GRC Ara - Rule Sets
GRC Ara - Rule Sets
GRC Ara - Rule Sets
Gautam Shetti
26 June 2015
1 | Page
Process 1: identify which Risk IDs and Function IDs are mapped as SODs/
Critical Actions
On the NWBC screen, click on Setup and under Access Rule Maintenance hit
on Access Risks
If you filter on Risk Type, we can identify the SOD / Critical Actions and their
associated Risk IDs and Function IDs.
You can further click on these Function IDs to identify the transactions that
are mapped to it.
2 | Page
Process 2: Identify if a role has Critical Actions:
Under Access Management in NWBC, go to Role Level and you find the
below screen popping:
3 | Page
Here we have taken as example for role: ZS_FI_ACCOUNTANT_P1: (Technical
View)
4 | Page
The above shows the Crtical Actions present in the role:
ZS_FI_ACCOUNTANT_P1 in ECP-200 system and its associated Risk IDs and
Risk Level.
This will give violations if any found on this role at the Permission Level.
This can also be performed in BOTH Technical and Business View.
5 | Page
Process 4: Identify Users with a particular Risk ID:
Go to Access Management in the NWBC screen and click on User Level for
below screen:
Here after entering the System, user type, Rule set and risk level, take the
drop down option in the boxes to select: Access Risk ID
6 | Page
Do see that this result is being executed in the BACKGROUND as there shall
be MANY users and the foreground execution can much longer time and can
even hang up!
How to check BACKGROUND JOBS:
In Access Management screen, scroll down to see the Scheduling heading
as shown:
Click on background jobs and you will see all jobs scheduled/ completed in
background:
7 | Page
The status Active indicates that the JOB is still running. You can refresh the
screen at the link provided in the page to check until the status moves to
Finished.
You can now click on the job and analyze the results.
Process 5: Similarly under User Level, you can identify users associated to
a Business Process
Here you find all the Function in the Rule set and its associated Business
Process.
8 | Page
To search for a specific Function ID, click on Filter in the screen and type in
the Function ID to search:
Here we are searching for Function ID: BS15, so type in BS15 once you click
on Filter. The result will show you only the Function ID BS15 as seen:
9 | Page
The above shows the Risk IDs and its associated Business Process, Function
IDs and Risk Level defined.
******************************************************************************
**********
Basics of a Rule Set:
- Rule set comprises of: Risk ID and Function IDs all mapped to a
Business Process
- Risk IDs consists of Function IDs
- Risk IDs are defined as SOD or Critical Action
- Function IDs consists of Transactions and its associated permissions
- If Risk ID is defined as SOD, it should have two function IDs minimum
- If Risk ID is defined as Critical Action, it can have ONLY ONE function ID
- Risk Level can be low, medium or HIGH
- The details of Risk IDs and Function IDs is something which Business
has to define or finalize
10 | P a g e