SAP GRC access control @ ULg Pierre Blauwart – Project Manager HERUG BvD-it Confidential.

Slides:



Advertisements
Similar presentations
CFO – MANUFACTURING SECTOR
Advertisements

Module N° 4 – ICAO SSP framework
OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Internal Control–Integrated Framework
Control and Accounting Information Systems
Corporate Service Review DEPARTMENT OF BUSINESS AND EMPLOYMENT.
DEPARTMENT OBJECTIVES 1. To Identify and deploy information technology to meet business objective at CKPL. 2.To Provide support to users for systems usage.
The Islamic University of Gaza
The TRUTH About SOX, Auditors & Oracle Applimation is the leading provider of Application Lifecycle Management solutions.
Copyright © 2003 Americas’ SAP Users’ Group Authorizations in the Finance & Controlling Modules Ranvir Singh, Sherman Wright Business Analysts, LSI LOGIC.
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.
Institute of Municipal Finance Officers & Related Professions
Managing the Information Technology Resource Jerry N. Luftman
Module 2 Segregation of Duties Case Study Individual Assignment
MIS350 Accounting Information Systems Course Context.
Internal Control Pertemuan 05 s.d 06 Matakuliah: F0712 / Lab Sistem Informasi Akuntansi Tahun: 2007.
Managing Segregation of Duties (SOD) in R3 Session Code: 808 Donnie Looper, Eastman Chemical Company Jasvir Gill, Virsa Systems.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
University of Southern California Enterprise Wide Information Systems The Procurement Process Instructor: Richard W. Vawter.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
SAP An Introduction October 2012.
ITIL: Why Your IT Organization Should Care Service Support
Project Execution.
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT Module 3.2 -Internal Control & Audit.
Best in Class Controls for AP The Institute of Financial Operations Indiana – Southern Illinois Chapter June 15, 2011 Sherry DePew.
Istanbul Kultur University Enterprise Wide Information Systems The Procurement Process.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
 A project is “a unique endeavor to produce a set of deliverables within clearly specified time, cost and quality constraints”
A NASSCOM ® Initiative DSCI-KPMG Survey 2010 State Of Data Security and Privacy in the Indian Banking Industry Vinayak Godse Director- Data Protection,
NASC Presentation – March 2014 An Overview of Pennsylvania’s Internal Controls By: Anna Maria Kiehl, CPA State Comptroller/Chief Accounting Officer Governor’s.
Practical Implementation of Automated Assessment Tools for the IT Auditor John A. Otte, CISSP, CISA, CFE, EnCE, MSIA Director, Strategic Services FishNet.
IT Service Delivery And Support Week Eleven – Auditing Application Control IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA.
IT Requirements Management Balancing Needs and Expectations.
1 Prosci ® Image Library. 2 Guidelines This library is not designed as a presentation, but rather a collection of available slides for potential use in.
Lecture 11 Managing Project Execution. Project Execution The phase of a project in which work towards direct achievement of the project’s objectives and.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Microsoft Office Project 2003: Selling EPM in your Organization Matt Wilson Business Solutions Specialist LMR Solutions.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 12 Integrating the Organization from End to End – Enterprise Resource Planning.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Plug-in B10 ENTERPRISE RESOURCE PLANNING.
Conference Workshop Continuous Auditing: An Approach for Today Univ. of Salford, 5 December December 2015 Presented by Anton Bouwer
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT Module 4.3: Internal Control & Audit.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals.
Collaboration Process 1. IC Objectives and Risk Tolerances Define, document, and implement top-down internal control objectives and risk tolerances: 
Auditors’ Dilemma – reporting requirements on Internal Financial Controls under the Companies Act 2013 and Clause 49 of the Listing agreement V. Venkataramanan.
IMS Implementation Project
Review of IT General Controls
SAP GRC(Governance Risk and Compliance) online tutorial
Financial Management 26th- Apr-16.
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
SAP Access Violation Management by Greenlight
PEFA 2016 Slides selected from the training materials of the PEFA secretariat.
Accountability and Internal Controls – Best Practices
QAD Enterprise Edition Segregation of Duties
Defining Internal Control
ITIL: Why Your IT Organization Should Care Service Support
Internal control - the IA perspective
ITIL: Why Your IT Organization Should Care Service Support
Module 2 Segregation of Duties Case Study Individual Assignment
PEFA 2016 Slides selected from the training materials of the PEFA secretariat.
SAP GRC EOH GRC Solutions Divisional divider Option 1.
ITIL: Why Your IT Organization Should Care Service Support
Performance improvement observations
Financial Control Measures
Financial Control Measures
Presentation transcript:

SAP GRC access control @ ULg Pierre Blauwart – Project Manager HERUG BvD-it Confidential

Agenda ULG in a nutshell Context Definitions Methodology & Roadmap Project status BvD-it Confidential

ULG – an all round university 17,000 students 3,800 foreign students 80 nationalities 3,200 graduates a year Budget : 269 millions Euros which 50 % are allocated to research 3,400 employees, of which 2,200 are teachers and researchers 3,000 employed at the University Hospital Centre (CHU) Around 1,500 jobs at the Liège Science Park (60 businesses) 900 jobs in spin-offs resulting from scientific research Just 60 minutes away from Brussels, the Grand Duchy of Luxemburg and France, 30 minutes away from Germany and the Netherlands, the University of Liège is at the heart of Europe. Financement vient des funds

ULG – SAP Implementation SAP for Finance & Logistics : MM, SD, EP, CATS, PS, RRB, PCA, BI, PI, GRC 600 Users – 1000 Roles HR non SAP, SLCM non SAP Financement vient des funds Funds : more & more control, Audit on « segregation of duties » FP6 www.ulg.ac.be

Context Trends in the ULg ecosystem: growing pressure to control the exposure to fraud and data tampering External: More & more controls from public grantors, with concerns on access procedure. This has resulted in audits driven by some of them & focused on segregation of duties Internal concern as well Segregation of duties: SoDs are a primary internal control intended to prevent, or decrease the risk of errors or irregularities, identify problems and ensure corrective action is taken. Principle : This is achieved by assuring no single individual has control over all phases of a business process. Example : Modify vendor bank account + Vendor payment Remediation : incompatible duties are divided, or segregated, among different people to reduce the risk of error or inappropriate actions. Grantors wants more & more to control their funds & expenses Concern about access procedure Financement vient des funds Funds : more & more control, Audit on « segregation of duties » FP6

Solution selection : SAP GRC Access control GRC : Governance, Risk & Compliance Governance: Manages the strategic directives a company wants to follow Risk : Management assesses the areas of exposures and potential impacts Compliance: Tactical action to metigate risk SAP GRC Access Control monitor, test, and enforce access and authorization controls across the enterprise. Solution assessed Set up a GRC tool Use of detection solutions that operate on downloaded data Solution adopted : Install SAP GRC access control The essential feature of segregation of duties is that no single person should have responsibility for controls over an entire transaction. Mitigation

Scope of the project : Access Control

Scope of the project : Phase 1 Compliance Calibrator Firefighter Compliance Calibrator : Risk Analysis & remediation solution for access & authorization controls Firefighter : super user access control solution Enables compliance-focused emergency access for SAP Role expert : role definition & management solution - allows role owners to document role definition, perform automated risk assessments, track change control, and facilitate maintenance Enables entreprise role definition (& maintenance) in a single location Access enforcer: Prevent Compliant solution at run time - enables compliant provisioning by automating the user access request and approval process with embedded risk analysis. Compliance Calibrator

Project Roadmap - Step 1: Project Preparation Implémentation Cycle 3 GRC Installation Version 5.2 Connected to ECC instance Proof-of-Concept : first risk assessment About 300.000 Violations First action: drastically reduce SAP_ALL, SAP_NEW Scoping of phase 1 Risk have been grouped by BPO: FLC (Financial & Closing) OTC (Order to Cash) P2P (Procure to Pay) I2P (Idea to Project) Basis Component : out of scope Implémentation Cycle 2 Implémentation Cycle 1 Voir avec Vincent sur quelle machine GRC est installé ? RFC ... Proof of concept 5 Go Live & Support 4 1 2 3 remediation Risk assessment BvD-it Confidential

Risks per Business Process BP : Finance & PS 32 risks SoD BP : Material Management 14 risks SoD BP : Purchasing 67 risks SoD BP : Customer (& grantors) invoicing 29 risks SoD BP : Basis – technical 19 risks SoD BP : EC-CS Consolidation 14 risks SoD BP : HR & payroll 21 risks SoD BP : APO 16 risks SoD BP : CRM 20 risks SoD BP : EBP & SRM 24 risks SoD

Step 2: Risk Assessment Workshops: Adapt the standard SOD matrix Are the risks proposed in the standard matrix relevant ? Do we have to add some risks ? Do we have to consider additional transactions (transaction Z* ) ? Adapt GRC standard risks : Critical, High, Medium & Low Design (update) the SOD matrix in the SAP GRC system Run the risk assessment Perform analysis BvD-it Confidential

Ecrans GRC - CC Pg.: 12 | 19/11/2004 BvD-it Confidential

Ecrans GRC - CC Pg.: 13 | 19/11/2004 BvD-it Confidential

Ecrans GRC - CC Pg.: 14 | 19/11/2004 BvD-it Confidential

Ecrans GRC - CC Pg.: 15 | 10/06/2009 BvD-it Confidential

Risk assessment Results Recommendations on naming convention 98 % (516 out of 525) of the SAP users have SOD risks SOD violations on role “display” !!! Recommendations on naming convention The naming of the role gives an information on the underlying business process Use simple roles Aggregate simple roles in composite role Identify quickly the different roles : Roles simples : « Z:xxx », roles composites : « ZC:xxx » Roles display : « Z:xxx_V » Create one specific role dedicated per critical risk Remark on traceability : the system keeps the history of the violations related to the risk assessment  perform the first analysis in the acceptance system Pg.: 16 | 19/11/2004 BvD-it Confidential

Step 3 : on progress Remediation : no role can content a SOD violation Mitigation : accept the risk for some user & enforce the control on it Use Firefighter : to track actions performed by super users during certain period of time (closing period for example) Integration on SAP EP BvD-it Confidential

Questions ? Send a mail to our CFO : Anne Girin anne.girin@ulg.ac.be Pg.: 18 | 19/11/2004 BvD-it Confidential