Learn to streamline User Provisioning process in Oracle Applications with workflows

Similar documents
Leverage T echnology: Turn Risk into Opportunity

Rapidly Reduce Segregation of Duty Violations in Oracle EBS R12 Responsibilities Session ID#: 15042

Rapidly Reduce Segrega/on of Duty Viola/ons in Oracle EBS R12 Responsibili/es

Global car and heavy equipment rental company, improves employee productivity with ERP Role Designer/Monitor

Leverage T echnology: Move Your Business Forward

Leverage T echnology: July 19 th, 2013 Adil Khan. Move Your Business Forward. Copyright. Fulcrum Information Technology, Inc.

Leverage T echnology: Turn Risk into Opportunity

Leverage T echnology: Turn Risk into Opportunity

Secure Your ERP Environment with Automated Controls Naomi Iseri,Sr. GRC Solution Consultant

Why Oracle GRC with every E-Business Suite Upgrade

RSA Identity Management & Governance

Neues von der Oracle Identity Governance Suite. Dr. Stephan Hausmann

Achieve Continuous Compliance via Business Service Management (BSM)

The Next Level of Controls Automation: How you can fully automate controls testing in financial systems by combining MetricStream and IRC

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Securing Your Business in the Digital Age

Employee Lifecycle Management in an R12 World

Continuous Controls Monitoring for Transactions: The Next Frontier for GRC Automation

SOLUTION BRIEF RSA IDENTITY GOVERNANCE & LIFECYCLE SOLUTION OVERVIEW ACT WITH INSIGHT TO DRIVE INFORMED DECISIONS TO MITIGATE IDENTITY RISK

Minimizing fraud exposure with effective ERP segregation of duties controls

Identity Governance and Administration

Fulfilling CDM Phase II with Identity Governance and Provisioning

TREASURY. INTEGRITY SaaS

Jeff Carpenter Authentication and Access Specialist RSA, The Security Division of EMC. Copyright 2015 EMC Corporation. All rights reserved.

Application Security Best Practices in an Oracle E- Business Suite Environment

ORACLE ADVANCED FINANCIAL CONTROLS CLOUD SERVICE

Making intelligent decisions about identities and their access

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Detect. Resolve. Prevent. Assure.

Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions

Identity is Everything

Oracle Risk Management Cloud. Release 13 (updates 18A 18C) What s New

Agenda. Manage the Risk of Inefficiency and Occupational Fraud in Day-to-Day Business Processes

Certified Identity Governance Expert (CIGE) Overview & Curriculum

Take Identity and Access Management to the Next Level Securely. Matthew Pecorelli

Simplify and Secure: Managing User Identities Throughout their Lifecycles

Towards continuous monitoring of segregation of duties

ORACLE ADVANCED ACCESS CONTROLS CLOUD SERVICE

Brainwave USER ACCESS REVIEW CERTIFICATION AND RECERTIFICATION IN A NUTSHELL

Oracle Identity & Access Management

Infor Risk & Compliance Monitor and control risk across your business

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

41880 Introduction to Hyperion Financial Management. Mike Malwitz Director Product Strategy Oracle Enterprise Performance Management

DRAFT. Fusion ERP Cloud Service October Oracle Fusion ERP Cloud Service. Magdalene Ritter

Streamlining Access Control for SAP Systems

Proactively Managing ERP Risks. January 7, 2010

Fastpath. Innovation in User Experience for Automated Controls SOLUTIONPERSPECTIVE EXPERIENCE. November 2017

AGENDA USING CONTINUOUS CONTROLS MONITORING TO MAXIMIZE P2P CONTROLS & RISK PREVENTION. Welcome! 60-second FISCAL Overview. Change in Purchase-to-Pay

Howto Approach Identity Management?

Identity and Access Management

Mastering new and expanding financial services regulations and audits

The two sides of managing Identity Risk

RouteONE Helping enhance the real value from SAP GRC Access Control

CHOOSE THE RIGHT IDENTITY & ACCESS MANAGEMENT SOLUTION

Securely Yours LLC. Identity and Access Management (IAM) IAM in a Cloud Auditing Guidelines IIA Detroit Chapter September 8, 2009

Top 10 SAP audit and security risks: Securing your system and vital data

Configure Innovate Automate Streamline. For a Best-in-Class Enterprise. smarterp.com smartonboarding.com analytics.smarterp.com

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

An Oracle White Paper March Access Certification: Addressing and Building On a Critical Security Control

WORKSHOP 84 STREAMLINING COMPLIANCE THROUGH GRC INTEGRATING A-123 UPDATES AND MORE!

What does an external auditor look for in SAP R/3 during SOX 404 Audits? Ram Bapu, CISSP, CISM Sandra Keigwin, CISSP

Reining in Maverick Spend. 3 Ways to Save Costs and Improve Compliance with e-procurement

OAUG / DOAG SIG DAY Vienna Sept 27 th 2010 Oracle Governance Risk and Compliance OAUG. August 2010

Compliance Management Solutions from Novell Insert Presenter's Name (16pt)

RSA. Sustaining Trust in the Digital World. Gintaras Pelenis

Sustainable Identity and Access Governance

An Oracle White Paper April Developers and Identity Services - Bridging Usability and Transparency with Role Provider Service

Infor Risk and Compliance for CDM Phase 2: Automate, integrate, manage, and report across your enterprise

Smart strategies for difficult times - Oracle roadmap to management excellence

A Financial Executive s Guide to Internal Controls & Fraud Prevention in the Cloud

October 4, Welcome. Dustin Grosse CMSO

Source-to-pay: Delivering value beyond savings

White Paper. Why Now s the Time to Convert from Oracle Hyperion

The 7 Tenets of Successful Identity & Access Management

Identity & Access Management Enabling e-government. Identity & Access Management (IAM) Defined

Identity and Access Management. Program Primer

October 16, Introduction. Ryan Duguid Chief Evangelist

Compliance in Multiple Regulatory Settings. a Holistic Approach

Security Convergence for the Smarter Grid

TABLE OF CONTENTS DOCUMENT HISTORY

Top 10 SAP audit and security risks

Utilizing Oracle Standard Functionality and other Oracle tools to comply with Sarbanes- Oxley By Olga Johnson City of Detroit

Sage X3 for Food & Beverage

SAP Road Map for Governance, Risk, and Compliance Solutions

Configure Innovate Automate Streamline. For a Best-in-Class Enterprise. smarterp.com smartonboarding.com analytics.smarterp.com

Slide GXS, Inc.

Source-to-pay: Delivering value beyond savings

September 19, 2007 San Francisco Chapter

Are you prepared to deal with the exposures associated with an Oracle ERP related breach?

OneShield Life Solution for Private Placement Life Insurance (PPLI)

Oracle Enterprise Governance, Risk and Compliance. Release Notes Release Part No. E

Oracle Identity Governance 11g R2: Essentials

At the Heart of Connected Manufacturing

REPORT 2014/115 INTERNAL AUDIT DIVISION. Audit of information and communications technology management at the United Nations Office at Geneva

Oracle Tax Reporting Cloud

Enterprise Performance Management

Oracle Fusion Cloud Vs EBS Upgrade: What suits your business best

Critical Components to a Successful Multi-pillar Cloud Implementation

Oracle Cloud ERP - Oil and Gas Industry Enabler for Digital Finance Transformation

Transcription:

Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Learn to streamline User Provisioning process in Oracle Applications with workflows A Leader in Risk Based Enterprise Controls Management Solutions Risk and Compliance Financial Reporting Internal Audit Controls Catalog Application Security Advanced Analytics Monthly Educational Webinar Series Adil Khan, Managing Director Feb 16, 2017 Leverage Technology: Turn Risk into Opportunity

Agenda Streamline User Provision in Oracle Apps Introduction User Provisioning Overview Access Policy Compliance Oracle User Security Assignment Self Service User Provisioning Process Case Study Q&A Page 2

Agenda Streamline User Provision in Oracle Apps Introduction User Provisioning Overview Access Policy Compliance Oracle User Security Assignment Self Service User Provisioning Process Case Study Q&A Page 3

Proven Expertise FulcrumWay Insight Global Thought Leadership Oracle Cloud London Feb 1-2 GRC Round Table, London, UK Educational Webinar Mar 23 rd Controls Monitoring Continuous Oracle Cloud Australia March GRC Round Table, Sydney, Australia Collaborate 17 April 2-6 Las Vegas GRC Open House Educational Webinar April 20 th Internal Audit Management with Advanced Control Analytics Oracle Open World October 1-5 Mascone West, San Francisco, CA Gitex October 8-12 GRC Round Table, Dubai UAE Oracle UK Users Group December GRC Round Table, Birmingham, UK Oracle Connect Africa October GRC Round Table, South Africa Page 4

Successful Track Record Government Oil and Gas FulcrumWay Client Studies Financial Services Retail Communications Manufacturing Transportation Natural Resources Media/Entertainment Healthcare High Tech Life Sciences Page 5

Agenda Streamline User Provision in Oracle Apps Introduction User Provisioning Overview Access Policy Compliance Oracle User Security Assignment Self Service User Provisioning Process Case Study Q&A Page 6

User Provisioning Process Process Hundreds of user add, change, deletes requests every day Inconsistent, ad-hoc and manual processes platform dependent Disparate provisioning tools and workflows Many human touch points: business managers, help desk, IT, etc Challenges No consistent policy enforcement No common controls or audit trail Very difficult to ensure compliance and assess risk Current Challenges Page 7 Portal Email Help Desk Provisioning Paper form IT Admin

User Provisioning Process User Access Common Source of Internal Abuse A Top Focus for IT Audits Gartner survey: 44% of IT audit deficiencies are IAM-related #1 area requiring remedial action Orphan Accounts Poor de-provisioning High risk of sabotage, theft, fraud PROTECTED Information Entitlement Creep Accumulated privileges Potential toxic combinations Increased risk of fraud Ernst & Young: 7 of Top 10 control deficiencies relate to user access control Rogue Accounts Fake accounts created by criminals Undetected access and activity Data theft, fraud, and abuse Privileged Users Users with keys to kingdom Poor visibility due to shared accounts Page 8

Agenda Streamline User Provision in Oracle Apps Introduction User Provisioning Overview Access Policy Compliance Oracle User Security Assignment Self Service User Provisioning Process Case Study Q&A Page 9

Access Policy Role Definition Privliges Page 10 10

Access Policy Components of access policy Source: Fusion Applications - Role Based Security, Kiran Mundy, Nigel King, Oracle Fusion Page 11 11

Access Policy Complicated Security Model High Risk of Access Control Deficiencies User Responsibility Evaluate User Access Test by User Test by Privilege Menu Manage Segregation of Duties Identify incompatible Privileges Predefined & Extensible SOD Rule Sets Function Form Page 12

Access Policy Management Control Assessment q Is ERP system access protected? q Do we conform to access policy? q Are we responding to risk Incidents? Compliance Checklist Inability to translate corporate governance into actionable IT policy Segregation of Duties Data Privacy policy Access Controls Testing Email or spreadsheet-based Human error, inconsistencies Data is hard to obtain, missing No ability to manage identity through a business lens Lack of transparency IT / Identity data not understood by the business Page 13

Agenda Streamline User Provision in Oracle Apps Introduction User Provisioning Overview Access Policy Compliance Oracle User Security Assignment Self Service User Provisioning Process Case Study Q&A Page 14

User Security Assignment Oracle EBS Access Provisioning Oracle EBS User User is assigned to the HR Record Menu has many functions / forms Active/Inactive User A Responsibility has many Menus and Sub-Menus Password Policy One or more responsibilities assigned to a User Page 15

User Security Assignment Access Policy Violations are costly to remediate after provisioning Root Cause Analysis is required for remediation! User: John Doe Responsibility: Payables Manager, US Menu: AP_Navigate_GUI12 What if we exclude Invoice Batches from AP_Invoices_Entry? Submenu: AP_Invoices_Entry Function: Invoice Batches SubMenu: AP_Invoices_Entry SubMenu: AP_Invoices_GUI12_G Menu: UK_AP_Navigate_GUI12 Responsibility: Payables Supervisor Menu: AX_Payables_User Responsibility: Payables User Page 16 User: Mike Jones Payables Users

Agenda Self Service User Provisioning in Oracle Introduction Identity Governance Overview Access Policy Compliance Oracle User Security Assignment Self Service User Provisioning Process Case Study Q&A Page 17

Page 18

User Provisioning Process Risk Based Approach to Access Management Regulatory Reporting Provisioning Life-cycle Business Tacking & Reporting Access Analytics Roles Management Provisioning Violation? Monitoring Risk & Model Workflow Directory for user provisioning process Self Service Actions Help Desk Security Policy Evaluation Page 19 Users

User Provisioning Process Self Service Access Management Move from fragmented approaches to centralized visibility and control Automate identity controls and business processes A business-friendly layer linking business users and processes to underlying technology and technical users Actively measures and monitors risk associated with users and resources Page 20

Agenda Self Service User Provisioning in Oracle Introduction Identity Governance Overview Access Policy Compliance Oracle User Security Assignment Self Service User Provisioning Process Case Study Q&A Page 21

Case Study Our Client A leading global supplier of drivetrain, mobility, braking and aftermarket solutions for commercial vehicle and industrial market With more than a 100-year legacy of providing innovative products to customers around the world Challenges Replace multiple legacy systems with one ERP solution Improved Segregation of Duty controls within mission critical applications Maintain consistent ERP system access roles across the subsidiaries leveraging the shared services model Increase external auditor s reliance on ERP Access Controls Monitoring Solutions Roles Manager/Advanced Self Service A Leading Global Auto Manufacturer Improves User Access Management across multiple ERP instances Results: Reduce User provisioning time by identifying and eliminating 80% manual steps resulting in over $50,000 annual cost savings in Audit and Remediation Costs Created access policies to ensure compliance during user provisioning process. Lowered ERP Total Cost of Ownership by reducing SoD remediation time and costs by ensuring that all users a assigned only the pre-approved Roles Improve SoD and Access Controls testing time by providing auditors the access log reports showing all Update, Review and Approve Role design changes. Accelerated ERP Access Approval time by identifying valid SOD conflicts before the Roles are assigned to Users. Page 22

Case Study User Provisioning Challenges Do the ERP Roles meet requirements for all users? Is access to sensitive data and functions protected? Do you maintain audit trail on ERP configuration controls? Does User provisioning prevent security policy violations? How do you detect Segregation of Duty policy violations? Can you prevent unauthorized Master Data changes? How do you monitor superuser activities? Do you obtain user access verification from managers, periodically? How do you ensure that terminated employees can t access ERP? Page 23

iaccess A Risk Based Approach to User Provisioning Employee/ Manager List Test Access Policy Add/ Update Role Application Access Rules Active Employee Users User Registration Request Roles Process Approval Request Add/ Update User Monitor Application Access Rules Manager DataProbe ETL iaccess Rules Manager Workflow DataProbe ETL Dashboard IS Security/ Audit/Compliance Network User List (AD) Requesters / Approvers Application Administrator IS Security Page 24

Case Study Discover User Activities and Improve Productivity Enhance security, improve helpdesk productivity, reduce support costs Analyze User Access Rights Design and Manager User Roles Configure Application Security Control Data Access Deploy Role Configuration Provision Roles to Users Grant Emergency Access (Fire Fighter ID) Certify User-Role Assignment Page 25

SOD Rules SafePaaS Capabilities Can be developed or deployed from FulcrumWay s Controls Catalogue Page 26

User Provisioning User Registration Page 27

User Provisioning User Registration Page 28

User Provisioning User Registration Page 29

User Provisioning User Registration Page 30

User Provisioning User Application Role Request Page 31

User Provisioning User Application Role Request Page 32

User Provisioning User Application Role Request Page 33

User Provisioning User Application Role Request Page 34

Risk Analytics Analyze ERP Risks with Analytics Use Adhoc Reporting to establish scope, analyze issues, remove false positives and exceptions Page 35

Roles Redesign SafePaaS Capabilities Page 36

Agenda Self Service User Provisioning in Oracle Introduction Identity Governance Overview Access Policy Compliance Oracle User Security Assignment Self Service User Provisioning Process Case Study Q&A Page 37

Q & A Sign-up for FREE 14 Days Evaluation Register online to try out SafePaaS Page 38