Presentation is loading. Please wait.

Presentation is loading. Please wait.

SAP GRC access control @ ULg Pierre Blauwart – Project Manager HERUG BvD-it Confidential.

Similar presentations


Presentation on theme: "SAP GRC access control @ ULg Pierre Blauwart – Project Manager HERUG BvD-it Confidential."— Presentation transcript:

1 SAP GRC access control @ ULg
Pierre Blauwart – Project Manager HERUG BvD-it Confidential

2 Agenda ULG in a nutshell Context Definitions Methodology & Roadmap
Project status BvD-it Confidential

3 ULG – an all round university
17,000 students 3,800 foreign students 80 nationalities 3,200 graduates a year Budget : 269 millions Euros which 50 % are allocated to research 3,400 employees, of which 2,200 are teachers and researchers 3,000 employed at the University Hospital Centre (CHU) Around 1,500 jobs at the Liège Science Park (60 businesses) 900 jobs in spin-offs resulting from scientific research Just 60 minutes away from Brussels, the Grand Duchy of Luxemburg and France, 30 minutes away from Germany and the Netherlands, the University of Liège is at the heart of Europe. Financement vient des funds

4 ULG – SAP Implementation
SAP for Finance & Logistics : MM, SD, EP, CATS, PS, RRB, PCA, BI, PI, GRC 600 Users – 1000 Roles HR non SAP, SLCM non SAP Financement vient des funds Funds : more & more control, Audit on « segregation of duties » FP6

5 Context Trends in the ULg ecosystem: growing pressure to control the exposure to fraud and data tampering External: More & more controls from public grantors, with concerns on access procedure. This has resulted in audits driven by some of them & focused on segregation of duties Internal concern as well Segregation of duties: SoDs are a primary internal control intended to prevent, or decrease the risk of errors or irregularities, identify problems and ensure corrective action is taken. Principle : This is achieved by assuring no single individual has control over all phases of a business process. Example : Modify vendor bank account + Vendor payment Remediation : incompatible duties are divided, or segregated, among different people to reduce the risk of error or inappropriate actions. Grantors wants more & more to control their funds & expenses Concern about access procedure Financement vient des funds Funds : more & more control, Audit on « segregation of duties » FP6

6 Solution selection : SAP GRC Access control
GRC : Governance, Risk & Compliance Governance: Manages the strategic directives a company wants to follow Risk : Management assesses the areas of exposures and potential impacts Compliance: Tactical action to metigate risk SAP GRC Access Control monitor, test, and enforce access and authorization controls across the enterprise. Solution assessed Set up a GRC tool Use of detection solutions that operate on downloaded data Solution adopted : Install SAP GRC access control The essential feature of segregation of duties is that no single person should have responsibility for controls over an entire transaction. Mitigation

7 Scope of the project : Access Control

8 Scope of the project : Phase 1
Compliance Calibrator Firefighter Compliance Calibrator : Risk Analysis & remediation solution for access & authorization controls Firefighter : super user access control solution Enables compliance-focused emergency access for SAP Role expert : role definition & management solution - allows role owners to document role definition, perform automated risk assessments, track change control, and facilitate maintenance Enables entreprise role definition (& maintenance) in a single location Access enforcer: Prevent Compliant solution at run time - enables compliant provisioning by automating the user access request and approval process with embedded risk analysis. Compliance Calibrator

9 Project Roadmap - Step 1: Project Preparation
Implémentation Cycle 3 GRC Installation Version 5.2 Connected to ECC instance Proof-of-Concept : first risk assessment About Violations First action: drastically reduce SAP_ALL, SAP_NEW Scoping of phase 1 Risk have been grouped by BPO: FLC (Financial & Closing) OTC (Order to Cash) P2P (Procure to Pay) I2P (Idea to Project) Basis Component : out of scope Implémentation Cycle 2 Implémentation Cycle 1 Voir avec Vincent sur quelle machine GRC est installé ? RFC ... Proof of concept 5 Go Live & Support 4 1 2 3 remediation Risk assessment BvD-it Confidential

10 Risks per Business Process
BP : Finance & PS 32 risks SoD BP : Material Management 14 risks SoD BP : Purchasing 67 risks SoD BP : Customer (& grantors) invoicing 29 risks SoD BP : Basis – technical 19 risks SoD BP : EC-CS Consolidation 14 risks SoD BP : HR & payroll 21 risks SoD BP : APO 16 risks SoD BP : CRM 20 risks SoD BP : EBP & SRM 24 risks SoD

11 Step 2: Risk Assessment Workshops: Adapt the standard SOD matrix
Are the risks proposed in the standard matrix relevant ? Do we have to add some risks ? Do we have to consider additional transactions (transaction Z* ) ? Adapt GRC standard risks : Critical, High, Medium & Low Design (update) the SOD matrix in the SAP GRC system Run the risk assessment Perform analysis BvD-it Confidential

12 Ecrans GRC - CC Pg.: 12 | 19/11/2004 BvD-it Confidential

13 Ecrans GRC - CC Pg.: 13 | 19/11/2004 BvD-it Confidential

14 Ecrans GRC - CC Pg.: 14 | 19/11/2004 BvD-it Confidential

15 Ecrans GRC - CC Pg.: 15 | 10/06/2009 BvD-it Confidential

16 Risk assessment Results Recommendations on naming convention
98 % (516 out of 525) of the SAP users have SOD risks SOD violations on role “display” !!! Recommendations on naming convention The naming of the role gives an information on the underlying business process Use simple roles Aggregate simple roles in composite role Identify quickly the different roles : Roles simples : « Z:xxx », roles composites : « ZC:xxx » Roles display : « Z:xxx_V » Create one specific role dedicated per critical risk Remark on traceability : the system keeps the history of the violations related to the risk assessment  perform the first analysis in the acceptance system Pg.: 16 | 19/11/2004 BvD-it Confidential

17 Step 3 : on progress Remediation : no role can content a SOD violation
Mitigation : accept the risk for some user & enforce the control on it Use Firefighter : to track actions performed by super users during certain period of time (closing period for example) Integration on SAP EP BvD-it Confidential

18 Questions ? Send a mail to our CFO : Anne Girin anne.girin@ulg.ac.be
Pg.: 18 | 19/11/2004 BvD-it Confidential


Download ppt "SAP GRC access control @ ULg Pierre Blauwart – Project Manager HERUG BvD-it Confidential."

Similar presentations


Ads by Google