Risk refers to all the potential threats to an organization. For the purposes of this post, we will focus on fraudulent and critical access and exposure of sensitive information – the avoidance of which is of primary importance for any organization. To these ends, the SAP applications GRC and IDM provide automated workflows, notifications, and reports for efficient management.
Fraudulent and critical access:
GRC has standard workflows known as user access reviews (UARs) and segregation of duties (SOD), which can periodically be triggered as ‘work-items’ to approvers (such as a user’s manager or risk owners) for review. A notification (mail) can be sent for each work-item. UAR work items show a users’s access and allow approvers to immediately remove or retain these accesses. A SOD work-item shows , thereby allowing risk owners to either mitigate or removing the same.
Periodic background jobs based on standard filters, such as user groups and SAP systems, can be scheduled to extract summary and detail reports. GRC also has a functionality called automated monitoring, which enables customization of monitoring of SOD risks. Risk reports can be tailored to belong to a specific business process or level. IDM provides tools (jobs) to create customized monitoring, such as role access reviews and critical access reports. These can be used to notify reviewers and auditors on critical accesses for their assessment.
Exposure of sensitive information:
Business-sensitive information pertaining to transaction, master, and configuration can easily be monitored through the process control module of GRC. This module has an automated monitoring feature, which can alert stakeholders on their monitoring criteria.
Examples of each of the three categories are:
Transactional: Detect number and total payment made to vendors
Master: Detect vendor master data, with identical bank account details
Configuration: Changes to release strategies, tolerance limits.
A pictorial representation an automated monitoring report is shown below.
Transaction: Total payment to a vendor
In this blog, standard ‘automated’ solutions from SAP GRC towards ‘Risk management’ are highlighted, which helps an organization stay compliant with Audit regulations, such as GDPR.
So, if you are looking towards protecting your enterprise from threats and ensuring a more secure governance, SAP’s Governance Risk and Compliance (GRC) component is the answer.
Please refer to the GRC website https://www.sap.com/products/technology-platforms/grc.html#access-governance, for more information.
If you want to discuss risk automation, please contact me.