SlideShare a Scribd company logo
SAP GRC Process Control
Process Control Automated
Monitoring
SAP Process Control
SAP Business Objects Process Control is an enterprise software solution
for compliance and policy management. The compliance management
capabilities enable organizations to manage and monitor its internal
control environment. This provides the ability to proactively remediate
any identified issues, and then certify and report on the overall state of the
corresponding compliance activities.
Business Scenario
• Basic business processes necessary for running any business are purchasing, sales,
hiring and promotion, etc. SAP Business Objects Governance, Risk and Compliance
(GRC) solutions provide an overview of such processes from a risk and compliance
point of view, and help customers measure risks and monitor compliance.
• Automated monitoring of backend systems and processes are part of the Process Control
10.0 application (PC 10). Customers of GRC use automated monitoring for
configurations, master data and transactions.
• The following figure depicts how GRC fits into the corporate IT landscape, and into a
corporate governance and compliance strategy.
• Automated (or semi-automated) monitoring can also help individuals perform the
control function. For instance, a person responsible for reviewing and approving
purchases might want to look at background information on the requester, vendor,
pricing trends, etc. before making a decision. Workflow can route the requisition itself
to his or her inbox, but PC automated monitoring can provide the additional information
needed to actually reach good decisions.
The term “technical experts” refers to software professionals who understand
databases, queries, web service configurations, or programming. Implementation
experts‖ are professionals who know the PC product well, they will be responsible for
installing and configuring it, or upgrading from previous releases.
Automated Monitoring Overview
• To monitor any system in your IT landscape, PC first has to be able to extract data from
it. The data could be anything: configurations, master data, transactions, usage logs, or
any structured information which the monitored system can provide on demand.
• The monitoring methods available to PC customers fall into one of two broad classes:
query-driven or event-driven.
1. PC initiates query-driven monitoring, typically via the
scheduler. This is why some practitioners also call it
schedule-driven monitoring. The common characteristic
of these monitoring methods is that the monitored
system is passive—all action is initiated from the PC
side. The data might come from a query, a report, a
function invocation, or from any other technical source,
but the semantics are those of a query.
2. Event-driven monitoring, by contrast, is not initiated by
PC. An external system decides when something is
significant enough to be communicated to PC, and
initiates data transfer by raising an event. PC treats such
events as data sources much the same as a query-driven
data source, and makes the event details available to
business rules for further evaluation
• PC can pull data from remote backend systems by multiple mechanisms. To
keep track of these, rule designers create objects called Data Sources, which
store the information about the actual sources of data on remote systems which
they will invoke when a monitoring rule runs.
• Monitored systems are backend applications such as SAP ERP, CRM, etc. For
legal reasons, this document uses only SAP applications in examples of
monitored systems, although PC 10.0 can be-- and is–used to monitor a wide
selection of non-SAP backend applications.
• Data sources are objects in PC which tell PC how to extract data from
backend systems being monitored.
• Business rules encode the actual monitoring logic the rule designer wants. A
business rule is designed to work against one data source. That‘s because the
rule engine needs to know which fields are available for building the rule, and
that depends on the data source being used.
• Systems Installation and Activation
The PC 10.0 installation guide available on SAP Service Marketplace gives details about
installation and configuration of PC 10.0. The rest of this section addresses configurations
unique to automated monitoring.
• Post-installation Configurations:
• Creating RFC destinations (called ―connectors in GRC) is standard NetWeaver
functionality, accessed via transaction code SM59. With such connectors, you then
configure PC to know which connectors it should use for automated monitoring.
The following figure shows the transaction SPRO in the PC system
Use the path Governance, Risk
and Compliance > Common
Component Settings > Integration
Framework.
The first of the links in the
highlighted box, Create
Connectors, is a shortcut to SM59
for creating or maintaining
connectors.
The next link, Maintain Connectors and Connection Types, takes you to the following
screen.
The three highlighted connector
types are of interest in
automated monitoring.
 Local system connectors are
used to integrate with the SAP
Business Objects Access
Control application for
monitoring segregation-of-duty
violations.
 Web service connectors are used
for external partner data sources.
 SAP system connectors are used
in all other cases.
The next step is to define which of the connectors previously defined in
SM59 can be used in monitoring.
SMEA5_100 is a connector to an ECC system. Note in particular the third
column that lists the name of a connector which is defined in the monitored
system, and which is configured to point back to the GRC system being
configured here. That is, in the highlighted row, SMEA5_100 is a connector in
the GRC system, and it points to an ERP system which is to be monitored. SM2
is a connector on the (remote) ECC system, which points back at this GRC
system.
Define Connector Group screen, as shown in the following figure.
All the connector configurations for automated monitoring should belong to the
configuration group called Automated Monitoring (shown highlighted).
Now, Choose the link Assign
Connectors to Connector Groups
to the AM connector group.
Next choose Maintain Connection Settings, as shown in the following figure.
A screen displays, asking
which Integration Scenario
you want. Choose AM for
automated monitoring. the
following page displays.
The highlighted box shows nine entries called sub-scenarios these are different types of
data sources and business rules supported in PC.
To create a specific data source type (say, configurable) for a system to be monitored, the
corresponding connector must be linked to that sub-scenario. Select the sub-scenario you
want, and then choose Scenario Connector Link in the left-hand panel, as follows
The following screen
displays. If the connector you
want to use for that scenario
is not already in the list for
that sub-scenario, choose
New Entries to add it. We
recommend the following
pattern for convenience.
Master -Data Preparation
Before monitoring rules can be scheduled to run, they must be hooked up to the
regulations, controls, and business processes, which are master data for PC.
Monitoring Methods
a) Data Sources in PC 10.0 encapsulate many different ways PC can extract data out
of monitored systems, while still presenting a uniform interface to rule designers
who want to filter and manipulate the data they extract.
b) Business Rules hold the processing logic for such filters, calculations and the logic
to determine if any extracted data represents a problem which control owners need
to review or remedy.
Design-time
All design-time user interfaces are located under ―Rule Setup‖ in the top-level toolbar,
as highlighted in the following figure.
The Rule Setup user interface may contain many sections, depending on your role and how
it is configured in your system. The following figure shows only the Continuous Monitoring
section.
Creating Data Sources
Choose Data Sources in the above picture. The Data Sources screen displays. The screen
lists the Data Sources previously configured in this system. You can create a new data
source by choosing the Create pushbutton
Name and Description: The
Data Source name should be
something descriptive which
will help you to find the data
source, and help document
its purpose.
Validity Dates: Validity
dates determine the range of
dates over which data
sources, rules, controls, and
so on, can be put to use in
monitoring.
Status: Data sources start with the status New. You can change most attributes of the data
source while it is in this status, but you cannot use it to support rule creation or any other
downstream activity. From ”New”, a data source can be changed only to ”In Review”; after
review, it can become ”Active”, which is the state in which it can be used to create
monitoring rules.
Search Terms: These are tags which can help in finding the right data sources, for instance
when you want to update or edit a data source, or you want to find one to reference when
creating business rules.
Use The Object Field tab to define more functionally relevant attributes of the data
source.
The Sub Scenario dropdown list
shows nine options; these are the
different types of data sources
available in PC.
For instance, the below
following figure shows the
vendor master table LFA1 of
SAP ERP.
The highlighted column shown in the following figure is editable, allowing the designer
to replace the default text with something better suited.
Connectors
For most sub-scenarios, you must define a main connector that points to the backend
system against which PC will try to validate your definition. The only exceptions are the
SoD Integration and Event sub-scenarios.
Creating Business Rules
Business rules filter the data stream coming from data sources, and apply user-
configured conditions and calculations against that data to determine if there is a
problem which requires attention. In PC this is called a deficiency.
The following screenshot shows the full range of power in a business rule
The name, description, validity dates, status and search terms fields serve exactly the
same function as the corresponding fields in data sources
The Category and Analysis Type fields are dependent on the data source type
Data For Analysis
A data source offers several fields for the business rule to use in filtering or
finding deficiencies.
Filter Criteria
Of all the business rule fields picked in the previous step, some will be useful
mainly in filtering out data that is not of interest. You should pick such fields as
filters, and define filter conditions against them.
Deficiency Criteria
Conditions and Calculations
Use this tab to define the calculations
necessary to compute the value of a
calculated field deficiency.
The Calculations tab allows three
types of calculations: a Field Value
calculation, a currency conversion, or
grouping and aggregation.
Field Value Calculation
PC provides a simplified user
interface for relatively simple
conditions and calculations, and
advises customers to use the full
BRF+ workbench to define more
complex calculations.
One important restriction is that the definition of a calculated field in the deficiency criteria screen
(above) is one-to-one related to the definition of the calculation itself in the conditions and calculations
tab. This means that any significant computation which requires intermediate variables is too complex to
handle here—it would be necessary to define such complex rules in the BRF+ workbench.
One decision method offered by BRF+ is directly incorporated into the PC rule interface: the decision
table. This is called a ―”pattern” in the PC 10.0 interface, and is available only for the change log check
category of business rule.
Currency Conversion
A key feature of the PC 10PC rule engine is the ability to convert currency amounts. This
feature uses core NetWeaver support for currency conversions, and leverages the same
underlying currency tables and features as used in ECC, CRM and other SAP applications.
To use this feature, a deficiency criterion must be of type Amount, and the same must be
true of one of the fields available in the rule.
Grouping and Aggregation
The screenshots in the section on Currency Conversion also include grouping and
aggregation. The other deficiency in that example, Total Number of Payments to One-
time Vendors, is intended to find the number of payments made to each one-time vendor,
and then apply the configured thresholds to determine if that violates policies.
The grouping is on Vendor number, and the aggregation method used is Count—which
simply counts how many times each vendor (the grouped-by field) appears in payments.
Grouping and Aggregation can also be combined in sequence with other calculation
methods.
Notice that the grouping/aggregation calculation is the second in the sequence, with
currency conversion being first we want to convert to a single currency before adding
BRF+ Workbench
To leverage the full power of BRF+, first create a stub PC Business Rule, and use the
generated rule ID
You must know the technical ID of the rule you created, which you can see in the
following screenshot of the PC Business Rule finder page. The technical object ID of
each rule is displayed in the left-most column. This technical ID serves as the base, or
first part, of the BRF+ rule ID in the BRF+ workbench.
The easiest way to find the corresponding BRF+ rule in the BRF+ workbench is to paste
this ID, add the wildcard character ‗*‘ to it, and then search. In the left-hand panel of the
BRF+ workbench screenshot, there are two BRF+ rules with the same base ID as the PC
10 rule. this is because BRF+ creates new versions of every such rule each time it is
changed.
Output Format
This section is common to all business rule/data source types, and arranges the output of
any detected deficiencies in the left-to-right column order specified. You can also hide
unwanted columns here.
Technical Settings
These primarily affect the execution and performance of monitoring. Most data sources
will allow users to cap the maximum amount of data they will process, as a
performance management feature.
Ad Hoc Query
This is useful for configurable business rules and data sources, which are designed and
implemented directly from the PC user interface.
The following screenshots show two modes of ad hoc query operation: one that collects
the data as the data source would, and another that applies the rule logic to filter the
data and then apply deficiency logic.
Assigning Rules to Controls
Monitoring rules need to be assigned to local controls.
The search widget at the top of this page lets you search for local controls that is,
controls assigned to a particular organization node. The next step is to select it in the
middle part of the screen, by clicking on its row.
You then modify the business rules assigned to it by choosing the Modify pushbutton,
and then choosing the Add pushbutton in the bottom portion of the screen. A screen
displays that allows you to search through Business Rules in the Active state, which you
can then assign to the local control.
You can also modify existing assignments and maintain frequencies of monitoring or
compliance checks. Once this assignment step is complete, you will be able to schedule
the monitoring rule in the Automated Monitoring scheduler.
Scheduling
The monitoring scheduler is also on the Rule Setup
Select the Automated Monitoring link. the following screen displays
Use this page to schedule all schedule-driven rules
The Scheduler page displays all currently scheduled jobs. You can create a new
monitoring job by choosing the Create Job pushbutton, which walks you through the
process. The following screenshot gives an overview.
The top of the screen shows that scheduling is a 5-step process, and the wizard guides you
through it. The most important thing to note about the scheduler is that you can run jobs
as frequently as hourly, and as infrequently as annually.
Monitoring Jobs
SAP Query Data Sources and Rules
SAP Query is a NetWeaver query tool. The following screenshot shows the transaction SQ01.
The following two screenshots show the relevant sub-scenario for Data Source
definitions
In defining a data source against a previously-defined SAP Query, the designer has to
point to a particular backend system which is to be monitored. PC looks up the set of
available queries in that backend system (including wildcard searches), looks up the
query details, and makes its results available to the PC rule engine.
To create any Business Rule, the first step is always to select the (active) Data Source on
which the rule will operate. Since this fixes the sub-scenario, you do not have to pick the
sub-scenario for any Business Rules—it is always inherited from the Data Source.
For SAP Query Business rules, you can define two categories of business rule, as follows
The Exception category means that any data returned by the data source is always
considered an exception.
The Analysis Type field decides whether to treat all such exceptions as deficiencies to
be remedied or as something a human must review to determine if it requires a remedy.
The other category, Value check, implies that there are deficiency criteria which
explicitly need to be evaluated, and that you will then be expected to configure in the
Deficiency Criteria and Conditions and Calculations steps of the create rule wizard
A configurable data source defines a query against tables in the monitored backend
system (such as ECC/ERP, SRM, and so on).
This section also explains the Change Log option, which tells PC to reconstruct past
configuration and master data settings over the timeframe of the control, and validates all
such past and present settings against the user-configured monitoring rule.
Having picked the Configurable sub-scenario, you next pick a connector to the
backend system against which you want to define the query
Having picked the main table, you can next pick related tables to bring in additional
information
Again, you can use wild cards to search for tables. Note that PC 10.0 already filters the list
of tables to include only those which have related information.
dependent tables are those which refer to (as foreign keys) the key fields of your main table
(primary keys), while reference tables are the opposite—they hold the primary keys to
which your main table refers as foreign keys
You can join multiple related tables together in such a compound data source, with the
constraint that the join conditions are restricted to being equality relationships between like-
type fields. For the most part, it is expected you will join primary keys to foreign keys.
Change Log Data Sources and Rules
A change log rule is a variation on the configurable rule defined previously, and hence is
presented as a subsection of that type in this document. It is intended to be used for
monitoring configuration and master data tables only.
SAP applications have extensive change-tracking mechanisms for database tables, which
guarantee that all changes are captured, even if they are of very short duration.
These mechanisms cover changes made directly in the system, and also changes
transported into the system.
So a change log business rule allows you to check the validity of a configuration or
master data setting at any time, with confidence that all changes made to that setting will
be found and tested for correctness. Wrong configurations are caught, no matter how
transiently they were in effect.
Definition of Change Log Rules
Change log based rules can be based on either configurable data sources, or programmed
ones. Such change-log-based rules can be used to monitor either configurations, or master
data.
For change log rules based on configurable data source types PC provides an analysis
type of pattern, which allows users define a multi-field deficiency criterion using a
decision table.
Table Handlers
When interpreting the change log, the GRC backend plug-in needs a handler to interpret
the change log entries. Sometimes more than one table handler is registered for the table in
question, and it can be difficult to determine which handler to use.
The correct handler for your situation will be the one which makes your deficiency fields
available for use in change analysis rule.

More Related Content

What's hot

SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
Rohan Andrews
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
nanda nanda
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
Ahmed Abdul Hamed
 

What's hot (20)

Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 
GRC access control access risk management guide
GRC access control   access risk management guideGRC access control   access risk management guide
GRC access control access risk management guide
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
What is sap security
What is sap securityWhat is sap security
What is sap security
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
 
Sap security interview question & answers
Sap security interview question & answersSap security interview question & answers
Sap security interview question & answers
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
Practical guide for sap security
Practical guide for sap security Practical guide for sap security
Practical guide for sap security
 
Sap security-administration
Sap security-administrationSap security-administration
Sap security-administration
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
Introduction on sap security
Introduction on sap securityIntroduction on sap security
Introduction on sap security
 
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
Rethinking Segregation of Duties: Where Is Your Business Most Exposed?
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 

Viewers also liked

SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
Ragu M
 
SAP GRC 5.3 Training
SAP GRC 5.3 TrainingSAP GRC 5.3 Training
SAP GRC 5.3 Training
raja RAJA
 
Scalable security modeling sap bw analysis authorizations
Scalable security modeling   sap bw analysis authorizationsScalable security modeling   sap bw analysis authorizations
Scalable security modeling sap bw analysis authorizations
Pallavi Koppula
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security features
Shazia_Sultana
 

Viewers also liked (13)

SAP Security important Questions
SAP Security important QuestionsSAP Security important Questions
SAP Security important Questions
 
SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)SAP Governance, Risk and Compliance (GRC)
SAP Governance, Risk and Compliance (GRC)
 
Simplifying IT GRC
Simplifying IT GRCSimplifying IT GRC
Simplifying IT GRC
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
 
Using FIORI to enhance user experience on SAP PPM
Using FIORI to enhance user experience on SAP PPMUsing FIORI to enhance user experience on SAP PPM
Using FIORI to enhance user experience on SAP PPM
 
A emmanuel-sap-grc- consultant ( ac,pc,rm) resume-sf
A emmanuel-sap-grc- consultant ( ac,pc,rm) resume-sfA emmanuel-sap-grc- consultant ( ac,pc,rm) resume-sf
A emmanuel-sap-grc- consultant ( ac,pc,rm) resume-sf
 
SAP GRC 5.3 Training
SAP GRC 5.3 TrainingSAP GRC 5.3 Training
SAP GRC 5.3 Training
 
Scalable security modeling sap bw analysis authorizations
Scalable security modeling   sap bw analysis authorizationsScalable security modeling   sap bw analysis authorizations
Scalable security modeling sap bw analysis authorizations
 
ISACA Victoria Chapter: GRC Professionals-Road map for Personal Success
ISACA Victoria Chapter: GRC Professionals-Road map for Personal Success ISACA Victoria Chapter: GRC Professionals-Road map for Personal Success
ISACA Victoria Chapter: GRC Professionals-Road map for Personal Success
 
Key Slides
Key SlidesKey Slides
Key Slides
 
Etkin Yetki Yönetimi - SAP GRC Access Control
Etkin Yetki Yönetimi - SAP GRC Access ControlEtkin Yetki Yönetimi - SAP GRC Access Control
Etkin Yetki Yönetimi - SAP GRC Access Control
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security features
 
GRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance ExecutiveGRC Governance, Risk mgmt. & Compliance Executive
GRC Governance, Risk mgmt. & Compliance Executive
 

Similar to Sap grc process control 10.0

Week11 Determine Technical Requirements
Week11 Determine Technical RequirementsWeek11 Determine Technical Requirements
Week11 Determine Technical Requirements
hapy
 
Product and sevices management system
Product and sevices management systemProduct and sevices management system
Product and sevices management system
Vinod Gurram
 
Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02
Shuchi Singla
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_design
Tushar Rajput
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
hapy
 
Database Design
Database DesignDatabase Design
Database Design
learnt
 
Due tomorrow 7122021 at 800pmNo plagiarism Develop thos
Due tomorrow 7122021 at 800pmNo plagiarism Develop thosDue tomorrow 7122021 at 800pmNo plagiarism Develop thos
Due tomorrow 7122021 at 800pmNo plagiarism Develop thos
AlyciaGold776
 

Similar to Sap grc process control 10.0 (20)

Week11 Determine Technical Requirements
Week11 Determine Technical RequirementsWeek11 Determine Technical Requirements
Week11 Determine Technical Requirements
 
Laudon Ch13
Laudon Ch13Laudon Ch13
Laudon Ch13
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating System
 
How to build management information system
How to build management information systemHow to build management information system
How to build management information system
 
X-Analysis Application Process Mapping
X-Analysis Application Process MappingX-Analysis Application Process Mapping
X-Analysis Application Process Mapping
 
Product and sevices management system
Product and sevices management systemProduct and sevices management system
Product and sevices management system
 
Onlineshoppingonline shopping
Onlineshoppingonline shoppingOnlineshoppingonline shopping
Onlineshoppingonline shopping
 
Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_design
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
About IT Analyzer
About IT AnalyzerAbout IT Analyzer
About IT Analyzer
 
Oracle fccs creating new application
Oracle fccs creating new applicationOracle fccs creating new application
Oracle fccs creating new application
 
Ridge weigh technical writeup
Ridge weigh technical writeupRidge weigh technical writeup
Ridge weigh technical writeup
 
Business Analytics System
Business Analytics SystemBusiness Analytics System
Business Analytics System
 
Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)
 
Mobile store management
Mobile store management Mobile store management
Mobile store management
 
Database Design
Database DesignDatabase Design
Database Design
 
Due tomorrow 7122021 at 800pmNo plagiarism Develop thos
Due tomorrow 7122021 at 800pmNo plagiarism Develop thosDue tomorrow 7122021 at 800pmNo plagiarism Develop thos
Due tomorrow 7122021 at 800pmNo plagiarism Develop thos
 

Recently uploaded

AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
Alluxio, Inc.
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 

Recently uploaded (20)

AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 

Sap grc process control 10.0

  • 1. SAP GRC Process Control Process Control Automated Monitoring
  • 2. SAP Process Control SAP Business Objects Process Control is an enterprise software solution for compliance and policy management. The compliance management capabilities enable organizations to manage and monitor its internal control environment. This provides the ability to proactively remediate any identified issues, and then certify and report on the overall state of the corresponding compliance activities.
  • 3. Business Scenario • Basic business processes necessary for running any business are purchasing, sales, hiring and promotion, etc. SAP Business Objects Governance, Risk and Compliance (GRC) solutions provide an overview of such processes from a risk and compliance point of view, and help customers measure risks and monitor compliance. • Automated monitoring of backend systems and processes are part of the Process Control 10.0 application (PC 10). Customers of GRC use automated monitoring for configurations, master data and transactions. • The following figure depicts how GRC fits into the corporate IT landscape, and into a corporate governance and compliance strategy. • Automated (or semi-automated) monitoring can also help individuals perform the control function. For instance, a person responsible for reviewing and approving purchases might want to look at background information on the requester, vendor, pricing trends, etc. before making a decision. Workflow can route the requisition itself to his or her inbox, but PC automated monitoring can provide the additional information needed to actually reach good decisions.
  • 4. The term “technical experts” refers to software professionals who understand databases, queries, web service configurations, or programming. Implementation experts‖ are professionals who know the PC product well, they will be responsible for installing and configuring it, or upgrading from previous releases.
  • 5. Automated Monitoring Overview • To monitor any system in your IT landscape, PC first has to be able to extract data from it. The data could be anything: configurations, master data, transactions, usage logs, or any structured information which the monitored system can provide on demand. • The monitoring methods available to PC customers fall into one of two broad classes: query-driven or event-driven. 1. PC initiates query-driven monitoring, typically via the scheduler. This is why some practitioners also call it schedule-driven monitoring. The common characteristic of these monitoring methods is that the monitored system is passive—all action is initiated from the PC side. The data might come from a query, a report, a function invocation, or from any other technical source, but the semantics are those of a query. 2. Event-driven monitoring, by contrast, is not initiated by PC. An external system decides when something is significant enough to be communicated to PC, and initiates data transfer by raising an event. PC treats such events as data sources much the same as a query-driven data source, and makes the event details available to business rules for further evaluation
  • 6. • PC can pull data from remote backend systems by multiple mechanisms. To keep track of these, rule designers create objects called Data Sources, which store the information about the actual sources of data on remote systems which they will invoke when a monitoring rule runs. • Monitored systems are backend applications such as SAP ERP, CRM, etc. For legal reasons, this document uses only SAP applications in examples of monitored systems, although PC 10.0 can be-- and is–used to monitor a wide selection of non-SAP backend applications. • Data sources are objects in PC which tell PC how to extract data from backend systems being monitored. • Business rules encode the actual monitoring logic the rule designer wants. A business rule is designed to work against one data source. That‘s because the rule engine needs to know which fields are available for building the rule, and that depends on the data source being used.
  • 7. • Systems Installation and Activation The PC 10.0 installation guide available on SAP Service Marketplace gives details about installation and configuration of PC 10.0. The rest of this section addresses configurations unique to automated monitoring. • Post-installation Configurations: • Creating RFC destinations (called ―connectors in GRC) is standard NetWeaver functionality, accessed via transaction code SM59. With such connectors, you then configure PC to know which connectors it should use for automated monitoring.
  • 8. The following figure shows the transaction SPRO in the PC system Use the path Governance, Risk and Compliance > Common Component Settings > Integration Framework. The first of the links in the highlighted box, Create Connectors, is a shortcut to SM59 for creating or maintaining connectors.
  • 9. The next link, Maintain Connectors and Connection Types, takes you to the following screen. The three highlighted connector types are of interest in automated monitoring.  Local system connectors are used to integrate with the SAP Business Objects Access Control application for monitoring segregation-of-duty violations.  Web service connectors are used for external partner data sources.  SAP system connectors are used in all other cases.
  • 10. The next step is to define which of the connectors previously defined in SM59 can be used in monitoring. SMEA5_100 is a connector to an ECC system. Note in particular the third column that lists the name of a connector which is defined in the monitored system, and which is configured to point back to the GRC system being configured here. That is, in the highlighted row, SMEA5_100 is a connector in the GRC system, and it points to an ERP system which is to be monitored. SM2 is a connector on the (remote) ECC system, which points back at this GRC system.
  • 11. Define Connector Group screen, as shown in the following figure. All the connector configurations for automated monitoring should belong to the configuration group called Automated Monitoring (shown highlighted). Now, Choose the link Assign Connectors to Connector Groups to the AM connector group.
  • 12. Next choose Maintain Connection Settings, as shown in the following figure. A screen displays, asking which Integration Scenario you want. Choose AM for automated monitoring. the following page displays.
  • 13. The highlighted box shows nine entries called sub-scenarios these are different types of data sources and business rules supported in PC.
  • 14. To create a specific data source type (say, configurable) for a system to be monitored, the corresponding connector must be linked to that sub-scenario. Select the sub-scenario you want, and then choose Scenario Connector Link in the left-hand panel, as follows The following screen displays. If the connector you want to use for that scenario is not already in the list for that sub-scenario, choose New Entries to add it. We recommend the following pattern for convenience.
  • 15. Master -Data Preparation Before monitoring rules can be scheduled to run, they must be hooked up to the regulations, controls, and business processes, which are master data for PC. Monitoring Methods a) Data Sources in PC 10.0 encapsulate many different ways PC can extract data out of monitored systems, while still presenting a uniform interface to rule designers who want to filter and manipulate the data they extract. b) Business Rules hold the processing logic for such filters, calculations and the logic to determine if any extracted data represents a problem which control owners need to review or remedy. Design-time All design-time user interfaces are located under ―Rule Setup‖ in the top-level toolbar, as highlighted in the following figure.
  • 16. The Rule Setup user interface may contain many sections, depending on your role and how it is configured in your system. The following figure shows only the Continuous Monitoring section. Creating Data Sources Choose Data Sources in the above picture. The Data Sources screen displays. The screen lists the Data Sources previously configured in this system. You can create a new data source by choosing the Create pushbutton
  • 17. Name and Description: The Data Source name should be something descriptive which will help you to find the data source, and help document its purpose. Validity Dates: Validity dates determine the range of dates over which data sources, rules, controls, and so on, can be put to use in monitoring. Status: Data sources start with the status New. You can change most attributes of the data source while it is in this status, but you cannot use it to support rule creation or any other downstream activity. From ”New”, a data source can be changed only to ”In Review”; after review, it can become ”Active”, which is the state in which it can be used to create monitoring rules. Search Terms: These are tags which can help in finding the right data sources, for instance when you want to update or edit a data source, or you want to find one to reference when creating business rules.
  • 18. Use The Object Field tab to define more functionally relevant attributes of the data source. The Sub Scenario dropdown list shows nine options; these are the different types of data sources available in PC. For instance, the below following figure shows the vendor master table LFA1 of SAP ERP.
  • 19. The highlighted column shown in the following figure is editable, allowing the designer to replace the default text with something better suited.
  • 20. Connectors For most sub-scenarios, you must define a main connector that points to the backend system against which PC will try to validate your definition. The only exceptions are the SoD Integration and Event sub-scenarios. Creating Business Rules Business rules filter the data stream coming from data sources, and apply user- configured conditions and calculations against that data to determine if there is a problem which requires attention. In PC this is called a deficiency.
  • 21. The following screenshot shows the full range of power in a business rule The name, description, validity dates, status and search terms fields serve exactly the same function as the corresponding fields in data sources The Category and Analysis Type fields are dependent on the data source type
  • 22. Data For Analysis A data source offers several fields for the business rule to use in filtering or finding deficiencies.
  • 23. Filter Criteria Of all the business rule fields picked in the previous step, some will be useful mainly in filtering out data that is not of interest. You should pick such fields as filters, and define filter conditions against them.
  • 25.
  • 26. Conditions and Calculations Use this tab to define the calculations necessary to compute the value of a calculated field deficiency. The Calculations tab allows three types of calculations: a Field Value calculation, a currency conversion, or grouping and aggregation. Field Value Calculation PC provides a simplified user interface for relatively simple conditions and calculations, and advises customers to use the full BRF+ workbench to define more complex calculations. One important restriction is that the definition of a calculated field in the deficiency criteria screen (above) is one-to-one related to the definition of the calculation itself in the conditions and calculations tab. This means that any significant computation which requires intermediate variables is too complex to handle here—it would be necessary to define such complex rules in the BRF+ workbench. One decision method offered by BRF+ is directly incorporated into the PC rule interface: the decision table. This is called a ―”pattern” in the PC 10.0 interface, and is available only for the change log check category of business rule.
  • 27. Currency Conversion A key feature of the PC 10PC rule engine is the ability to convert currency amounts. This feature uses core NetWeaver support for currency conversions, and leverages the same underlying currency tables and features as used in ECC, CRM and other SAP applications. To use this feature, a deficiency criterion must be of type Amount, and the same must be true of one of the fields available in the rule.
  • 28. Grouping and Aggregation The screenshots in the section on Currency Conversion also include grouping and aggregation. The other deficiency in that example, Total Number of Payments to One- time Vendors, is intended to find the number of payments made to each one-time vendor, and then apply the configured thresholds to determine if that violates policies.
  • 29. The grouping is on Vendor number, and the aggregation method used is Count—which simply counts how many times each vendor (the grouped-by field) appears in payments. Grouping and Aggregation can also be combined in sequence with other calculation methods.
  • 30. Notice that the grouping/aggregation calculation is the second in the sequence, with currency conversion being first we want to convert to a single currency before adding
  • 31. BRF+ Workbench To leverage the full power of BRF+, first create a stub PC Business Rule, and use the generated rule ID You must know the technical ID of the rule you created, which you can see in the following screenshot of the PC Business Rule finder page. The technical object ID of each rule is displayed in the left-most column. This technical ID serves as the base, or first part, of the BRF+ rule ID in the BRF+ workbench. The easiest way to find the corresponding BRF+ rule in the BRF+ workbench is to paste this ID, add the wildcard character ‗*‘ to it, and then search. In the left-hand panel of the BRF+ workbench screenshot, there are two BRF+ rules with the same base ID as the PC 10 rule. this is because BRF+ creates new versions of every such rule each time it is changed.
  • 32.
  • 33. Output Format This section is common to all business rule/data source types, and arranges the output of any detected deficiencies in the left-to-right column order specified. You can also hide unwanted columns here. Technical Settings These primarily affect the execution and performance of monitoring. Most data sources will allow users to cap the maximum amount of data they will process, as a performance management feature. Ad Hoc Query This is useful for configurable business rules and data sources, which are designed and implemented directly from the PC user interface. The following screenshots show two modes of ad hoc query operation: one that collects the data as the data source would, and another that applies the rule logic to filter the data and then apply deficiency logic.
  • 34.
  • 35. Assigning Rules to Controls Monitoring rules need to be assigned to local controls.
  • 36. The search widget at the top of this page lets you search for local controls that is, controls assigned to a particular organization node. The next step is to select it in the middle part of the screen, by clicking on its row. You then modify the business rules assigned to it by choosing the Modify pushbutton, and then choosing the Add pushbutton in the bottom portion of the screen. A screen displays that allows you to search through Business Rules in the Active state, which you can then assign to the local control. You can also modify existing assignments and maintain frequencies of monitoring or compliance checks. Once this assignment step is complete, you will be able to schedule the monitoring rule in the Automated Monitoring scheduler.
  • 37. Scheduling The monitoring scheduler is also on the Rule Setup Select the Automated Monitoring link. the following screen displays Use this page to schedule all schedule-driven rules
  • 38. The Scheduler page displays all currently scheduled jobs. You can create a new monitoring job by choosing the Create Job pushbutton, which walks you through the process. The following screenshot gives an overview. The top of the screen shows that scheduling is a 5-step process, and the wizard guides you through it. The most important thing to note about the scheduler is that you can run jobs as frequently as hourly, and as infrequently as annually.
  • 40. SAP Query Data Sources and Rules SAP Query is a NetWeaver query tool. The following screenshot shows the transaction SQ01. The following two screenshots show the relevant sub-scenario for Data Source definitions
  • 41. In defining a data source against a previously-defined SAP Query, the designer has to point to a particular backend system which is to be monitored. PC looks up the set of available queries in that backend system (including wildcard searches), looks up the query details, and makes its results available to the PC rule engine. To create any Business Rule, the first step is always to select the (active) Data Source on which the rule will operate. Since this fixes the sub-scenario, you do not have to pick the sub-scenario for any Business Rules—it is always inherited from the Data Source.
  • 42. For SAP Query Business rules, you can define two categories of business rule, as follows The Exception category means that any data returned by the data source is always considered an exception. The Analysis Type field decides whether to treat all such exceptions as deficiencies to be remedied or as something a human must review to determine if it requires a remedy. The other category, Value check, implies that there are deficiency criteria which explicitly need to be evaluated, and that you will then be expected to configure in the Deficiency Criteria and Conditions and Calculations steps of the create rule wizard A configurable data source defines a query against tables in the monitored backend system (such as ECC/ERP, SRM, and so on).
  • 43. This section also explains the Change Log option, which tells PC to reconstruct past configuration and master data settings over the timeframe of the control, and validates all such past and present settings against the user-configured monitoring rule. Having picked the Configurable sub-scenario, you next pick a connector to the backend system against which you want to define the query
  • 44. Having picked the main table, you can next pick related tables to bring in additional information Again, you can use wild cards to search for tables. Note that PC 10.0 already filters the list of tables to include only those which have related information.
  • 45. dependent tables are those which refer to (as foreign keys) the key fields of your main table (primary keys), while reference tables are the opposite—they hold the primary keys to which your main table refers as foreign keys You can join multiple related tables together in such a compound data source, with the constraint that the join conditions are restricted to being equality relationships between like- type fields. For the most part, it is expected you will join primary keys to foreign keys.
  • 46. Change Log Data Sources and Rules A change log rule is a variation on the configurable rule defined previously, and hence is presented as a subsection of that type in this document. It is intended to be used for monitoring configuration and master data tables only. SAP applications have extensive change-tracking mechanisms for database tables, which guarantee that all changes are captured, even if they are of very short duration. These mechanisms cover changes made directly in the system, and also changes transported into the system. So a change log business rule allows you to check the validity of a configuration or master data setting at any time, with confidence that all changes made to that setting will be found and tested for correctness. Wrong configurations are caught, no matter how transiently they were in effect.
  • 47. Definition of Change Log Rules Change log based rules can be based on either configurable data sources, or programmed ones. Such change-log-based rules can be used to monitor either configurations, or master data. For change log rules based on configurable data source types PC provides an analysis type of pattern, which allows users define a multi-field deficiency criterion using a decision table.
  • 48. Table Handlers When interpreting the change log, the GRC backend plug-in needs a handler to interpret the change log entries. Sometimes more than one table handler is registered for the table in question, and it can be difficult to determine which handler to use. The correct handler for your situation will be the one which makes your deficiency fields available for use in change analysis rule.