2-4-0 Acr1 Detailed Level Design 1-Rev2
2-4-0 Acr1 Detailed Level Design 1-Rev2
2-4-0 Acr1 Detailed Level Design 1-Rev2
Version: v1.0
6. Organisational Structure........................................................................................................ 16
Document Distribution
Client:
Hind Obaid Saeed Al Falasi
Document Purpose
This document provides a detailed level of the solution relating to Access Control requirements and
documents all configuration items that have been considered for the implementation of the GRC Access
Control solution.
All design decisions relating to the configuration of the solution have been discussed and agreed and this
document interprets what needs to be configured and how in order for the technical solution to meet the
business requirements.
STRATA_HIGH_LEVEL_DESIGN 1
STRATA_AUTHORISATIONS_FUNCTIONAL_DESIGN 1
Landscape
Access Control will be connected to the following target systems across the development and productive
systems. This reflects the backend SAP systems that Access Control will process user and role data for.
SAP ECC ✓
✓ ✓ ✓
SAP BW ✓
✓ ✓ ✓
SAP GRC ✓
✓ ✓ ✓
Note: Those systems that have not been included in the table above are not in scope.
Connectors
A number of communication channels (called connectors) will be created to facilitate the communication
between SAP GRC and target systems. These communicate through standard Remote Function Calls (RFC).
For example; DE0CLNT100, where DE0 is the System ID and 100 is the “Client ID”.
GD1CLNT100 ED2CLNT100 3
GD1CLNT100 BD2CLNT200 3
GRPCLNT200 BP2CLNT200 3
GRPCLNT200 EP2CLNT100 3
Connector Definition
Before any connectors can be used with SAP GRC, they have to be defined. The connections described
above will be defined as follows:
Connector Groups
Connector groups are logical groupings of physical connectors that are subject to the same SoD & critical
access rules. By grouping them together in this way the connectors will share the same set of rules and
changes made to the rules will apply to each connector.
The advantage of this approach is that rule changes will only need to be made against a logical system,
instead of against each physical connector thus reducing ongoing maintenance. Logical groupings are system
independent.
Note: Groups ending with _LG are connector groups with logical system groupings. Groups ending
with _CG are standard connector groups.
Integration scenarios are used to define the message format, flow and exchange between two different
application components within SAP GRC Access Control which has five integration scenarios to choose from:-
Note: The assignment of all relevant scenarios to all connectors is recommended by SAP.
SAP ECC ✓ ✓ ✓ ✓
SAP BW ✓ ✓ ✓ ✓
SAP GRC ✓ ✓ ✓ ✓
Plug-in Parameters
Configuration parameters are set in the plug-in system to manage communication back to SAP GRC. The
plug-in parameters below will be set in each of the target systems:-
1000 Maintenance of Plug-in Connector Connector name maintained in GRC target system
Note: This table is cross-client, and user exit settings are transportable through the system landscape.
Note: Configuration parameters for all in scope Access Control modules are included in the relevant
sections
Strata Strata
The embedded spreadsheet below documents all parameters that will need to be set along with specific
values for each. These parameters will help determine the way the solution operates so that it meets business
requirements.
An SoD risk always consists of two (or three or more) sides. By definition, an SoD risk occurs when a user is
able to execute multiple processes which would present an opportunity for personal gain or to misstate
financial statements. Structurally, a SoD risk in GRC consists of two or three functions (defined below). At the
risk level, the ruleset will describe how the risk may be breached (in terms of the conflicting functions) and also
provide some insight into what the risk actually is. Each SoD risk is also given a criticality rating of high,
medium or low.
Critical Risks
A critical risk always has only one side (i.e. consists of just one function). This means that a risk will be
reported if a user has access to any of the transactions in a critical function. All critical risks have the criticality
rating of critical.
The Ruleset
The SoD and critical risk ruleset is where Strata’s rules are defined in relation to what SAP transaction codes
are not permitted to be assigned to users. For SoD risks, the rules define which combinations of transactions
are not permitted. The rules also define which transactions are critical in nature in respect of potentially
compromising data confidentiality, system or data integrity or system availability.
The rules are used by Access Control to assess roles and users to identify breaches. Such breaches (conflicts
or violations) can either be found in roles (due to combinations of transactions found in a role) or at the user
level (due to combinations of roles (and thus combinations of transactions) assigned to the user).
Functions
A function in GRC terms can be defined as a task that is executed in SAP, for example purchase order
maintenance or vendor master data maintenance. A function is a wrapper in the ruleset to house all the
various transactions that could be executed by a user to run a particular task, so for example in ECC
As well as defining the transactions that a user could execute to run a task, the function will also contain a
definition of all the authorisation objects and authorisation values that are required in order to execute each
transaction. This detail is required in order to fully establish if a role or user has all the access required to be
able to execute a transaction – if they do not, then they would not be able to execute the transaction and
would thus not be able to breach the risk.
Ruleset Approach
An industry standard ruleset is delivered with GRC Access Control which contains an extensive set of SoD
and critical risks. ECC risks are defined for all end to end processes/SAP modules. Basis risks are also
included and these apply to all SAP ABAP solutions.
The SAP standard ruleset will form the basis of the Strata ruleset. During blueprint, a risk identification process
was run that has identified changes that need to be made to the SAP standard ruleset to meet Strata control
requirements. The approach to risk identification is documented below and the final Strata ruleset can be
found in full detail in the embedded ruleset file below.
It is necessary to establish which particular SoD and critical risks present in the SAP standard ruleset are
relevant to Strata. Workshops were held to discuss this and establish which risks will be present in the Strata
version of the SAP standard ruleset at go-live. The line manages at Strata approved the relevant risks and
their risk level.
The overarching principle to be adopted is that SAP standard risks will be included in the Strata ruleset if there
is any suggestion that users may have access to the underlying transactions that will cause a risk. The
thinking here is that if a risk could potentially materialise, it is better to have visibility of it than not, therefore
providing Strata with opportunity to address the risk. The exception here is where risks relating to functionality
not used at Strata will be considered out of scope. These are reflected clearly in the embedded ruleset
spreadsheet above.
There is also an element of future proofing at work in this approach. Where risks are left as active where
transactions are not currently in use, there is no impact on GRC processes as risks would not be reported. In
the future, should transactions be introduced into use (either legitimately or maliciously) that would introduce
risks then no further work is required to bring GRC into line.
Function Maintenance
SAP standard functions will be updated on a needs only basis. Generally, the SAP standard composition of
the functions will be accepted as it stands. The exceptions to this are:
1. Where custom transaction codes are identified as being relevant to an SoD risk then they will be added
to relevant functions (along with any relevant authorization objects and authorization values)
2. Where authorization values need to be updated in functions to remove a false positive
Ruleset Changes
All ruleset changes, (to functions and risks) will be managed through the standard SAP GRC workflow. These
changes should be captured and managed in the development environment and subsequently transported
through to production.
Any changes that are made to the ruleset including updates to “Functions, “Access Risks” and “Access
Controls” are recorded and time stamped.
Mitigating Controls
Mitigating Controls will be defined in the Master Data Design product after realization phase.
All mitigating controls will be assigned a business process and sub business process within SAP GRC Access
Control. This is a mandatory activity to categorise the controls and this categorization activity is done upon the
creation of the control as master data. Business Process configuration will be driven by those risks that have
been activated/de-activated within the Access Controls ruleset. (embedded above)
The table below describes the business processes and sub business processes in scope:-
Projects Timesheets
Configuration Parameters
The embedded spreadsheet below describes the configuration parameters that are specific to the Emergency
Access Management module and documents the values that will be configured within each parameter to
enable the solution.
Reason Codes
Reason codes are set up in GRC EAM so that an emergency user self certifies the reason for why they need
to log on with enhanced access. The reason code specified is captured in the logs created by EAM and is then
used as part of the log review/challenge process which helps form the control provided by EAM. The agreed
reason codes are captured in the embedded spreadsheet below.
EAM ID Mapping
EAM users and mapping will be captured in the Master Data Design product.
Access Request Management automates provisioning tests for SoD issues and streamlines approvals to the
appropriate business approvers to unburden IT staff and provide a complete history of user access.
Request Types
SAP pre-delivers several standard request types. A request type is usually the first selection that is made by a
user to determine the type of access request, for example whether a request is for a new account, to change
an account or delete an account.
These standard request types represent actions that usually occur in the back end systems. The following
request types are to be defined for Strata
Access request priorities are used to determine how quickly a request should be approved or pushed through
the process. These priorities are configured and appear on the ‘Priority’ tab of the access request. The priority
level that is selected directly impacts the workflow by determining the time rate for the approval process. The
following access request priorities will be configured into the solution:-
Employee Types
Employee types configured can determine the type of request and/ or workflow path that the request will take.
The following employee types will be configured.
SAP number ranges are used to determine the request number of the access request. The request numbers
assigned under GRACREQNO in transaction code SNRO will be activated for use as shown below.
The EUP is the screen that the end user will see/use as part of the access request. The screen can be
customised to define the behaviour of the fields and the pushbuttons on the screen.
By default, the standard SAP EUP form will be called within each access request form/stage. However, it is
possible to assign a specific EUP form to a request stage within the workflow.
The default EUP form (ID 999) settings which will be used as the base and then modified for Strata are
captured in the embedded spread sheet below:
GRC Access Control can be configured to provision roles and users at a global or system specific level. At the
global level, the settings that will be configured are applicable to all connected systems, unless it has been
explicitly set for a specific system. For Strata, the solution will indeed be set to system level for all role and
user provisioning.
A user defaults business rule can be used to define the default entries automatically maintained for a user
master record based on defined attributes and conditions in a Business Rules Framework plus application.
The user default assignment is performed on successful approval of an access request and just before
provisioning occurs in the target system. The attributes for the user default are mostly values available in
transaction code SU01 (User Maintenance). Additionally, user group assignment and parameter IDs to be
provisioned can be maintained by default based on a defined business rule.
This capability provides control to access provisioning, saves time in maintaining numerous master records,
and makes the assignment of SU01 specific values less error prone. A number of fields in the user master
data can benefit from user default assignment.
Once the user defaults have been configured, the data is transferred to the appropriate SAP backend system
(in transaction code SU01) as defaults.
The following table defaults will be configured for the Strata in accordance with client discussions.
Parameter ID’s
Once the default values and parameter ids have been confirmed the following BRF+ rule will be configured.
The user defaults functionality works on the principle that the BRF+ application evaluates a series of input
criteria and then outputs a specific result value. This result value then equates to the key assigned to the
specific user default configuration set in customizing (user default master data). The first step in setting up a
user defaults business rule is to identify the attributes for which it is intended to maintain user defaults. These
records typically exist in transaction code SU01.
Business Roles
Business roles will be configured according to the business roles mapping matrix that will be provided as part
of the role mapping exercise. This section will be updated with the business role map once this has been
approved.
The parameters specified in the embedded spreadsheet below will be configured into ARM in order to enable
the solution:-
SAP provide a number of “out of the box” workflow processes for SAP GRC Access Control. Whilst additional
and customised Multi Stage Multi Path (MSMP) workflow processes cannot be created, it should be noted that
the delivered workflow processes are sufficient for leveraging all possible GRC Access Control capabilities.
All MSMP workflow processes are fully modifiable, allowing dynamic workflows to be designed and
implemented. The addition of Business Rules Framework (BRF+) allows the implementation of custom
initiators, approver stages and detour routes.
In the latest ABAP based technology, it is expected that the system performance will be more robust than
older product versions, therefore giving a reliable and fast user experience.
The table below outlines the workflow processes that are delivered by SAP. In scope ARM workflow
processes will be modified and configured to meet solution requirements.
SAP_GRAC_FIREFIGHT_LO Firefighter Log EAM Initiates a workflow item containing the YES
G_REPORT Report Review EAM session log to review and approve.
Workflow
SAP_GRAC_FUNC_APPR Function Approval ARA Initiates approval request for proposed YES
Workflow changes to Ruleset Function definitions.
SAP_GRAC_RISK_APPR Risk Approval ARA Initiates approval request for proposed YES
Workflow changes to Ruleset Risk definitions.
SAP_GRAC_SOD_RISK_RE SoD Risk Review ARM / The SoD review is a workflow process to YES
VIEW Workflow ARA initiate and route periodic SoD Risk
Reviews, where a review is conducted
upon the overall access related risks
within the landscape by business
managers and/or risk owners. This
MSMP process can also be configured to
initiate the removal of violating roles via
Access Request Workflow.<period>
SAP_GRAC_USER_ACCESS User Access ARA / The User Access Review is a workflow YES
_REVIEW Review Workflow ARM process to initiate and route a periodic
User Access Review, where a review is
conducted upon the user access within
the landscape by business managers or
role owners.<period BRM data, must
configure BRM correctly>
Whilst GRC provides ready to use agent rules such as “Role Owners” and “EAM ID Owners”, the application
does not provide all the necessary agent types by default. Therefore, custom agents can be created to act as
approvers or be notified of any event within the access request workflow. There are four methods of being
able to define who the agent would be as follows:-
1. Directly Mapped Users – Allows to be defined as a static user group (i.e. directly listed within
the GRC workflow)
2. PFCG Roles – Recipient identified via an active role assignment within the GRC system
3. PFCG User Groups – Determined on a user group assignment within the GRC system
4. GRC API Rules – Coded as per rule’s type i.e. BRF+ rule, ABAP Class based rules (usually
SAP delivered) or Function Module Based Rules
The Custom Agents not be configured at this time on this greenfield implementation at Strata.:-
An MSMP process ID can have only one Initiator assigned for use, therefore all Initiator results must be listed
out within the custom BRF+ table with the results for the required path. The result shall be determined by the
attributes within the request e.g. User Group, Business Process, System, Request type etc.
The Role Types/ Critical Level / Company/ Functional Area attributes designated to a role definition will
determine the result of the Access Request initiator. The attributes are assigned to the role definitions in the
GRC AC BRM tool.
Each workflow is made up of a number of stages (refer below section) and the workflow path determines the
sequence in which these stages take place.
There are one or more stages in a workflow path. At each stage the workflow will determine the appropriate
approver for that stage (based on the criteria set for that specific stage) and route the work item to them for
action.
Within this section it is also necessary to specify the wait time and escalation configuration for the details of
the values to be populated for each stage, along with the justification for these options. For each stage the
notification and additional configuration must be completed.
The embedded spreadsheet below contains a table documenting the stages that have been defined. The
standard/custom Agent Rules to be assigned to the individual stages have been specified also. The stage
settings also determine if the performance of a Risk Analysis is mandatory by the approver.
Escape Route
The Escape Route will be initiated for example when an approver rejects all roles in a request and
consequently there are no roles remaining to approve in the next stage. The Request will escape route to the
No Role Owner Approver to be rejected by the appropriate team.
Notifications
Each stage has specific notification settings configured to notify the necessary involved individuals/groups of
decisions made. The table below shows under which circumstances a user will receive a notification from the
system during the workflow process.
Manager Approved x X X
Escalated x X X
Rejected x x X
Submit x
Escalated x X X
Rejected x x X
Submit x
Security Approved
Escalated
Rejected X X
Submit x
Provisioning
ARM enables users and roles to be provisioned automatically to SAP systems upon completion of the
approval stages in the workflow. Alternatively, the information and approvals can be collected and used by
Administrators to manually update the system. SAP production systems will be provisioned automatically to
the user master record.
New Users
No Role Owner
If a request is submitted or approved that contains no roles to approve, or if a New User or Change User
request contains no roles, then the request cannot be processed. Rather than creating an error in the system,
an escape route workflow is to be configured to send these requests to a central team for review and rejection.
Lock User
Unlock User
This workflow deals with requests for an existing SAP user to have access to an existing EAM User ID. This is
not to request a new EAM User ID to be created.
Only valid EAM ID’s (existing within the target system) can be requested for users who have access to the
EAM cockpit within the GRC system itself.
A request containing SAP access shall be subjected to an automatic risk analysis upon submission. This will
ensure the approver receives the request with any potential risk violations reported prior to approval.
Various MSMP workflows are available as default to enable audited maintenance of the Access Risk Analysis
ruleset and control definition and assignment.
By default, these requests do not need initiators to be maintained. However it is recommended that the ruleset
maintenance related workflows are only activated and initiated from the GRC Development systems; as SAP
best practice is to maintain the ruleset within GRC Development only and transport the changes across the
rest of the landscape.
It should be noted, as the standard workflows provided by SAP are being utilised for ruleset maintenance,
custom initiators and custom paths do not need to be created or maintained.
This workflow initiates a request item to the designated Control Owner to approve an assignment of a
Mitigating Control to a user. This request can be initiated during the process of applying a Mitigating Control to
a user manually or during the Access Request workflow process.
By default the MSMP process (SAP_GRAC_CONTROL_ASGN) uses a single stage approval process. This
shall not be altered for Strata. It is recommended to enable this MSMP process within the GRC Production
system for live use.
By default, the MSMP process uses a single stage approval process. It is recommended to enable this MSMP
process within the Production system for “live” use.
The MSMP process SAP_GRAC_FUNC_APPR initiates an approval request for proposed changes to ruleset
Function definitions. By default the process consists of a single stage approval.
This workflow should only be enabled within the Access Control Development system as ruleset changes
should be executed in the development system and transported across the landscape.
The MSMP process SAP_GRAC_RISK_APPR allows changes within a risk definition to be reviewed and
approved by the designated approver (by default the Risk Owner) prior to the ruleset being regenerated taking
the changes into account.
This workflow should only be enabled within the Access Control Development system, with approved changes
being transported across the landscape.
Access Control provides the capability of managing the assignment of EAM ID’s to users via the Access
Request process. In addition, there is an Emergency Log review to be conducted via automated workflows
being sent to the designated EAM ID Controller.
It should be noted, as the standard workflows provided by SAP are being utilised for receiving and reviewing
the EAM session log reports, custom initiators and custom paths do not require to created or maintained.
The Controller must be set to receive logs via “Workflow” for the specific EAM ID. This will be set-up in the
front end of the GRC system. Once an emergency session has been concluded, the GRC system initiates a
workflow via the SAP_GRAC_FIREFIGHT_LOG_REPORT MSMP process containing the EAM session log to
review/approve.
By default, this process consists of a single stage approval process and ensures the Emergency logs are
being audited in a timely manner.
In order to use BRM, the methodology processes and steps for role maintenance need to be defined. The
application provides a set of actions that can be used for role maintenance, such as Definition, Actions &
Permissions, Risk analysis, Derive, Approval, Generation, Testing and Provisioning (only for Business Roles).
Users can select which actions to use, the order, and the frequency per methodology created.
It should be noted, as the standard workflows provided by SAP are being utilised for notifying the role owner/s
and accepting the approval for the new/changed role definition, custom initiators and custom paths do not
need to created or maintained.
The approval action results in an approval request being sent to the assigned Role Owner/s to approve the
creation/content update of the role definition. This functionality utilises the MSMP workflow process
SAP_GRAC_ROLE_APPR.
By default, the process uses a single stage approval process. This shall not be altered for Strata. This MSMP
process will be activated within the GRC Production system for live use, with the actual role build and
maintenance taking place against the target Development system. Once the role has been approved and
generated, it shall be transported across the rest of the landscape as per existing processes.
Each workflow event in the Access Control workflow process can trigger an email notification that corresponds
to exactly one pre-defined message class. Each message class corresponds to one document object
containing a pre-delivered message body for the respective workflow event.
Upon a request submission and at the end of a request, notifications are sent to notify the user of the
beginning and end of the process respectively.
The table below lists each process ID or event and the corresponding message class for each one of the
workflow events that are required by Strata:-
SAP_GRAC_ACCESS_REQUEST comes with the following additional events and message classes:-
The SoD Risk Review workflow comes with two additional message classes for email reminder events. These
are:-
Password Self Service functionality allows end-users to reset their passwords in the SAP backend system
without having the SAP Help Desk or the SAP Security Group involved. This tool saves the SAP Security
Group time and expedites the password resetting process for the end-user.
The parameters that need to be maintained to facilitate the BRM solution are captured in the embedded
spreadsheet below along with the required values.
All role information that is to be used within ARM and BRM for end user provisioning is now maintained in
BRM.
In BRM, business process and sub business processes are attributes that are assigned to the role definition.
This helps categorise roles in a way that is easier for end users to navigate and select roles when creating
access requests. This is also used to drive the ARM workflows. These are the same business processes that
are configured for ARA.
Note: To register and define roles for ARM and BRM, a sub-process will need to be selected and
assigned along with its corresponding business process.
Role Types
A number of SAP role types are pre-delivered with GRC Access Control. Role types that are marked in
configuration are in-active for ARM and BRM modules. By default, all role types are set as active and some of
these will need to be de-activated for Strata. The following role types shall be made in-active.
Note: GRC 10.0 will support the provisioning of ABAP and JAVA roles as part of the provisioning
processes
This feature is useful for integration with other systems that may have such character length limits:-
Companies Definition
Roles can also be categorised and/ or assigned to Strata (1000), Strata Manufacturing, Al Ain, UAE.
Functional Areas
The functional area values will be used to route the divisional approval of user requests (via BRF+ rule based
custom agents). The functional areas are based on user groups however they are a separate (role attribute)
entity within ARM.
The functional areas documented in the embedded spreadsheet below will be created:-
Default Roles
Default roles are roles that are assigned to user requests under certain access request conditions. For
example, if a new user is created for ECC and a set of two default roles is required as a basis to navigate
SAP. These roles are known as “default roles”.
Default roles can be configured in Access Control so that they are added to an access request according to
the request attributes selected by the requester.
The table below outlines the default roles that have been identified as necessary. These or equivalent roles
will be configured in the solution as default roles:-
A number of jobs are scheduled and will be subject to review once system performance has been factored in.
This background job synchronises the authorisation object information from PFCG into the SAP GRC
repository. The input parameters will be as follows:-
System Field *
Language EN
This background job synchronises the role profiles, role names and user master information into the SAP GRC
repository. Depending on the selections, the program executes 3 other programs. It can be executed in full
mode (Synchronises all data, as of 01/01/1970 until current date) or incremental mode (checks changes since
last execution of program).
Language EN
Transaction Usage
This background job synchronises user transaction usage counts into the SAP GRC repository. This retrieves
data from the standard SAP monitoring tables from within the plug-in systems. The input parameters for the
job are:-
Connector *
User *
Roles Usage
This background job synchronises the role usage count for users into the SAP GRC repository. The settings
for the job are:-
Connector *
Language EN
This background job populates the SAP GRC Access Control dashboards/management reports. It uses a
combination of offline tables that drive and update information on a periodic basis.
This background job retrieves emergency access management activity from plug-in systems. This data is then
consolidated and used to populate the log files that are centrally accessed through SAP GRC.
Connector ED2CLNT100
Connector BD2CLNT200
Connector BP2CLNT200
Connector EP2CLNT100
Note: Ensure the EAM log synchronisation job is setup with the connector id set to the system name
and not “*”.
SAP GRC is pre-delivered with two templates that can be used for periodic email reminders and notifications
for each workflow process. These are shown below:-
Custom document objects containing customized message bodies for these template IDs (message classes)
can be created.
The table below shows all synchronisation jobs and their recommended frequency.
Note: The jobs all need to be run and scheduled separately on the Development and Production instances of
Access Control.