Application Access Controls Governor Implementation Guide 8.2.0
Application Access Controls Governor Implementation Guide 8.2.0
Application Access Controls Governor Implementation Guide 8.2.0
Diagnostic Steps
Application Access Controls Governor has been designed to be incredibly scalable by
means of hardware configurations. This means AACG performance can often be
improved via a hardware change rather than an AACG software change.
Touch points of AACG include several areas that span hardware, software, and network
variables. Refer to the Hardware Platform Requirement document for the preferred and
supported hardware configurations.
Any deviation from these recommendations may result in unforeseen issues and would
cause additional time and require additional resources during implementation of AACG.
It is highly recommended during implementation planning that sufficient time be
allocated for setting up, testing, and troubleshooting environment-specific issues that
commonly occur with the many combinations of environments available.
The following is a high-level recommendation for diagnostic steps during environment
setup and implementation:
1 Work with Oracle consulting or a partner service provider to evaluate your environ-
ment and options for AACG installation.
a Consider creating Development, Test, and Production instances. It is highly
recommended that the environments for these instances be similar to one another,
as varying environments could cause unexpected issues.
b Search for any patches that may need to be applied.
2 Refer to the Hardware Platform Requirement document for the preferred and supported
hardware configurations.
3 Look on Oracle Support for known environment variable issues.
4 Follow the Installation and Upgrade Guide to install AACG.
ETL Synchronization
To maximize performance and handle cross-platform analysis, application access security
model data is extracted and loaded into AACG to be used in analysis. How often synchro-
nization is run or scheduled depends on various factors.
In general, any time the access security model of the data source you are running analysis
against has changed, an ETL synchronization should occur before conflict analysis is run.
If, for instance, your organization commonly makes changes to Oracle menu structures,
or creates and changes responsibilities on a daily basis, then it would also be wise to run
the ETL synchronization on a daily basis.
If, for another example, your company evaluates conflicts on a monthly basis, then it may
only be necessary to run the synchronization process once a month.
Defining Entitlements
If you decided to load the best-practice SOD library, you will have a number of entitle-
ments that already group together common access points, labeled by appropriate business
terminology.
At this point, you should have a good idea of the GRC goals of the company and know
what areas of the business should be focused on.
Reviewing each loaded entitlement and its access points is necessary to ensure that the
entitlements fully cover the known ways that users may access functionality. It may be
easier first to identify policies to be activated, and then focus on the entitlements within
those policies for completeness.
Defining Policies
If you decided to load the best-practice SOD library, you will have a number of policies
that already identify sets of access points to which individual users should not be granted
access.
At this point, you should have a good idea of the GRC goals of the company and know
what areas of the business should be focused on.
Reviewing each loaded policy and its access points is necessary to ensure that the goals
of the company are being met. There are several ways to approach defining policies. A
common approach is outlined in the following steps:
1 Identify GRC goals of the company.
2 Load the best-practice SOD library.
3 Hold workshops with subject matter experts (SMEs) to review policies.
4 Create and edit policies and entitlements as needed.
5 Prioritize policies.
6 Assign policy types.
7 Define and assign dimensions to categorize policies.
8 Assign policy participants.
Defining Conditions
Conditions help eliminate false positives and create focused conflict-analysis runs. Condi-
tions are specific to the application data source and most likely will be tweaked throughout
the remediation process to help focus on different areas as the clean-up process occurs.
Remediation Flowchart
Remediation Checklist
The following checklist provides a more detailed list of steps using Application Access
Controls Governor during remediation. When you are ready to begin the remediation
process, you log on to Oracle Application Access Controls Governor and work through
these steps to begin cleanup in your systems.
1 Run conflict analysis for all policies.
Loading all best practice SOD policies and running conflict analysis will
provide a quick view of your company’s overall SOD health and provide a
basis for beginning analysis and prioritization.
2 View the Heat Map in various ways.
Use the Heat Map to select various combinations of the X and Y axes to
provide high-level counts of conflicts in your system. This will help determine
the best area to begin focusing on conflict analysis and remediation.
3 Focus on areas with the highest risk, priority, and volume.
Depending on your company’s GRC goals, determine focus areas to begin
analyzing. The Heat Map provides a high-level way to see where the volume is
the greatest. Use the Heat Map to continue drilling into more layers of data, or
move into more detailed data via online screens and reports.
4 Review intra-role conflicts.
Focusing on intra-role conflicts first will inherently clean up potentially
hundreds of conflicts. (In the context of remediation, “role” means the level of
access point that is assigned directly to a business-management-application
user, such as a responsibility in Oracle E-Business Suite.) Many times a role
has been built with segregation of duties conflicts within itself. By identifying
these issues and cleaning them up first, you will see an across-the-board effect.
5 Review inter-role conflicts.
Focus next on inter-role conflicts. These conflicts mean a user has access to
one or more access points across one or more roles. Sometimes removing an
access point from one role will clean up several conflicts.
6 Use various on-line views to analyze conflicts.
In the AACG Work Queue, various on-line views group and summarize data at
a high level; you can drill into each view for more detailed analysis. Try run-
ning the different Work Queue views to determine more accurately where your
conflicts reside.