SlideShare a Scribd company logo
1 of 43
Download to read offline
Leverage Technology:
Move Your Business Forward™
Risk and Compliance Financial Reporting Internal Audit Controls Catalog Application Security Advanced Analytics
A Leader in Risk Based Enterprise Controls Management Solutions
Copyright ©. Fulcrum Information Technology, Inc.Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes
Learn	
  Role	
  and	
  Responsibility	
  Design	
  Techniques	
  that	
  strengthen	
  Segrega9on	
  of	
  Duty	
  Controls	
  
and	
  boost	
  User	
  Produc9vity	
  in	
  Oracle	
  E-­‐Business	
  Suite	
  
Third Thursday Training Webinar Series
Adil Khan, Managing Director
February 19th, 2015
www.fulcrumway.comPage 2Copyright © FulcrumWay
Strengthen Segregation of Duty Controls and Boost
User Productivity
  Introductions
  Fundamentals of Oracle EBS Security Model
  Checklist of User Security Risks
  Security Assessment Approach
  Role Design Techniques
  Case Study
  Q&A
Agenda
www.fulcrumway.comPage 3Copyright © FulcrumWay
Strengthen Segregation of Duty Controls and Boost
User Productivity
  Introductions
  Fundamentals of Oracle EBS Security Model
  Checklist of User Security Risks
  Security Assessment Approach
  Role Design Techniques
  Case Study
  Q&A
Agenda
www.fulcrumway.comPage 4Copyright © FulcrumWay
A Leader in Risk Based Controls Management™
FulcrumWay: is the #1 End-to-End Provider of Risk Based Enterprise Controls Management
Solutions for Oracle EBS, PeopleSoft and JDE customers with over 200 Fortune-500 to Middle
Market clients. Since 2003, we have successfully assisted companies across all major industry
segments.
Expertise: Risk Advisory Services. Advanced Controls Design for Enterprise Applications. Best
Practices for Risk Mitigation and Internal Controls Automation. Audit, Compliance, Financial,
Enterprise and Operational Risk Assessments. Risk Remediation Services.
Packaged Solutions: FulcrumWay is the #1 choice of Oracle customers for Oracle GRC Advanced
Controls, GRC Manager, and GRC Intelligence/OBIEE software implementation. Oracle has certified
us as the only partner with Accelerators for Oracle GRC. We also provide Managed Services
Software Services: Risk Assessment for ERP systems, Control Design and Management Tools,
Controls Catalog, Enterprise Risk Manager, Financial Reporting Manager, Audit Manager
USA Presence: Privately held Delaware Corporation with US offices in New York City, Dallas and San
Francisco
International Presence: in Auckland, Chennai, Johannesburg, London, Mexico City
FulcrumWay
www.fulcrumway.comPage 5Copyright © FulcrumWay
FulcrumWay ClientsSuccessful
Track Record
Government Oil and Gas
Healthcare
Communications
Financial Services
Transportation Natural ResourcesManufacturing
Retail
High TechMedia/Entertainment Life Sciences
www.fulcrumway.comPage 6Copyright © FulcrumWay
FulcrumWay™ Insight
Thought Leadership
Co-Authored GRC Book: First book on GRC for Oracle
Applications
SROAUG GRC Solution Lab - February 27th – Los
Angels: GRC Case Studies and Best Practices
Innovate 15 – March 19th – Iselin, NJ -GRC Case
Studies and Best Practices
Collaborate 15 – GRC Client Appreciation Dinner April
13th, 2015 Las Vegas
IIA/ISACA GRC Conference – August 17th - 19th, 2015 -
Presentations – GRC Case Studies and Best Practices
Educational Webcasts – Every 3rd Thursday of the
Month – GRC Best Practices, Trends and Expert Insight
Oracle Open World – Annual GRC Dinner on October
26th, 2015 - San Francisco, CA
LinkedIn –FulcrumWay Risk, Compliance and Audit
Software Group
YouTube Podcasts – FulcrumWay Instant Insight in 10
min or less
Proven Expertise
www.fulcrumway.comPage 7Copyright © FulcrumWay
Strengthen Segregation of Duty Controls and Boost
User Productivity
  Introductions
  Fundamentals of Oracle EBS Security Model
  Checklist of User Security Risks
  Security Assessment Approach
  Role Design Techniques
  Case Study
Agenda
www.fulcrumway.comPage 8Copyright © FulcrumWay
Responsibility
Form
Complicated Security Model
High Risk of Access Control Deficiencies
Menu
Function
User
Evaluate User Access
•  Test by User
•  Test by Privilege
Manage
Segregation of Duties
•  Identify incompatible Privileges
•  Predefined & Extensible SOD
Rule Sets
Fundamentals
www.fulcrumway.comCopyright © FulcrumWay
Complicated Security Model
High Risk of Access Control DeficienciesFundamentals
Oracle	
  EBS	
  User	
  
Password	
  Policy	
  
User	
  is	
  assigned	
  
to	
  the	
  HR	
  Record	
  
Ac:ve/Inac:ve	
  
User	
  
One	
  or	
  more	
  
responsibili:es	
  
assigned	
  to	
  a	
  User	
  
A	
  Responsibility	
  
has	
  many	
  Menus	
  
and	
  Sub-­‐Menus	
  	
  
Menu	
  has	
  many	
  
func:ons	
  /	
  forms	
  
www.fulcrumway.comCopyright © FulcrumWay
Complicated Security Model
High Risk of Access Control DeficienciesFundamentals
Menu	
  has	
  
prompts	
  that	
  user	
  
can	
  see	
  to	
  
navigate	
  
Grant	
  Flag	
  
enables	
  access	
  to	
  
the	
  Sub-­‐Menu	
  or	
  
Func:on	
  
Menu	
  has	
  
prompts	
  that	
  user	
  
can	
  see	
  to	
  
navigate	
  
A menu is a hierarchical arrangement of application functions (forms). In the definition of a responsibility, the specified menu
defines what is displayed in the navigator. The specified menu does not necessarily define the functions that can be
accessed by the responsibility, which are granted.
www.fulcrumway.comCopyright © FulcrumWay
Complicated Security Model
High Risk of Access Control DeficienciesFundamentals
Func:ons	
  enable	
  
users	
  to	
  view,	
  enter,	
  
update,	
  delete	
  data	
  
on	
  a	
  Form	
  
Responsibility	
  -­‐	
  The	
  func:on	
  is	
  controlled	
  by	
  the	
  
user's	
  responsibility	
  
Organiza:on	
  -­‐	
  The	
  func:on	
  is	
  controlled	
  by	
  the	
  
user's	
  organiza:on	
  
Security	
  Group	
  -­‐	
  The	
  func:on	
  is	
  controlled	
  by	
  the	
  
user's	
  security	
  group	
  
A function is a part of an application's functionality that is registered under a unique name for the purpose of assigning it to,
or excluding it from, a responsibility.
Oracle	
  EBS	
  User	
  
have	
  access	
  to:	
  
Self	
  Service	
  Web	
  
Pages	
  
www.fulcrumway.comCopyright © FulcrumWay
Complicated Security Model
High Risk of Access Control DeficienciesFundamentals
If	
  you	
  specify	
  the	
  
parameter	
  
QUERY_ONLY=YES,	
  
the	
  form	
  opens	
  in	
  
query-­‐only	
  mode.	
  
www.fulcrumway.comCopyright © FulcrumWay
Complicated Security Model
High Risk of Access Control DeficienciesFundamentals
The	
  Form	
  Personaliza:on	
  feature	
  allows	
  
you	
  to	
  declara:vely	
  alter	
  the	
  behavior	
  of	
  
Forms-­‐based	
  screens,	
  including	
  changing	
  
proper:es,	
  execu:ng	
  buil:ns,	
  displaying	
  
messages,	
  and	
  adding	
  menu	
  entries.	
  
www.fulcrumway.comCopyright © FulcrumWay
Complicated Security Model
High Risk of Access Control DeficienciesFundamentals
A	
  profile	
  is	
  a	
  set	
  of	
  changeable	
  op:ons	
  that	
  affect	
  the	
  way	
  
your	
  applica:on	
  looks	
  and	
  behaves.	
  You	
  can	
  set	
  user	
  
profile	
  op:ons	
  at	
  different	
  levels:	
  site,	
  applica:on,	
  
responsibility,	
  user,	
  server,	
  and	
  organiza:on,	
  depending	
  
on	
  how	
  the	
  profile	
  op:ons	
  are	
  defined.	
  
www.fulcrumway.comCopyright © FulcrumWay
Complicated Security Model
High Risk of Access Control DeficienciesFundamentals
You	
  can	
  use	
  request	
  security	
  groups	
  
to	
  specify	
  the	
  reports,	
  request	
  sets,	
  
and	
  concurrent	
  programs	
  that	
  your	
  
users	
  can	
  run	
  from	
  a	
  standard	
  
submission	
  form,	
  such	
  as	
  the	
  Submit	
  
Requests	
  form.	
  
www.fulcrumway.comCopyright © FulcrumWay
Strengthen Segregation of Duty Controls and Boost
User Productivity
  Introductions
  Fundamentals of Oracle EBS Security Model
  Checklist of User Security Risks
  Security Assessment Approach
  Role Design Techniques
  Case Study
Agenda
www.fulcrumway.comCopyright © FulcrumWay
Security Risk Factors
  Complexity of ERP System Security Model
–  An average Oracle EBS R12 customer has over 35,000 functions and 12,500
menus
  Effectiveness Roles Design
–  Single Global Roles Template or wide variation based on user needs
  Completeness of User Provisioning Process
–  Does user provisioning process include control warnings for approvers?
  Auditability of ERP Configuration and Data Access
–  Can you track ALL changes to key setup and or master data?
  Number of ERP environments
–  Do you need to control access to multiple ERP systems?
Checklist
www.fulcrumway.comPage 18Copyright © FulcrumWay
Security questions to benchmark ERP
security maturity (Qualitative Analysis)Checklist
Do	
  the	
  ERP	
  Roles	
  
meet	
  requirements	
  
for	
  all	
  users?	
  
Does	
  User	
  
provisioning	
  
prevent	
  security	
  
policy	
  viola:ons?	
  
How	
  do	
  you	
  
monitor	
  “super-­‐
user”	
  ac:vi:es?	
  
Do	
  you	
  obtain	
  user	
  
access	
  verifica:on	
  
from	
  managers,	
  
periodically?	
  	
  	
  
How	
  do	
  you	
  detect	
  
Segrega:on	
  of	
  Duty	
  
policy	
  viola:ons?	
  
Is	
  access	
  to	
  
sensi:ve	
  data	
  and	
  
func:ons	
  
protected?	
  
Do	
  you	
  maintain	
  
audit	
  trail	
  on	
  ERP	
  
configura:on	
  
controls?	
  
Can	
  you	
  prevent	
  
unauthorized	
  
Master	
  Data	
  
changes?	
  
How	
  do	
  you	
  ensure	
  
that	
  terminated	
  
employees	
  can’t	
  
access	
  ERP?	
  
www.fulcrumway.comCopyright © FulcrumWay
User: John Doe
Responsibility: Payables Manager, US
Menu: AP_Navigate_GUI12
Submenu: AP_Invoices_Entry
Function: Invoice Batches
User: Mike Jones
Payables Users
Responsibility: Payables Supervisor
Responsibility:
Payables UserMenu: UK_AP_Navigate_GUI12
SubMenu: AP_Invoices_Entry
SubMenu: AP_Invoices_GUI12_G Menu: AX_Payables_User
Responsibility: Payables Supervisor
Responsibility: Payables Manager, US
Responsibility:
Payables User
What if we exclude ‘Invoice
Batches’ from
AP_Invoices_Entry?
Root Cause Analysis is
required for remediation!
Checklist Quantitative Analysis of Security Model
www.fulcrumway.comCopyright © FulcrumWay
Strengthen Segregation of Duty Controls and Boost
User Productivity
  Introductions
  Fundamentals of Oracle EBS Security Model
  Checklist of User Security Risks
  Security Assessment Approach
  Role Design Techniques
  Case Study
Agenda
www.fulcrumway.comCopyright © FulcrumWay
Risk Based Access Management
Detect/
Analyze
Findings
Implement
Corrective
Actions
Monitor
Controls
Scope
Application
Controls
Sample
ERP
Data
Manage
Exceptions
Implement
Controls
Risk Advisors/
ERP Managers/
Control Owners
Risk Advisors/
Control Owners
Control
Owners/
ERP
Managers
Establish
Test
Environment
Assess RiskIdentify Risk
Design Controls
Advanced
Controls
Experts/
ERP Managers
Approach
www.fulcrumway.comCopyright © FulcrumWay
Top Down Risk Based Approach to Application
Controls
What	
  are	
  the	
  enterprise	
  wide	
  risks	
  
that	
  need	
  to	
  be	
  
Assessed?	
  
Which	
  business	
  processes	
  are	
  impacted	
  by	
  
these	
  risks?	
  
Which	
  ERP	
  apps	
  are	
  used	
  to	
  perform	
  these	
  
processes	
  
Where	
  (business	
  loca9ons)	
  are	
  the	
  
processes	
  performed	
  
What	
  applica9on	
  func9ons	
  control	
  the	
  
processes?	
  	
  
Identify Risks
www.fulcrumway.comCopyright © FulcrumWay
Application Risk Factors
Risk	
  Threshold	
  
AR	
  
AP	
   GL	
  
INV	
  
INV	
  
PR	
  
HR	
  
OM	
  
PO	
  
FA	
   List	
  of	
  
Apps	
  
Primary	
  
Process	
  
Enabler	
  
Financial	
  /
Sensi9ve	
  
Data	
  
Custom	
  
Code	
  
	
  
Freq.	
  of	
  
Changes	
  
Audit	
  
Logs	
  
Risk	
  
Ra9ng	
  
GL	
   8	
   9	
   5	
   9	
   8	
   34	
  
AP	
   7	
   7	
   6	
   8	
   9	
   32	
  
AR	
   7	
   7	
   9	
   9	
   7	
   39	
  
FA	
   5	
   5	
   5	
   5	
   5	
   25	
  
PO	
   5	
   5	
   4	
   6	
   4	
   24	
  
AP	
   GL	
  
AR	
   Risk Scale: Highest 10
Risk Threshold: Over 30
Assess Risks
www.fulcrumway.comCopyright © FulcrumWay
ERP Control Methods
Monitor Controls
Mitigate Remediate & Prevent
Accept
High Risk
Medium Risk
Medium Risk
Low Risk
Low
High
High
I
M
P
A
C
T
PROBABILITY
Treat Risk
www.fulcrumway.comCopyright © FulcrumWay
Strengthen Segregation of Duty Controls and Boost
User Productivity
  Introductions
  Fundamentals of Oracle EBS Security Model
  Checklist of User Security Risks
  Security Assessment Approach
  Role Design Techniques
  Case Study
Agenda
www.fulcrumway.comCopyright © FulcrumWay
Role Design
Build roles that strengthen security
and user productivty
1.	
  Extract/Map	
  
Roles	
  
• Extract	
  
Security	
  
Model	
  from	
  
the	
  Source.	
  
This	
  step	
  
requires	
  
mapping	
  of	
  
all	
  security	
  
tables	
  as	
  well	
  
as	
  any	
  
ajributes	
  
that	
  limit	
  
access	
  to	
  
source	
  
system	
  
func:ons	
  
and	
  data.	
  	
  	
  
2.	
  Configure	
  	
  
Security	
  Sekngs	
  
• Using	
  the	
  
Role	
  
migra:on	
  
map,	
  and	
  
security	
  
configura:on	
  
data,	
  create	
  
target	
  roles	
  
base	
  on	
  the	
  
target	
  
configura:on	
  
ajributes	
  
available.	
  	
  
3.	
  Configure	
  Data	
  
Access	
  
• Apply	
  
repor:ng	
  
and	
  data	
  
access	
  
ajributes	
  
available	
  in	
  
the	
  target	
  
system	
  based	
  
on	
  the	
  role	
  
migra:on	
  
map.	
  	
  	
  
4.	
  Apply	
  Security	
  
Ajributes	
  	
  
• Apply	
  
securing	
  
ajributes	
  
such	
  as	
  
security	
  
exclusion	
  or	
  
inclusion	
  
ajributes	
  
from	
  the	
  
source	
  
system	
  roles	
  
that	
  map	
  to	
  
the	
  target	
  
system	
  
5.	
  Compare	
  
Source	
  and	
  Target	
  	
  
• Generate	
  
reports	
  from	
  
the	
  Roles	
  
Manager	
  to	
  
compare	
  and	
  
confirm	
  that	
  
the	
  target	
  
roles	
  are	
  
migra:ng	
  
from	
  the	
  
source	
  roles	
  
according	
  to	
  
the	
  security	
  
migra:on	
  
map.	
  	
  	
  
6.	
  Obtain	
  Role	
  
Approval	
  
• Provide	
  Role	
  
hierarchy	
  
report	
  to	
  
business	
  and	
  
IT	
  users	
  to	
  
obtain	
  
approval	
  for	
  
deployment	
  
into	
  the	
  
target	
  
system	
  for	
  
Role	
  tes:ng.	
  
7.	
  Deploy	
  Roles	
  to	
  
Business	
  Units	
  
• Once	
  the	
  
source	
  roles	
  
are	
  accepted	
  
by	
  ERP	
  
system	
  users,	
  
each	
  role	
  is	
  
deployed	
  for	
  
the	
  business	
  
units	
  within	
  
scope	
  
www.fulcrumway.comCopyright © FulcrumWay
Advanced Analytics to Accelerate Role
Design
Pre-­‐built	
  Risk	
  Analy9cs.	
  	
  Risk	
  Reports	
  available	
  for	
  client	
  review	
  
Risk Advisors identifies controls violations and has the capability to analyze
issues, remove false positives to prepare the findings report	
  
Role Design
www.fulcrumway.comCopyright © FulcrumWay
Strengthen Segregation of Duty Controls and Boost
User Productivity
  Introductions
  Fundamentals of Oracle EBS Security Model
  Checklist of User Security Risks
  Security Assessment Approach
  Role Design Techniques
  Case Study
  Q&A
Agenda
www.fulcrumway.comCopyright © FulcrumWay
Global car and equipment rental company, improves
employee productivity
Our	
  Client	
  
  Leader	
  in	
  the	
  car	
  and	
  equipment	
  rental	
  businesses	
  
worldwide	
  
  Providing	
  quality	
  car	
  rental	
  service	
  for	
  over	
  90	
  years.	
  
  Over	
  30,000	
  employees	
  
Challenges	
  
  Replace	
  mul9ple	
  legacy	
  systems	
  with	
  one	
  ERP	
  
solu9on	
  
  Improved	
  Segrega9on	
  of	
  Duty	
  controls	
  within	
  
mission	
  cri9cal	
  applica9ons	
  	
  
  Maintain	
  consistent	
  ERP	
  system	
  access	
  roles	
  	
  
across	
  the	
  subsidiaries	
  leveraging	
  the	
  shared	
  
services	
  model	
  	
  
  Increase	
  external	
  auditor’s	
  reliance	
  on	
  ERP	
  Access	
  
Controls	
  Monitoring	
  
Solu9ons	
  
	
  ERP	
  Controls	
  Catalog	
  
	
  ERP	
  Roles	
  Monitor	
  
	
  
Results:	
  	
  
  Reduce	
  ERP	
  Role	
  design,	
  build,	
  tes9ng	
  and	
  
implementa9on	
  9me	
  by	
  80%	
  resul9ng	
  in	
  over	
  $200,000	
  
cost	
  savings	
  during	
  ERP	
  system	
  implementa9on	
  and	
  
global	
  roll-­‐out.	
  	
  
  Created	
  over	
  100	
  Segrega9on	
  of	
  Duty	
  compliant	
  Roles	
  
by	
  business	
  segment	
  with	
  two	
  weeks	
  from	
  FulcrumWay	
  
Role	
  Templates	
  within	
  the	
  controls	
  catalog.	
  	
  
  Lowered	
  ERP	
  Total	
  Cost	
  of	
  Ownership	
  by	
  reducing	
  SoD	
  
remedia9on	
  9me	
  and	
  costs	
  by	
  ensuring	
  that	
  all	
  users	
  a	
  
assigned	
  only	
  the	
  pre-­‐approved	
  Roles	
  
  Improve	
  SoD	
  and	
  Access	
  Controls	
  tes9ng	
  9me	
  by	
  
providing	
  auditors	
  the	
  access	
  log	
  reports	
  showing	
  all	
  
Update,	
  Review	
  and	
  Approve	
  Role	
  design	
  changes.	
  	
  
  Accelerated	
  ERP	
  tes9ng	
  and	
  deploying	
  9me	
  by	
  
iden9fying	
  SOD	
  conflicts	
  before	
  the	
  Roles	
  are	
  assigned	
  
to	
  Users.	
  	
  
	
  
Case Study
www.fulcrumway.comPage 30Copyright © FulcrumWay
Enterprise Controls Platform
Compensating
Policies
Preventive
Provisioning
Remediation
(Clean-up)
Access
Analysis
•  Accelerate deployment and time to
value with ready-made controls library
•  Mitigate risk of inappropriate user
access with approval workflow and
audit trails
•  Simplify segregation of duties
enforcement with simulation and
remediation
Define Access
Controls
Detection Prevention
GRC Manager
SOD &
Access
Application
Configuration
Transaction
Monitoring
GRC Intelligence
Advanced Controls
Application Access Controls
Embed Controls Natively in Enterprise Apps
Case Study
www.fulcrumway.comCopyright © FulcrumWay
FulcrumWay Roles Manager Overview
Eliminate Root Cause of Access Control Violations in ERP:
  Improve Segregation of Duty controls within mission critical applications
  Reduce ERP implementation and upgrade costs with pre-configured roles
  Lower ERP Total Cost of Ownership by assigning pre-approved Roles
We enable ERP Administrators:
  Select pre-configured ERP roles from a roles catalog
  Update, Review and Approve Role design changes.
  Identify SOD conflicts before the Roles are assigned to Users.
Case Study
www.fulcrumway.comCopyright © FulcrumWay
  Role Manager is an ERP security design tool
  Contains a pre-configured catalog of roles which comply with segregation of
duty (SOD) policies.
  Roles by ERP module and typical access requirements for those modules
such as Manager, Supervisor, Clerk, Inquiry, Business Setup and IT Setup.
  You can use this tool to view existing role templates and design new roles
by easily selecting or deselecting ERP functions/transaction.
  Once you complete the roles design, you can send it, using workflows, to
pre-assigned reviewers and approvers to finalize the roles.
  The role preparers, reviewers and approvers can also assess the SOD
control risks before finalizing the roles.
  Leverage FW DataProbe/Scripts to load current Roles
  Secure Access from fulcrumway.com portal
Role Design FulcrumWay Roles Manager Features
www.fulcrumway.comCopyright © FulcrumWay
Access to Roles ManagerRole Design
Sign-­‐in	
  to	
  ERP	
  Controls	
  and	
  Navigate	
  to	
  Roles	
  Manager	
  at	
  FulcrumWay.com	
  
Roles	
  Manager	
  is	
  a	
  component	
  of	
  the	
  FulcrumWay	
  Risk	
  Remedia9on	
  so^ware	
  services	
  	
  that	
  is	
  
available	
  instantly	
  over	
  a	
  	
  secure	
  internet-­‐connec9on.	
  
www.fulcrumway.comCopyright © FulcrumWay
Select	
  the	
  Access	
  Monitor	
  Icon.	
  	
  	
  	
  	
  Then	
  click	
  on	
  the	
  Maintain	
  Access	
  Roles	
  Tab	
  	
  
Search and Browse through catalog of
Roles for Oracle EBS R12
Roles	
  Manager	
  contains	
  hundreds	
  of	
  Oracle	
  EBS	
  Responsibili9es	
  with	
  SOD	
  Controls	
  
Designed	
  into	
  the	
  configura9on	
  to	
  give	
  you	
  a	
  jump	
  start	
  
Role Design
www.fulcrumway.comCopyright © FulcrumWay
Access to Roles Manager
Use	
  a	
  “source”	
  role	
  to	
  create	
  a	
  new	
  “target”	
  role.	
  	
  View	
  exis9ng	
  SOD	
  issues	
  with	
  the	
  “source”	
  role.	
  	
  
Assign	
  Reviewers	
  and	
  Approvers	
  for	
  the	
  role	
  
Embed	
  SOD	
  Controls	
  into	
  Oracle	
  Responsibili9es	
  design	
  by	
  elimina9ng	
  conflic9ng	
  business	
  
ac9vi9es	
  inherent	
  in	
  the	
  EBS	
  Responsibility	
  configura9on	
  	
  
Role Design
www.fulcrumway.comCopyright © FulcrumWay
Access to Roles ManagerRole Design
Select/	
  Deselect	
  business	
  ac9vi9es	
  to	
  update	
  Role	
  configura9on	
  automa9cally	
  
Reduce	
  Role	
  design	
  9me	
  and	
  effort	
  by	
  selec9ng	
  business	
  ac9vi9es	
  to	
  drive	
  the	
  
configura9on	
  of	
  Oracle	
  Responsibili9es.	
  	
  	
  
www.fulcrumway.comCopyright © FulcrumWay
ERP Role Provisioning
Save Precious Time Verifying Role Provision Request
  Prevent Unauthorized Systems Access
  Reduce the Risk of Internal Fraud
  Improve Your Compliance Audit Trail
We enable Security/ERP Administrators:
  Automate manual access request processes
  Ensure there are no unauthorized users
  Detect and prevent disallowed access attempts
Case Study
www.fulcrumway.comCopyright © FulcrumWay
	
  Monitor	
  Role	
  Assignment	
  Requests	
  Mitigate Access
Risks
Monitor	
  controls	
  over	
  the	
  user	
  provisioning	
  process.	
  	
  Maintain	
  audit	
  log	
  	
  
Reduce	
  SOD	
  viola9ons	
  by	
  monitoring	
  User	
  Access	
  Requests	
  at	
  Helpdesk	
  and	
  
perform	
  SOD	
  analysis	
  before	
  access	
  is	
  granted	
  	
  
www.fulcrumway.comCopyright © FulcrumWay
Periodically Verify Role Assignments
Save Precious Time Verifying User Access
  Detect Unauthorized Systems Access
  Automate User Access Review
  Improve Your Compliance Audit Trail
We enable Security/ERP Administrators:
  Ensure there are no unauthorized users
  Maintain universal access security compliance
Monitor Access
Risks
www.fulcrumway.comCopyright © FulcrumWay
Prevent	
  dormant	
  user	
  role	
  assignments	
  Monitor Access
Risks
Send	
  user	
  access	
  verifica9on	
  request	
  to	
  applica9on	
  control	
  owners	
  using	
  
“passkey”	
  to	
  verify	
  ot	
  terminate	
  access	
  
Monitor	
  User	
  Access	
  to	
  Responsibility/Role	
  and	
  Func9ons	
  	
  
	
  	
  
www.fulcrumway.comCopyright © FulcrumWay
Compensating Controls for Privileged
(super-user) roles
Apply Continuous Monitoring to ERP Controls
  Minimize Process Errors and Losses
  Maintain compliance with regulations and internal policies
  Reduce the Cost of Risk and Audit
We enable Business and IT Managers:
  Meet your organizational control objectives
  Complete your controls monitoring repository
  Apply policies and rules to each business cycle
Case Study
www.fulcrumway.comCopyright © FulcrumWay
FW Controls Catalog with over 1,000
advance controls
Select	
  SOD,	
  Master	
  Data,	
  Setup,	
  and	
  Transac9on	
  Controls	
  Risk	
  Assessment	
  
Detect	
  control	
  weaknesses	
  across	
  ERP	
  system	
  to	
  iden9fy	
  business	
  process	
  
op9miza9on	
  opportuni9es	
  
Case Study
www.fulcrumway.comCopyright © FulcrumWay
Leader in Risk Based Management ControlsQ & A
Visit Resources to get
started with Security
Assessment and Role
Design

More Related Content

Similar to FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Strengthen SOD Controls & Boost User Productivity in Oracle EBS

Reduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniquesReduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniquesactjax
 
Webinar feb 16 2017 Learn to Streamline User Provisioning process in Oracle A...
Webinar feb 16 2017 Learn to Streamline User Provisioning process in Oracle A...Webinar feb 16 2017 Learn to Streamline User Provisioning process in Oracle A...
Webinar feb 16 2017 Learn to Streamline User Provisioning process in Oracle A...Alice Cantu
 
FulcrumWay - Ed. Webinar - Identify and Eliminate False Positives from your S...
FulcrumWay - Ed. Webinar - Identify and Eliminate False Positives from your S...FulcrumWay - Ed. Webinar - Identify and Eliminate False Positives from your S...
FulcrumWay - Ed. Webinar - Identify and Eliminate False Positives from your S...FulcrumWay
 
FulcrumWay - Implement Effective Access Controls within your Oracle ERP System
FulcrumWay - Implement Effective Access Controls within your Oracle ERP SystemFulcrumWay - Implement Effective Access Controls within your Oracle ERP System
FulcrumWay - Implement Effective Access Controls within your Oracle ERP SystemFulcrumWay
 
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle AppsSroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle AppsJane Jones
 
FulcrumWay Webinar - Fusion Security
FulcrumWay Webinar - Fusion SecurityFulcrumWay Webinar - Fusion Security
FulcrumWay Webinar - Fusion Securityactjax
 
Learn the latest trends and tools to help you id and remediate SOD
Learn the latest trends and tools to help you id and remediate SODLearn the latest trends and tools to help you id and remediate SOD
Learn the latest trends and tools to help you id and remediate SODAlice Cantu
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Oracle
 
FulcrumWay - Effective Ways to Assess ERP Controls 2014
FulcrumWay - Effective Ways to Assess ERP Controls 2014FulcrumWay - Effective Ways to Assess ERP Controls 2014
FulcrumWay - Effective Ways to Assess ERP Controls 2014FulcrumWay
 
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & ImplementationsThousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & ImplementationsOracle
 
Secure Development on the Salesforce Platform - Part I
Secure Development on the Salesforce Platform - Part ISecure Development on the Salesforce Platform - Part I
Secure Development on the Salesforce Platform - Part ISalesforce Developers
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC SolutionsMantala
 
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOptimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOracle
 
Epm fm-1111x-provisioning-whitepape-133674
Epm fm-1111x-provisioning-whitepape-133674Epm fm-1111x-provisioning-whitepape-133674
Epm fm-1111x-provisioning-whitepape-133674Sathya Narayanan
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information GovernanceJohn Newton
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditoreprentise
 
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...Oracle
 
Comcast, Integra LifeSciences, LPL Financial, and Smucker's - Doing Your ERP ...
Comcast, Integra LifeSciences, LPL Financial, and Smucker's - Doing Your ERP ...Comcast, Integra LifeSciences, LPL Financial, and Smucker's - Doing Your ERP ...
Comcast, Integra LifeSciences, LPL Financial, and Smucker's - Doing Your ERP ...Oracle
 
Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire Services Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire Services Marlabs
 

Similar to FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Strengthen SOD Controls & Boost User Productivity in Oracle EBS (20)

Reduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniquesReduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniques
 
Webinar feb 16 2017 Learn to Streamline User Provisioning process in Oracle A...
Webinar feb 16 2017 Learn to Streamline User Provisioning process in Oracle A...Webinar feb 16 2017 Learn to Streamline User Provisioning process in Oracle A...
Webinar feb 16 2017 Learn to Streamline User Provisioning process in Oracle A...
 
FulcrumWay - Ed. Webinar - Identify and Eliminate False Positives from your S...
FulcrumWay - Ed. Webinar - Identify and Eliminate False Positives from your S...FulcrumWay - Ed. Webinar - Identify and Eliminate False Positives from your S...
FulcrumWay - Ed. Webinar - Identify and Eliminate False Positives from your S...
 
FulcrumWay - Implement Effective Access Controls within your Oracle ERP System
FulcrumWay - Implement Effective Access Controls within your Oracle ERP SystemFulcrumWay - Implement Effective Access Controls within your Oracle ERP System
FulcrumWay - Implement Effective Access Controls within your Oracle ERP System
 
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle AppsSroaug  October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
 
FulcrumWay Webinar - Fusion Security
FulcrumWay Webinar - Fusion SecurityFulcrumWay Webinar - Fusion Security
FulcrumWay Webinar - Fusion Security
 
Learn the latest trends and tools to help you id and remediate SOD
Learn the latest trends and tools to help you id and remediate SODLearn the latest trends and tools to help you id and remediate SOD
Learn the latest trends and tools to help you id and remediate SOD
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
FulcrumWay - Effective Ways to Assess ERP Controls 2014
FulcrumWay - Effective Ways to Assess ERP Controls 2014FulcrumWay - Effective Ways to Assess ERP Controls 2014
FulcrumWay - Effective Ways to Assess ERP Controls 2014
 
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & ImplementationsThousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
 
Secure Development on the Salesforce Platform - Part I
Secure Development on the Salesforce Platform - Part ISecure Development on the Salesforce Platform - Part I
Secure Development on the Salesforce Platform - Part I
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
 
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOptimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
 
Epm fm-1111x-provisioning-whitepape-133674
Epm fm-1111x-provisioning-whitepape-133674Epm fm-1111x-provisioning-whitepape-133674
Epm fm-1111x-provisioning-whitepape-133674
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information Governance
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditor
 
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
 
Resume
ResumeResume
Resume
 
Comcast, Integra LifeSciences, LPL Financial, and Smucker's - Doing Your ERP ...
Comcast, Integra LifeSciences, LPL Financial, and Smucker's - Doing Your ERP ...Comcast, Integra LifeSciences, LPL Financial, and Smucker's - Doing Your ERP ...
Comcast, Integra LifeSciences, LPL Financial, and Smucker's - Doing Your ERP ...
 
Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire Services Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire Services
 

Recently uploaded

Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 

Recently uploaded (20)

Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 

FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Strengthen SOD Controls & Boost User Productivity in Oracle EBS

  • 1. Leverage Technology: Move Your Business Forward™ Risk and Compliance Financial Reporting Internal Audit Controls Catalog Application Security Advanced Analytics A Leader in Risk Based Enterprise Controls Management Solutions Copyright ©. Fulcrum Information Technology, Inc.Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Learn  Role  and  Responsibility  Design  Techniques  that  strengthen  Segrega9on  of  Duty  Controls   and  boost  User  Produc9vity  in  Oracle  E-­‐Business  Suite   Third Thursday Training Webinar Series Adil Khan, Managing Director February 19th, 2015
  • 2. www.fulcrumway.comPage 2Copyright © FulcrumWay Strengthen Segregation of Duty Controls and Boost User Productivity   Introductions   Fundamentals of Oracle EBS Security Model   Checklist of User Security Risks   Security Assessment Approach   Role Design Techniques   Case Study   Q&A Agenda
  • 3. www.fulcrumway.comPage 3Copyright © FulcrumWay Strengthen Segregation of Duty Controls and Boost User Productivity   Introductions   Fundamentals of Oracle EBS Security Model   Checklist of User Security Risks   Security Assessment Approach   Role Design Techniques   Case Study   Q&A Agenda
  • 4. www.fulcrumway.comPage 4Copyright © FulcrumWay A Leader in Risk Based Controls Management™ FulcrumWay: is the #1 End-to-End Provider of Risk Based Enterprise Controls Management Solutions for Oracle EBS, PeopleSoft and JDE customers with over 200 Fortune-500 to Middle Market clients. Since 2003, we have successfully assisted companies across all major industry segments. Expertise: Risk Advisory Services. Advanced Controls Design for Enterprise Applications. Best Practices for Risk Mitigation and Internal Controls Automation. Audit, Compliance, Financial, Enterprise and Operational Risk Assessments. Risk Remediation Services. Packaged Solutions: FulcrumWay is the #1 choice of Oracle customers for Oracle GRC Advanced Controls, GRC Manager, and GRC Intelligence/OBIEE software implementation. Oracle has certified us as the only partner with Accelerators for Oracle GRC. We also provide Managed Services Software Services: Risk Assessment for ERP systems, Control Design and Management Tools, Controls Catalog, Enterprise Risk Manager, Financial Reporting Manager, Audit Manager USA Presence: Privately held Delaware Corporation with US offices in New York City, Dallas and San Francisco International Presence: in Auckland, Chennai, Johannesburg, London, Mexico City FulcrumWay
  • 5. www.fulcrumway.comPage 5Copyright © FulcrumWay FulcrumWay ClientsSuccessful Track Record Government Oil and Gas Healthcare Communications Financial Services Transportation Natural ResourcesManufacturing Retail High TechMedia/Entertainment Life Sciences
  • 6. www.fulcrumway.comPage 6Copyright © FulcrumWay FulcrumWay™ Insight Thought Leadership Co-Authored GRC Book: First book on GRC for Oracle Applications SROAUG GRC Solution Lab - February 27th – Los Angels: GRC Case Studies and Best Practices Innovate 15 – March 19th – Iselin, NJ -GRC Case Studies and Best Practices Collaborate 15 – GRC Client Appreciation Dinner April 13th, 2015 Las Vegas IIA/ISACA GRC Conference – August 17th - 19th, 2015 - Presentations – GRC Case Studies and Best Practices Educational Webcasts – Every 3rd Thursday of the Month – GRC Best Practices, Trends and Expert Insight Oracle Open World – Annual GRC Dinner on October 26th, 2015 - San Francisco, CA LinkedIn –FulcrumWay Risk, Compliance and Audit Software Group YouTube Podcasts – FulcrumWay Instant Insight in 10 min or less Proven Expertise
  • 7. www.fulcrumway.comPage 7Copyright © FulcrumWay Strengthen Segregation of Duty Controls and Boost User Productivity   Introductions   Fundamentals of Oracle EBS Security Model   Checklist of User Security Risks   Security Assessment Approach   Role Design Techniques   Case Study Agenda
  • 8. www.fulcrumway.comPage 8Copyright © FulcrumWay Responsibility Form Complicated Security Model High Risk of Access Control Deficiencies Menu Function User Evaluate User Access •  Test by User •  Test by Privilege Manage Segregation of Duties •  Identify incompatible Privileges •  Predefined & Extensible SOD Rule Sets Fundamentals
  • 9. www.fulcrumway.comCopyright © FulcrumWay Complicated Security Model High Risk of Access Control DeficienciesFundamentals Oracle  EBS  User   Password  Policy   User  is  assigned   to  the  HR  Record   Ac:ve/Inac:ve   User   One  or  more   responsibili:es   assigned  to  a  User   A  Responsibility   has  many  Menus   and  Sub-­‐Menus     Menu  has  many   func:ons  /  forms  
  • 10. www.fulcrumway.comCopyright © FulcrumWay Complicated Security Model High Risk of Access Control DeficienciesFundamentals Menu  has   prompts  that  user   can  see  to   navigate   Grant  Flag   enables  access  to   the  Sub-­‐Menu  or   Func:on   Menu  has   prompts  that  user   can  see  to   navigate   A menu is a hierarchical arrangement of application functions (forms). In the definition of a responsibility, the specified menu defines what is displayed in the navigator. The specified menu does not necessarily define the functions that can be accessed by the responsibility, which are granted.
  • 11. www.fulcrumway.comCopyright © FulcrumWay Complicated Security Model High Risk of Access Control DeficienciesFundamentals Func:ons  enable   users  to  view,  enter,   update,  delete  data   on  a  Form   Responsibility  -­‐  The  func:on  is  controlled  by  the   user's  responsibility   Organiza:on  -­‐  The  func:on  is  controlled  by  the   user's  organiza:on   Security  Group  -­‐  The  func:on  is  controlled  by  the   user's  security  group   A function is a part of an application's functionality that is registered under a unique name for the purpose of assigning it to, or excluding it from, a responsibility. Oracle  EBS  User   have  access  to:   Self  Service  Web   Pages  
  • 12. www.fulcrumway.comCopyright © FulcrumWay Complicated Security Model High Risk of Access Control DeficienciesFundamentals If  you  specify  the   parameter   QUERY_ONLY=YES,   the  form  opens  in   query-­‐only  mode.  
  • 13. www.fulcrumway.comCopyright © FulcrumWay Complicated Security Model High Risk of Access Control DeficienciesFundamentals The  Form  Personaliza:on  feature  allows   you  to  declara:vely  alter  the  behavior  of   Forms-­‐based  screens,  including  changing   proper:es,  execu:ng  buil:ns,  displaying   messages,  and  adding  menu  entries.  
  • 14. www.fulcrumway.comCopyright © FulcrumWay Complicated Security Model High Risk of Access Control DeficienciesFundamentals A  profile  is  a  set  of  changeable  op:ons  that  affect  the  way   your  applica:on  looks  and  behaves.  You  can  set  user   profile  op:ons  at  different  levels:  site,  applica:on,   responsibility,  user,  server,  and  organiza:on,  depending   on  how  the  profile  op:ons  are  defined.  
  • 15. www.fulcrumway.comCopyright © FulcrumWay Complicated Security Model High Risk of Access Control DeficienciesFundamentals You  can  use  request  security  groups   to  specify  the  reports,  request  sets,   and  concurrent  programs  that  your   users  can  run  from  a  standard   submission  form,  such  as  the  Submit   Requests  form.  
  • 16. www.fulcrumway.comCopyright © FulcrumWay Strengthen Segregation of Duty Controls and Boost User Productivity   Introductions   Fundamentals of Oracle EBS Security Model   Checklist of User Security Risks   Security Assessment Approach   Role Design Techniques   Case Study Agenda
  • 17. www.fulcrumway.comCopyright © FulcrumWay Security Risk Factors   Complexity of ERP System Security Model –  An average Oracle EBS R12 customer has over 35,000 functions and 12,500 menus   Effectiveness Roles Design –  Single Global Roles Template or wide variation based on user needs   Completeness of User Provisioning Process –  Does user provisioning process include control warnings for approvers?   Auditability of ERP Configuration and Data Access –  Can you track ALL changes to key setup and or master data?   Number of ERP environments –  Do you need to control access to multiple ERP systems? Checklist
  • 18. www.fulcrumway.comPage 18Copyright © FulcrumWay Security questions to benchmark ERP security maturity (Qualitative Analysis)Checklist Do  the  ERP  Roles   meet  requirements   for  all  users?   Does  User   provisioning   prevent  security   policy  viola:ons?   How  do  you   monitor  “super-­‐ user”  ac:vi:es?   Do  you  obtain  user   access  verifica:on   from  managers,   periodically?       How  do  you  detect   Segrega:on  of  Duty   policy  viola:ons?   Is  access  to   sensi:ve  data  and   func:ons   protected?   Do  you  maintain   audit  trail  on  ERP   configura:on   controls?   Can  you  prevent   unauthorized   Master  Data   changes?   How  do  you  ensure   that  terminated   employees  can’t   access  ERP?  
  • 19. www.fulcrumway.comCopyright © FulcrumWay User: John Doe Responsibility: Payables Manager, US Menu: AP_Navigate_GUI12 Submenu: AP_Invoices_Entry Function: Invoice Batches User: Mike Jones Payables Users Responsibility: Payables Supervisor Responsibility: Payables UserMenu: UK_AP_Navigate_GUI12 SubMenu: AP_Invoices_Entry SubMenu: AP_Invoices_GUI12_G Menu: AX_Payables_User Responsibility: Payables Supervisor Responsibility: Payables Manager, US Responsibility: Payables User What if we exclude ‘Invoice Batches’ from AP_Invoices_Entry? Root Cause Analysis is required for remediation! Checklist Quantitative Analysis of Security Model
  • 20. www.fulcrumway.comCopyright © FulcrumWay Strengthen Segregation of Duty Controls and Boost User Productivity   Introductions   Fundamentals of Oracle EBS Security Model   Checklist of User Security Risks   Security Assessment Approach   Role Design Techniques   Case Study Agenda
  • 21. www.fulcrumway.comCopyright © FulcrumWay Risk Based Access Management Detect/ Analyze Findings Implement Corrective Actions Monitor Controls Scope Application Controls Sample ERP Data Manage Exceptions Implement Controls Risk Advisors/ ERP Managers/ Control Owners Risk Advisors/ Control Owners Control Owners/ ERP Managers Establish Test Environment Assess RiskIdentify Risk Design Controls Advanced Controls Experts/ ERP Managers Approach
  • 22. www.fulcrumway.comCopyright © FulcrumWay Top Down Risk Based Approach to Application Controls What  are  the  enterprise  wide  risks   that  need  to  be   Assessed?   Which  business  processes  are  impacted  by   these  risks?   Which  ERP  apps  are  used  to  perform  these   processes   Where  (business  loca9ons)  are  the   processes  performed   What  applica9on  func9ons  control  the   processes?     Identify Risks
  • 23. www.fulcrumway.comCopyright © FulcrumWay Application Risk Factors Risk  Threshold   AR   AP   GL   INV   INV   PR   HR   OM   PO   FA   List  of   Apps   Primary   Process   Enabler   Financial  / Sensi9ve   Data   Custom   Code     Freq.  of   Changes   Audit   Logs   Risk   Ra9ng   GL   8   9   5   9   8   34   AP   7   7   6   8   9   32   AR   7   7   9   9   7   39   FA   5   5   5   5   5   25   PO   5   5   4   6   4   24   AP   GL   AR   Risk Scale: Highest 10 Risk Threshold: Over 30 Assess Risks
  • 24. www.fulcrumway.comCopyright © FulcrumWay ERP Control Methods Monitor Controls Mitigate Remediate & Prevent Accept High Risk Medium Risk Medium Risk Low Risk Low High High I M P A C T PROBABILITY Treat Risk
  • 25. www.fulcrumway.comCopyright © FulcrumWay Strengthen Segregation of Duty Controls and Boost User Productivity   Introductions   Fundamentals of Oracle EBS Security Model   Checklist of User Security Risks   Security Assessment Approach   Role Design Techniques   Case Study Agenda
  • 26. www.fulcrumway.comCopyright © FulcrumWay Role Design Build roles that strengthen security and user productivty 1.  Extract/Map   Roles   • Extract   Security   Model  from   the  Source.   This  step   requires   mapping  of   all  security   tables  as  well   as  any   ajributes   that  limit   access  to   source   system   func:ons   and  data.       2.  Configure     Security  Sekngs   • Using  the   Role   migra:on   map,  and   security   configura:on   data,  create   target  roles   base  on  the   target   configura:on   ajributes   available.     3.  Configure  Data   Access   • Apply   repor:ng   and  data   access   ajributes   available  in   the  target   system  based   on  the  role   migra:on   map.       4.  Apply  Security   Ajributes     • Apply   securing   ajributes   such  as   security   exclusion  or   inclusion   ajributes   from  the   source   system  roles   that  map  to   the  target   system   5.  Compare   Source  and  Target     • Generate   reports  from   the  Roles   Manager  to   compare  and   confirm  that   the  target   roles  are   migra:ng   from  the   source  roles   according  to   the  security   migra:on   map.       6.  Obtain  Role   Approval   • Provide  Role   hierarchy   report  to   business  and   IT  users  to   obtain   approval  for   deployment   into  the   target   system  for   Role  tes:ng.   7.  Deploy  Roles  to   Business  Units   • Once  the   source  roles   are  accepted   by  ERP   system  users,   each  role  is   deployed  for   the  business   units  within   scope  
  • 27. www.fulcrumway.comCopyright © FulcrumWay Advanced Analytics to Accelerate Role Design Pre-­‐built  Risk  Analy9cs.    Risk  Reports  available  for  client  review   Risk Advisors identifies controls violations and has the capability to analyze issues, remove false positives to prepare the findings report   Role Design
  • 28. www.fulcrumway.comCopyright © FulcrumWay Strengthen Segregation of Duty Controls and Boost User Productivity   Introductions   Fundamentals of Oracle EBS Security Model   Checklist of User Security Risks   Security Assessment Approach   Role Design Techniques   Case Study   Q&A Agenda
  • 29. www.fulcrumway.comCopyright © FulcrumWay Global car and equipment rental company, improves employee productivity Our  Client     Leader  in  the  car  and  equipment  rental  businesses   worldwide     Providing  quality  car  rental  service  for  over  90  years.     Over  30,000  employees   Challenges     Replace  mul9ple  legacy  systems  with  one  ERP   solu9on     Improved  Segrega9on  of  Duty  controls  within   mission  cri9cal  applica9ons       Maintain  consistent  ERP  system  access  roles     across  the  subsidiaries  leveraging  the  shared   services  model       Increase  external  auditor’s  reliance  on  ERP  Access   Controls  Monitoring   Solu9ons    ERP  Controls  Catalog    ERP  Roles  Monitor     Results:       Reduce  ERP  Role  design,  build,  tes9ng  and   implementa9on  9me  by  80%  resul9ng  in  over  $200,000   cost  savings  during  ERP  system  implementa9on  and   global  roll-­‐out.       Created  over  100  Segrega9on  of  Duty  compliant  Roles   by  business  segment  with  two  weeks  from  FulcrumWay   Role  Templates  within  the  controls  catalog.       Lowered  ERP  Total  Cost  of  Ownership  by  reducing  SoD   remedia9on  9me  and  costs  by  ensuring  that  all  users  a   assigned  only  the  pre-­‐approved  Roles     Improve  SoD  and  Access  Controls  tes9ng  9me  by   providing  auditors  the  access  log  reports  showing  all   Update,  Review  and  Approve  Role  design  changes.       Accelerated  ERP  tes9ng  and  deploying  9me  by   iden9fying  SOD  conflicts  before  the  Roles  are  assigned   to  Users.       Case Study
  • 30. www.fulcrumway.comPage 30Copyright © FulcrumWay Enterprise Controls Platform Compensating Policies Preventive Provisioning Remediation (Clean-up) Access Analysis •  Accelerate deployment and time to value with ready-made controls library •  Mitigate risk of inappropriate user access with approval workflow and audit trails •  Simplify segregation of duties enforcement with simulation and remediation Define Access Controls Detection Prevention GRC Manager SOD & Access Application Configuration Transaction Monitoring GRC Intelligence Advanced Controls Application Access Controls Embed Controls Natively in Enterprise Apps Case Study
  • 31. www.fulcrumway.comCopyright © FulcrumWay FulcrumWay Roles Manager Overview Eliminate Root Cause of Access Control Violations in ERP:   Improve Segregation of Duty controls within mission critical applications   Reduce ERP implementation and upgrade costs with pre-configured roles   Lower ERP Total Cost of Ownership by assigning pre-approved Roles We enable ERP Administrators:   Select pre-configured ERP roles from a roles catalog   Update, Review and Approve Role design changes.   Identify SOD conflicts before the Roles are assigned to Users. Case Study
  • 32. www.fulcrumway.comCopyright © FulcrumWay   Role Manager is an ERP security design tool   Contains a pre-configured catalog of roles which comply with segregation of duty (SOD) policies.   Roles by ERP module and typical access requirements for those modules such as Manager, Supervisor, Clerk, Inquiry, Business Setup and IT Setup.   You can use this tool to view existing role templates and design new roles by easily selecting or deselecting ERP functions/transaction.   Once you complete the roles design, you can send it, using workflows, to pre-assigned reviewers and approvers to finalize the roles.   The role preparers, reviewers and approvers can also assess the SOD control risks before finalizing the roles.   Leverage FW DataProbe/Scripts to load current Roles   Secure Access from fulcrumway.com portal Role Design FulcrumWay Roles Manager Features
  • 33. www.fulcrumway.comCopyright © FulcrumWay Access to Roles ManagerRole Design Sign-­‐in  to  ERP  Controls  and  Navigate  to  Roles  Manager  at  FulcrumWay.com   Roles  Manager  is  a  component  of  the  FulcrumWay  Risk  Remedia9on  so^ware  services    that  is   available  instantly  over  a    secure  internet-­‐connec9on.  
  • 34. www.fulcrumway.comCopyright © FulcrumWay Select  the  Access  Monitor  Icon.          Then  click  on  the  Maintain  Access  Roles  Tab     Search and Browse through catalog of Roles for Oracle EBS R12 Roles  Manager  contains  hundreds  of  Oracle  EBS  Responsibili9es  with  SOD  Controls   Designed  into  the  configura9on  to  give  you  a  jump  start   Role Design
  • 35. www.fulcrumway.comCopyright © FulcrumWay Access to Roles Manager Use  a  “source”  role  to  create  a  new  “target”  role.    View  exis9ng  SOD  issues  with  the  “source”  role.     Assign  Reviewers  and  Approvers  for  the  role   Embed  SOD  Controls  into  Oracle  Responsibili9es  design  by  elimina9ng  conflic9ng  business   ac9vi9es  inherent  in  the  EBS  Responsibility  configura9on     Role Design
  • 36. www.fulcrumway.comCopyright © FulcrumWay Access to Roles ManagerRole Design Select/  Deselect  business  ac9vi9es  to  update  Role  configura9on  automa9cally   Reduce  Role  design  9me  and  effort  by  selec9ng  business  ac9vi9es  to  drive  the   configura9on  of  Oracle  Responsibili9es.      
  • 37. www.fulcrumway.comCopyright © FulcrumWay ERP Role Provisioning Save Precious Time Verifying Role Provision Request   Prevent Unauthorized Systems Access   Reduce the Risk of Internal Fraud   Improve Your Compliance Audit Trail We enable Security/ERP Administrators:   Automate manual access request processes   Ensure there are no unauthorized users   Detect and prevent disallowed access attempts Case Study
  • 38. www.fulcrumway.comCopyright © FulcrumWay  Monitor  Role  Assignment  Requests  Mitigate Access Risks Monitor  controls  over  the  user  provisioning  process.    Maintain  audit  log     Reduce  SOD  viola9ons  by  monitoring  User  Access  Requests  at  Helpdesk  and   perform  SOD  analysis  before  access  is  granted    
  • 39. www.fulcrumway.comCopyright © FulcrumWay Periodically Verify Role Assignments Save Precious Time Verifying User Access   Detect Unauthorized Systems Access   Automate User Access Review   Improve Your Compliance Audit Trail We enable Security/ERP Administrators:   Ensure there are no unauthorized users   Maintain universal access security compliance Monitor Access Risks
  • 40. www.fulcrumway.comCopyright © FulcrumWay Prevent  dormant  user  role  assignments  Monitor Access Risks Send  user  access  verifica9on  request  to  applica9on  control  owners  using   “passkey”  to  verify  ot  terminate  access   Monitor  User  Access  to  Responsibility/Role  and  Func9ons        
  • 41. www.fulcrumway.comCopyright © FulcrumWay Compensating Controls for Privileged (super-user) roles Apply Continuous Monitoring to ERP Controls   Minimize Process Errors and Losses   Maintain compliance with regulations and internal policies   Reduce the Cost of Risk and Audit We enable Business and IT Managers:   Meet your organizational control objectives   Complete your controls monitoring repository   Apply policies and rules to each business cycle Case Study
  • 42. www.fulcrumway.comCopyright © FulcrumWay FW Controls Catalog with over 1,000 advance controls Select  SOD,  Master  Data,  Setup,  and  Transac9on  Controls  Risk  Assessment   Detect  control  weaknesses  across  ERP  system  to  iden9fy  business  process   op9miza9on  opportuni9es   Case Study
  • 43. www.fulcrumway.comCopyright © FulcrumWay Leader in Risk Based Management ControlsQ & A Visit Resources to get started with Security Assessment and Role Design