https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/SAP-Risk-Management-blog-posts.xml SAP Community - SAP Risk Management 2024-05-20T11:13:35.104433+00:00 python-feedgen SAP Risk Management blog posts in SAP Community https://community.sap.com/t5/financial-management-blogs-by-members/sap-grc-access-control-12-0-exclude-objects-from-risk-analysis-with/ba-p/13535953 SAP GRC Access Control 12.0 - Exclude Objects from Risk Analysis with Supplementary Rules 2022-08-04T07:10:14+02:00 pau_torregrosa https://community.sap.com/t5/user/viewprofilepage/user-id/616048 <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/08/risk-1.png" /></P><BR /> There might be situations in which the Business decides to accept a given Risk but just for a set of users, or a specific User Group, and you might need to exclude them from all Risk Analysis reports.<BR /> <BR /> SAP Access Control provides the ability to exclude objects (Users, Roles, Profiles, User Groups) from Batch Risk Analysis via IMG activity 'Maintain Exclude Objects from Batch Risk Analysis':<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/08/SPRO.png" height="377" width="331" /></P><BR /> However, this option will only take effect over Offline Risk Analysis and Dashboards. It will not affect online/ad-hoc Risk Analysis, nor any Risk Analysis simulations.&nbsp;One possible solution to this problem is to <A href="https://help.sap.com/docs/SAP_ACCESS_CONTROL/5cae1bc9a72348389e91183714220e30/1f17ea4f962a2e74e10000000a44176f.html" target="_blank" rel="noopener noreferrer">create a Supplementary Rule</A> to exclude the desired User IDs or User Groups from any Risk Analysis report.<BR /> <H3 id="toc-hId-1089379265">Excluding User IDs with Supplementary Rules</H3><BR /> First, you will need to set parameter 1037 to YES.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/08/1037.png" height="17" width="708" /></P><BR /> Now, go to NWBC, Setup tab, and click on 'Supplementary Rules' under Exception Access Rules section.<BR /> <BR /> We could use any custom or standard table, but in our example, we will extend the same table used by the IMG activity to exclude objects from Batch Risk Analysis, GRACEXCLUDEDOBJS.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/08/GRACEXCLUDEDOBJS-Select-Entries.png" height="42" width="333" /></P><BR /> The following supplementary rule is created and assigned to all Risk IDs, looks for all User IDs in the GRACEXCLUDEDOBJS table which are Object Type User (1) and Active (X), and excludes them for any Risk Analysis report, Online or Offline:<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/08/Exclude-Users-1.png" /></P><BR /> <BR /> <H3 id="toc-hId-892865760"></H3><BR /> <H3 id="toc-hId-696352255">Excluding User Groups with Supplementary Rules</H3><BR /> Similarly, let's say we want to exclude all users from User Group 'SUPPORT'. In this case, we could just use table USR02, and the field CLASS:<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/08/Exclude-Groups.png" /></P><BR /> &nbsp;<BR /> <BR /> Hope this helps, if you need more information do not hesitate to leave a comment. 2022-08-04T07:10:14+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/grc-tuesdays-governance-risk-and-compliance-securing-the-recruit-to-retire/ba-p/13554275 GRC Tuesdays: Governance, Risk and Compliance securing the Recruit-to-Retire process 2022-10-25T12:08:59+02:00 neil_patrick https://community.sap.com/t5/user/viewprofilepage/user-id/330209 &nbsp;<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/284287_Total-Workforce-Management_R_blue.png" /></P><BR /> At SAP we tend to talk about 4 key ERP processes for the Intelligent Enterprise:<BR /> <UL><BR /> <LI>Source-to-Pay</LI><BR /> <LI>Recruit-to-Retire</LI><BR /> <LI>Design-to-Operate</LI><BR /> <LI>Lead-to-Cash</LI><BR /> </UL><BR /> This blog looks at the second of these, Recruit-to-Retire, and is in fact a follow-on companion blog to <A href="https://blogs.sap.com/2022/10/11/grc-tuesdays-governance-risk-and-compliance-securing-the-source-to-pay-process/" target="_blank" rel="noopener noreferrer">Governance, Risk and Compliance securing the Source-to-Pay process</A> that my colleague Thomas Frenehard wrote a couple of weeks ago.<BR /> <BR /> &nbsp;<BR /> <H2 id="toc-hId-962107134">What is Recruit-to-Retire?</H2><BR /> SAP visualises the Recruit-to-Retire process as comprising of 6 major steps: Planning, Staffing, Onboarding, Working, Travel, Paying and Closing. Different groupings of these steps make up frequently used industry subprocesses, for example: hire to retire, travel to reimburse, external workforce management. SAP has a number of foundational&nbsp;<SPAN style="font-size: 1rem">cloud</SPAN><SPAN style="font-size: 1rem">&nbsp;</SPAN><SPAN style="font-size: 1rem">solutions covering these steps and subprocesses.</SPAN><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/Recruit-to-Retire-white.png" /></P><BR /> While discussing this topic with SAP Human Experience Management SME colleagues internally we reached a conclusion that while HR departments understand HR risk well, they seldom look outside their line of business to for example assess the overall enterprise risk or business consequence of an HR risk becoming an event.<BR /> <BR /> The above mentioned Thomas wrote about these steps in some detail his great blog <A href="https://blogs.sap.com/2022/01/25/grc-tuesdays-human-resources-and-governance-risk-and-compliance-working-together/" target="_blank" rel="noopener noreferrer">Human Resources and Governance, Risk, and Compliance Working Together</A> earlier this year. In this blog I will be more solution-specific and drill into how GRC can help secure the six steps with some examples, and in so doing, help the business secure the overall Recruit-to-Retire process. And potentially more importantly, help secure the company’s enterprise risk and resilience capability.<BR /> <BR /> <STRONG>Plan</STRONG><BR /> <BR /> The organisation generates a plan by modelling the demand for talent, and budgeting.&nbsp;Includes formalised project planning where individual planners identify more detailed future and current talent needs.<BR /> <BR /> HR risks include not accounting for keyman and leadership succession planning (recent study showed 43% of UK companies had unexpected leadership changes), global skills shortages (remember shortage of data protection officers when GDPR was ramping up?), and bad hires. The cost to a business of a bad hire includes their hiring cost, low productivity as they ramp up, potential costs if they are ineffective or make mistakes and maybe damage the business (or even a country if it’s the senior position….), and time delays on the projects they were supposed to deliver on.<BR /> <BR /> <STRONG>Staff</STRONG><BR /> <BR /> Identify internal talent: search for existing resources with the required skills. Recruit new hires: open requisitions, find candidates, make offers.<BR /> <BR /> The process of identifying the right talent through the avalanche of CV’s – and who (or what) actually wrote them – going through the recruitment process with various types and stages of interview and evaluation techniques, use recruitment agencies or your own staff, the growing complexity of types of employment contract, and options for full time vs part time, employees vs contingent labour, is complex, time-consuming and fraught with risk. One risk to highlight with all the personal information moving around is that of data privacy and protection, and the duties of a data controller vs data processor.<BR /> <BR /> <STRONG>Onboard</STRONG><BR /> <BR /> Complete the paperwork, employee receives equipment, user/role provisioning, take required training, meet team members, etc.<BR /> <BR /> Having secured your delightful talent you want them to have sign their contracts with the correct legal localisations, follow a well-planned and organised onboarding process, have them work through all the corporate policies, be operational as soon as possible – and not waiting for equipment or access to policy, training, and business systems. There is also the Transfer of Undertakings (Protection of Employment) regulations (TUPE) risk during a merger or acquisition, where employment terms have to be aligned. A little appreciated risk is the speed with which you can allocate your new joiner an email account and user id(s), and provision them to the systems they need access to with authorizations appropriate to their role as defined in the HR system. We have had cases where some companies can take up to 3 weeks for a joiner to receive their computer and get access to the systems to do their job.<BR /> <BR /> <STRONG>Work</STRONG><BR /> <BR /> Aside from performing their role duties there are ongoing development, skills management, performance management, time and cost management, role/location change, regulatory compliance, and wellness programs to consider.<BR /> <BR /> It sounds trivial to say that you need to have the correctly skilled people in the locations where the work demands it. It’s true that post pandemic we have all learned some roles, and some aspects of roles, can be done remotely. But there are many roles where this is not possible, others where productivity is greatly improved by teamworking, and with more junior roles sometimes a situational leadership approach is required – a lot of supervision initially. Also with current rapid and large scale changes in global politics impacting practicalities of out of country hires, import/export duties &amp; supply chain challenges resulting in selection of different suppliers who are maybe no longer close to your ‘follow on process’ high skills centres, talent poaching and churn, having the right people in the right place at the right time is far more complex and volatile than it was. Consequences can impact goods and service delivery, growth, time to market, revenue, cash flow. Anticipating this and having risk-based contingency plans adds to your resilience but also agility.<BR /> <BR /> <STRONG>Travel</STRONG><BR /> <BR /> Expense policy management and supervision, travel and expenses recording and submission, claims validation.<BR /> <BR /> A well known risk is that of claims fraud, bribery and corruption using expenses, collusion leading to fraud, or accidental / deliberate breaching/abuse of travel and expenses policies. Managing this consistently, cost-effectively and quickly is not always as easy though, and is a risk to the business.<BR /> <BR /> <STRONG>Pay &amp; Close</STRONG><BR /> <BR /> Total compensation, payroll and tax, incentives and benefits payment, expenses reimbursement, severance/retirement agreement, update financial statements, off-boarding, deprovisioning.<BR /> <BR /> Frequently labour cost is one of the highest costs for a business and errors with paying employees and contractors can lead to financial loss and employee disaffection. Fines can arise from incorrect employment paperwork for example incorrect employment and wage eligibility, under-insurance (recent study showed 15.6% of employers are unknowingly under-insured for employee liability), fines due to companies being unaware of regulatory changes (e.g. changes to anti-bribery and corruption law, duties under GDPR).<BR /> <BR /> A specific risk to mention is employee payment errors during period close and year end close, which aside from the impact on employees can lead to financial statement errors, audit findings, costly remediation, reputational damage, and in the worst cases large-scale labor disputes and fines.<BR /> <BR /> &nbsp;<BR /> <H2 id="toc-hId-765593629">SAP Cloud solutions for GRC to the rescue!</H2><BR /> Below is a representation of the examples of vulnerabilities and risks related to various steps in the Recruit-to-Retire process.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/Orange-GRC-diagram.jpg" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Summary of selected risks along the Recruit-to-Retire process</P><BR /> Individual risks can obviously lead to costs and delays in each step. The individual (or worse cumulative) impact can however lead to the end-to-end process being ineffective or even broken. Luckily there are cloud Governance, Risk, and Compliance &amp; Cybersecurity and Data Protection solutions from SAP ready to be deployed, to help prevent these risks from becoming damaging events.<BR /> <BR /> Companies can use these solutions to help develop a pro-active risk management approach to the Recruit-to-Retire process, thus safeguarding their employees, reputation, and financial viability.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/10/Green-GRC-diagram.jpg" /></P><BR /> In an alternative use of <A href="https://www.sap.com/products/financial-management/watch-list-screening.html" target="_blank" rel="noopener noreferrer">SAP Watch List Screening</A>&nbsp;in the&nbsp;<STRONG>Plan</STRONG> step, employers can automatically screen the agencies they use to recruit employees in case they are sanctioned, and also independently assess the role candidates in case they are on a watch list, or for example associated with organisations supplying services to the public sector or on a sanction party list.<BR /> <BR /> In the&nbsp;<STRONG>Staff</STRONG>&nbsp;step,&nbsp;<A href="https://www.sap.com/products/financial-management/privacy-governance.html" target="_blank" rel="noopener noreferrer">SAP Privacy Governance</A> helps companies document and manage the risk of improper processing of personal data during the staffing process, for example is ‘privacy by design’ in place for both your organisation and third parties involved in staffing, accountability duties of the data controller and data processor, data retention and deletion requirements, and which are lawful processing activities during staffing.<BR /> <BR /> During&nbsp;<STRONG>Onboarding</STRONG>,&nbsp;<A href="https://www.sap.com/products/financial-management/cloud-iam.html" target="_blank" rel="noopener noreferrer">SAP Identity Access Governance</A> helps companies give their new employees the appropriate authorisations for their role – as defined in and read from their HR system – automatically, and rapidly. Ideally on or just before they start their first day of work. It will also help organisations ensure managed segregation of duties and also invisibility of data between sensitive LOB’s.<BR /> <BR /> Once employed, i.e. during the&nbsp;<STRONG>Work, Travel and Pay &amp; Close</STRONG><STRONG> steps</STRONG>,&nbsp;<A href="https://www.sap.com/products/financial-management/financial-compliance-management.html" target="_blank" rel="noopener noreferrer">SAP Financial Compliance Management</A> helps automate internal controls over financial processes. Companies can minimize the risk of misstatements in their quarterly and annual reports and protect against fraud and bribery with a strong internal controls framework and system. The solution will help document the most important business processes and corporate exposure in cases where there is a risk of under skilled or under staffed operations. It will help achieve quicker and less error prone period end and year end close. Companies can also monitor and document inconsistencies in operating procedures and policy.<BR /> <BR /> Underpinning the Recruit-to-Retire process is the Intelligent Enterprise, and how SAP supports this via <STRONG>Business Process Intelligence</STRONG>. At its core, HR processes are heavy users and processors of personal information, they increasingly use public cloud systems, and access/processing frequently crosses geographical and political boundaries. <A href="https://www.sap.com/products/financial-management/data-custodian.html" target="_blank" rel="noopener noreferrer">SAP Data Custodian</A> enables companies to demonstrate and deliver controls over public cloud resources and applications. In parallel <A href="https://www.sap.com/products/financial-management/enterprise-threat-detection.html" target="_blank" rel="noopener noreferrer">SAP Enterprise Threat Detection</A>, a high volume real time security information and event management tool, helps companies proactively identify, analyse, and neutralize cyberattacks at a business level in their SAP applications - before for example serious breaches occur.<BR /> <BR /> One final thing to take note of is that the same SAP cloud GRC solutions apply to both the Source-to-Pay and Recruit-to-Retire processes! In other words business and IT investment in these solutions will have multiple benefits within an organization:<BR /> <UL><BR /> <LI>Improving the return-on-investment business case</LI><BR /> <LI>Reducing the overall IT footprint</LI><BR /> <LI>Reduced change management / user disruption as the number of solutions to be trained on is reduced</LI><BR /> <LI>Increasing simplicity and integration by adopting SAP solutions with a native SAP ERP integration</LI><BR /> </UL><BR /> &nbsp; 2022-10-25T12:08:59+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/cybersecurity-highlights-from-sap-insider-2022-vienna/ba-p/13548220 Cybersecurity highlights from SAP Insider 2022, Vienna 2022-11-21T11:25:11+01:00 i353gfiata https://community.sap.com/t5/user/viewprofilepage/user-id/656256 <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/11/IMG_1435-1.jpg" /></P><BR /> <P style="text-align: center">SAPinsider 2022, Vienna</P><BR /> &nbsp;<BR /> <BR /> The 2022 conference in Vienna has been another great SAPinsider success.<BR /> <BR /> The experiences and challenges that people from companies all around the world share and discuss with each other is essential to support the continuous innovation of our way of working and enriching us professionally.<BR /> <H2 id="toc-hId-961302617">Security as a key priority</H2><BR /> Out of about 150 presentations in Vienna, more than 50 were focused on Security, Enterprise Risk Management and Business Resiliency.<BR /> <BR /> This is more than a third of the whole conference focus and it shows how SAP, our partners and companies from every region and industry, are realising how critical the cyber threat become.<BR /> <BR /> Conferences like this are instrumental to build stronger partnerships with one common goal. Safeguarding business, together.<BR /> <H2 id="toc-hId-764789112">What were the main topics and questions at the conference on Security</H2><BR /> RISE with SAP was a key topic on the agenda. The number of companies looking into the RISE offering and model is growing significantly, and with that, the interest on how security is managed in the cloud.<BR /> <BR /> To summarise, these were the main 3 topics I heard people at the conference discussing and asking the most questions about.<BR /> <H3 id="toc-hId-697358326">1. Shared security responsibility between customers, hyperscaler and SAP</H3><BR /> <H4 id="toc-hId-629927540"><EM>"How do we distribute the daily security work and responsibilities in RISE, between our internal security teams, our external security advisors, the hyperscaler and SAP?"</EM></H4><BR /> &nbsp;<BR /> <BR /> Roles and responsibilities vary depending on the deployment approach, however, in general we can say that with RISE: network and infrastructure security are managed by SAP and the Hyperscaler; whilst application security measures like identity and access governance, as well as security logging and application security hardening, are decided, prioritised and managed by the customer (often supported by their specialised partners).<BR /> <BR /> This is because the implementation of application security measures are often dependent on the business processes that run on these applications and needs to be strongly aligned with the company's business priorities.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/11/Picture-1-6.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Example of Shared Responsibilities in Cloud Architecture</P><BR /> &nbsp;<BR /> <H3 id="toc-hId-304331316">2. Where to start with application security.</H3><BR /> <H4 id="toc-hId-236900530"><EM>"What are the tools, solutions and services we should be using to secure the SAP application layer?"</EM></H4><BR /> First of all, you need the security culture, mindset and processes embedded at every level of the organisation. This is the foundation for success.<BR /> <BR /> Then, a good way to start is to map the security framework (e.g. NIST, ISO27001/2) to services, tools and solutions that can support each framework area and domain.<BR /> <BR /> Then based on this mapping understand: 1) what solutions are there by default, and depending on the contract with SAP, managed as a service; and 2) what solutions are there for the customer to opt in.<BR /> <BR /> The first ones are usually referred to as SAP standard tools which are included as part of the SAP installation, and the second ones are Cybersecurity or Compliance solutions which companies can invest on, to improve their overall application security posture.<BR /> <BR /> Additionally, security services are provided by SAP consulting, or specialised partners, to support customers with their security priorities.<BR /> <P class="image_caption" style="text-align: center;font-style: italic;font-family: SAPRegular, 'Helvetica Neue', Arial, sans-serif;overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/11/Picture-1-7.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Example of services and solutions to support the NIST framework in SAP</P><BR /> &nbsp;<BR /> <H3 id="toc-hId--88695694">3. SAP Security standard documentation for Cloud solutions</H3><BR /> <H4 id="toc-hId--156126480"><EM>"Where can we find security recommendations&nbsp;for SAP cloud solutions?"&nbsp;</EM></H4><BR /> &nbsp;<BR /> <BR /> Official SAP security documentation that can be found on SAP.com.<BR /> <BR /> This objective of this documentation is to suggest customers the implementation of certain security measures. But ultimately, the customer is the one that needs to decide and approve how their business applications should be secured.<BR /> <BR /> A good starting point is the <A href="https://sap.com/ctc" target="_blank" rel="noopener noreferrer">SAP Trust Center</A> where there are many security topics documented, covering various areas. From recommended system security configuration settings, to information about internal security operations, until audit and compliance certifications of SAP solutions.<BR /> <BR /> SAP customers and SAP partners can also subscribe to <STRONG>My Trust Center</STRONG><STRONG>, </STRONG>where a subscription functionality offers you email notifications about changes and updates for content which is of particular relevance to you. One example is the <A href="https://support.sap.com/en/my-support/trust-center/tools-documentation.html?anchorId=58673b2eaf1a8d4bd077cd930664ccb1" target="_blank" rel="noopener noreferrer">Recommended Security Configuration for SAP Cloud Services. </A>(access only available to SAP customers and SAP partners).<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/11/Screenshot-2022-11-18-at-13.42.40.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">One example of content available on My Trust Center</P><BR /> <BR /> <H2 id="toc-hId--610805423">Other discussions worth to mention</H2><BR /> A recurring a very popular discussion at the conference was the one about humans being the weakest link in cybersecurity.<BR /> <BR /> Millions of people are targeted every single day with advanced phishing attacks, and it is very difficult for a victim to realise when they are being scammed. Therefore increasing the chances for an hacker to break in.<BR /> <BR /> Training people on recognising these scams is a rising priority for companies that want to reduce the risk of their sensitive business data being breached, but also educate their employees on how they can safeguard their personal digital assets.<BR /> <H2 id="toc-hId--807318928">Conclusions</H2><BR /> Security is a key decision factor when moving business applications to the cloud. It is paramount for companies to understand how security responsibilities are shared between them and their vendors. And it is equally important for them to recognise that even if they delegate responsibility to a third party, the accountability remains theirs.<BR /> <BR /> Ultimately, it is the customer data, processes and business. And we can safeguard it together.<BR /> <BR /> <STRONG>To Learn More</STRONG><BR /> <UL><BR /> <LI><A href="https://blogs.sap.com/2021/09/15/rise-with-sap-shared-security-responsibility-for-sap-cloud-services/" target="_blank" rel="noopener noreferrer">Blog: Rise with SAP shared security responsibility</A></LI><BR /> <LI><A href="https://www.sap.com/products/erp-financial-management/grc.html" target="_blank" rel="noopener noreferrer">SAP® Governance, Risk, and Compliance solutions.</A></LI><BR /> </UL><BR /> And if you want to connect on LinkedIn here is my <A href="https://www.linkedin.com/in/gabrielefiata/" target="_blank" rel="nofollow noopener noreferrer">profile</A>. 2022-11-21T11:25:11+01:00 https://community.sap.com/t5/financial-management-blogs-by-sap/grc-tuesdays-governance-risk-and-compliance-securing-the-lead-to-cash/ba-p/13555844 GRC Tuesdays: Governance, Risk and Compliance securing the Lead-to-Cash process 2022-11-22T13:49:05+01:00 neil_patrick https://community.sap.com/t5/user/viewprofilepage/user-id/330209 <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/11/284285_Lead-to-Cash_R_blue.png" /><BR /> <BR /> As a refresh, at SAP we tend to talk about 4 key ERP processes for the Intelligent Enterprise:<BR /> <UL><BR /> <LI>Source-to-Pay</LI><BR /> <LI>Recruit-to-Retire</LI><BR /> <LI>Design-to-Operate</LI><BR /> <LI>Lead-to-Cash</LI><BR /> </UL><BR /> This blog looks at the last of these, Lead-to-Cash, and is in fact the last in the series that me and my colleague <A href="https://www.linkedin.com/in/thomasfrenehard/" target="_blank" rel="nofollow noopener noreferrer">Thomas Frenehard</A> have been writing. You can find blogs for the first three here: <A href="https://blogs.sap.com/2022/10/11/grc-tuesdays-governance-risk-and-compliance-securing-the-source-to-pay-process/" target="_blank" rel="noopener noreferrer">Source-to-Pay process</A>, <A href="https://blogs.sap.com/2022/10/25/grctuesdays-governance-risk-and-compliance-securing-the-recruit-to-retire-process/" target="_blank" rel="noopener noreferrer">Recruit-to-Retire process</A>, and <A href="https://blogs.sap.com/2022/11/08/grc-tuesdays-governance-risk-and-compliance-securing-the-design-to-operate-process/" target="_blank" rel="noopener noreferrer">Design-to-Operate</A>.<BR /> <BR /> &nbsp;<BR /> <BR /> <STRONG>What is Lead-to-Cash?</STRONG><BR /> <BR /> Lead-to-Cash manages all aspects of customer experience and business process chain. This covers the initial interaction, to order fulfilment, to service delivery, and revenue. The SAP Intelligent Enterprise approach provides adaptable process templates based on best practices, which vary depending on industry type, customer type, and sales channel (direct sales or e-commerce).<BR /> <BR /> SAP visualises the Lead-to-Cash process as comprising of the 5 main stages below:<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/11/L2C-main-image.png" /></P><BR /> Lead-to-Cash is one of <EM>the</EM> most business-critical processes as it moves from customer contact to sales to ordering to contract to fulfilment to money! If this is delayed, disrupted, or damaged, the effectiveness, profitability, and possible viability of the business will be severely impacted. Furthermore, while the details and complexity of the process are largely hidden from end customers, being at the effect of a poor Lead-to-Cash process is all too visible and will permanently affect their impression of the business they are dealing with.<BR /> <BR /> Each of the 5 stages are complex in themselves as is the technical integration and handover between them, and they span the entire SAP Customer Experience solution portfolio. The many stages and steps deal with personal data, financial data, contract terms and conditions, revenue &amp; profitability, and ultimately brand perception and reputation.<BR /> <BR /> Any new business models or offerings or innovations has to be supported by and realised through the Lead-to-Cash process. It therefore needs to remain flexible and agile, and yet robust and secure. In addition, the end customer’s experience needs to be seamless and frictionless.<BR /> <BR /> This makes Lead-to-Cash an ideal beneficiary of GRC and cybersecurity controls, assurance, protection, and pro-active risk management.<BR /> <BR /> <STRONG>Contact to Lead</STRONG><BR /> <BR /> A marketing expert creates a campaign to generate sales leads, and targets existing or new customers via mechanisms such as email, social media, personalised recommendations, or relationships. Based on the customer’s consent and interaction, the customer is converted to a lead.<BR /> <BR /> Adherence to privacy laws, ensuring personal data protection, not dealing with sanctioned countries, organisations or individuals, not dealing with bad debtors, and not violating the businesses’ conduct risk policy, are important priorities during this stage.<BR /> <BR /> <STRONG>Lead to Opportunity</STRONG><BR /> <BR /> A marketing expert retargets the customers if needed, to encourage them to proceed with the marketing offer. Analytics tools can be used to assess the potential of the lead and determine if it is worth pursuing. The lead is converted to an opportunity based on the lead scoring.<BR /> <BR /> As with the previous stage, data privacy and protection, sanctioned parties and business ethics are key. In addition, from a business operational risk perspective, incorrect or biased analytics can lead to missed opportunities, inappropriate contacts, or skewed outcome based KPI’s leading to inaccurate performance analysis and future strategy setting.<BR /> <BR /> <STRONG>Opportunity to Quote/Cart</STRONG><BR /> <BR /> The sales representative assessed the readiness of the opportunity to be offered a quote. The customer can request a quote for example via the web, a physical outlet, or by phone/email. The sales rep or system creates the quote and sends it to the customer.<BR /> <BR /> I would anticipate that in the near future the greenhouse gas emissions loading for goods or services quoted for will also need to be included.<BR /> <BR /> There is business risk associated with the quote value a sales rep can prepare and offer, and thresholds are frequently attached to an approval process. There is the opportunity for collusion, bribery and fraud within this stage. Appropriate disclaimers and offer conditions should also be reviewed before being communicated with the quote so there is potentially a legal process, and the suitability of the end customer should be re-confirmed (in case for example the party the quote is sent to is different to the end customer, is in a high-risk country, or is on a sanction list).<BR /> <BR /> Accurate and defensible greenhouse gas emissions will also have to be ensured in the near future.<BR /> <BR /> <STRONG>Quote to Order</STRONG><BR /> <BR /> The quote is presented to the customer and can be negotiated, until a final agreement is reached. Once the quote is accepted by the customer it gets converted to an order. Customer feedback on the order creation process is collected, and the feedback can be used to improve the quote and order creation process.<BR /> <BR /> As with the previous process there is risk of collusion, bribery and fraud. It can also include approvals bypass or delays, process shortcuts, credit check errors, delays in issuing quotes, and errors in the quote (e.g. payment terms, currency conversions, tax).<BR /> <BR /> <STRONG>Order to Cash</STRONG><BR /> <BR /> Based on the different types of items in the order, the order gets split into physical, subscription or service products, and are sent to the back-end systems for further processing. The order status is marked as complete only when all order types and steps are complete. On confirmation of delivery, billing and invoicing tasks are initiated and when received, revenues are booked (posted) for the business unit.<BR /> <BR /> This is a key financial process that converts potential to recognisable revenue. It is at risk from fraud and collusion, dealings with sanctioned parties or high-risk countries as above, but also for example posting errors due to system errors, incorrect manual postings or manual overrides of preventive controls; inaccurate or incomplete customer master data leading to incorrect or out of policy orders; segregation of duties errors; delays in cash collection; currency and tax errors.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/11/288013_Cash-Collection-Diagram_R_green.png" height="190" width="396" /></P><BR /> <STRONG>Days Sales Outstanding (DSO)</STRONG><BR /> <BR /> DSO is a useful performance indicator for a business, used to estimate the size of their outstanding accounts receivable (i.e. legally enforceable claims for payment). Measured in average sales days, it represents the number of days of (average) sales that you currently have outstanding. It is an important tool in measuring liquidity and ultimately cash flow. High DSO could indicate inadequate analysis of customers, incorrect terms and conditions (e.g. to close the deal), poor collection, less credit-worthy customers.<BR /> <BR /> The Lead-to-Cash process is the primary process impacting DSO and therefore the company’s liquidity and cash flow, and therefore financial stability. Keeping this process well managed and consistent is critical for a successful viable business.<BR /> <BR /> &nbsp;<BR /> <BR /> <STRONG>SAP Cloud solutions for GRC to the rescue!</STRONG><BR /> <BR /> Below is a representation of the examples of vulnerabilities and risks related to various steps in the Lead-to-Cash process, which can lead to errors and delays.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/11/GRC-Orange-image.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Summary of selected risks along the Lead-to-Cash process</P><BR /> &nbsp;<BR /> <BR /> The individual (or worse cumulative) impact through the process can lead to the end-to-end process being ineffective or even broken, with the potential for significant damage to financial performance, investment potential, reputation and future viability. Luckily there are cloud Governance, Risk, and Compliance &amp; Cybersecurity and Data Privacy solutions from SAP ready to be deployed, to help prevent these risks from becoming damaging events.<BR /> <BR /> Companies can use these solutions to help develop a pro-active risk management and internal controls approach to support the Lead-to-Cash process, thus safeguarding the marketing, conversion to quote, cash collection, and revenue recognition processes, and through these, overall business viability.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2022/11/GRC-Green-image.png" /></P><BR /> <A href="https://www.sap.com/products/financial-management/watch-list-screening.html" target="_blank" rel="noopener noreferrer">SAP Watch List Screening</A> ca be used in the&nbsp;<STRONG>Contact to Lead</STRONG>&nbsp;step can screen for high risk or sanctioned parties, entities and individuals. It can also be used to assess suitability of supplying goods or services to partners who in turn supply to the public sector.<BR /> <BR /> In the&nbsp;<STRONG>Contact to Lead </STRONG>and <STRONG>Lead to Opportunity</STRONG> stages, <A href="https://www.sap.com/products/financial-management/privacy-governance.html" target="_blank" rel="noopener noreferrer">SAP Privacy Governance</A>&nbsp;helps companies document and manage the risk of improper processing of personal data during the staffing process, for example is ‘privacy by design’ in place for both your organisation and third parties involved in staffing, accountability duties of the data controller and data processor, data retention and deletion requirements, and which are lawful processing activities during staffing.<BR /> <BR /> Spanning from&nbsp;<STRONG>Opportunity to Quote, to Order to Cash</STRONG>,&nbsp;<A href="https://www.sap.com/products/financial-management/cloud-iam.html" target="_blank" rel="noopener noreferrer">SAP Identity Access Governance</A>&nbsp;helps companies detect, document and manage segregation of duties risk. This includes both removal of and controlled management of SOD occurrences. To Cash<BR /> <BR /> As the more finance heavy steps of&nbsp;<STRONG>Quote to Order </STRONG>and <STRONG>Order to Cash </STRONG>are reached&nbsp;<A href="https://www.sap.com/products/financial-management/financial-compliance-management.html" target="_blank" rel="noopener noreferrer">SAP Financial Compliance Management</A>&nbsp;helps implement and automate internal controls. This allows companies to implement in-process business controls to deal with posting errors, process bypassing, fraud, master data errors, financial errors, delays, actual SOD occurrences. It will also help minimize the risk of misstatements in their quarterly and annual reports. The solution will help monitor the most important business processes and proactively protect the business from exposure. Companies can also monitor and document inconsistencies in operating procedures and policy.<BR /> <BR /> I see the Lead-to-Cash process as a core process for the Intelligent Enterprise – and thanks Thomas for explaining it in your <A href="https://blogs.sap.com/2022/11/08/grc-tuesdays-governance-risk-and-compliance-securing-the-design-to-operate-process/" target="_blank" rel="noopener noreferrer">Design-to-Operate</A> blog. With the proposed integration between SAP Financial Compliance Management and SAP Signavio, customers will soon have visibility and assurance over core processes like Lead-to-Cash, and all its sub-processes, as well as a synchronised view on the adequacy and strength of controls. Audit will love this!<BR /> <BR /> <A href="https://www.sap.com/products/financial-management/data-custodian.html" target="_blank" rel="noopener noreferrer">SAP Data Custodian</A> enables companies to demonstrate and deliver controls over the public cloud resources and applications which are fundamental to the Lead-to-Cash process. In parallel <A href="https://www.sap.com/products/financial-management/enterprise-threat-detection.html" target="_blank" rel="noopener noreferrer">SAP Enterprise Threat Detection</A>, a high volume real time security information and event management tool, helps companies proactively identify, analyse, and neutralize cyberattacks at a business level in their SAP applications - before for example serious breaches occur.<BR /> <BR /> Note again that the same SAP cloud GRC solutions apply to all 4 of the core processes covered in this blog series! Business and IT investment in these solutions will have multiple benefits within the organization.<BR /> <BR /> In summary:<BR /> <UL><BR /> <LI>Borrowing Thomas’ definition of the Intelligent Enterprise in his Design-to-Operate blog: organizations “<EM>that apply advanced technologies and best practices within agile, integrated business processes to run at their best</EM>” (<A href="https://www.sap.com/intelligent-enterprise.html" target="_blank" rel="noopener noreferrer">link</A>)</LI><BR /> <LI>also acknowledging the business-wide move towards automation and ‘doing more with less’</LI><BR /> <LI>and the increasing trend towards creating ‘digital twins’ of physical processes &amp; assets in a digital representation...</LI><BR /> </UL><BR /> it is clear from these 4 blogs that SAP’s GRC and Cybersecurity solutions can contribute significantly to a safe, secure, reliable, resilient, agile, ethical, efficient and effective, financially stable and financially viable business.<BR /> <BR /> &nbsp;<BR /> <BR /> For your information, you can find all 4 blogs in this GRC and Intelligent Enterprise processes series listed below:<BR /> <UL><BR /> <LI><A href="https://blogs.sap.com/2022/10/11/grc-tuesdays-governance-risk-and-compliance-securing-the-source-to-pay-process/" target="_blank" rel="noopener noreferrer">GRC Tuesdays: Governance, Risk and Compliance securing the Source-to-Pay process</A>&nbsp;(released on 11/10/2022)</LI><BR /> <LI><A href="https://blogs.sap.com/2022/10/25/grctuesdays-governance-risk-and-compliance-securing-the-recruit-to-retire-process/" target="_blank" rel="noopener noreferrer">GRC Tuesdays: Governance, Risk and Compliance securing the Recruit-to-Retire process</A>&nbsp;(released on 25/10/2022)</LI><BR /> <LI><A href="https://blogs.sap.com/2022/11/08/grc-tuesdays-governance-risk-and-compliance-securing-the-design-to-operate-process/" target="_blank" rel="noopener noreferrer">GRC Tuesdays: Governance, Risk and Compliance securing the Design-to-Operate process</A>&nbsp;(released on 08/11/2022)</LI><BR /> <LI>GRC Tuesdays: Governance, Risk and Compliance securing the Lead-to-Cash process (released 22/11/2022)</LI><BR /> </UL><BR /> &nbsp; 2022-11-22T13:49:05+01:00 https://community.sap.com/t5/financial-management-blogs-by-members/mitigating-controls-is-this-a-cure-for-quot-all-evil-quot-in-excessive/ba-p/13558821 Mitigating controls - is this a cure for "all evil" in excessive authorizations risks in SAP? (part 1/5) 2022-12-01T10:47:38+01:00 FilipGRC https://community.sap.com/t5/user/viewprofilepage/user-id/11783 <STRONG>Part # 1/5 -</STRONG> The challenge for mitigation controls.<BR /> <BR /> <STRONG>Introduction</STRONG><BR /> <BR /> In my <A href="https://blogs.sap.com/2022/11/18/mitigating-controls-is-this-a-cure-for-all-evil-in-excessive-authorizations-risks-in-sap/" target="_blank" rel="noopener noreferrer">previous</A> post I introduced the blog post series we preapre together with <SPAN class="mention-scrubbed">andrzejpartyka</SPAN>. I want to discuss the topic further to challange aproach where by default mitigation controls are used to to eliminate the excessive authorization risks. Are we eliminating the root cause of the problem or are we just dealing with its side effects? Let’s debate whether it is the right and well-thought approach. What are the negative consequences of doing so, are there any?<BR /> <BR /> Mitigating controls are control mechanisms implemented in business processes, for the purpose of limiting the access risk coming from the user excessive authorizations granted in ERP systems. These are activities, in most cases, outside the ERP system (SAP) and conducted in a manual manner, usually based on SAP reports or other statements generated from the IT systems. <STRONG>Mitigating controls</STRONG> are a common management response to the access risk coming from conflicting authority assigned to users in SAP. Removing user access rights or modifying access via role change management process is a difficult, time-consuming and very often under appreciate response to the problem.<BR /> <BR /> Considering the access risk of excessive or incorrect authorizations in the SAP system as a <STRONG>serious disease</STRONG>, it should be remembered that each treatment requires, first of all, a full spectrum diagnosis. Next using the doctor's knowledge and practice experience, appropriate diagnostic facilities and treatment plan, the disease (excessive authorization in SAP), can be cured.<BR /> <BR /> As in the case of any disease, also in this area, anyone who faced the problem of wrong user access management process may consider applying short-cut solution. However, it is only a painkiller that will be a temporary solution to a serious problem, remediating a problem output not dealing with a root-cause of the problem. Sometimes such choice may prove to be beneficial but should not be considered as a long-term solution, like a painkiller can not be a substitute to doctor treatment. Are mitigating controls only a pain killer to excessive user system access or is it a remedy to the root cause of the SAP authorization problem?<BR /> <BR /> <STRONG>Project implementation practice</STRONG><BR /> <BR /> A properly carried out project of rebuilding user roles and authorizations in SAP should be based on a segregation of duties matrix for user responsibilities in business processes designed during business workshops. The SoD matrix is ​​a key product in such project, often overlooked during the implementation of a new SAP system. The project team focused on the quick and cost-effective launch of the new S/4 Hana system, ignores the security aspects, shifting the effort for their implementation to the period after the go-live of new SAP system. The segregation of duties matrix is, however, ​​a key product that summarizes the requirements for building authorizations from the perspective of the specificity of the company that implements the new SAP system. These requirements are the foundation for the future authorization architecture, which is derived from the method of executing activities in business processes. This product considers how the company: allocates documents, works with master data, controls data through Workflow system, carries out payments, warehouse, and logistics operations, etc. It is acting as an access risks security repository with guidelines and principles on how SAP users should be assigned to access rights and authorities in SAP system. Preparation of this information is a considerable investment, but from our experience it is worth doing it during the system implementation project to better prepare for the ongoing new ERP system operation and exploitation phase. This approach ensures the security of financial data from the very first day of the system operation, which is a huge benefit in comparison to alternative approach, where after go-live system is being secured and security breaches are closed. Solving these problems later causes additional work in needed to assess whether in the period from system go-live to security issues remediation, wrongly assigned, excessive permissions have not been misused by internal or external users. In case of such problems, it is possible to act on an ad hoc basis by implementing additional mechanisms in the form of mitigating controls, but it is worth considering beforehand whether it is a beneficial solution in the long term?<BR /> <BR /> Over the last few years, our company carried out several dozen projects to rebuild authorizations in various organizations. We have cooperated with private enterprises as well as public administration units. We also had the opportunity to cooperate with widely recognized, international corporations.<BR /> <BR /> Among many conclusions from such projects, the topic of mitigating controls seems to be an interesting aspect, and more precisely, the visible tendency to address these unnecessary risks in SAP authorizations by introducing additional control elements, the so-called "Mitigating control". Is this the correct approach? What are the consequences of doing so? Is there one answer that is right for all organizations or situations?<BR /> <BR /> <STRONG>What is the challenge?</STRONG><BR /> <BR /> Excess user access authorities in the SAP system are circumstances in which a given user has unnecessary access in the SAP system that generates a risk to the company. Additionally in common practice the user usually does not even use these risky access. The Company is exposed to additional risk with a significant weakness withing security model and becomes for this exposure no rewards or benefits (e.g. replacement in the absence of another employee). This situation generates segregation of duties &nbsp;risk with potential exposure to fraud or company assets misuse. In our projects, we introduce mechanisms that allow us to determine which authorization or transaction the user has executed in the past period to justify if access is really needed.&nbsp; As a result, it allows to report information about transaction and system usage. This is useful, however this does not respond to the main question if used access is need by user or not, and if access was assigned based on minimal required access to perform user responsibilities and business process duties. This creates a challenge for both IT and business management.<BR /> <BR /> <STRONG>An example from a project</STRONG><BR /> <BR /> To better understand the challenge of mitigating controls, let's use an example from the sales area. The price at which the Company sells its product to its Client should be carefully monitored and it is usually copied (imported with display access) from the price master data lists prepared by the team responsible for the pricing policy. It is carefully prepared based on the current market situation, labor costs and inventory, as well as the forecasted demand for goods and services. Then the sales price proposals undergo a detailed verification and approval process. At the end of each week, the list of applicable prices is sent to the system for the next billing period. Access to these operations should be monitored and restricted.<BR /> <BR /> In the SAP sales process, the price information is presented on a sales order document processed by an employee of the Customer Service Department. One of the values ​​that he can modify (intentionally or accidentally) is the price of the product. This creates vulnerabilities in the sales process with access risk of sales prices being modified during sales order creation of throwing all the work (prices validation, approval, etc) of the pricing team into the bin, but what is worse, there is also the risk that prices will not be adjusted to market conditions. This will also directly cause the risk of a falling trading margin and, consequently, net profit, which is the basic indicator analyzed by investors and company owners. Of course, there are many arguments for such a situation, the most frequently mentioned ones are the possibility of correction in the event of an error or a special sale for an 'exceptional' customer.<BR /> <BR /> A natural action (or best practice advise) would be to <STRONG><U>not allow</U></STRONG> to change sales order price for users in Customer Service Department. In practice, however, it is much convenient for business users to propose a new mitigating control in which another user will, on systematic basis execute control action. This activity will focus on comparing the prices used in the sales orders to those in the price lists. This control will be random, and the method of its implementation will be a time-consuming operation with the nature to find out difference between two sources of information. Of course, this initial control will be optimized and evolved during control life cycle, new automation elements will be introduced, e.g. in the form of a price discrepancy report, which will be generated automatically after a few weeks or months. <STRONG><U>But is it really the right way?</U></STRONG> Would it be possible to simply 'avoid' such operations instead of automating such operations? Should automation capabilities replace thinking about the method and how to design business processes to be secured?<BR /> <BR /> Often, instead of considering changing the approach to the access risk of wrong system user access rights, companies develops further automation: new reports or systems are created that compare these two statements faster and cheaper.<BR /> <BR /> The find a right solution we need to take a look at the problem from a broader perspective and do not consider other solutions from the scope of the entire internal control system. It is also a problem because many business owners, under the influence of strong pressure from internal or external audit, convinced that the more controls there are to mitigate the operations in business processes, make the business process safer. However, it is worth considering whether the choice of this route will not cause a continuous appearance of new problems, "fires" requiring extinguishing and generating unnecessary costs? Are there other methods and ways that will allow the effective and safe use of the SAP system by users inside the organization?<BR /> <BR /> <STRONG>Are the all user accesses in SAP required?</STRONG><BR /> <BR /> The above example concerns on granted broad authorization to users, but much more often we deal with a situation in which access is granted less intentionally. Excessive access is often unnecessary and unused (e.g. logs from SM19 or SM20 transactions do not indicate use for the last 12 months) by the user, and its presence in the permissions poses a significant threat to the company. Thus, we refute the popular myth that often appears in our clients' concerns that the SOD risk resolution project is directly related to the fact that users will lose the rights to transactions they need to work. Often, an allowance rebuilding project begins with the removal of permissions that have been previously granted to users that you do not use in their daily work SAP operations. <STRONG>Based on our design observations, these powers account for approximately 50-60% of the risks of redundant access</STRONG>.<BR /> <BR /> The challenge faced by the organization is that managers responsible for business processes must decide <STRONG>when</STRONG> and <STRONG>in what situations</STRONG> the system access risk should be remediated by access removal, and when it should remediated by assigning compensating controls.<BR /> <BR /> <STRONG>Summary &amp; Conclusion</STRONG><BR /> <BR /> Often the solution is to involve people from different departments with the appropriate competencies and link them with technical competencies that are knowledgeable about roles and authorization best practices. Such a combination is a basic element of an efficient response to the presented problem of excess access or the abuse of risk-reducing controls. The problem resolution decision can not be found working in company or process structure silos – cross organizational team will have more chances to find better solutions.<BR /> <BR /> In the next, second part, we will briefly present the GRC procedure for dealing with the new risk of excesive access rights. As can be seen from the problem description so far, this algorithm should not start and end with creating a new mitigating control. So how do you react? What to pay special attention to? About this in the next part of the article. We highly recommend reading and leaving a thought or two on the subject.<BR /> <BR /> <STRONG>Please share feedback or thoughts in a comment section.</STRONG><BR /> <BR /> Read <A href="http://community.sap.com/topics/grc" target="_blank">more</A> on related topic in SAP Solutions for Governance, Risk, and Compliance Topic Page<BR /> <UL><BR /> <LI>See our <A href="https://blogs.sap.com/2022/11/18/mitigating-controls-is-this-a-cure-for-all-evil-in-excessive-authorizations-risks-in-sap/" target="_blank" rel="noopener noreferrer">introductory post</A> with link to other articles in this series prepared together with <SPAN class="mention-scrubbed">andrzejpartyka</SPAN></LI><BR /> <LI>Ask questions about Governance, Risk, Compliance (GRC), and Cybersecurity and <A href="https://answers.sap.com/tags/237150e2-6555-4a16-b49e-e93dbf1891da" target="_blank" rel="noopener noreferrer">follow</A> us</LI><BR /> <LI>Read other Governance, Risk, Compliance (GRC), and Cybersecurity and follow <A href="http://blogs.sap.com/tags/237150e2-6555-4a16-b49e-e93dbf1891da" target="_blank" rel="noopener noreferrer">blog</A> post</LI><BR /> <LI>Please follow my profile for future posts <SPAN class="mention-scrubbed">fnowak</SPAN></LI><BR /> </UL><BR /> Filip Nowak 2022-12-01T10:47:38+01:00 https://community.sap.com/t5/financial-management-blogs-by-members/mitigating-controls-is-this-a-cure-for-quot-all-evil-quot-in-excessive/ba-p/13567214 Mitigating controls - is this a cure for "all evil" in excessive authorizations risks in SAP? (part 2/5) 2023-01-25T11:09:48+01:00 FilipGRC https://community.sap.com/t5/user/viewprofilepage/user-id/11783 <STRONG>Part # 2/5 –</STRONG> When is it worth to create and when should we avoid mitigating controls?<BR /> <BR /> In the <A href="https://blogs.sap.com/2022/12/01/mitigating-controls-is-this-a-cure-for-all-evil-in-excessive-authorizations-risks-in-sap-part-1-5/" target="_blank" rel="noopener noreferrer">previous</A> part (#1) of our Mittigation control series of <A href="https://blogs.sap.com/2022/11/18/mitigating-controls-is-this-a-cure-for-all-evil-in-excessive-authorizations-risks-in-sap/" target="_blank" rel="noopener noreferrer">articles&nbsp;</A> we concluded that managers responsible for business operations must decide <STRONG>when</STRONG> and <STRONG>in what situations</STRONG> the system access risk should be remediated by access removal, and when it should remediated by assigning compensating controls.<BR /> <BR /> <STRONG>Mitigating controls</STRONG> are a common management response to the access risk coming from conflicting system authorizations assigned to users in SAP. Removing user access rights or modifying access via role change management process is a difficult, time-consuming and very often under appreciate response to the problem. In this part (#2) we will debate about when it pays off to implement a mitigation control and when it is better to remove user access.<BR /> <BR /> One million dollar question is: is there <EM>'some'</EM> algorithm for dealing with the new access risk of excess rights? What is the best way to proceed? When and what activities to execute? In this article, I share my knowledge and experience in respec to approach to SOD security and access risks.<BR /> <BR /> <STRONG>When is it worth using mitigating controls?</STRONG><BR /> <BR /> While working on audit and consulting projects, I observed that the business management team, while working on the company best response to the access risk, more often than required, uses the creation of mitigating controls. Often this happens under pressure and a strong need to meet the audit requirements coming from external or internal auditors that are general in nature, served to customer without paying attention to specific situation.Should having more &amp; more controls, which are very costly to maintain in long run, be the first management's choice? How to design a control mechanism so that it brings a real benefit to the internal control system and significantly reduces the risk for which it was created?<BR /> <BR /> This is the question that we will answer in this part of the article too add my part to our series of five articles – see a list <U style="font-size: 1rem"><A href="https://blogs.sap.com/2022/11/18/mitigating-controls-is-this-a-cure-for-all-evil-in-excessive-authorizations-risks-in-sap/" target="_blank" rel="noopener noreferrer">here</A>. </U>Our observations of the controls life cycle show that it is <STRONG><U>definitely worth to</U></STRONG> use mitigation controls in the following situations:<BR /> <OL><BR /> <LI>Conflicting user access activity are required to perform system tasks assigned to user and specified by the HR department at a given job-position. Introducing changes in such a situation is a difficult and complicated task.</LI><BR /> <LI>Access risk are coming from wrong process design and it is not possible to change process design or the scope of activities to be performed, or separating these activities into another organizational area.</LI><BR /> <LI>There are limited human resources and access risk related user responsibilities can not be delegated to another person in the department.</LI><BR /> </OL><BR /> The presence of the above-mentioned situations makes the application of mitigating controls more justified. However, the order in which to proceed is important in determining the Organization's best response to a segregation of duties conflict. A model sequence of operation is presented below.<BR /> <OL><BR /> <LI><STRONG> Conflicting access risks are part of HR defined user responsibilities</STRONG></LI><BR /> </OL><BR /> The first step in any authorization redesign project is the removal of redundant (not used) user access rights. The access rights defined as redundant are those assigned to the user authorization profile, while in practice (e.g. for the last 12 months) they are not used at daily employee ERP (SAP) system operations. Often, but not always, this system access are also not defined in the scope of the employee's responsibilities in its HR job-position description. Identifying and then removing this authorization, from my experience, eliminates about <STRONG>50-60%</STRONG> of all risks identified in the user's permissions. In any case, this should be the first step in remediating the problem coming from redundant permissions. Skipping this step means that we begin to develop control mechanisms for risks that do not require it (have not been ‘materialized’ since last 12 months, as transaction was not executed) or there is an alternative, cheaper to maintain and more effective in operation, that the company has failed to implement. If there is a valid business reason to believe that the authorizations are being used to fulfill the daily job tasks, as described in job description, there is a need to conduct a detailed analysis. The analysis is not always simple, because the "general business description language" in which the user responsibilities are described, often cannot be directly translated into the SAP business process activities executed by user in the SAP S/4 Hana system. Those are often defined using specific activities (transactions) that are executed during day-to-day system operations. To prepare such a content manager needs SAP system experience and technical system understanding. Helpful here maybe the key user or application consultants engagement.<BR /> <OL start="2"><BR /> <LI><STRONG> Organizational change in the business process is not possible</STRONG></LI><BR /> </OL><BR /> If all not needed user access authorizations have been revoked, and there is still an access risk of segregation of duties, it means that at the stage of designing business processes flow, the segregation of duties risk matrix was not taken into account. The team that designed the processes or target responsibilities of employees did not consider the fact that some activities in business processes in ERP systems should not be performed by the same person. In such a case, company management should consider changing the way the business process is carried out. Consider whether the conflicting scope of access authorities may be switch to another HR job position in the department or another organizational unit. Best practice here is to move authorization for working with process master data (business partners, material indexes, a chart of accounts, the structure of controlling objects,) to dedicated teams, that are not responsible for business process day-to-day transaction processing.<BR /> <OL start="3"><BR /> <LI><STRONG> Limited human resources</STRONG></LI><BR /> </OL><BR /> If the assigned user authorizations are consistent with the scope of HR job responsibilities and the process itself cannot be redesign / changed in a short period of time, the next step should be to analyze whether the resources that the Organization has at its disposal are able to delegate these duties to another employee. These types of changes do not require a comprehensive reorganization of the processes, but a different distribution of responsibilities in the department. In practice, it can be difficult to implement. The "simulation" functionality is very helpful in implementing such a change, in which the GRC system creates a preview of the theoretical situation in which the given authorizations will be assigned to another employee. You can read more about the features of the GRC system on our website (#grcadvsory, #smartGRC). Coming back to the often-emerging challenge of limited human resources, it is worth following the example of one of our projects. An employee of a local, small Customer Service Department, which employs 2 people, is responsible for recording sales orders from customers that flow from various sales channels and ensuring (by verifying and, if necessary, correcting) that the prices on sales orders are in line with the company's current price list. The scope of duties defined in this way means that an employee in the SAP system, in addition to access to work with orders, must have access to correct valuable conditions. Combining these two activities in the system creates a risk that the prices entered on the orders will be incorrect and the company will lose the trade margin due to incorrect information entered on the sales order. Organizational change is not possible, because the department employs only two people who know the specifics of the local market and customers. The scale of operations means that without employment or centralization of this function, it will not be possible to divide responsibilities. Applying mitigating control in such a situation is the most beneficial decision from a business point of view.<BR /> <BR /> Let's summarize when it is <STRONG>not</STRONG> worth implementing mitigating controls:<BR /> <UL><BR /> <LI>In a situation where in the SAP / ERP system it is possible to partially limit or revoke user rights</LI><BR /> <LI>The organization accept the possibility of changing the current business process in place, to include segregation of duties requirements in the process design</LI><BR /> <LI>User permissions can be delegated to another employee, thus avoiding new risks or segregation of duties conflicts.</LI><BR /> </UL><BR /> In the next part of Mittigation control <A href="https://blogs.sap.com/2022/11/18/mitigating-controls-is-this-a-cure-for-all-evil-in-excessive-authorizations-risks-in-sap/" target="_blank" rel="noopener noreferrer">series</A> of articles, we will describe what are the best practices and how to build a mitigation control repository. &nbsp;We will deal with the Bermuda Triangle(also know as <STRONG>Devil's Triangle)</STRONG>, where all our SoD conflicts and access risks 'magically' disappear and then return during the financial audit<span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:">😊</span> How to avoid their delay in time and sudden appearance during an audit? How to avoid the risks of their materialization?<BR /> <BR /> <STRONG>Please share feedback or thoughts in a comment section.</STRONG><BR /> <BR /> Read <A href="http://community.sap.com/topics/grc" target="_blank">more</A> on related topic in SAP Solutions for Governance, Risk, and Compliance Topic Page<BR /> <UL><BR /> <LI>See our <A href="https://blogs.sap.com/2022/11/18/mitigating-controls-is-this-a-cure-for-all-evil-in-excessive-authorizations-risks-in-sap/" target="_blank" rel="noopener noreferrer">introductory post</A> with link to other articles in this series prepared together with <SPAN class="mention-scrubbed">andrzejpartyka</SPAN></LI><BR /> <LI>Ask questions about Governance, Risk, Compliance (GRC), and Cybersecurity and <A href="https://answers.sap.com/tags/237150e2-6555-4a16-b49e-e93dbf1891da" target="_blank" rel="noopener noreferrer">follow</A> us</LI><BR /> <LI>Read other Governance, Risk, Compliance (GRC), and Cybersecurity and follow <A href="http://blogs.sap.com/tags/237150e2-6555-4a16-b49e-e93dbf1891da" target="_blank" rel="noopener noreferrer">blog</A> post</LI><BR /> <LI>Please follow my profile for future posts <SPAN class="mention-scrubbed">fnowak</SPAN></LI><BR /> </UL><BR /> Filip Nowak 2023-01-25T11:09:48+01:00 https://community.sap.com/t5/financial-management-blogs-by-members/mitigation-controls-creation-and-assignment-in-sap-grc-12-0/ba-p/13549488 Mitigation Controls creation and assignment in SAP GRC 12.0 2023-04-19T11:36:30+02:00 javed_khan3 https://community.sap.com/t5/user/viewprofilepage/user-id/207679 Author's LinkedIn Profile : <A class="pv-contact-info__contact-link link-without-visited-state t-14" href="https://www.linkedin.com/in/javedkhan0107" target="_blank" rel="nofollow noopener noreferrer">linkedin.com/in/javedkhan0107</A><BR /> <BR /> <STRONG>Purpose of the document:</STRONG><BR /> <BR /> Creation and assignment of Mitigation Controls in SAP GRC 12.0.This document describes the Mitigation configuration proces in GRC12 Access Control in very simple and easy way.<BR /> <BR /> <STRONG>What is Mitigation? </STRONG><BR /> <BR /> The Mitigation&nbsp;allows you to mitigate certain risk violations that you want available to specific users or roles. This is done by creating and assigning a Mitigation Control.<BR /> <BR /> <STRONG>Why is Mitigation is required?</STRONG><BR /> <BR /> you can use mitigation controls when it is not possible to separate Segregation of duties SoD from the business process.<BR /> <H3 id="use" class="section_title w-anchor" id="toc-hId-1090417243">Use</H3><BR /> <P class="p">You can use&nbsp;<SPAN class="ph uicontrol">Mitigating Controls</SPAN>&nbsp;to associate controls with risks, and assign them to users, roles, profiles, or HR objects. You can then define individuals as control monitors, or approvers, and assign them to specific controls. You can also create organizations and business processes to help categorize mitigating controls.</P><BR /> <P class="p">Using the&nbsp;<SPAN class="ph uicontrol">Mitigating Controls</SPAN>&nbsp;section, you can complete the following tasks:</P><BR /> <BR /> <UL class="ul"><BR /> <LI class="li"><BR /> <P class="p">Create mitigating controls (that you cannot remove)</P><BR /> </LI><BR /> <LI class="li"><BR /> <P class="p">Assign mitigating controls to users, roles, and profiles that contain a risk</P><BR /> </LI><BR /> <LI class="li"><BR /> <P class="p">Establish a period of time during which the control is valid</P><BR /> </LI><BR /> <LI class="li"><BR /> <P class="p">Specify steps to monitor conflicting actions associated with the risk</P><BR /> </LI><BR /> <LI class="li"><BR /> <P class="p">Create administrator, control monitors, approvers, and risk owners, and assign them to mitigating controls</P><BR /> </LI><BR /> </UL><BR /> Now we will learn how to create and assign a Mitigation.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><STRONG>Step 1) </STRONG>&nbsp;As a pre requisite, the two Owners (Normal Dialog User Ids) should be created under SU01 and assign the below Roles.</P><BR /> &nbsp;<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/GRC-Roles-1.png" height="77" width="944" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic;font-family: 'SAPRegular', 'Helvetica Neue', Arial, sans-serif">GRC Controler Roles under PFCG</P><BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <BR /> and should be maintained under Path,&nbsp; NWBC &gt; Setup &gt; Access Owners &gt; Access Control Owners&nbsp; ,as below.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/2-13.png" /></P><BR /> Assign one as Mitigation Monitors and Second as Mitigation Approvers<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/3-8.png" /></P><BR /> <P style="text-align: center"><EM>Owners Assignment</EM></P><BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <P style="overflow: hidden;margin-bottom: 0px">Now Save and Close.</P><BR /> &nbsp;<BR /> <BR /> <STRONG>Step 2)</STRONG> Now, we will be creating Root Organization<BR /> <P style="overflow: hidden;margin-bottom: 0px"><STRONG>Path</STRONG> : SPRO &gt; GRC &gt; Shared Master Data Setting à Create Root Org Hierarchy</P><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/4-7.png" /></P><BR /> <P style="text-align: center"><EM>SPRO Tcode</EM></P><BR /> &nbsp;<BR /> <BR /> Give the name as per your requirement and execute.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/5-6.png" /></P><BR /> &nbsp;<BR /> <BR /> <STRONG>Step 3) </STRONG>Now, Goto NWBC &gt; Setup and maintain data for Root Organization<BR /> <BR /> &nbsp;<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/6-7.png" /></P><BR /> <P style="text-align: center"><EM>Under NWBC</EM></P><BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <BR /> Open the Organization you created.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/7-5.png" /></P><BR /> Details for General and Owners Tabs are compulsory<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/20-2.png" /></P><BR /> <P style="overflow: hidden;margin-bottom: 0px">In Owners Tab maintain the Users which we have created in Step -1.</P><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/21-2.png" /></P><BR /> &nbsp;<BR /> <BR /> <STRONG>Step &nbsp;4)</STRONG><BR /> <BR /> Now, we will create Mitigation Control Id<BR /> <BR /> Goto NWBC &gt; Setup &gt; Mitigation Control<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/10-8.png" /></P><BR /> &nbsp;<BR /> <BR /> maintain the details<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/11-4.png" /></P><BR /> Give the Risk Id under Access Risks which you wanted to Mitigate. One Mitigation Id can be used to Mitigate multiple Risks.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/Risk-Id-assignment-1.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Risk Id asignment</P><BR /> &nbsp;<BR /> <BR /> In Owners tab maintain the same two users which we had created in Step -1. One as Approver and another as Monitor.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/Owners-assignment.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Owners Assignment</P><BR /> &nbsp;<BR /> <BR /> We have created Mitigation Control Id now Save and close this tab.<BR /> <BR /> &nbsp;<BR /> <BR /> <STRONG>Step 5)</STRONG><BR /> <BR /> Now we will assign this Mitigation Control Id to the User who has a Risk.<BR /> <BR /> Goto Mitigated User under Access Management under NWBC.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/14-3.png" /></P><BR /> &nbsp;<BR /> <BR /> Goto Assign tab and fill all the required details, we already created the Control Id, Monitor and Approver, same we can maintain here, also give the user Name which you wanted to mitigate and click on save.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/15-1.png" /></P><BR /> <P style="text-align: center"><EM>User Mitigation</EM></P><BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <BR /> <STRONG>Step 6)</STRONG><BR /> <BR /> We may now proceed for Risk Analysis<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/16-2.png" /></P><BR /> &nbsp;<BR /> <BR /> Maintain all required details.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/17-2.png" /></P><BR /> &nbsp;<BR /> <BR /> Upon executing Risk Analysis it will through as no Violation.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/04/Risk-Analysis.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">Risk Analysis</P><BR /> &nbsp;<BR /> <BR /> User is Mitigated, we achieved our goal, we learned End to End Process of MItigation Creationa and assignment here.Hope this document will help you to learn the mitigation Process.Please feel free to ask questions and comment if any issue related to Mitigation is being faced or any further help needed, this will motivate to create further more SAP blogs.<BR /> <BR /> &nbsp; 2023-04-19T11:36:30+02:00 https://community.sap.com/t5/financial-management-blogs-by-members/mitigating-controls-is-this-a-cure-for-all-evil-in-redundant-authorizations/ba-p/13565041 Mitigating controls – is this a cure for “all evil” in redundant authorizations in SAP? (part 5/5) 2023-05-25T10:24:20+02:00 FilipGRC https://community.sap.com/t5/user/viewprofilepage/user-id/11783 <STRONG>Part #5/5</STRONG>: Summary and conclusions<BR /> <BR /> The fifth and the last part of the article summarizes the topic. In this section, we will gather all the information and answer the questions:<BR /> <BR /> <EM>Why the topic of access risk and SoD control is important</EM>? and <EM>Why it is worth dealing with in</EM>? We will suggest a correct sequence of actions. Why are redundant permissions dangerous and why shouldn't this problem be left for later? Why do financial audits analyze this topic in such detail? We will also select the most important points from the previous parts to present both the problem itself and the method of dealing with it in a short summary. Finally, we will also look at the topic from the financial perspective - what determines the cost of 'compliance' ($$$) and how to reduce it. Enjoy reading!<BR /> <BR /> <STRONG>Why is the topic important?</STRONG><BR /> <BR /> Every year, the American organization ACFE (Association of Certified Fraud Examiners) investigates cases of fraud in organizations around the world. The data disclosed in the report for 2020 confirm the trend that has been visible for many years, in which the costs of fraud are on average 5% of financial revenues. It takes an average of 14 months to detect an abuse from the moment it first occurs. The abuses cost businesses an average of $ 8,300 per month. Financial corruption is the most common type of fraud. In the report itself, the authors repeatedly emphasize that the best cost-effective approach to reducing financial losses resulting from fraud is prevention, i.e. preventing the occurrence of fraud.<BR /> <BR /> It may seem obvious, but from our perspective it is important to pay attention to the 'direction of thinking'. Which means that it is possible, and it is worth investing in preventing abuse than bearing the costs of repairing the damage caused by them. The lack of an appropriate internal control system is responsible for 1/3 of the abuses. We refer to the topic of our article here, because the question about mitigating controls is the question about the architecture of the internal control system. Building an effective internal control system should start, just like building a house, with a good foundation. Our experience shows that this foundation is the appropriate secured IT systems that support business processes and generate financial data because of their implementation. These financial data are summarized later in the Profit and Loss Account or in the Corporate Financial Balance Sheet. These data are the basis for making investment decisions by investors and for setting the course of action by the Management Board and management of the company. Therefore, they cannot be wrong. The central point of ensuring the correct processing of this data is a properly planned, designed, and implemented user authorization control system. The authorizations have the advantage that if they do not make it possible to perform a specific operation in the IT system, the user will not perform it. Of course, this is often the subject of frustration for users who want to carry out the tasks entrusted to them, and the system displays the message "<U>You are not authorized to perform this operation</U>". Most importantly, however, by its nature, correct authorizations in the SAP system enable preventive control, i.e. preventing the occurrence of financial fraud.<BR /> <BR /> <STRONG>How to approach the topic in correct manner?</STRONG><BR /> <BR /> In a few words - when you identify the risk of excessive access rights, do not start with the implementation of a new mitigating control. In the first place, it is necessary to analyze the authorization model and determine whether the user who has the risk of excessive access rights needs access from which the risk arises. The practice of working with organizations shows that users use only 50-60% of the rights they are assigned to. It is worth approaching each identified risk in the entitlements individually, taking into account the level of risk and its negative impact on our organization. After deciding on the lack of acceptance for the effects of the risk and the willingness to eliminate it, it is worth analyzing the algorithm below, which presents the possible actions and, more importantly, the suggested sequence of their execution.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/05/New_sod_risk_EN.png" /></P><BR /> &nbsp;<BR /> <BR /> <STRONG>How to deal with user excessive access?</STRONG><BR /> <BR /> Excessive user access rights often result from copying privileges during access requesting ("I am asking to copy authorities from Mr. Kowalski) and taking into account that access rights of Mr. Kowalski are very rarely removed when the employee moves from the one to another department. The system for periodic access review comes to the rescue, which allows to define authorizations that are not or have not been used (e.g. in the last 6-12 months) by the user to perform daily system tasks based on his HR responsibilities. The process of periodic verification is the foundation of the authorization control system, unfortunately, companies rarely use it, because such a process is difficult to implement in the organization without the use of appropriate tools that support management decisions. Valuable information during such a review of rights is not only whether a given transaction was used, but also whether, for example, a given risk has already appeared in the history of reviews and if so, what was the decision made at that time (acceptance or rejection of rights) for a given risk, context organizational and user. Before starting the access review, useful information is to determine which authorizations have already been withdrawn in accordance with the verifiers' decision and, for example, have been re-granted in the authorization process. That is why the processes of broadcasting and periodic verification should be mutually coupled, so that information between them is shared for better decisions of the management of the organization.<BR /> <BR /> <STRONG>How to improve the user authorization model?</STRONG><BR /> <BR /> A good authorization model is one in which users have only the privileges they require to perform the tasks assigned to a given HR position or process steps. Two challenges will often arise at this point. The first is how to determine what is needed to perform tasks at a given HR position (process steps), and the second is how to technically define (map) it to the accesses in the SAP system (ERP). The scope of duties in each position is defined, but it often happens that it is allowed to extend the scope of an employee's tasks - and thus – system authorization accesses. This is a partially understandable practice, but it does not improve the situation of the person who is to design a new entitlement model and wants to base it on the minimum needed for work. In such a situation, during the project initiative, the management redefines the division of tasks in each process or area. For this purpose, it uses the practices resulting from the segregation of duties matrices that define the scope of authorizations that should not be combined as they cause unacceptable risks for the company.<BR /> <BR /> <STRONG>Summarizing, therefore, the entitlement model should include the following features:</STRONG><BR /> <UL><BR /> <LI>user rights should be minimal required, necessary to perform tasks in each HR position. There should be no excessive rights, needed during the replacement or received as part of the performance of work in previous job-positions,</LI><BR /> <LI>authorizations should not include the risk of segregation of duties, in particular those marked as high or critical,</LI><BR /> <LI>The authorization process should be controled, i.e. one that takes into account segregation of duties risk analysis before assigning authorizations. Permissions should not be copied from other users (a frequently used simplification in the permission granting process). Access to data should be multi-stage, in particular approved by the appropriate data owner ("Data owner" or, for example, "Role owner"), i.e. avoiding a situation in which the manager of an employee in the logistics area grants authorizations to financial areas,</LI><BR /> <LI>authorizations should be periodically verified to consider organizational and process changes, or those resulting from the conducted HR policy. The data owner should have tools for periodic (once a year) efficient (supporting decision-making) verification of the existing accesses.</LI><BR /> </UL><BR /> <STRONG>How to use mitigating controls wisely?</STRONG><BR /> <BR /> Mitigating controls are not an ideal solution to the problem of excessive user rights, but if properly implemented, they can be an effective protection against the access risks. They apply especially when in the SAP / ERP system it is impossible to partially restrict or revoke user access rights. The organization has resources or allows for the possibility of changing the current way of implementing the process in the short term.<BR /> <BR /> In the third part of the article, we described the important role of knowing the business context. This is key in determining whether the control mechanisms we want to create haven’t already been implemented in the organization or there are similar ones, addressing the same control objective (the same risk). The only difference is in the way the control activity is described or there is a different business area requesting this control mechanism. It is very important to avoid duplication of control activities because it generates huge costs for the organization, without guaranteeing better (effective) management of the identified risks. An important element that helps to avoid duplication is an automatic repository of controls and risks, which allows in various aspects to report the reasons for the existence of control in processes: the perspective of risks, regulations or legal requirements, processes, etc. Touching the appropriate scale (&gt; 30 risks), it is impossible to maintain such a repository and system without a dedicated tool/system/application that will enable the implementation of automatic mitigating controls.<BR /> <BR /> <STRONG>Changes in business processes</STRONG><BR /> <BR /> If we are unable to implement business controls or their implementation is not justified in the long term, it is worth considering changes in the current business processes design and operations. In the short term, this is a greater organizational effort, but in the long term, it may turn out to be more beneficial and may generate some optimization into our business process flows. Of course, ad hoc changes in business processes require an appropriate project initiative that will plan and design the future shape of the processes and then prepare a roadmap to achieve this state. Then, through progress monitoring mechanisms, it will ensure that the changes are implemented. This requires costs related to:<BR /> <UL><BR /> <LI>work of own managers and / or external experts who will help design the target model,</LI><BR /> <LI>costs of training employees in a new way of implementing the process,</LI><BR /> <LI>costs related to the maintenance of the new model, which, in principle, should be lower than the costs incurred so far.</LI><BR /> </UL><BR /> <STRONG>How much does it cost?</STRONG><BR /> <BR /> Finally, it is worth considering the financial and cost aspect. From our experience, this aspect is often overlooked, as the management of the company often thinks in terms of must have, as it is required by a specific legal regulation. It is often justified, but the years of our professional practice show that no regulation directly indicates the method of implementation. The method of implementation is at the discretion of management or external advisers who yield to an approach based on the principle that it <EM>is better to do more than less</EM>. In the years 2003-2005, when the first implementations of the Sarbanes-Oxley Act appeared in the world, which forced the construction of an internal control system, organizations based on powers created new control mechanisms. In the following years, many costly optimization projects were carried out, as it turned out that maintaining unjustified, ill-considered controls in business processes cost a lot of money.<BR /> <BR /> <STRONG>This cost of control resulted directly or indirectly from:</STRONG><BR /> <UL><BR /> <LI>time (working-days) of middle and high-level managers devoted not only to the implementation of control in the business process, but also its documentation and description,</LI><BR /> <LI>time (man-days) of internal and external audits needed to test these mechanisms, that is, certify that they work properly and further address the control objectives resulting from the risk described.</LI><BR /> </UL><BR /> On the other extreme, there are penalties for companies for failure to control or misunderstanding of requirements. The Securities and Exchange Commission (SEC) imposed penalties on the anonymous amount of USD 4.3 billion only in 2019.<BR /> <BR /> Therefore, the challenge remains the correct balance between the effectiveness of the internal control system and the expenditure incurred on its implementation and subsequent maintenance. An appropriate system of entitlements allows to reduce the costs of maintaining such a system, and the resources saved can be wisely invested in the automation and maintenance of those control mechanisms that are appropriate for the defined risk base<BR /> <BR /> <STRONG>Please share feedback or thoughts in a comment section.</STRONG><BR /> <BR /> Read&nbsp;<A href="http://community.sap.com/topics/grc" target="_blank">more</A>&nbsp;on related topic in SAP Solutions for Governance, Risk, and Compliance Topic Page<BR /> <UL><BR /> <LI>See our&nbsp;<A href="https://blogs.sap.com/2022/11/18/mitigating-controls-is-this-a-cure-for-all-evil-in-excessive-authorizations-risks-in-sap/" target="_blank" rel="noopener noreferrer">introductory post</A>&nbsp;with link to other articles in this series prepared together with&nbsp;<SPAN class="mention-scrubbed">andrzejpartyka</SPAN></LI><BR /> <LI>Ask questions about Governance, Risk, Compliance (GRC), and Cybersecurity and&nbsp;<A href="https://answers.sap.com/tags/237150e2-6555-4a16-b49e-e93dbf1891da" target="_blank" rel="noopener noreferrer">follow</A>&nbsp;us</LI><BR /> <LI>Read other Governance, Risk, Compliance (GRC), and Cybersecurity and follow&nbsp;<A href="http://blogs.sap.com/tags/237150e2-6555-4a16-b49e-e93dbf1891da" target="_blank" rel="noopener noreferrer">blog</A>&nbsp;post</LI><BR /> <LI>Please follow us on and our profile for future posts&nbsp;<SPAN class="mention-scrubbed">fnowak</SPAN>&nbsp;and&nbsp;<SPAN class="mention-scrubbed">andrzejpartyka</SPAN></LI><BR /> </UL><BR /> Filip Nowak<BR /> <BR /> &nbsp; 2023-05-25T10:24:20+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/shining-a-light-on-cybersecurity-safeguarding-critical-infrastructure-and/ba-p/13566381 Shining a light on Cybersecurity: Safeguarding Critical Infrastructure and Communities in the Age of the Internet of Things 2023-05-26T13:01:33+02:00 i353gfiata https://community.sap.com/t5/user/viewprofilepage/user-id/656256 <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/05/out-3-2.png" /></P><BR /> <P class="image_caption" style="text-align:center;font-style:italic;, Arial, sans-serif">One of the first known cases of a cyber-attack to critical infrastructures was the power outage in Ukraine, which left over 225,000 people without electricity for several hours.</P><BR /> &nbsp;<BR /> <P style="font-weight: 400">Cybersecurity has evolved significantly in today's ever-changing digital landscape, transitioning from a routine IT task to a critical business strategy.</P><BR /> <P style="font-weight: 400">The rise of recent cyber-attack trends has further elevated the importance of cybersecurity, which in some cases involves safeguarding critical infrastructures and ensuring the safety of individuals and communities.</P><BR /> <BR /> <DIV><BR /> <H2 id="toc-hId-963091225"><B>The Internet of Things: A Double-Edged Sword</B></H2><BR /> </DIV><BR /> <DIV><BR /> <BR /> <A name="OLE_LINK1" target="_blank"></A>The risks associated with cyber-attacks on critical infrastructure are amplified due to the increasing use of interconnected devices used to automate processes and manage operations more efficiently. This trend, often referred to as the "Internet of Things" (IoT), has led to the creation of vast networks of connected devices, commonly known as Operational Technology (OT), which are used to monitor and control critical infrastructure systems.<BR /> <BR /> </DIV><BR /> <DIV><BR /> <BR /> While these interconnected devices offer significant benefits, they also introduce new vulnerabilities that cybercriminals can exploit. For example, a cyber-attack on a single device within a network can quickly spread to other devices and systems, potentially causing widespread disruption and damage.<BR /> <DIV><BR /> <H2 id="toc-hId-766577720"><B>Power Grids and Healthcare at Risk: The Urgent Call</B></H2><BR /> <DIV><BR /> <BR /> Particularly worrying is the increasing number of ransomware attacks on critical infrastructure. These attacks are often carried out by sophisticated cybercriminals who seek to extort money from organizations by threatening to disrupt or destroy their vital systems.<BR /> <BR /> </DIV><BR /> <DIV><BR /> <BR /> The potential damage that can be caused by cyber-attacks on critical infrastructure is significant. For example, an attack on a power grid could cause widespread blackouts, leaving people without electricity, heating, and other essential services. In hospitals, an attack could result in the disruption of patient care, leading to serious health consequences. Attacks on transportation systems could cause chaos and disrupt the movement of people and vital goods.<BR /> <BR /> </DIV><BR /> </DIV><BR /> <DIV><BR /> <H2 id="toc-hId-570064215"><B>Securing our future: Steps Taken by Governments and Organizations</B></H2><BR /> <P style="font-weight: 400">As a result of the increased risks associated with interconnected devices, many organizations and governments are taking steps to address the security challenges posed by the IoT.</P><BR /> <P style="font-weight: 400">Governments are working to establish standards and regulations to ensure the security of interconnected devices and systems. For example, the US government has established the Cybersecurity and Infrastructure Security Agency (CISA), which is responsible for protecting critical infrastructure from cyber-attacks.</P><BR /> <P style="font-weight: 400">Recently, the European Union has introduced the NIS2 (Network and Information Systems) Directive to strengthen cybersecurity measures across its countries.</P><BR /> <P style="font-weight: 400">These governing bodies require operators of essential services and digital service providers to take steps to prevent and respond to cyber threats that could affect their systems and services, and in case of significant cybersecurity incidents, timely report and communicate them.</P><BR /> <P style="font-weight: 400">Companies operating in these sectors are required to implement strong cybersecurity measures, such as incident response plans, risk assessments, and regular security audits.</P><BR /> <P style="font-weight: 400">This is why there is an increasing investment towards advanced cybersecurity tools and techniques, such as machine learning and artificial intelligence, to better detect and respond to threats. Those technologies help with:</P><BR /> <BR /> <OL><BR /> <LI><STRONG>Cybersecurity risk assessment:</STRONG> Processes and tools can be used to analyse and assess the cybersecurity risk associated with different types of critical infrastructure, such as power grids or water treatment plants. This can help organizations prioritize their security efforts and allocate resources to areas where they are most needed.</LI><BR /> </OL><BR /> <P style="font-weight: 400"></P><BR /> <BR /> <OL start="2"><BR /> <LI><STRONG>Threat intelligence analysis:</STRONG> Analytics on threat intelligence data can be used to identify patterns and trends that could indicate an impending attack. This can enable organizations to prioritize their security efforts and take preventive measures to prepare their defences before attacks occur.</LI><BR /> </OL><BR /> <P style="font-weight: 400"></P><BR /> <BR /> <OL start="3"><BR /> <LI><STRONG>Anomaly detection:</STRONG> Machine learning algorithms can be trained to recognize normal behaviours and flag any abnormal activity that could indicate a cyber-attack. By correlating data from multiple sources, including network data, application logs, and threat intelligence feeds, potential cyber-attacks can be predicted before they occur.</LI><BR /> </OL><BR /> <P style="font-weight: 400"></P><BR /> <BR /> <OL start="4"><BR /> <LI><STRONG>Automated incident response:</STRONG> Security process automation can be used to automatically respond to certain types of cyber-attacks, such as malware infections or distributed denial-of-service (DDoS) attacks. This can help organizations quickly contain the attack and prevent it from spreading to other systems<BR /> <DIV></DIV></LI><BR /> </OL><BR /> <DIV><BR /> <H2 id="toc-hId-373550710"><A name="OLE_LINK9" target="_blank"></A><B>Working together: Securing Critical Infrastructures and Communities</B></H2><BR /> <P style="font-weight: 400">In summary, cybersecurity has transitioned from being a routine IT task to a crucial strategic business objective, and currently, it also represents a mission-critical effort to safeguard vital infrastructure.</P><BR /> <P style="font-weight: 400">The threat of ransomware is real and can cause serious damage, but while the risks associated with interconnected devices are significant, they are not insurmountable. With the right investments, collaborations and partnerships in cybersecurity, organizations and governments can mitigate these risks to ensure the safety and protection of our communities.</P><BR /> <BR /> <H4 style="font-weight: 400" id="toc-hId-435202643"><STRONG>Find out how SAP can help protect data and business systems as a Cloud ERP provider. Visit the&nbsp;</STRONG><A href="https://www.sap.com/about/trust-center/security.html" target="_blank" rel="noopener noreferrer"><STRONG>SAP Trust Center</STRONG></A><STRONG>&nbsp;site to explore our security, compliance, privacy, and service performance capabilities.</STRONG></H4><BR /> <P style="font-weight: 400"></P><BR /> <BR /> </DIV><BR /> <DIV><BR /> <H2 id="toc-hId--19476300"><A name="OLE_LINK9" target="_blank"></A><B></B><B></B></H2><BR /> </DIV><BR /> </DIV><BR /> </DIV> 2023-05-26T13:01:33+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/demystifying-cyber-risk-empowering-sap-organizations-to-measure-and/ba-p/13558139 Demystifying Cyber Risk: Empowering SAP Organizations to Measure and Integrate Cyber Risks into Business Decisions 2023-06-12T16:11:41+02:00 i353gfiata https://community.sap.com/t5/user/viewprofilepage/user-id/656256 <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/06/FAIR.png" /></P><BR /> <P class="image_caption" style="text-align: center;font-style: italic">FAIR Methodology (Factor Analysis of Information Risk) for Risk Quantification</P><BR /> <P style="font-weight: 400">In today's digitally driven world, organizations of all sizes and industries face the pervasive threat of cyberattacks.</P><BR /> <P style="font-weight: 400">With businesses relying increasingly on technology and interconnected systems, quantifying cyber risk has emerged as a critical task to increase risk visibility at the board level.</P><BR /> <P style="font-weight: 400">This blog explores how the FAIR (Factor Analysis of Information Risk) methodology helps in quantifying cyber risk, particularly within the SAP realm. It emphasizes the importance of integrating cyber risks into the broader enterprise risk management framework, ensuring that cybersecurity is not treated in isolation but is considered alongside other strategic risks.</P><BR /> <P style="font-weight: 400">By adopting a holistic approach to risk management, organizations can identify and prioritize cybersecurity investments, enhance their incident response capabilities, and safeguard their assets, reputation, and customers.</P><BR /> <BR /> <H3 style="font-weight: 400" id="toc-hId-1091307936"><STRONG>Quantifying Cyber Risk with the FAIR Model:</STRONG></H3><BR /> <P style="font-weight: 400">The FAIR methodology is a framework for assessing and quantifying information risk in a structured and systematic manner. It provides organizations with a consistent and repeatable approach to evaluating and measuring risk.</P><BR /> <P style="font-weight: 400">It promotes the usage of data-driven methods and probabilistic models to estimate and measure risk in financial terms, providing organizations with a more objective and consistent way to make risk-informed decisions and allocate resources effectively.</P><BR /> <P style="font-weight: 400">“<EM>By assigning probabilistic values and monetary figures to these components, organizations can gain a clearer understanding of the financial impact associated with cyber risks.</EM>” says Julian Meyrick, VP of Security Strategy Risk &amp; Compliance, IBM.</P><BR /> <BR /> <H3 style="font-weight: 400" id="toc-hId-894794431"><STRONG>Integrating Cyber Risks with Enterprise Risk Management:</STRONG></H3><BR /> <P style="font-weight: 400">Quantifying cyber risk with FAIR is essential, but it's just the beginning. Organizations must integrate cyber risks into their broader enterprise risk management (ERM) approach. This alignment allows them to prioritize risk mitigation and consider the impact on reputation, resilience, compliance, and finances.</P><BR /> <P style="font-weight: 400">To learn more, read the NIST guide for <A href="https://csrc.nist.gov/publications/detail/nistir/8286/final" target="_blank" rel="nofollow noopener noreferrer">Integrating Cybersecurity and Enterprise Risk Management.</A></P><BR /> <P style="font-weight: 400">For SAP, integrating cyber risks means assessing their effects on data breaches, operational downtime, financial losses, and reputation damage. This is how organizations can gain a comprehensive view and can develop cohesive mitigation strategies.</P><BR /> <BR /> <H3 style="font-weight: 400" id="toc-hId-698280926"><STRONG>Quantifying cyber risks in SAP:</STRONG></H3><BR /> <P style="font-weight: 400">The confidentiality, integrity, and availability of information (CIA Triad) in an SAP system is often crucial to the operation of a business. Ideally, when the CIA Triad is effectively managed, the security profile of the organization is stronger and better equipped to handle threat incidents.</P><BR /> <P style="font-weight: 400">Let’s look at one real-life example on how Loss of Integrity could be estimated in an SAP environment (the specific values used in this example are for illustrative purposes only, and in practice, actual values would vary based on the organization and its context).</P><BR /> <P style="font-weight: 400">In this scenario, a privileged insider with malicious intent, could manipulate or alters data in the SAP systems, leading to a loss of integrity and potentially affecting product manufacturing processes.</P><BR /> <P style="font-weight: 400">Please note that, for the sake of simplicity, we will not delve into all the specific analysis parameters and variables, such as Control Frequency, Probability of Action, Threat Capability, and Resistance Strength.</P><BR /> <P style="font-weight: 400">We also present values as point estimates (for simplicity). In practice, we account for the uncertainty that naturally occurs in this work by using ranges of values. For example, threat event frequency might be estimated to be somewhere between 0.05 times per year (1 in 20 years) and 0.2 times per year (1 in 5 years) with a most likely of 0.1 times per year (1 in 10 years). In our examples, we’ll only discuss the single most likely value.</P><BR /> <BR /> <H4 style="font-weight: 400" id="toc-hId-630850140"><STRONG>Threat Event Frequency:</STRONG></H4><BR /> <P style="font-weight: 400">Assume the threat of a Privileged Insider compromising the integrity of the SAP system occurs once every 10 years. Therefore, it would be 0.1.</P><BR /> <BR /> <H4 style="font-weight: 400" id="toc-hId-434336635"><STRONG>Vulnerability Frequency:</STRONG></H4><BR /> <P style="font-weight: 400">Assume that the set of controls that protect from a skilled privileged insider from compromising the integrity of the SAP system only allow half of threat events to become loss events. Therefore, the probability that the Threat Event will result in a Loss Event could be estimated to 50%.</P><BR /> <BR /> <H4 style="font-weight: 400" id="toc-hId-237823130"><STRONG>Primary Loss:</STRONG></H4><BR /> <P style="font-weight: 400">Consider the potential primary loss as the cost of rework, system restoration, and operational disruption caused by the compromised integrity of the SAP system. Assume this amounts to $500,000.</P><BR /> <BR /> <H4 style="font-weight: 400" id="toc-hId-41309625"><STRONG>Secondary Loss:</STRONG></H4><BR /> <P style="font-weight: 400">Assume the secondary loss refers to the potential loss of customer trust, brand reputation, and market share. Assume a value of $30,000,000 was calculated to capture these intangible losses.</P><BR /> <BR /> <H4 style="font-weight: 400" id="toc-hId--155203880"><STRONG>Loss Frequency:</STRONG></H4><BR /> <P style="font-weight: 400">Multiply the Threat Event Frequency (0.1) by the Vulnerability Frequency (50%) to calculate the Loss Frequency. In this case, it would be 0.05.</P><BR /> <BR /> <H4 style="font-weight: 400" id="toc-hId--351717385"><STRONG>Loss Magnitude:</STRONG></H4><BR /> <P style="font-weight: 400">Add the Primary Loss and Secondary Loss together to get the Loss Magnitude. In this case, it would be $30,500,000 ($500,000 + $30,000,000).</P><BR /> <BR /> <H4 style="font-weight: 400" id="toc-hId--548230890"><STRONG>Overall Risk:</STRONG></H4><BR /> <P style="font-weight: 400">Multiply the Loss Frequency by the Loss Magnitude to calculate the overall risk. In this case, the most likely annual aggregated loss exposure would be $152,500 ($30,500,000 * 0.05).</P><BR /> As previously stated, in practice, these values would also be expressed in ranges, as opposed to a single point value as shown in our example.<BR /> <H3 style="font-weight: 400" id="toc-hId--949058483"><STRONG>Call&nbsp;to Action:</STRONG></H3><BR /> This example demonstrates the importance of quantifying risk to help organizations see where they need to implement stronger access controls, monitoring mechanisms, privileged user management, and incident response protocols to maintain the integrity of their SAP systems and their business processes.<BR /> <BR /> Quantifying cyber risk is an essential step towards building business resilience. The FAIR methodology empowers organizations to assign financial values to cyber risks, aiding in better decision-making and resource allocation.<BR /> <BR /> However, the true power lies in integrating cyber risk management with the broader enterprise risk management framework, which allows organizations to get buy-in from senior leadership and effectively prioritize risks mitigations.<BR /> <BR /> It is essential to acknowledge that cybersecurity is an ongoing investment that requires continuous adaptation and enhancement, and it is important to collaborate closely with your cloud service providers of software (SAAS), platform (PAAS), and infrastructure (IAAS) to fortify your organization against the ever-evolving face of cyber threats.<BR /> <H4 style="font-weight: 400" id="toc-hId--1438974995"><STRONG>Learn more:</STRONG></H4><BR /> <UL style="font-weight: 400"><BR /> <LI><A href="https://podcast.opensap.info/the-future-of-erp/2023/06/14/episode-12-uncovering-blind-spots-a-guide-to-measuring-and-managing-your-cybersecurity-risks-with-sap-ibm/" target="_blank" rel="nofollow noopener noreferrer"><SPAN style="font-size: 1rem">Podcast: A Guide to Measuring and Managing Your Cybersecurity Risks with SAP &amp; IBM</SPAN></A></LI><BR /> <LI><A href="https://www.sap.com/insights/viewpoints/how-to-spend-your-cybersecurity-budget.html" target="_blank" rel="noopener noreferrer">SAP and the FAIR model</A></LI><BR /> <LI><A href="https://help.sap.com/docs/SAP_ANALYTICS_CLOUD/42093f14b43c485fbe3adbbe81eff6c8/40553ae164a943e0b6076364d8fef944.html" target="_blank" rel="noopener noreferrer">SAP Cybersecurity Dashboard</A></LI><BR /> <LI><A href="https://www.forbes.com/sites/sap/2023/04/03/the-cybersecurity-advantages-of-the-cloud/?sh=7a083954311c" target="_blank" rel="nofollow noopener noreferrer">The Cybersecurity Advantages of the Cloud</A></LI><BR /> </UL> 2023-06-12T16:11:41+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/grc-tuesdays-why-i-love-risk-management-and-i-think-you-should-as-well/ba-p/13423911 GRC Tuesdays : Why I Love Risk Management… and I Think You Should As Well 2023-07-04T15:28:09+02:00 T_Frenehard https://community.sap.com/t5/user/viewprofilepage/user-id/215222 <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2020/05/Image-1-6.jpg" /></P><BR /> The bottom line is pretty straight forward: it’s because risk management is not about preventing the business from progressing faster. It’s actually to help it thrive and take the right level of risk - the one that will support the achievement of the objectives and won’t endanger the business in case it encounters a few roadblocks on the way.<BR /> <BR /> Who would drive a car at night and not turn the headlights on? Or go on a long trip without checking the level of petrol first?<BR /> <H2 id="toc-hId-930684166">Risk Management Is Reactive and Proactive</H2><BR /> &nbsp;<BR /> <BR /> That’s precisely what risk management is – a constant petrol gauge to ensure the company is sufficiently fuelled and won’t run out of gas before it reaches its destination. That’s the reactive part.<BR /> <BR /> But risk management also incorporate a proactive part, hence the headlights in the night analogy. Our context and environment is always changing, and so is the road you’re driving, so making sure you can see all the curves and other cars ahead of time will prevent last minute swerves and enable a smoother drive.<BR /> <H2 id="toc-hId-734170661">Risk Management Is Insurance</H2><BR /> &nbsp;<BR /> <BR /> Risk management is also about ensuring that you have the right level of insurance. Not only because it’s a legal obligation when you own a car - a regulatory risk if not complied with - but also because, if you’re the sole driver of your compact two-door-car, do you really need an insurance that covers two extra drivers and all damage liabilities for a Lamborghini class vehicle?<BR /> <BR /> Well, with risk management, you’re able to identify what could go wrong and to quantify these events in the context of your business and its own value. Hence, when you transfer your insurable risks, you can confidently select the right level of coverage and optimize your insurance costs.<BR /> The potential gain can then be reinvested in the business to add more fuel and go further.<BR /> <BR /> In order to be as close to reality as possible, risk management has to rely on a network of in-house business experts since they’re the ones who know the business like the palm of their hands and can not only explain what the potential risks are, but also can work on finding responses that would appropriately mitigate them.<BR /> <BR /> There’s where risk management goes to full power – these business experts are not necessarily risk specialists, so both departments need to work together to come up with the list of threats and their associated mitigations in a manner that’s consistent with the company’s risk management framework so as to be reportable and comparable across all business units.<BR /> <BR /> If risk management has the ear of the business and is correctly perceived as a trusted value-add activity, then this will not only go smoothly but will ensure continuous discussions and updates. And this is worth its weight in gold for both parties.<BR /> <BR /> As you can read, I’m a strong believer that risk management is much more than a consolidation and reporting function, it supports effectively the efforts of the complete company: from its operations to its management functions.<BR /> <BR /> A department that focuses on the long-term sustainability of the company – doesn’t that sound like a good place to be in?<BR /> <BR /> Originally published on the <A href="https://www.sap.com/community/topics/analytics.html" target="_blank" rel="noopener noreferrer">SAP Analytics Blog</A> 2023-07-04T15:28:09+02:00 https://community.sap.com/t5/financial-management-blogs-by-members/net-present-value-calculation-using-tpm60cva/ba-p/13580910 Net Present Value Calculation using TPM60CVA 2023-08-29T18:42:17+02:00 sumitdua https://community.sap.com/t5/user/viewprofilepage/user-id/869375 TPM60CVA - Calculate Net Present Values - With CVA and DVA<BR /> <BR /> In&nbsp;Treasury and Risk Management, one can use the following functions for system to calculate NPVs (or fair values):<BR /> <UL><BR /> <LI><STRONG>Transaction JBRX - </STRONG>Single Value Analysis: NPVto calculate NPVs for financial transactions. Please note that this transaction doesn’t save any calculated NPVs but is used for What-if analysis based on input scenario.</LI><BR /> <LI><STRONG>Transaction TPM60</STRONG> – In order to save NPVs that system has calculated and use them later, we can use TPM60 which is function&nbsp;for Save NPVs. For this transaction, the system calculates the NPVs in exactly the same way as transaction&nbsp;JBRXand saves the results in NPV table&nbsp;VTVBAR.</LI><BR /> <LI><STRONG>Transaction TPM60CVA</STRONG> – The function is used to&nbsp;determine NPVs Including CVA and DVA&nbsp;in your NPV calculation. The results are also stored in the NPV table.<BR /> <UL><BR /> <LI>Credit Value Adjustment (CVA) is the amount subtracted from the mark-to-market (MTM) value of positions to account for the expected loss due to counterparty defaults. Since&nbsp;CVA is a positive value, it is deducted from the risk free NPV calculation.</LI><BR /> <LI>Debit Value Adjustment (DVA) is the amount added back to the MTM value to account for the expected gain from an institution’s own default.&nbsp;As the DVA is negative value, it must be subtracted from the risk free NPV calculation.</LI><BR /> </UL><BR /> </LI><BR /> </UL><BR /> The NPV of a financial transaction with the inclusion of CVA and DVA is derived as “<STRONG>Risk-free NPV – CVA – DVA</STRONG>”<BR /> <BR /> CVA and DVA is calculated in the system in the following ways:<BR /> <OL><BR /> <LI><STRONG>Difference Method:</STRONG> With this method, the system will calculate below values based on evaluation types:<BR /> <OL><BR /> <LI><STRONG>Risk-based NPV</STRONG> using the yield curve stored in the evaluation type. If the settings for credit spreads is also saved, the system also takes it into account when calculating the NPV like in a composite yield curve.</LI><BR /> <LI><STRONG>Risk-Free NPV</STRONG> based on risk free yield curve stored in the evaluation type</LI><BR /> </OL><BR /> </LI><BR /> </OL><BR /> The difference between Risk-free NPV and Risk-Based NPV is equal to CVA or DVA<BR /> <BR /> 2.<STRONG> Based on Expected Exposures: </STRONG>In this method, CVA/DVA is calculated separately based on the expected exposures on a given date. The calculation required the credit spread curve for the reference entity for either the counterparty or your own company.<BR /> <BR /> This document explains the NPV calculation of a Foreign exchange transaction based on expected exposures and below is the terminology for understanding of the process:<BR /> <OL><BR /> <LI><STRONG>Evaluation Type</STRONG>: This is an object where all the required yield curves are mapped that will be used to determine the NPV. The field is available as input in the TPM60CVA screen</LI><BR /> <LI><STRONG>Reference Entity</STRONG>: Reference entities are created for counterparty or own company codes. These entities are mapped to the yield curves that will be used for CVA/DVA calculation.</LI><BR /> <LI><STRONG>CVA/DVA Type</STRONG>: This object determines how CVA/DVA calculation is done in the system.</LI><BR /> </OL><BR /> Customizing required for calculating NPV for CVA/DVA:<BR /> <BR /> <STRONG>Define Expected Exposure Type</STRONG><BR /> <BR /> This setup control how the system calculates expected exposures (EE).<BR /> <BR /> SPRO-&gt; Financial Supply Chain Management -&gt; Treasury and Risk Management -&gt; Basic Analyzer Setting -&gt; Valuation -&gt; Settings for Calculation of Credit and Debit Value Adjustments -&gt; Define expected Exposure Types<BR /> <P style="overflow: hidden;margin-bottom: 0px"><STRONG> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture1-39.png" /></STRONG></P><BR /> <STRONG>Define Credit and Debit Value Adjustment types</STRONG><BR /> <BR /> The adjustment types control how the system calculates CVA and DVA.<BR /> <BR /> SPRO-&gt; Financial Supply Chain Management -&gt; Treasury and Risk Management -&gt; Basic Analyzer Setting -&gt; Valuation -&gt; Settings for Calculation of Credit and Debit Value Adjustments -&gt; Define Credit and Debit Value Adjustment Types<BR /> <BR /> &nbsp;<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture2-25.png" /></P><BR /> <STRONG>Define Valuation Rule</STRONG><BR /> <BR /> SPRO-&gt; Financial Supply Chain Management -&gt; Treasury and Risk Management -&gt; Basic Analyzer Setting -&gt; Valuation -&gt; Define Valuation Rule<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture3-18.png" /></P><BR /> <STRONG>Define Evaluation Type</STRONG><BR /> <BR /> Settings for evaluation types are required for the calculation of the net present values of financial transactions/treasury positions.<BR /> <BR /> SPRO-&gt; Financial Supply Chain Management -&gt; Treasury and Risk Management -&gt; Basic Analyzer Setting -&gt; Valuation -&gt; Define and Setup Evaluation Type<BR /> <P style="overflow: hidden;margin-bottom: 0px">&nbsp;&nbsp;&nbsp; <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture4-20.png" /></P><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture5-18.png" /></P><BR /> &nbsp;<BR /> <BR /> <STRONG>Master Data Required to be maintained:</STRONG><BR /> <BR /> Below are the currency parameters of the Forex transaction that we are evaluating:<BR /> <BR /> Position Currency: USD<BR /> <BR /> Valuation Currency: EUR<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture6-16.png" /></P><BR /> Based on the composite curve structure in the evaluation type, the market data for the required date need to be maintained to make sure that NPV calculation is being done correctly.<BR /> <BR /> <STRONG>Risk Free Yield Curve</STRONG> – Curve Type 1000<BR /> <BR /> Reference rates maintained for Yield Curve for Currency EUR:<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture7-17.png" /></P><BR /> Reference Rates Maintained as on 31.07.2023:<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture8-18.png" /></P><BR /> <STRONG>FX Volatility Type</STRONG> –Curve Type 002<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture9-16.png" /></P><BR /> <STRONG>Basis Spread Curve</STRONG> – 1000 (Will be picked based on Tenor)<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture10-16.png" /></P><BR /> <STRONG>Credit Spread for Business Partner</STRONG><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture11-16.png" /></P><BR /> Now, we execute TPM60CVA as on 31.07.2023.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture12-15.png" /></P><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture13-13.png" /></P><BR /> Upon execution, system will display the NPV calculated.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture14-13.png" /></P><BR /> The NPV value is saved in the internal table(VTVBAR)<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture15-14.png" /></P><BR /> Once NPV values are saved, execute valuation TPM1 to post the accounting entries.<BR /> <BR /> &nbsp;<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture17-10.png" /></P><BR /> &nbsp;<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/08/Picture16-11.png" /></P><BR /> &nbsp;<BR /> <BR /> TPM60CVA offers an enhanced functionality to calculate the Net present value by taking into account the credit risk associated with the external bank and own organization, thus further adjusting the value allowing for a more accurate assessment of the financial position.<BR /> <BR /> Please share your thoughts in the comments and let me know in case you want me to cover any other analyzer related topic.. 2023-08-29T18:42:17+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/grc-tuesdays-in-risk-management-a-picture-is-worth-a-thousand-words/ba-p/13423909 GRC Tuesdays: In Risk Management, a Picture Is Worth a Thousand Words 2023-10-10T05:31:10+02:00 T_Frenehard https://community.sap.com/t5/user/viewprofilepage/user-id/215222 <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2019/10/Picture1-2.jpg" height="206" width="286" /><BR /> <BR /> To me, this adage fully applies to risk management where the complex situation and environment of a risk can more easily be grasped visually using dedicated graphical models like the bow tie representation. Indeed, I believe this type of representation can truly ease the risk identification and mitigation phases. Furthermore, with such an easy-to-understand representation, the myth of risk management being a complicated process vanishes and people can focus on the true value of risk management – making decisions.<BR /> <H2 id="toc-hId-930684143"><STRONG>What Is the Bow-Tie Method?</STRONG></H2><BR /> &nbsp;<BR /> <BR /> The bow tie method is a risk documentation and representation approach where the risk event sits in the middle of the picture and its context surrounds it. In most versions, the impacts and drivers are displayed on both sides of the risk resulting in a representation of a man’s bow tie.<BR /> <BR /> Most diagrams also include risk responses located on each impact and driver branch and some elaborated versions incorporate the associated processes in which the risk would take place and even sometimes the relevant key risk indicators (KRIs) constituting the early warning system for the risk.<BR /> <H2 id="toc-hId-734170638"><STRONG>When Should I Use the Bow-Tie Method?</STRONG></H2><BR /> &nbsp;<BR /> <BR /> To me, the bow tie method can be used in most if not all situations. Widely used for Environment, Health and Safety (EH&amp;S) type risks, I see no reason why it should be restrained to one risk category because it’s simply another representation of the risk information.<BR /> <BR /> From my experience, this approach is very helpful when performing a risk identification with people who don’t have a prior risk management experience. Leveraging this approach often helps stakeholders better picture the risk, its sources and consequences, and therefore increase their implication in the exercise.<BR /> <BR /> Furthermore, for risks that span across multiple areas or departments, it helps in recreating the complete chain of events that would result in the risk occurring. Indeed, by graphically documenting the risk drivers, this approach can facilitate the identification of related events since bow tie is a great brainstorming support.<BR /> <H2 id="toc-hId-537657133"><STRONG>Where Do I Start?</STRONG></H2><BR /> &nbsp;<BR /> <BR /> Using bow tie is rather straight forward and I would suggest simply following these steps:<BR /> <OL><BR /> <LI>Name and describe the risk event (what could happen) in a circle placed in the middle of the page</LI><BR /> <LI>On the left of the circle, place the risk drivers (risk sources) that could trigger the even to occur</LI><BR /> <LI>On the right, place the potential consequences (risk impacts) that would be incurred should the event effectively happen</LI><BR /> </OL><BR /> That’s it! Now that you have identified the risk, if you want to take this exercise a step further, you can place the preventive and corrective risk responses on each branch. This would enable you to rapidly visualize if any branch is left uncovered or if, on the other hand, some are being <EM>over </EM>covered with too many risk responses.<BR /> <BR /> The following&nbsp; is simply an illustrative example of the result you would be getting and the lightening symbol illustrates where risk responses are in place:<BR /> <BR /> &nbsp;<BR /> <BR /> <IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2019/10/Bow-tie.png" /><BR /> <BR /> This easy-to-understand representation facilitates decision making, which is the true value of risk management.<BR /> <BR /> What about you? Do you currently use this bow tie approach? If so, would you have any recommendations on where to start and how to progress? If not, could you tell us why you aren’t using this method?<BR /> <BR /> If you are interested in learning more about SAP solutions for Governance, Risk, and Compliance, feel free to fill-in the <A href="https://www.sap.com/registration/request-demo.html?product=237150e2-6555-4a16-b49e-e93dbf1891da&amp;productName=Governance%2C+Risk%2C+Compliance+%28GRC%29%2C+and+Cybersecurity&amp;pageTitle=Cybersecurity+and+Governance%2C+Risk%2C+and+Compliance+Software&amp;countryOfOrigin=en_au&amp;refererPagePath=https%3A%2F%2Fwww.sap.com%2Faustralia%2Fproducts%2Ffinancial-management%2Fgrc.html&amp;refererContentPath=%2Fcontent%2Fsapdx%2Flanguages%2Fen_gb%2Fproducts%2Ffinancial-management%2Fgrc&amp;navTitle=Request+a+Demo" target="_blank" rel="noopener noreferrer">demo request form</A>!<BR /> <BR /> Originally published on the <A href="https://www.sap.com/community/topics/analytics.html" target="_blank" rel="noopener noreferrer">SAP Analytics Blog</A> 2023-10-10T05:31:10+02:00 https://community.sap.com/t5/financial-management-blogs-by-sap/sap-risk-management-and-controls-in-the-public-cloud/ba-p/13572101 SAP Risk Management and Controls in the Public Cloud 2023-11-21T09:50:12+01:00 neil_patrick https://community.sap.com/t5/user/viewprofilepage/user-id/330209 <H2 id="toc-hId-963893412"><STRONG>Game Changer for our Customers</STRONG></H2><BR /> This is a momentous event in SAP GRC! We are adding a new public cloud risk management capability to our already exciting public cloud internal control solution <A href="https://www.sap.com/products/financial-management/financial-compliance-management.html" target="_blank" rel="noopener noreferrer">SAP Financial Compliance Management</A> (FCM). Take a look at my <A href="https://www.sap.com/products/financial-management/financial-compliance-management.html" target="_blank" rel="noopener noreferrer">GRC Tuesday blog on the solution</A> if you want additional information about FCM.<BR /> <BR /> We will offer public cloud risk and control management in the same solution, running on SAP Business Technology Platform, and with integration into SAP S/4HANA cloud - both public and private versions. It can also integrate to SAP ERP 6.0 (ECC) as part of an implementation project. Note this risk module is different to our existing private cloud solution SAP Risk Management.<BR /> <BR /> We plan to release the new functionality into FCM before the end of 2023.<BR /> <BR /> &nbsp;<BR /> <H2 id="toc-hId-767379907"><STRONG>Why this matters, and why now</STRONG></H2><BR /> We are in at a point time where businesses really do have to deal with a VUCA (volatility, uncertainty, complexity, and ambiguity) environment – in terms of data, processes, employees, financials and financing, n<SUP>th</SUP> parties, technology, regulations, internal and external risk. By way of example, ESG pretty much covers all of these aspects in one go.<BR /> <BR /> At the SAP Insider GRC conference last week in Copenhagen, we saw an interesting figure from their <A href="https://sapinsider.org/research-reports/the-cios-transformation-report-card-2023/" target="_blank" rel="nofollow noopener noreferrer">The CIO’s Transformation Report Card 2023</A>. The most common trend, with 53% of 2023 respondents (up from 36% in 2022) picking it was: Automation, standardization, or redesign of our business processes.<BR /> <BR /> I believe this is a reflection of trends such as:<BR /> <UL><BR /> <LI>90% of compliance leaders expect evolving business, <STRONG>regulatory, and customer demands</STRONG> to <STRONG>increase compliance-related operating costs</STRONG> by up to 30% (<A href="https://www.accenture.com/content/dam/accenture/final/a-com-migration/pdf/pdf-177/accenture-compliance-risk-study-report-2022-may13.pdf" target="_blank" rel="nofollow noopener noreferrer">Accenture, 2022</A>)</LI><BR /> <LI>50% of organizations aim to <STRONG>automate controls</STRONG> monitoring and management capabilities to address core drivers of GRC strategy in 2023 (<A href="https://sapinsider.org/grc-state-of-the-market-2023-benchmark-report/" target="_blank" rel="nofollow noopener noreferrer">SAP Insider, 2023</A>)</LI><BR /> <LI><STRONG>3 out of 4 of companies</STRONG> are planning to increase spend across data analytics (75%), process automation (74%), and technology (72%) to support the detection and <STRONG>monitoring of risks</STRONG> (<A href="https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/global-risk-survey.html" target="_blank" rel="nofollow noopener noreferrer">PwC, 2022</A>)</LI><BR /> </UL><BR /> The way to deal with a VUCA business landscape is to centralize and consolidate risk and control management, automate where possible, adopt best practices and standard operating procedures, replace technical debt options with strategically aligned integrated solutions from a single supplier, and select solutions with low TCO but with ease of use. Which is where this new offering from SAP fits, perfectly.<BR /> <BR /> &nbsp;<BR /> <H2 id="toc-hId-570866402"><STRONG>Risk and Controls in the same solution</STRONG></H2><BR /> It’s incumbent and honest of me to say this is the first release of our public cloud risk module into FCM. However, there is a strong roadmap of product development behind it, as well as FCM itself. Which will also include a name change.<BR /> <BR /> With this solution we will:<BR /> <UL><BR /> <LI>Provide one platform for many uses cases and risk domains across the enterprise</LI><BR /> <LI>Transform&nbsp;governance, risk, and compliance (GRC) from a cost factor (backward looking) to a strategic differentiator (business performance improvement, forward looking)</LI><BR /> <LI>Enhance process assurance for S/4HANA Cloud, Public &amp; Private Cloud Edition, on premise, as well as hybrid scenarios.</LI><BR /> <LI>Align with SAP core strategy of running on SAP Business Technology Platform, and SAP Analytics Cloud.</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Risk-and-Control-Vision.jpg" /></P><BR /> &nbsp;<BR /> <H2 id="toc-hId-374352897"><STRONG>Some sneak screenshot previews</STRONG></H2><BR /> <STRONG>Bear in mind the actual release version may look different.</STRONG><BR /> <BR /> Below are some screenshots form one of our development instances of the public cloud risk management software. It’s no accident I have chosen an ESG-type risk below just to demonstrate that while the software is (currently) called SAP Financial Compliance Management, use cases are by no means limited to financial ones. They could be HR, Operational, Legal, IT application, ESG (as in this case), and more.<BR /> <BR /> The risk definition section is intuitive and comprehensive, with a summary and loss section at the top for a quick grasp of the state of the risk.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Risk-Definition-1.jpg" /></P><BR /> &nbsp;<BR /> <BR /> We document Causes and Impacts for the risk<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Cause-and-Impact-1.jpg" /></P><BR /> &nbsp;<BR /> <BR /> As well as the process and result of a risk assessment, based on the strength of treatment plans.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Treatment-Plan-1.jpg" /></P><BR /> By including this risk management module within FCM allows the use of automated control performance to be included in the risk assessment. In the example above the treatment measure "Reduction of high risk water-sourcing regions" is in fact one of the controls in the system. The control automatically interrogates S/4HANA, checking for suppliers from countries subject to failures due to increased occurrences of drought brought about by climate change.<BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Control-AP.jpg" /></P><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/AP-Found-Items.jpg" /></P><BR /> Business users can easily fine tune the logic in the procedure by editing parameters and thresholds for the automated procedure performance. They can also drill into the outputs and conduct thorough issue and remediation activities.<BR /> <BR /> &nbsp;<BR /> <BR /> It’s worth noting too that we have an integration between FCM and <A href="https://www.signavio.com/products/process-manager/" target="_blank" rel="nofollow noopener noreferrer">SAP Signavio Process Manager</A>, which means the business first line solution (Signavio) and assurance second line solution (FCM) automatically synchronize process and control information. I have discussed this in my <A href="https://blogs.sap.com/2023/04/25/automatically-synchronize-controls-and-processes-across-process-modelling-and-assurance/" target="_blank" rel="noopener noreferrer">blog about this integration</A>. And this leading edge integration has been nominated for an innovation award by <A href="https://www.grcworldforums.com/news-and-insights/the-risk-awards-2023-finalists-revealed/8932.article" target="_blank" rel="nofollow noopener noreferrer">#RISK Awards Team</A>.&nbsp;Of course we are looking at including risk in the integration<BR /> <BR /> &nbsp;<BR /> <H2 id="toc-hId-177839392"><STRONG>Benefits</STRONG></H2><BR /> The benefits of this new offering are simple but can be subtle, which in fact means they are sometimes complex to articulate with due importance. And there can be many which leads to a ‘listener fatigue’. But for the business and business users, they are real.<BR /> <BR /> Examples include:<BR /> <UL><BR /> <LI>Low total cost of ownership</LI><BR /> <LI>Simple infrastructure</LI><BR /> <LI>Short time to operationalize</LI><BR /> <LI>Smoother digitalization, finance/digital transformation</LI><BR /> <LI>Ease of use, intuitive user interface</LI><BR /> <LI>Standardised best practice approach</LI><BR /> <LI>Access to expanding consumable content</LI><BR /> <LI>Leverage SAP Business Technology Platform capabilities</LI><BR /> <LI>In line with SAP strategy, customer strategy</LI><BR /> <LI>Benefits from LLP and ML capabilities, future potential access to anonymized data</LI><BR /> </UL><BR /> &nbsp;<BR /> <H2 id="toc-hId--18674113"><STRONG>In Summary</STRONG></H2><BR /> Effective risk and control management is a fundamental requirement for the modern business - for performance, not only risk and compliance.<BR /> <BR /> Public cloud GRC software has real business benefits.<BR /> <BR /> SAP is here to support customers looking for a public cloud risk and control solution with deep integration to S/4HANA.<BR /> <BR /> And this journey is just going to get stronger. 2023-11-21T09:50:12+01:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/innovating-risk-management-envisioning-sap-s-4hana-cloud-and-ai-integration/ba-p/13575897 🌐 INNOVATING RISK MANAGEMENT: ENVISIONING SAP S/4HANA CLOUD AND AI INTEGRATION 🌐 2023-12-01T09:46:21+01:00 Alexander_Korne https://community.sap.com/t5/user/viewprofilepage/user-id/131930 <span class="lia-unicode-emoji" title=":rocket:">🚀</span> As a Product Manager deeply immersed in the realm of innovation, let's explore an exciting yet imaginary scenario— the integration of SAP S/4HANA Cloud with Artificial Intelligence for advanced risk management. Although currently a vision, the potential impact on business resilience is profound. <span class="lia-unicode-emoji" title=":robot_face:">🤖</span><BR /><BR />𝐓𝐡𝐞 𝐕𝐢𝐬𝐢𝐨𝐧𝐚𝐫𝐲 𝐁𝐥𝐞𝐧𝐝:<BR />Imagine SAP S/4HANA Cloud evolving into a strategic powerhouse by harmoniously integrating with AI algorithms to redefine how businesses approach risk management. The mission? To fortify organizations against uncertainties and drive informed decision-making. <span class="lia-unicode-emoji" title=":shield:">🛡</span>️<span class="lia-unicode-emoji" title=":briefcase:">💼</span><BR /><BR />𝐏𝐨𝐭𝐞𝐧𝐭𝐢𝐚𝐥 𝐓𝐫𝐚𝐧𝐬𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧𝐬:<BR /><span class="lia-unicode-emoji" title=":bar_chart:">📊</span> 𝘍𝘳𝘢𝘶𝘥 𝘋𝘦𝘵𝘦𝘤𝘵𝘪𝘰𝘯 𝘔𝘢𝘴𝘵𝘦𝘳𝘺: Envision AI scrutinizing financial transactions within SAP S/4HANA Cloud, detecting patterns indicative of potential fraud. It's not just about identifying risks; it's about thwarting them before they materialize. <span class="lia-unicode-emoji" title=":magnifying_glass_tilted_left:">🔍</span><span class="lia-unicode-emoji" title=":credit_card:">💳</span><BR /><BR /><span class="lia-unicode-emoji" title=":globe_with_meridians:">🌐</span> 𝘏𝘰𝘭𝘪𝘴𝘵𝘪𝘤 𝘙𝘪𝘴𝘬 𝘈𝘴𝘴𝘦𝘴𝘴𝘮𝘦𝘯𝘵: Picture AI analyzing diverse data sources, from market trends to supplier performance, providing a comprehensive risk assessment. It's a futuristic approach to risk management that goes beyond traditional boundaries. <span class="lia-unicode-emoji" title=":globe_with_meridians:">🌐</span><span class="lia-unicode-emoji" title=":chart_increasing:">📈</span><BR /><BR />𝐇𝐨𝐰 𝐭𝐡𝐞 𝐅𝐮𝐬𝐢𝐨𝐧 𝐔𝐧𝐟𝐨𝐥𝐝𝐬:<BR />1. 𝐈𝐧𝐭𝐞𝐥𝐥𝐢𝐠𝐞𝐧𝐭 𝐃𝐚𝐭𝐚 𝐀𝐧𝐚𝐥𝐲𝐬𝐢𝐬: Imaginative AI algorithms dissect vast datasets within SAP S/4HANA Cloud, identifying anomalies and potential risks.<BR />2. 𝐂𝐨𝐧𝐭𝐢𝐧𝐮𝐨𝐮𝐬 𝐋𝐞𝐚𝐫𝐧𝐢𝐧𝐠 𝐌𝐞𝐜𝐡𝐚𝐧𝐢𝐬𝐦: In this visionary scenario, AI continually learns from emerging patterns, adapting its risk assessment capabilities over time.<BR />3. 𝐏𝐫𝐨𝐚𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐌𝐢𝐭𝐢𝐠𝐚𝐭𝐢𝐨𝐧: Hypothetically, SAP S/4HANA Cloud becomes a hub where AI not only identifies risks but actively suggests mitigation strategies, empowering businesses to navigate uncertainties seamlessly. <span class="lia-unicode-emoji" title=":counterclockwise_arrows_button:">🔄</span><span class="lia-unicode-emoji" title=":locked:">🔒</span><BR /><BR />𝐈𝐧 𝐂𝐥𝐨𝐬𝐢𝐧𝐠:<BR />In the world of ERP and AI convergence, this scenario is a call to dream beyond the known. It's about innovating not just for today but for the challenges that tomorrow might bring. 2023-12-01T09:46:21+01:00 https://community.sap.com/t5/financial-management-blogs-by-sap/enhance-your-sap-experience-with-sap-approved-grc-ac-experts-through-the/ba-p/13574468 Enhance your SAP experience with SAP approved GRC AC Experts through the Ask an Expert Peer channel 2023-12-04T15:55:49+01:00 neerajmanocha https://community.sap.com/t5/user/viewprofilepage/user-id/45911 &nbsp;<BR /> <H1 id="toc-hId-834873351">What is Ask an Expert Peer?</H1><BR /> <P style="text-align: left"><A href="https://support.sap.com/en/my-support/product-support/ask-expert-peer.html" target="_blank" rel="noopener noreferrer">Ask an Expert Peer</A>&nbsp;lets you&nbsp;<STRONG>collaborate</STRONG>&nbsp;on your technical, product-related questions through one-on-one interactions with a qualified and approved expert&nbsp;<STRONG>outside</STRONG>&nbsp;of SAP. This channel is best to deliver fast issue resolutions for your basic, non-business critical questions and all&nbsp;<STRONG>low&nbsp;</STRONG>to&nbsp;<STRONG>medium&nbsp;</STRONG>priority cases. Ask an Expert Peer is currently available for&nbsp;<STRONG>SAP SuccessFactors</STRONG>&nbsp;and&nbsp;<STRONG>SAP ERP, SAP S/4 HANA, Technology, GRC &amp; Finance</STRONG>&nbsp;solutions&nbsp;at no additional cost.</P><BR /> More information, including expanded product areas for Ask an Expert Peer, can be found in&nbsp;<A href="https://me.sap.com/notes/2998816" target="_blank" rel="noopener noreferrer">KBA 2998816</A>.&nbsp; More details in <A href="https://blogs.sap.com/2023/10/05/ask-an-expert-peer-is-now-live-in-the-get-support-application-in-sap-for-me/" target="_blank" rel="noopener noreferrer">blog</A><BR /> <BR /> &nbsp;<BR /> <H1 id="toc-hId-638359846">Ask an Expert Peer channel is available for which GRC Product Areas?</H1><BR /> This channel is available for <STRONG>SAP Access Control</STRONG> and <STRONG>SAP Access Control for SAP S/4HANA</STRONG>.<BR /> <BR /> Experts are available for all sub-product functions of Access Control.<BR /> <BR /> Product Function includes:-<BR /> <OL><BR /> <LI>Emergency Access Management</LI><BR /> <LI>Business Role Management</LI><BR /> <LI>Access Risk Analysis</LI><BR /> <LI>Access Request Management</LI><BR /> <LI>Analysis and Reports</LI><BR /> </OL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Product_Function.png" /></P><BR /> &nbsp;<BR /> <H1 id="toc-hId-441846341">How to Access Ask an Expert Peer from SAP&nbsp;for&nbsp;ME?</H1><BR /> <UL><BR /> <LI>Logon to <A href="https://me.sap.com/" target="_blank" rel="noopener noreferrer">SAP for Me</A> with valid S user id. Navigate to <STRONG>Services &amp; Support</STRONG> and select <STRONG>Get Support</STRONG> App</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/SAP4ME.png" /></P><BR /> &nbsp;<BR /> <UL><BR /> <LI>Provide all basic information about your issue, System, Product and Product Function.</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Basic_info.png" /></P><BR /> &nbsp;<BR /> <UL><BR /> <LI>Based upon Product <STRONG>SAP Access Control</STRONG> / <STRONG>SAP Access Control for SAP S/4HANA </STRONG>selection, all available channels will be shown. Select button “Ask an Expert Peer” to launch the experience</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/AaEP.png" /></P><BR /> <BR /> <UL><BR /> <LI>Provide details about your issue and submit your question. A&nbsp;qualified and approved&nbsp;expert outside of SAP will work with you to resolve your case through a chat window.</LI><BR /> </UL><BR /> <P style="overflow: hidden;margin-bottom: 0px"><IMG class="migrated-image" src="https://community.sap.com/legacyfs/online/storage/blog_attachments/2023/11/Submit_Question.png" /></P><BR /> <BR /> <UL><BR /> <LI>If the expert is unable to resolve your question or you are not satisfied with the answer, you have the option to&nbsp;easily switch to another channel and interact with SAP support&nbsp;by starting&nbsp;<STRONG>Schedule an Expert&nbsp;</STRONG>or by submitting <STRONG>Case</STRONG>. The conversation transcript from Ask an Expert Peer will be saved, so there will be no duplication of effort for you.</LI><BR /> </UL><BR /> <H3 id="toc-hId-503498274"></H3><BR /> <H3 style="text-align: center" id="toc-hId-306984769"><STRONG>Start using Ask an Expert Peer</STRONG> <STRONG>today for all your&nbsp;</STRONG><STRONG>low&nbsp;</STRONG><STRONG>to&nbsp;</STRONG><STRONG>medium</STRONG><STRONG><BR /> priority incidents.</STRONG></H3><BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <BR /> &nbsp;<BR /> <BR /> &nbsp; 2023-12-04T15:55:49+01:00 https://community.sap.com/t5/financial-management-blogs-by-sap/sap-financial-compliance-risk-and-assurance-management-covers-much-more/ba-p/13586622 SAP Financial Compliance / Risk and Assurance Management covers much more than Finance 2024-01-30T11:14:37.797000+01:00 neil_patrick https://community.sap.com/t5/user/viewprofilepage/user-id/330209 <P><FONT size="5"><STRONG>Reset your Perception!</STRONG></FONT></P><P>First thing is to say is that SAP Financial Compliance Management&nbsp;has changed names to <FONT face="arial,helvetica,sans-serif"><FONT size="3">SAP Risk and Assurance Management (as of end February 2024).</FONT><FONT size="3">&nbsp;I'll use the new name in the rest of the blog.</FONT></FONT></P><P>But a new name isn’t going to be the thing that changes how the software can be used. That is determined by what the solution can do. This blog is aiming to reset your perception, and expectations, as to what RAM&nbsp;<EM>can already do</EM>.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="neil_patrick_0-1706608189388.jpeg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55760i0092D522F77F0171/image-size/medium?v=v2&amp;px=400" role="button" title="neil_patrick_0-1706608189388.jpeg" alt="neil_patrick_0-1706608189388.jpeg" /></span></P><P>RAM is now a strong generic internal controls solution. I have to say has grown leaps and bounds since it was first released to customers almost 3 years ago. I bring this up because:</P><UL><LI>With the rise in importance of the office of the CFO to business performance but also business advice and stakeholder management, finance is a very important topic for any business. It spans operations, planning and forecasting. It covers core finance but also for example IT and digital transformation.</LI><LI>While launched with the name SAP <EM>Financial</EM> Compliance Management, it was actually the baseline content SAP provided that focused on financial processes. It’s not a software design constraint.</LI><LI>And while it was called SAP Financial <EM>Compliance</EM> Management, since December 2023 it can also perform simple risk management, and crucially, link documented control performance to enable stakeholders to produce a more accurate and complete risk assessment.</LI></UL><P>So the software itself is more generic. And if one applies other LOB content/use cases, the software can do more. Hence the new name SAP Risk and Assurance Management. I hope to make that clear in this blog.</P><P><FONT size="5"><STRONG>What RAM can do already</STRONG></FONT></P><P>One of the interesting but subtle points to note is that RAM covers both first line and/or second line controls in the same solution. And I know as I typed the word control I am using it a bit loosely to also include what some people might call an exception report, rather than a control.</P><P>For example RAM can already:</P><UL><LI>Run one of its baseline content automated procedures as a first line business check. For example, checking if journal entries have been posted in a previously closed fiscal period: this could impact how quickly month end / quarter end / annual accounts can be closed. Or looking for blocked suppliers with open items: this could reduce production and/or revenue, or negatively impact supplier relationship.</LI><LI>Run one of S/4HANA’s control exception reports automatically and put it under a ‘governance process’ (assign an owner, raise issues if anything untoward is found, document remediation if required, make all this transparent for audit). This could be an exception report, or a control, or both!</LI><LI>Dive into the topic of tax compliance to help companies with their prefiling accuracy by automating tax compliance checks.</LI><LI>On top of this also perform second line activities for example test of effectiveness and test of design over the above examples.</LI><LI>Perform a survey / questionnaire / mixed format assessment.</LI><LI>Integrate automatically with Signavio Process Manager.</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="neil_patrick_1-1706608189438.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55762i6519F472C3C87BC8/image-size/medium?v=v2&amp;px=400" role="button" title="neil_patrick_1-1706608189438.png" alt="neil_patrick_1-1706608189438.png" /></span></P><P>&nbsp;</P><P><FONT size="5"><STRONG>What will be available soon</STRONG></FONT></P><P>We also have some exciting content updates, to further reinforce the additional breadth of RAM:</P><UL><LI>There are 8x latent IT controls SAP produced, which are deployed in S/4HANA, that RAM can make use of. They focus on S/4HANA user management (e.g. detect users that never logged in, detect expired and locked users that should be deleted). We will formally roll them into RAM baseline content as part of the S/4HANA 2408 release, but can already be used.</LI><LI>Next month as part of our S/4HNA 2402 release we will add to our baseline content with ESG, human rights due diligence and Fraud use cases. To show what is possible. We also plan to release a GDPR certification content pack.</LI><LI>Key to the RAM strategy is the ready to use content for S/4HANA. And our partners see this too. Across our energetic and innovative partner ecosystem there will soon be (weeks) content covering ESG as a more comprehensive stand-alone topic plus industry-specific content packs covering 12x industry verticals from Winterhawk. Turnkey have starter packs for RAM . There are a large library of tax compliance rules amongst the Big-4.</LI></UL><P>In terms of functional enhancements:</P><UL><LI>We will be adding an Asset object to RAM in the first half or 2024, thus extending the IT control (and risk) management capabilities. But of course this is a generic object that I expect can also be used for ESG-relevant assets, finance assets, data assets, and other physical assets (water and energy utilities, oil and gas, transportation etc.)</LI><LI>We will build an integration to SAP Document and Reporting Compliance during 2024.</LI><LI>We will build an integration to SAP Sustainability Control Tower during 2024.</LI><LI>We will add AI use cases.</LI></UL><P>&nbsp;</P><P><FONT size="5"><STRONG>Move up the Performance, Control, and Risk Maturity Curve</STRONG></FONT></P><P>There are obviously financial and rollout benefits of being able to cover more LOB use cases in a single solution.</P><P>But I also want to highlight what this can enable for the ‘digital first’ customers - those who are transitioning to a posture where internal information, processes, and customer experience is digitised and virtualised.</P><P>To drive performance (financial, operational, non-financial, legal etc.) with intentionality, processes, risks and controls if well managed will enable the business to catch and prevent any downstream impact to the organization or an end customer. Which is a true value add.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="3 levels.jpg" style="width: 629px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55796i14AA4F95262E40F7/image-dimensions/629x265?v=v2" width="629" height="265" role="button" title="3 levels.jpg" alt="3 levels.jpg" /></span></P><P>RAM can help the first line owning and managing risk via understanding and analysing the processes of the business, and ensuring adequate internal controls over [insert an LOB here] reporting. Supporting first line activities also helps the business grow and by nature is more forward-looking.</P><P>This is in addition to value protect activities such as compliance.</P><P>&nbsp;</P><P><FONT size="5"><STRONG>Summary</STRONG></FONT></P><P>With one single low TCO, short time to operationalize, easy to use public cloud solution RAM:</P><UL><LI>Can already technically cover finance, tax, IT, ESG, HRDD, fraud and data privacy</LI><LI>Will soon expand this to broad, and deep, content packs from our partner ecosystem</LI><LI>Can cover control and risk in the same solution, and automate controls</LI><LI>Provides transparency into the business</LI><LI>Helps the business improve performance, and provides real value add</LI></UL><P>That’s what I would consider a good return on investment.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="neil_patrick_3-1706608189479.png" style="width: 318px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/55763i4503836AFE44ADE0/image-dimensions/318x318?v=v2" width="318" height="318" role="button" title="neil_patrick_3-1706608189479.png" alt="neil_patrick_3-1706608189479.png" /></span></P><P>&nbsp;</P> 2024-01-30T11:14:37.797000+01:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/join-the-innovation-journey-with-sap-enterprise-threat-detection-cloud/ba-p/13592486 Join the Innovation Journey with SAP Enterprise Threat Detection, cloud edition 2024-02-04T19:00:00.037000+01:00 Lingscheid https://community.sap.com/t5/user/viewprofilepage/user-id/38175 <P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="I522482_0-1706876930170.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59265iA4A88683D5F2FC21/image-size/large?v=v2&amp;px=999" role="button" title="I522482_0-1706876930170.png" alt="I522482_0-1706876930170.png" /></span></P><P style=" text-align: center; ">Picture 1</P><P>&nbsp;</P><P>Embark on a Journey of Growth and Innovation and secure customers Businesses Now and Tomorrow with SAP Enterprise Threat Detection, cloud edition.</P><P>At a time when threats are constantly evolving, SAP Enterprise Threat Detection, cloud edition is a robust solution. We are pleased to announce our expansion journey and officially invite like-minded partners. Be part of our journey of progressive growth and innovation and take advantage of this exciting opportunity. Let's secure the digital landscape together and foster an environment that is not only secure but also conducive to innovation.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="287567_GettyImages-1194852020_medium_jpg.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59183i1439DC43B6C4E514/image-size/large?v=v2&amp;px=999" role="button" title="287567_GettyImages-1194852020_medium_jpg.jpg" alt="287567_GettyImages-1194852020_medium_jpg.jpg" /></span></P><P>&nbsp;</P><P> </P><P style=" text-align: center; ">Picture 2</P><H2 id="toc-hId-965743590">&nbsp;</H2><H2 id="toc-hId-769230085">Current State of application security &amp; corporate compliance</H2><P>The need for robust cybersecurity measures has been amplified by our increasingly digital economy. Statistics reveal that 81% of data breaches result from lost, stolen, or weak passwords, of which three-quarters are instigated by outsiders. Alarmingly, a quarter of these breaches are carried out from within the organizations showing that cybersecurity threats do not solely exist externally but also pose a significant internal risk that demands attention.</P><H2 id="toc-hId-572716580">&nbsp;</H2><H2 id="toc-hId-376203075">Increasing Importance of Cybersecurity</H2><P>Organizations now readily recognize the relevancy of their cybersecurity posture, with 64% rating it as either important or very important. These businesses understand the integral link between a robust cybersecurity framework and reduced risk of data breaches for all involved - employees, customers, and partners. As many as 65% of the organizations acknowledge this correlation in our intensively digitized business world, where data security is of paramount significance.</P><H2 id="toc-hId-179689570">&nbsp;</H2><H2 id="toc-hId--16823935">The Talent Gap</H2><P>However, a considerable challenge remains - the acute scarcity of security talent in the industry. A staggering 87% of organizations are struggling with a shortage of cybersecurity specialists. As a result, the number of global cybersecurity job vacancies has drastically increased by an impressive 350%, from 1 million in 2013 to an anticipated 3.5 million in 2021. With the increasing proliferation, sophistication, and scale of cybercrimes, this glaring lack of qualified talent creates a significant hurdle for businesses globally.</P><H2 id="toc-hId--213337440">&nbsp;</H2><H2 id="toc-hId--409850945">Cost of Cybercrime</H2><P>From a broader perspective, the extraction of an alarming $6 trillion annually from the global economy due to cybercrime reinforces the severity and urgency of reinforcing cybersecurity measures. It is worrying to find that only a mere 38% of organizations can proactively spot risks before they develop into serious threats.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture1.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59161i4BB9B02FB95DDDF3/image-size/large?v=v2&amp;px=999" role="button" title="Picture1.png" alt="Picture1.png" /></span></P><P>&nbsp;</P><P style=" text-align: center; "> Picture 3</P><H2 id="toc-hId--606364450">&nbsp;</H2><H2 id="toc-hId--802877955">Cybersecurity as a Business Risk</H2><P>Cybersecurity, once considered a specialized branch and an IT domain challenge, has escalated to command serious attention at executive levels within organizations. Recent data show that a substantial 88% of board members view cybersecurity as a critical business risk, marking a significant shift from 2016 figures - when only 58% shared the same view. This shift signifies a growing seriousness about cyber threats and their potential to impact businesses at large.</P><H2 id="toc-hId--652137103">&nbsp;</H2><H2 id="toc-hId--848650608">Security and Compliance</H2><P>Importantly, it must be noted that organizations cannot be compliant without establishing thorough security measures. Compliance to industry standards and regulatory requirements, while providing a guide, cannot alone ensure security. It is insufficient to just adhere to compliance checklists. The rising surge in cybersecurity threats calls for more elaborate and dynamic security protocols, which go well beyond basic compliance frameworks.</P><H2 id="toc-hId--1045164113">&nbsp;</H2><H2 id="toc-hId--1241677618">The Impact of Security Inadequacies</H2><P>Failures in the security domain can render organizations susceptible to cyber-attacks, breaches, and violations, inevitably affecting compliance outcomes. These cyber risks disrupt business processes, putting at risk confidential and sensitive information and thus impacting overall compliance with industry standards. Hence, it is fundamental for an organization to incorporate security measures not merely for compliance, but to safeguard vital assets, secure data, uphold reputation and provide assurance to stakeholders.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="I522482_0-1706870023644.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59172i95C816A7B4B1902D/image-size/large?v=v2&amp;px=999" role="button" title="I522482_0-1706870023644.png" alt="I522482_0-1706870023644.png" /></span></P><P>&nbsp;</P><P style=" text-align: center; ">Picture 4</P><H2 id="toc-hId--1438191123">&nbsp;</H2><H2 id="toc-hId--1634704628">Embedding Security into Organizational Fabric</H2><P>Therefore, if compliance is the goal, weaving security into the very fabric of an organization is essential. This necessitates transforming approaches to view cybersecurity as an inherent part of the business strategy, thus amplifying overall compliance and resilience to cybersecurity threats.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="I522482_0-1706869392485.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59163i0B38AE7785F7F2C9/image-size/large?v=v2&amp;px=999" role="button" title="I522482_0-1706869392485.png" alt="I522482_0-1706869392485.png" /></span></P><P>&nbsp;</P><P style=" text-align: center; ">Picture 5</P><P> </P><H2 id="toc-hId--1831218133">Benefits of leveraging SAP Enterprise Threat Detection</H2><P>SAP Enterprise Threat Detection (ETD), cloud edition, is a cutting-edge SAP Business Technology Platform Software-as-a-Service (SaaS) solution. Moreover, it incorporates managed services from SAP or one of our specialized partners, dedicated to identifying, analyzing, and reporting malicious activities in your SAP applications before they can inflict serious damage.</P><P>Along with presenting a detailed audit trail of all activity and detecting anomalies, ETD provides best practice advice for monitoring SAP applications. It also aids companies in complying with onerous regulatory requirements such as those outlined in the EU's NIS2 directive, the RCE, KRITIS, General Data Protection Regulation (GDPR), as well as various local security laws.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture3.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59165iA5C93228E53DC468/image-size/large?v=v2&amp;px=999" role="button" title="Picture3.png" alt="Picture3.png" /></span></P><P>&nbsp;</P><P style=" text-align: center; ">Picture 6</P><H2 id="toc-hId--2027731638">&nbsp;</H2><H2 id="toc-hId-2070722153">The Power of Partnership</H2><P>As we, at SAP, expand our product and service horizons, we're inviting partners to join us on our journey of growth and innovation. We fervently believe that by synergizing our individual proficiencies and skills, we can significantly advance the way we serve our clients and deliver unparalleled value, not just to our direct customers, but to partners' customers as well.</P><P>By partnering with SAP, you as partner receive multi-fold strategic benefits. To start with, you can take advantage of our advanced cybersecurity solution which will instantly enable you to augment your service propositions and boost client confidence. <SPAN>With this service, your customers will benefit profoundly as it offers more than just data protection. It equips them with strengthened security measures, significantly reducing their threat to potential breaches. Plus, it delivers an invaluable sense of tranquility, knowing that their data is safeguarded. This secure atmosphere fosters trust and confidence, allowing your customers to focus on growing their businesses, rather than worrying about data security. Moreover, it elevates their experience with your partnership, reinforcing your reputation as a reliable, secure provider.</SPAN></P><P>On top of this, leveraging SAP's extensive global network, you can amplify your reach in the market, acquire access to untapped industry sectors and widen your customer base. The sheer magnitude of our network ensures that associating with us instantly lends an additional layer of trust and reassurance to your customers, thereby bolstering their already existing confidence in your services.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="I522482_0-1706869883422.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/59169iB485FFAC0CBF0532/image-size/large?v=v2&amp;px=999" role="button" title="I522482_0-1706869883422.png" alt="I522482_0-1706869883422.png" /></span></P><P>&nbsp;</P><P style=" text-align: center; ">Picture 7</P><H2 id="toc-hId-1874208648">&nbsp;</H2><H2 id="toc-hId-1845878834">Exploring New Opportunities</H2><P>But that's not all! Your engagement with SAP Enterprise Threat Detection, cloud edition equips you with the resources to create unique security services and solution offerings tailor-made to address your customers requirements and objectives. This could take the form of customized managed security services, expert compliance and security consulting, or portfolio optimization. It opens up the gateway to innovative security opportunities, empowering you to stay abreast of competition and offer forward-looking, cutting-edge solutions to your customers.</P><P>&nbsp;</P><H2 id="toc-hId-1649365329">Getting in Touch &amp; Moving Forward</H2><P>To explore potential collaboration, receive more information, or simply discuss synergies, feel free to reach out to <A href="mailto:tobias.keller@sap.com" target="_self" rel="nofollow noopener noreferrer">Tobias Keller</A> or <A href="mailto:%20a.lingscheid@sap.com&nbsp;" target="_self" rel="nofollow noopener noreferrer">Arndt Lingscheid</A>.</P><P>Our doors (and inboxes) are always open to engaging discussions on combating cybersecurity threats together.</P><P>Explore our <A href="https://partneredge-prod-author.wcms-prod.c.eu-de-2.cloud.sap/content/partnerexp/en/products/etd/about.html" target="_self" rel="nofollow noopener noreferrer">SAP Enterprise&nbsp;Threat Detection Partner Portal</A>&nbsp; to delve deeper into our product and partnership framework.</P><P>We, at SAP, wholeheartedly invite all entities who are serious in their quest to enhance their cybersecurity strategies. Together, we can augment our defenses against the incessant tide of cyber threats and build a safer, resilient digital economy. Let's rise to the challenge, together.</P><P><A href="https://pages.community.sap.com/topics/enterprise-threat-detection" target="_blank" rel="noopener noreferrer">SAP Enterprise Threat Detection | SAP Community</A></P> 2024-02-04T19:00:00.037000+01:00 https://community.sap.com/t5/technology-blogs-by-members/grc-risk-management-series-risk-analysis-profile/ba-p/13657284 GRC Risk Management Series: Risk Analysis profile 2024-04-07T18:00:00.031000+02:00 plaban_sahoo6 https://community.sap.com/t5/user/viewprofilepage/user-id/245157 <P>This article provides a conceptual overview of the Risk Analysis measurement through 'Analysis' and 'Response' calculations. A pre-requisite to this article is to have a basic understanding on the building blocks of Risk Management, such as Probability, Speed of Onset, Impact, etc.</P><P>We will begin with determining the 'Analysis'. And then will proceed to 'Response'.</P><P><U>Calculation of 'Analysis'</U></P><P>Risk Management in GRC is based on a hierarchical model, where Risks are associated with Activities. An Activity can be thought of as an assignment which an organization undertakes. Eg. Data Processing of EU countries. Activities are grouped into categories. Let's say EU projects.</P><P>And each Activity Category is assigned with a Risk Category. A Risk category is created under the work-center Master Data &gt; Risk and Responses&gt; Risk Catalog.&nbsp; A Risk category requires an 'Analysis profile' to be assigned to it.&nbsp;</P><P>So, let us begin the calculation by understanding from the basic unit of Analysis Profile.</P><P>An Analysis profile is defined in SPRO &gt; Governance Risk and Compliance &gt; Risk Management &gt; Risk and Opportunity Analysis . The important governing factors for an analysis profile are Probability and Impact.</P><P>These 2 factors can of the type Qualitative, Quantitative, scoring, Three-point analysis, etc. Here we will consider Quantitative and Three-point analysis for determining the Risk level.</P><P><U>Three-point Analysis</U> This approach considers customizable %age for 3 scenarios: Min., Average and Max.&nbsp;</P><P><U>Example</U> in the case of a financial loss the %age definition such as 25, 50 and 25 , respectively for the above 3 scenarios will determine the Total loss.&nbsp;</P><P><U>Calculation of 'Response'</U> : A Response is an action taken against a Risk and are of the types: Mitigate, Accept, Transfer, etc. The amount of loss mitigated through this Response is subtracted from the Total loss(calculated through 'Analysis') resulting in the Residual Loss.&nbsp;</P><P>The amount(in currency) mitigated is defined under 'Mitigation' in tab Response(for the Risk). The '<STRONG>Completeness</STRONG>' and '<STRONG>Effectiveness</STRONG>' are 2 other factors which determine the Residual loss. Therefore, there are 2 types of Residual Loss. One is the present Residual Loss. The other is when the Response is fully completed and therefore is termed Planned Residual Loss.</P><P><U>Example</U>: Response defined with a Completeness of 50% will consider half of the amount(monetary) mentioned under the Response/Mitigation for the present Residual loss. While the planned Residual loss will consider completion at 100% and therefore the entire amount define under Mitigation is considered.&nbsp;</P><P>'Effectiveness' also determines the residual loss. Such as 'Very Effective' considers&nbsp; the entire monetary amount defined in Mitigation, while Effective considers 50% of the amount.&nbsp;&nbsp;</P><P>Below figure shows calculation of Analysis and Mitigation, resulting to net Residual loss and Residual loss(Planned)</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Completness- 50, Effectivenss -VeryEffective.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91932i6B75617D07BF308A/image-size/large?v=v2&amp;px=999" role="button" title="Completness- 50, Effectivenss -VeryEffective.png" alt="Completness- 50, Effectivenss -VeryEffective.png" /></span></P><P>There can be other scenarios such as where the probability-reduction is 10% when Mitigation is applied.&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Completness- 50, Effectivenss -VeryEffective Probabilty reduction 10.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92281i1F081F487FCB56E1/image-size/large?v=v2&amp;px=999" role="button" title="Completness- 50, Effectivenss -VeryEffective Probabilty reduction 10.png" alt="Completness- 50, Effectivenss -VeryEffective Probabilty reduction 10.png" /></span></P><P>&nbsp;</P><P>The above provides a basic understanding of Risk Measurement. The other elements on Risk Management will be shared in different articles.</P><P>Please share your comments and suggestions.</P><P>&nbsp;</P> 2024-04-07T18:00:00.031000+02:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/influence-the-development-of-sap-enterprise-threat-detection-cloud-edition/ba-p/13687244 INFLUENCE THE DEVELOPMENT OF SAP ENTERPRISE THREAT DETECTION, CLOUD EDITION 2024-05-03T06:40:10.948000+02:00 KirtiSingh01 https://community.sap.com/t5/user/viewprofilepage/user-id/1447958 <P>Introducing influence page for SAP Enterprise Threat Detection, cloud edition.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KirtiSingh01_2-1714475829296.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103858i767BFD6748C29B56/image-size/large?v=v2&amp;px=999" role="button" title="KirtiSingh01_2-1714475829296.png" alt="KirtiSingh01_2-1714475829296.png" /></span></P><P>The SAP Enterprise Threat Detection product team are inviting customers and partners to share their feedback and ideas to enhance our solution.</P><P>On <A href="https://influence.sap.com/sap/ino/#/campaign/3606" target="_blank" rel="noopener noreferrer">SAP Enterprise Threat Detection, cloud edition Influence page</A> you can see all submitted requests, submit your improvement requests, vote and comment on other ideas.</P><P>The rationale and advantages of a customer influence page include:</P><UL><LI>Augmenting customers engagement and influence on product features.</LI><LI>Improving product/services using meaningful customer insights.</LI><LI>Cultivating an engaged community.</LI><LI>Serving as a central platform for customer suggestions and fueling innovation.</LI></UL><P>The product team regularly evaluates the ideas and considers them for roadmap planning. Votes help to priorities ideas along with other important selection criteria such as:</P><UL><LI><STRONG>DESIRABILITY</STRONG>: How many customers voted for this? How many customers will benefit from it?</LI><LI><STRONG>VIABILITY</STRONG>: Is this Improvement Request globally relevant? Is this in alignment with SAP’s strategy for the product?</LI><LI><STRONG>FEASIBILITY</STRONG>: Is the development effort realistic? Is this request achievable within the product’s architecture?</LI></UL><P>While this page is mainly for the public cloud edition, for private cloud and on-premise versions feel free to propose integration-related ideas.</P><P><STRONG>Follow the steps below to get access</STRONG>&nbsp;and start sharing your enhancement ideas:</P><UL><LI><STRONG>Go to</STRONG>&nbsp;<A href="https://influence.sap.com/sap/ino/#/campaign/3606" target="_blank" rel="noopener noreferrer">SAP Enterprise Threat Detection, cloud edition Influence page</A><U>.</U>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<UL class="lia-list-style-type-circle"><LI>In case you are a new user, create a user account using S-User-ID and accept the Terms of Use. Once the user is created you activate SSO and can access without any interruption.</LI></UL></LI></UL><UL><LI><STRONG>Follow&nbsp;</STRONG>the session to get notified of new Improvement Requests and blogs.</LI><LI><STRONG>Vote</STRONG>&nbsp;and&nbsp;<STRONG>comment</STRONG>&nbsp;on Improvement Requests posted by other customers/ partners.</LI><LI><STRONG>Submit</STRONG>&nbsp;new Improvement Requests.</LI></UL><P>You can also check out the videos\link below, if you wish to learn more about SAP Continuous Influence and how to submit and manage improvement requests:</P><UL><LI><A href="https://www.sap.com/assetdetail/2019/06/145793d7-517d-0010-87a3-c30de2ffd8ff.html" target="_blank" rel="noopener noreferrer">How to get started and navigate on the Customer Influence Site</A></LI><LI><A href="https://www.sap.com/assetdetail/2018/11/08f0cc5e-277d-0010-87a3-c30de2ffd8ff.html" target="_blank" rel="noopener noreferrer">How to submit an improvement request</A></LI><LI><A href="https://www.sap.com/about/customer-involvement/influence-adopt.influence-opportunities.html#join-customer-influence" target="_blank" rel="noopener noreferrer">SAP Customer Influence and Adoption main info page</A></LI></UL><P>Please reach us at <A href="mailto:SAP-ETD@sap.com" target="_blank" rel="noopener nofollow noreferrer">SAP-ETD@sap.com</A> in case of any issue.</P><P>We look forward to seeing your ideas and further improve our software as we move forward.</P> 2024-05-03T06:40:10.948000+02:00