Automation of risk management in SAP

Publish date:

Risk management in SAP applications through automation via governance, risk, and compliance (GRC) and identity management (IDM) are key topics in this blog

Risk refers to all the potential threats to an organization. For the purposes of this post, we will focus on fraudulent and critical access and exposure of sensitive information – the avoidance of which is of primary importance for any organization. To these ends, the SAP applications GRC and IDM provide automated workflows, notifications, and reports for efficient management.

Fraudulent and critical access:

GRC has standard workflows known as  user access reviews (UARs) and segregation of duties (SOD), which can periodically be triggered as ‘work-items’ to approvers (such as a user’s manager or risk owners) for review. A notification (mail) can be sent for each work-item. UAR work items show a users’s access  and allow approvers to immediately remove or retain these accesses. A SOD work-item shows , thereby allowing risk owners to either mitigate or removing the same.

Periodic background jobs based on standard filters, such as user groups and SAP systems, can be scheduled to extract summary and detail reports. GRC also has a functionality called automated monitoring, which enables customization of monitoring of SOD risks. Risk reports can be tailored to belong to a specific business process or level. IDM provides tools (jobs) to create customized monitoring, such as role access reviews and critical access reports. These can be used to notify reviewers and auditors on critical accesses for their assessment.

Exposure of sensitive information:

Business-sensitive information pertaining to transaction, master, and configuration can easily be monitored through the process control module of GRC. This module has an  automated monitoring feature, which can alert stakeholders on their monitoring criteria.

Examples of each of the three categories are:

Transactional: Detect number and total payment made to vendors

Master: Detect vendor master data, with identical bank account details

Configuration: Changes to release strategies, tolerance limits.

A pictorial representation an automated monitoring report is shown below.

Transaction: Total payment to a vendor

In this blog, standard ‘automated’ solutions from SAP GRC towards ‘Risk management’ are highlighted, which helps an organization stay compliant with Audit regulations, such as GDPR.

So, if you are looking towards protecting your enterprise from threats and ensuring a more secure governance, SAP’s Governance Risk and Compliance (GRC) component is the answer.

Please refer to the GRC website https://www.sap.com/products/technology-platforms/grc.html#access-governance, for more information.

If you want to discuss risk automation, please contact me.

Related Posts

AWS

Being Zeus in the Cloud

Prabhakar Lal
Date icon June 25, 2020

I’ve met multiple cloud service providers to discuss ongoing or potential opportunities and...

cloud

Move-2-Cloud or Move-2-SAP S/4HANA, or both?

Gianluca Simeone
Date icon June 25, 2020

Common questions from our Customers include “Do I first have to move to the cloud and then to...

microsoft

The Renewable Enterprise: Servitization with SAP and Microsoft!

Alex Bulat
Date icon June 25, 2020

A lot has been written and published on the subject of servitization, which I don’t want to...