Process Control
Process Control
Process Control
2021-02-08
4 Integration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.1 Integration of Shared Data (Data Model). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.2 Integration with Access Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.3 Integration with Risk Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Risk Harmonization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.4 Integration of Continuous Controls Monitoring with SAP S/4HANA Cloud. . . . . . . . . . . . . . . . . . . . 27
5 Key Concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5.1 Master Data Flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Master Data Change Workflow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
5.2 Navigating Compliance Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
5.3 Standard Roles and Authorization Objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
5.4 Top-Down, Risk-Based Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
5.5 Workflows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Performing Automated Testing and Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Performing Evaluations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Performing Manual Tests of Effectiveness. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Remediating Evaluation Issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Remediating CAPA Issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Using Flexible Workflows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Using SAP Interactive Forms by Adobe. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
SAP Process Control is an enterprise software solution for compliance and policy management. The
compliance management capabilities enable organizations to manage and monitor their internal control
environments. This provides the ability to proactively remediate any identified issues, and then certify and
report on the overall state of the corresponding compliance activities.
The policy management capabilities support the management of the overall policy lifecycle, including the
distribution and attestation of policies by target groups.
These combined capabilities help reduce the cost of compliance and improve management transparency and
confidence in overall compliance management processes.
Key Capabilities
● Align internal controls and policies with business objectives and risks
● Monitor key business processes like reconcile-to-report, order-to-cash, procure-to-pay, IT, and more
● Leverage the power and speed of SAP HANA to monitor high volume of transactions in key S/4 HANA
business processes in real time
● Perform comprehensive online and offline control evaluations with flexible workflows and configurable
forms
● Manage the complete policy lifecycle with collaborative tools and surveys
● Streamline issue management and certifications with best practice workflows (ex. CAPA integrated with
audit management)
Technical Data
Planner
● Checks and warnings are implemented to make sure that there are always objects selected in plan
activities and every object has recipients. For more information, please refer to the SAP note 2930229
● An occurrence of a recurring manual control performance plan is named in the pattern "Plan name_Control
Name_Frequency_ Occurrence Timeframe" so that the occurrences of the same plan can be easily
differentiated.
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
Related Information
Technical Data
You can configure the fields available for notification templates depending on the plan activities. For more
information, please refer to the SAP note 2899780 .
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
Technical Data
● New Fiori app Complete Sign-off is available that provides better use experience in performing sign-off
tasks.
Compared to the old UI where you have to complete one step before you can go on to the next, the Fiori
App is an one-click-through design, where all the steps are displayed on one screen and you can scroll up
and down to whichever step you like.
For more information, please see Complete Sign-off [page 70]
● In downloaded reporting worksheets, the selection and filter criteria for the report is hidden so as to
provide a clear view for you to read.
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
Technical Data
● With the newly-added standard reporting Central Business Process Use List, you are able to see a complete
list of the local objects that reference a central object, for example, the organizations that reference a
particular central control.
● More variables such as ISSUE_NAME, OBJECT_TYPE, OBJECT_NAME and DUE_DATE are now available for
Ad Hoc Issue initial notification template, making the notifications more informative.
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
Technical Data
● When checking Monitor Issue Status reports, you can know which organization, if any, an issue concerns,
according to the issue list or issue details, which now present the organization names.
● Now you can decide whether to limit the number of query entries shown in the Query Center Ad Hoc
Query Result to 500. If you want to remove the limitation, set the indicator LIMIT_QUERY_CNT_ROWS in
the view V_GRPCCUST1 to false.
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
Technical Data
● A new option Display technical name of column is available for reporting, which enables the Field ID of each
column, as are defined in the Customizing activity Maintain Report Configuration Report Column ,
to be displayed in your report.
● Configurable Notification is available for Automated Monitoring and Disclosure Survey, with which, you can
○ Enable configurable notifications for each Automated Monitoring job, and define the notification rules
and templates in Notification Template Maintenance. When there are tasks generated by Automated
Monitoring jobs, notifications will be sent out based on the rules.
○ Check sent notifications Notification History.
● When there are changes made to a business rule, it is possible to enable the scheduled Automated
Monitoring jobs that are based on this business rule and that are yet to be run to be run on the changed
rule. And when checking Job step results, you’ll see a message telling this step is based on the changed
business rule. For instructions, refer to 2723158
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
Technical Data
You are now able to add a Manual Control Performance link to an email notification template in Notification
Template Maintenance via Rule Details Details Task Link .
It is now possible to disable mandatory review for Manual Control Performance for a specific sub-process via
Master Data Organizations Subprocess Review Settings .
Locked or expired users have been added to the data source for SOD integration and can now be included in
the scope of SOD integration analysis.
You can now select multiple users to remove some or all roles assigned to them, or replace them with new
assignees, or copy their role assignment to other users with Mass Role Reassignment [page 514].
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
Technical Data
A new feature Search Work Items can be found under Assessments Assessment Planning , which allows
user to search for work items matching specific criteria.
Please note this feature doesn't support search for Policy Acknowledgement, Quiz and Survey work items
because these activities have no items generated in Work Inbox.
You can still allow all the deficiency spreadsheets to be sent together in one email, regardless of which specific
issue this email regards.
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
For more information on the CCM ABAP Report Monitor Value Analysis subscenario, see the guide, CCM ABAP
Report Monitor Value Analysis, which you can find under Continuous Control Monitoring on the SAP Process
Control product page at http://help.sap.com/pc .
Technical Data
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
For more information on the CCM ABAP Report Monitor Value Analysis subscenario, see the guide, CCM ABAP
Report Monitor Value Analysis, which you can find under Continuous Control Monitoring on the SAP Process
Control product page at http://help.sap.com/pc .
Technical Data
New Features
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
For more information on the CCM ABAP Report Monitor Value Analysis subscenario, see the guide, CCM ABAP
Report Monitor Value Analysis, which you can find under Continuous Control Monitoring on the SAP Process
Control product page at http://help.sap.com/pc .
Technical Data
New Features
More Information
For more information, see the application help for SAP Process Control at http://help.sap.com/pc .
Technical Data
Key features:
● Ability to run exclusively on SAP S/4HANA – SAP Access Control, Process Control and Risk
Management 10.1 on S/4HANA run on SAP S/4HANA.
● Ability to run on SAP HANA or non-HANA database – SAP Access Control, Process Control, and Risk
Management 10.1 run on SAP NetWeaver 740 SP02 on non-HANA or on SAP HANA databases.
● Enhanced User Experience with Entry Page and Side Panel – The entry page enhancement provides a
role-based home page for a couple of delivered business sample roles. The entry pages can be easily
configured and personalized according to specific user behaviors. In the meantime, in order to provide
additional, context-sensitive information to existing WebDynpro-based screens, now you can use side
panel in selected areas.
● Embedded Search for Business Entities and Documents – Designed to provide the end user with a
simple and fast access to PC related documents and objects with a search engine UI, by leveraging the
capability of SAP NetWeaver Enterprise Search, PC 10.1 now has a unified, comprehensive and real-time
search function to search data and information.
● Operational Data Provisioning Enablement – This new feature allows real-time analytics and reporting in
a reusable way. You can now use ODP (Operational Data Provider) data models to construct your own
reports, dashboards, and other analytic applications.
● HANA-Based CCM – HANA Based CCM provides the power to perform high volume cross-system
monitoring. The monitoring feature of HANA system brings more value to the customers’ HANA
investments. Many customers have multiple SAP and non-SAP systems to monitor. Previously, a single
data source/business rule is only able to monitor one system at a time. With data stored in HANA and
made available to the GRC automated rule engine, they can now monitor processes across systems and
with great performance despite potentially large data volumes. The customers can also reuse their HANA
analytics investments.
● Import/Export of Data Source and Business Rule – The importing and exporting of CCM content enables
the CCM content delivery from SAP or SAP partners to the customer. Compared with the previous
transport approach via change requests, the improved importing and exporting function of CCM data
source and business rules allows you to do it in a much simpler and faster way.
● Disclosure Survey – This is a new type of survey that allows you to collect and confirm the performance of
controls and processes from a variety of users. The documented information can be used as part of
disclosed financial, operational, or regulatory reporting according to SOX 302 requirements.
● Context Sensitive Help – You can directly access the help topics for the process that you are executing
through the Help Center by clicking on the application screen or pressing F1.
For more information, see the application help for SAP Process Control at http://help.sap.com/pc.
The processes and user interfaces of the following products are closely linked, as they have interconnected
features:
You can access the features and documentation of one or several of these products only after licensing and
installing the relevant products.
The integration topics describe the integration scenarios that leverage 12.0 features across multiple
applications.
Use
● Organizations can optionally be shared between Process Control, Risk Management, and Access Control.
Some organization data may be shared, and other data may be specific to a single application. The access
to this data is controlled by the user’s authorizations.
● Controls may be shared between Process Control and Access Control. There is application-specific
information for Process Control and Access Control applications. The access to this data is controlled by
the user’s authorizations.
● The Shared Risk Catalog is used by Process Control and Risk Management. There is application-specific
information for Process Control and Access Control applications. The access to this data is controlled by
user’s authorizations.
● You can configure UI properties of attributes (fields) to be application-specific.
More Information
Use
In Governance, Risk, and Compliance (GRC) 12.0 solutions, technical platforms are united on SAP NetWeaver
(ABAP), enabling increased harmonization of key master data. Organization, process and control structures
can now be shared across components of Access Control, Process Control and Risk Management, which
support a more integrated approach to governance, risk, and compliance.
Prerequisites
● You have configured the GRC 12.0 application through the Customizing activities.
● You have started the GRC 12.0 application.
Features
● Process Control is integrated with the Access Risk Analysis component in Access Control to monitor
Segregation of Duties (SoD) violations
● Process Control and Access Control share a compliance structure in the following ways:
○ Process Control and Access Control share organizations.
○ Controls in Process Control are used as mitigation controls in Access Control.
○ Processes in Process Control are used as business processes in Access Control.
Use
The Process Control and Risk Management applications share certain capabilities. The menu areas common to
both applications are:
Both applications share the corporate and organization objects. For Risk Management, activity is optional.
Prerequisites
● You have configured both the Process Control (PC) and Risk Management (RM) applications through the
Customizing activities.
● You have started both applications.
● You have set up the roles and business events in both applications.
Features
Process Control and Risk Management have the following integration points:
● Risk Management can use existing Process Control controls as risk responses in Risk Management. For
more information, see the topic Using PC Controls in the application help for SAP Risk Management .
More Information
For more information about Risk Management, see the topic Integration with Process Control in the
documentation for SAP Risk Management.
Use
Note
Risk harmonization is only relevant if you have licensed both SAP Risk Management and SAP Process
Control.
Risk harmonization allows both SAP Risk Management and SAP Process Control users to share a more unified
source of risk repository. The interchange of risk and control information between the two applications
facilitates a top-down, risk-based internal control approach with which risks in processes can now be
automatically identified and responses can be automatically provided.
If risk harmonization is not enabled, SAP Process Control (PC) and SAP Risk Management (RM) use separate
risk information objects and they are not fully integrated with each other. PC and RM share the same risk
catalogs and risk templates, but without risk harmonization the risks and risk assessment results from RM
cannot be used by PC users, nor can they be used to display harmonized risk and control information. In such a
case you can only link an RM risk to a PC subprocess through an RM activity.
The risk harmonization feature allows direct relationships to be established between RM risks and PC
subprocesses and controls. It also allows PC users to use RM risk assessment results and to display the
harmonized data in the frequently used reports.
With the risk harmonization feature activated, SAP Process Control users can add SAP Risk Management risks
to local SAP Process Control subprocesses. Subsequently, any controls added to these risks are automatically
recognized on the SAP Risk Management side as responses to the risks.
Note
Risk harmonization is only relevant if you have licensed both SAP Risk Management and SAP Process
Control.
You can activate risk harmonization in Customizing for Governance, Risk and Compliance under Shared
Master Data Settings Activate the Risk Harmonization Feature .
You maintain the mapping relationships between risk levels and risk scores in Customizing for Governance, Risk
and Compliance under Process Control Scoping Maintain Risk Score and Risk Level Mapping .
You choose which SAP Risk Management risk analysis type you want to use in SAP Process Control in
Customizing for Governance, Risk and Compliance under Process Control Scoping Maintain Risk Analysis
Type .
Email Notifications
You can define the recipient of email notifications for different business events in Customizing for Governance,
Risk and Compliance under General Settings Workflow Maintain Custom Agent Determination Rules .
To allow the SAP Process Control internal control manager to be able to create and remove a PC control as an
activity or response under an RM risk, the following authorization settings need to be added to the relevant
roles:
02 Change
03 Display
06 Delete
GRC_DATAPT *
GRC_ENTITY ACTIVITY
RESPONSE
GRC_SUBTYP *
Context
Note
Risk harmonization is only relevant if you have licensed both SAP Risk Management and SAP Process
Control.
Procedure
1. To allow risks to be assigned to a local subprocess in PC, you need to select the Allow Local Change option
when you assign a central subprocess to the organization.
2. In SAP Risk Management, create a risk, and in the Organization Unit field, choose the same organization
under whose subprocess you want to assign this risk.
3. In SAP Process Control, assign the risk to a local subprocess. Note that all risks from SAP Risk
Management have the source Inherent to Organization.
Context
Note
Risk harmonization is only relevant if you have licensed both SAP Risk Management and SAP Process
Control.
With risk harmonization, SAP Risk Management is able to automatically identify SAP Process Control controls
as responses to SAP Risk Management risks. The control-risk relationship works as follows:
● When a PC control is assigned to an RM risk as a response, the risk is automatically added to the control on
PC side.
● When an RM risk is assigned to a PC control, the control is automatically added to the risk as a response.
Note
You must first assign these risks to the local subprocess under which the local controls are located, then
you are able to add the risks to the controls.
Procedure
1. In SAP Risk Management, open a risk, assign an SAP Process Control control to the risk as a response. You
can also remove an existing SAP Process Control control from the risk. Note: If you have enabled the email
notification feature for this activity, the system sends out a notification email to the relevant user when the
control is assigned to or removed from the risk as response.
Context
Note
Risk harmonization is only relevant if you have licensed both SAP Risk Management and SAP Process
Control.
With risk harmonization activated, you can assign SAP Risk Management Risks to SAP Process Control
controls.
Procedure
1. In SAP Process Control, open a local control and assign an SAP Risk Management risk to the control. You
can also remove an existing SAP Risk Management risk from the control. Note: If you have enabled the
email notification feature for this activity, the system sends out a notification email to the relevant user
when the risk is assigned to or removed from the local control.
2. In SAP Risk Management, open the risk. The SAP Process Control control has been automatically added to
or removed from the risk as a response.
Note
Risk harmonization is only relevant if you have licensed both SAP Risk Management and SAP Process
Control.
As a result of shared risk and control information between SAP Process Control and SAP Risk Management,
the risk harmonization feature allows the use of SAP Risk Management risk assessment results in SAP Process
Control, so that the SAP Process Control user is able to perform risk-based scoping for control evaluation.
4.3.1.6 Reporting
Note
Risk harmonization is only relevant if you have licensed both SAP Risk Management and SAP Process
Control.
With the risk harmonization feature activated, you are able to monitor the risk coverage with the following
reports:
Report Location
For example, you can use the Risk Coverage with Ratings by Organization report to monitor which risks have
been covered by controls with risk level information. You can also navigate to the SAP Risk Management risk
(with risk source Inherent to Organization) through the link, to see the details of the risk.
To set up the integration of continuous controls monitoring in your on-premise SAP Process Control system
with SAP S/4HANA Cloud, you must perform the following configuration steps.
Scope item Continuous Control Monitoring Integration (2OH) must be active. You can check this in the Manage
Your Solution app under View Solution Scope.
A user must exist for creating a communication system in SAP S/4HANA Cloud to access the on-premise SAP
Process Control system. This user must have the following privileges:
You must have a user with sufficient authorization in Customizing for SAP Process Control, for example, GRC
System Administrator.
Activities
Note
When configuring the access control list for the cloud to on-premise scenario, you need to specify function
modules (resources) which can be invoked on the on-premise host. The SAP Cloud Platform Cloud
Connector uses very strict whitelists for its access control.
Use GRFN as the function module name for the communication scenario SAP_COM_0230 (Process Control
& Risk Management Integration).
For more information, go to the SAP Help Portal and search for the SAP S/4HANA Cloud product page. In the
Product Assistance, navigate to the following chapter: SAP S/4HANA Cloud Generic Information General
Functions for the Key User Integration Scenarios How to Set Up SAP Cloud Platform Cloud Connector .
1. Create a communication user. You can do this using the Maintain Communication Users app.
Note
To perform this step, you must have a role that contains the business catalog SAP_CORE_BC_COM
(Communication Management).
2. Create a communication system which defines the host name of the SAP Process Control system and
handles users for both inbound and outbound communications. You can do this using the Communication
Systems app.
When creating the system, you must add the virtual host name for the SAP Process Control system and
choose Use Cloud Connector.
1. Create an RFC connector to communicate with the SAP S/4HANA Cloud system.
You can do this in Customizing for Governance, Risk and Compliance under Common Component
Settings Integration Framework Create Connectors .
The RFC destination of the created connector must be the system ID of the SAP S/4HANA Cloud system
and the connection type must be 3 (ABAP Connection).
You must also add the target SCC host name and instance number, and for the logon details you include
the user name you created on the SAP S/4HANA side above.
2. Define the connection types that are used when connecting to the SAP S/4HANA Cloud system.
You can do this in Customizing for Governance, Risk and Compliance under Common Component
Settings Integration Framework Maintain Connectors and Connection Types .
For the new connector, define the following:
○ Target connector: Provide the RFC destination created in step 1.
○ Connection type: S4HANA
○ Source connector: Provide the RFC destination of the current client of the SAP Process Control
system.
○ Logical port: Again, provide the RFC destination of the current client of the SAP Process Control
system.
3. Assign the connectors to an integration scenario.
You can do this in Customizing for Governance, Risk and Compliance under Common Component
Settings Integration Framework Maintain Connection Settings .
Enter AM as the integration scenario. Configure the subscenario by adding the connector link to the RFC
destination created in step 1.
4. Maintain the whitelist to indicate the tables that the SAP S/4HANA system is allowed to read.
You can do this in Customizing for Governance, Risk and Compliance under Common Component
Settings Continuous Monitoring Maintain Whitelist for S/4HANA Integration .
Create new entries with the tables that you want to whitelist in SAP S/4HANA.
Use
Recommendation
For more information on creating these master data objects, see the Master Data [page 397] section of this
help.
Perform the master data assignments after all related objects are created, including:
Indirect entity-level controls may be created at any time and assigned to existing organizations.
The following is a graphical representation of the suggested order of creation of the master data.
Use
You can require all master data changes (such as account group, control objective, process) go through an
approval workflow.
Prerequisites
● You have set up the Activate Workflows for Master Data Changes Customizing activity under Governance,
Risk, and Compliance Shared Master Data Settings .
You must activate the BC Set GRFN-MDC.
For more information, see Configuring Master Data Change Workflow [page 32].
Process
Use
Prerequisites
You set up the Activate Workflow for Master Data Changes Customizing activity located under Governance,
Risk, and Compliance Shared Master Data Settings .
Process
More Information
SAP Access Control 12.0 / Process Control 12.0 and Risk Management 12.0 Security Guide
Documenting com Creating and editing or Cross Regulation Or Master Data Master Data
pliance initiatives ganizations ganization Administra
Organizations
tor, Cross Regulation
Organization Owner Organizations
Policies Regulations,
Master Data
Regulations and
Policies Policies
Creating and editing in Cross Regulation Proc Master Data Master Data
direct entity-level con ess and Control Admin Activities and
trols istrator
Processes Indirect
Entity-Level Controls
Creating and editing Cross Regulation Proc Master Data Master Data Risk
risk catalog ess and Control Admin
and Responses Risk
istrator
Catalog
Creating and editing Cross Regulation Proc Master Data Master Data
account groups ess and Control Admin
Accounts
istrator
Accounts
Creating and editing Cross Regulation Proc Master Data Master Data
control objectives ess and Control Admin
Objectives Control
istrator
Objectives
Creating and editing Cross Regulation Proc Master Data Master Data
global process and con ess and Control Admin Activities and
trol catalog istrator
Processes Business
Processes
Organizations Open
Subprocess tab
Organizations
Access Management
GRC Role
Assignments
Business Processes
Assigning indirect en Internal Controls Man Master Data Master Data
tity-level controls to or ager
Organizations
ganizations
Organizations Open
Indirect Entity-Level
Controls
Planning Creating and editing Internal Controls Man Master Data Master Data
the consolidated ac ager, Global Organiza
Accounts
count group balances tion Owner
Consolidated Account
(Financial Compliance
only) Group Balances
Creating and editing Internal Controls Man Master Data Master Data
the organization level ager, Global Organiza
Accounts
balances (Financial tion Owner
Organization-Level
Compliance only)
Account Group
Balances
Balances
Planner Risk
Assessment type
Assessment type
Planner
Creating and editing Cross Regulation Con Rule Setup Rule Setup
the business rules tinuous Monitoring Continuous Monitoring
Business Rule Special
Business Rule
ist
Creating and editing Cross Regulation Con Rule Setup Rule Setup
the data sources. tinuous Monitoring Continuous Monitoring
Business Rule Special
Data Sources
ist
Creating and editing Cross Regulation Con Rule Setup Rule Setup
the automated control tinuous Monitoring Job
Scheduling
monitoring Specialist
Automated Control
Monitoring
Scheduling event moni Cross Regulation Con Rule Setup Rule Setup
toring jobs tinuous Monitoring Job
Scheduling Event
Specialist
Queue
Performing assess Assessing and testing Process Tester, Organi My Home My Home Work
ments and tests zation Owner, Organi
Inbox
zation Tester, Internal
Auditor, Process
Owner, Subprocess
Owner, Control Owner
Inbox
Planner Sign-Off
type
Monitor
Policy Management Adapt policy as needed Policy Administrator, Master Data Master Data
Policy Manager and Regulations and
Policy Owner
Policies Policies
Use
The authorization concept of SAP NetWeaver assigns authorizations to users on the basis of roles. Some
general SAP standard roles are delivered with Process Control as described below.
You can copy and adjust these default roles in the Customizing activities under SAP NetWeaver Application
Server System Administration Users and Authorizations Maintain Authorizations and Profiles using Profile
Generator Maintain Roles (transaction PFCG).
In the Process Control application, the power user can assign these roles to the corresponding entities.
Features
● Basic Role (SAP_GRC_FN_BASE): The basic technical role for a user who wants to use Risk Management or
Process Control. This role contains all necessary authorizations to make the necessary Customizing
settings for this application. This role does not contain any authorizations for the portal interface.
● Power User (SAP_GRC_FN_ALL): In addition to the authorizations of the business user, a power user also
has authorization for administrative functions through the Customizing activities, such as the definition of
organizations.
Caution
Authorization granted to power users through the role SAP_GRC_FN_ALL cannot be delegated to
business users. If the power user needs to delegate his authorization to others, he must ask the IT
department to assign the PFCG role SAP_GRC_FN_ALL to that user. This delegation is not entity
dependent. For more information, see My Delegation Overview. [page 391]
● Display User (SAP_GRC_FN_DISPLAY): A user with this role can display all data in the portal. This role is
useful for external auditors, for example. We recommend using this role in addition to the business user
role.
Note
For more information, see the documentation on the individual roles in transaction PFCG.
Activities
1. The system administrator assigns the basic role SAP_GRC_FN_BASE to all users working with the
application. This role contains the technical authorizations required to run the application. Without this
role, assigned users cannot run the application.
2. The system administrator copies the delivered power user role SAP_GRC_FN_ALL, makes any necessary
adjustments, and assigns the modified copy of the standard role to a user who then becomes a power user
for the application. Alternatively, the delivered standard role can be used directly.
3. The system administrator copies the delivered display user role SAP_GRC_FN_DISPLAY, makes any
necessary adjustments, and assigns the modified copy of the standard role to other users who become
display users for the application. Alternatively, the delivered standard role can be used directly.
4. The system administrator copies the delivered business user role SAP_GRC_FN_BUSINESS_USER, makes
any necessary adjustments, and assigns the modified copy of the standard role to other users who become
business users for the application. Alternatively, the delivered standard role can be used directly. The
business users' authorizations within the application can be defined further by the application roles.
5. The portal administrator copies the delivered roles, makes any necessary adjustments, and assigns the
modified copy of the enterprise portal roles to the end users to grant them the required access to the Risk
Management application. Alternatively, the delivered standard role can be used directly.
The Process Control risk model allows you to identify the subprocesses and account groups or assertions to be
audited, based on risks assigned to the account groups or assertions, and to the controls. Relationships can be
associated between account groups or assertions, as well as between subprocesses and control objectives.
Compliance efforts are directed to areas that present the highest risk, such as the financial statement close
process, and controls that are designed to prevent fraud.
The top-down, risk-based approach of the application comprises materiality analysis, risk assessment,
control risk assessment, and level of evidence determination.
Aspect Description
Identify significant accounts and assertions Consider materiality, likelihood of errors or fraud, accounting
and reporting complexities, and subjectivity.
Identify risks of financial misstatements To determine the sources and likelihood of misstatements,
ask: “What could go wrong?”
Identify significant locations and processes Consider significant accounts and assertions plus other
risks of financial misstatements
Assess the financial reporting risks Rate the risks, considering the impact and likelihood of ma
terial misstatements in financial reports.
Identify controls to address financial reporting risks Consider entity-level, transaction, IT, and monitoring con
trols.
Evaluate control operating effectiveness Consider control risk factors to determine the nature, extent,
and timing of evaluations.
Process Control uses the following mechanisms to develop a testing strategy and level of evidence:
A workflow is a sequence of steps processed either by people or by the SAP system. The chronological and
logical sequence of steps is linked to the evaluation of conditions. The evaluations are monitored by persons
assigned to the role tasked with this obligation (this can vary depending on your business' needs).
Use
You can automate the testing of control effectiveness and monitoring of controls in the ERP system. All
automated tests of effectiveness and monitoring of controls use automated test rules to determine the
exception data to extract from the ERP system. The following graphic illustrates that an automated test rule is
assigned to a control within Process Control to run a program within the ERP system to test or monitor data in
the ERP system:
● Transaction data — Identify transactions based on thresholds or identify transactions outside of the
tolerance settings
Note
Adding a test plan to a control will generate workflow even if no deficiencies are found, regardless of
whether the test automation is Automated, Semi-Automated, or Manual. You can then review results and
add issues to automated and semi-automated jobs in the same way that you can for manual jobs.
To enable this feature, assign a manual test plan to a Control with test automation set to Automated or
Semi-Automated in Governance, Risk and Compliance Process Control Evaluation Setup Enable
Test Plan Assignment for Auto and Semi-Auto Controls .
Then assign a business rule to the Control in Continuous Monitoring Business Rule Assignment , and
create a Test Control Effectiveness using the Planner.
Process Control records historical information in a change log to monitor changes to configuration settings and
master data over the entire timeframe of the control. For more information, see the SAP Process Control 12.0
Operations Guide.
You can use automated test rules to fully or partially automate the testing of a control when no manual test
plan is assigned, as follows:
● Fully automated testing — The system determines the control rating and creates issues for remediation
processing, based on test results.
● Semi-automated testing — You manually review the test results and determine the control rating and the
issues for remediation.
When a manual test plan is assigned, you can input a manual test result for the control.
Process
1. On the start date, Process Control executes the test or monitoring activities and passes the rule
information to the program (plug-in) in the ERP system.
2. The program executes based upon the business rule assignment.
1. The business rules identify exceptions in configuration data and transaction data based on the rule for
a given period.
2. When the rule execution is complete, the program on the ERP system sends an exception report to
Process Control.
Use
Process Control facilitates the monitoring of data to ensure controls in your ERP system are operating
effectively, and to identify weaknesses or potential deficiencies on a timely basis. You can create the following
monitoring controls within Process Control to identify exceptions in your ERP system based on your deficiency
parameters:
● Configuration Controls – to identify potential unauthorized configuration settings or parameters in the ERP
system.
● Master Data Controls – to identify suspect master data in the ERP system.
● Transaction Data Controls – to identify unusual business transactions in the ERP system
You can customize your automated monitoring controls to review data based on your filter parameters and test
period. You then schedule the automated monitoring controls at any frequency you choose based upon your
configuration.
Note
If issues are identified for automated control monitoring, redoing the monitoring control for the same
period returns the same results. For this reason and to ensure that issues are identified on a timely basis,
some companies perform control monitoring more frequently than either manual testing or automated
testing of control effectiveness.
Automated test rules can automate your monitoring procedures. The rule filters and the deficiencies set within
them identify exceptions in the data within the ERP system. For more information, see Performing Automated
and Semi-automated Tests of Effectiveness [page 44], Creating a Business Rule [page 431], and Creating and
Changing Data Sources [page 425].
● If exceptions are found, the system automatically creates an issue when exceptions are identified.
● If no exceptions are found, no results are returned. The activity is logged with an Adequate deficiency rating
in the Job Monitor. If you discover an issue that should be addressed, you can create an ad hoc issue,
regardless of the deficiency rating. For more information, see Identifying, Creating and Assigning Ad Hoc
Issues [page 385].
● If a test plan is assigned, and no exceptions are found, the results of the test will still be visible in the
workflow and can be edited manually. Issues that are added manually are processed in the same way as
issues that are generated by the system.
The following figure illustrates the steps in performing automated controls monitoring:
A monitoring control may be semi-automated based on its control design. However, if issues are found, the
workflow tasks between automated and semi-automated control monitoring are the same. Shown below is the
test failure routing for automated and semi-automated control monitoring based upon delivered business
content.
Note
The applications determine the agent (or recipient) of a workflow task based on the mapping of business
events and roles. You can override the default configuration and maintain your own agent determination
rule in the Customizing activities (using the SPRO transaction). Carry out the activity Maintain Custom
Agent Determination Rules under Governance, Risk, and Compliance General Settings Workflow
In the Customized Business Events table, you configure rules for determining the recipient of a workflow
task by customizing the business events, sort, roles, entities, and subentities.
Process
1. Process Control performs automated control monitoring based on the schedule you create in the
Monitoring Scheduler. The schedule triggers the monitoring in the ERP system based upon the rules to
determine if the data represents an exception. For more information, see Creating a Business Rule [page
431] and Assigning a Business Rule to a Control [page 435].
2. The ERP system returns any exceptions to Process Control. The issues have a deficiency rating of High,
Medium, Low, or Review Required, depending on the rule settings. You define your tolerance settings for
deficiencies in the rule.
3. If a test plan is assigned to the control, then workflow is generated even if no deficiencies are found. The
test results can then be edited manually, and issues added.
If no exceptions are identified, and there is no test plan assigned, the monitoring job schedule is completed
and no workflow is required. The job monitor shows that the job has completed its execution with Adequate
deficiency rating.
If you discover an issue that should be addressed, you can create an ad hoc issue, regardless of the
deficiency rating. For more information, see Identifying, Creating and Assigning Ad Hoc Issues [page 385].
If exceptions are identified, this automatically creates an issue. The system routes the issue to the person
assigned the task to receive the issues. In the delivered Business Configuration (BC) set, this person has
the Control Owner role.
4. Note
You have the option of assigning the task to another role, depending on your business requirements
and organization.
Use
Process Control can facilitate automation of the effectiveness testing of controls that exist in your ERP system.
This increases testing efficiency and standardizes testing if several organizations have similar controls. You can
customize your automated tests based on filter parameters. You can also run the automated tests at any
Test of Effectiveness
In a fully automated test of effectiveness, the system creates an issue when the system identifies exceptions
based upon your rule criteria. The following figure displays the process flow for an automated test of
effectiveness scenario (note: this example assumes that Review is not required, but Remediation Plans are):
1. The system performs the test of control effectiveness. If the test passes, the work flow is complete, unless
a test plan has been assigned. If a test plan has been assigned, the owner can edit the result and create
issues manually.
2. If the test fails, the system creates issues and routes them to the issue owner.
3. The issue owner reviews the issues for validity. If it is not a valid issue, the work flow is complete.
4. If it is a valid issue, the issue owner assigns a remediation plan owner and submits it.
The plan owner creates, executes, and completes the plan.
5. The issue owner reviews the remediation activities and closes the issue. The work flow is complete.
In a semi-automated test of effectiveness, the tester receives the test results, with any identified issues. The
tester must review and validate the exceptions. The tester can then void the issue or assign the issue to an
owner for processing.
Automated and semi-automated tests of effectiveness have differences in certain workflow tasks. Shown below
is the routing of tasks for automated and semi-automated tests of effectiveness.
The receiver of issues and tasks in the table below represent the predelivered configuration by SAP. You can
define your own settings in the Customizing activity found at Governance, Risk and Compliance
General Settings Workflow Maintain Custom Agent Determination Rules . For more information, see
the SAP Process Control 12.0 Security Guide.
Procedure
1. Process Control performs automated tests based on the plan you created in the Planner. The plan includes
information such as start and due date of testing, organization name, and control selection. When the plan
start date occurs, the test executes in the ERP system based on business rule assignments.
Automatic retesting is not applicable to automated and semi-automated tests of effectiveness. This is
because if the test is rerun for the same period, it would return the same results based upon the ERP data.
For this reason, some companies perform automated testing on a more frequent basis than manual
testing.
For more information, see Planner [page 497] and Assigning a Business Rule to a Control [page 435]
2. The ERP system returns any test exceptions to Process Control. The exceptions have a deficiency rating of
High, Medium, Low, or Review Required depending on the rule settings and the data in your ERP system.
You define your tolerance settings for High, Medium, Low deficiencies within the rule parameters for
specific rule criteria.
3. If no exceptions are identified, the system performs the following depending on whether the test is fully or
partially automated:
○ Automated Test of Effectiveness — Testing of the plan is complete. The system assigns the test a
deficiency rating of Adequate.
○ Semi-automated Test of Effectiveness — The system assigns the test a deficiency rating of
Adequate.
Note
For monitoring, no task is generated if no exceptions are found. For testing purposes, a task is
generated, even if no exceptions are found.
Note
You can assign this task to another role, depending on your business requirements.
To access your tasks and reports for compliance tests or control monitoring, choose My Home Work Inbox
Work Inbox
Note
3. To perform tasks related to remediation, see Remediation of Open Issues [page 55].
Procedure
Note
At any point in performing the assessment, you have the option to change it. Accessing the
assessment changes its status from Ready to Reserved. If needed, you can then complete it later.
4. On the Evaluation tab, complete the assessment by answering the survey questions:
Note
Caution
Depending on the question, the answer may require an explanation. If required, you must enter your
explanation in the comments field next to the question before you submit the assessment.
5. (Optional) On the Attachments and Links tab, attach or link documents as evidence or additional support.
Note
The system automatically completes the Date Performed based upon the system date.
6. Assign one of the following overall ratings to the evaluation. The names of these ratings can vary based
upon your configuration.
○ Adequate (green icon)
○ Deficient (yellow icon)
○ Significantly Deficient (red icon)
Caution
Ratings other than Adequate require an issue to be created before submitting the assessment.
7. If necessary, create an issue. Otherwise, select Submit. For more information about creating issues, see
Identifying, Creating, and Assigning Issues [page 53].
Prerequisites
After the task owners have closed all remediation plans and issues related to an assessment, the system
creates a task to verify the completeness.
Note
This is configurable through the Customizing activity Governance, Risk and Compliance Process
Control Evaluation Setup Specify Reevaluation Necessity and Timelag .
Procedure
1. The original assessor repeats the assessment. For more information about the steps involved, see
Performing Evaluations [page 47]. The only difference between performing an initial evaluation and
repeating one is there is an additional tab containing the history.
Perform Task Delivered Role Control Owner Control Owner Subprocess Owner Organization
Owner
Review Task Delivered Role Subprocess Owner Subprocess Owner Process Owner Corporate Audit
Manager
Task Review Control De Review Self-As Review Subpro Review Entity-
sign Assessment sessment cess Design As Level Control As
sessment sessment
Evaluation
Use
Prerequisites
Process
1. Test performance - The test of effectiveness uses a test plan that may include both step and test
activities. Step refers to the preparation or gathering of information for the test. Test refers to the
validation of data to determine whether the control is effective.
1. During creation of the test plan, you designate each test as Required or Not Required and indicate
whether Fail Ends Test. These fields, with the test results of Pass/Done or Fail/Not Done, determine
whether the test fails and if the remaining activities must be completed. See Creating and Editing
Manual Test Plans [page 495].
2. To trigger a workflow for manual tests of effectiveness, you create a plan for a test period with a start
date and due date. For information about creating and activating a plan, see Planner [page 497].
3. Once the plan start date occurs, the system routes the tasks of performing manual tests to the testers.
2. Identification and creation of issues - If the overall test fails, the process tester creates one or more
issues and assigns an issue owner for each. The system defaults the issue owner as the person assigned to
the task Receive Issues from Manual Test of Control, but this can be changed. In the BC Set, this task is
assigned to the role Subprocess Owner. If the test passes, submission of issues is not permitted.
3. Remediation - Once the issue owner receives the issue and assigns a remediation plan with a start date
and due date, the remediation plan owner receives a task to create the remediation plan. The remediation
plan owner is defaulted to the person assigned the Receive Remediation Plans from Manual Test of Control
task. In the BC Set, this task is assigned to the role Control Owner. The plan owner creates the plan,
performs the remediation, and completes the remediation activity.
4. Close issue without plan - If the issue was resolved without a remediation plan, the issue owner can close
the issue without a plan. No remediation plan owner exists, and the issue owner closes the issue directly.
Note
You can assign the tasks to a different role, depending on your organizational structure and business
requirements. You can also choose to enable or disable retesting through the Customizing activities.
Example
Procedure
Note
At any point, you can make changes to the test. This changes the status from Ready to Reserved and
allows you to complete the test later, if needed.
7. Choose Submit.
8. To understand the interaction of the overall test result, the result of individual test and step activities,
and test plan attributes, see table Actions upon Submission of Test [page 53].
Context
● Issues related to evaluation tests – If your overall rating for a test is Fail, you are required to create at least
one issue. This procedure details this creation process.
● Ad Hoc Issues – This issue can be a question, problem, action item, or planned task. Navigate to My
Home Ad Hoc Tasks Issues . See Identifying, Creating, and Assigning Ad Hoc Issues [page 385].
Procedure
Note
If the issue was raised in error, you can void the issue before submitting your test.
4. Choose Submit. To understand the interaction of the test result, the individual test and step activities, and
test plan attributes, see the table below.
Yes Yes Pass or Done (all or All activities pass – At least one activity
most activities) Test is submitted suc fails – Test can be
Yes No cessfully. No open is submitted after creat
sues exist. ing at least one issue.
If all activities pass,
No – returns you to
the test.
Yes Yes Fail or Not Done (at If any required test Test can be submitted
least one activity) steps fail, then the after creating at least
overall test result one issue.
must be set as Fail.
Remaining steps do
not need to be com
pleted, even if other
wise required.
No – returns you to
the test.
No Yes This combination (Required - No and Fail Ends Test – Yes) is not al
lowed during the creation of a test plan.
If the result for any required step or test activity is blank, you cannot submit the test. However, if at
least one test activity with Fail Ends Test = Yes has already been set to Fail, all required steps and tests
are no longer needed to submit your test.
5. After you have submitted your test, the actions depend on the Review Required setting established in the
Customizing activity located at Governance, Risk and Compliance Process Control Specify Whether
Review is Necessary.
Issues Review Not Required Review Required Workflow Sent to Subprocess Owner*
Approve Reject
6. If a review is required, the reviewer has visibility to the test including related issues, contextual information,
and attachments or links.
○ If the reviewer chooses Reject, comments are required.
○ If approved, comments are optional.
The workflow between the reviewer and tester continues until agreement is reached and the reviewer
approves the test. Each role can change only his or her own comments.
Use
All of the evaluations, assessment surveys, manual test plans, automated and semi-automated control testing,
and control monitoring, follow these basic steps:
1. Evaluation
Note
You have created an evaluation with an issue and it has been approved, if review is required.
Process
1. The tester receives the task to perform the manual test of effectiveness.
2. The tester performs the test and submits it. If the test passes, the task is complete.
3. If the test fails, the tester creates an issue and assigns it to an issue owner.
4. The issue owner assigns the remediation task to an owner and submits it.
5. The remediation owner creates, executes, and completes the remediation plan.
6. The issue owner reviews the remediation and closes the issue.
7. The tester performs the test of effectiveness again and submits it. If the test passes, the task is complete.
8. If the test fails, the tester creates an issue and assigns it to an issue owner.
The process continues until issues are closed.
Note
The process flow above is an example of manual tests of effectiveness and does not include Review
Required nor Forwarding functionality. See Performing Tasks Related to Remediation [page 58].
Use
Ad hoc issue management allows the creation and management of issues identified outside the standard
testing and assessment process. It also provides the following functionality:
Process
The following chart shows an end-to-end scenario of ad hoc issue creation and remediation
● Report Issue: You can create ad hoc issues outside of evaluation process with a one-step or two-step
approach.
● Remediate Issue: You can configure whether to use a remediation plan or CAPA plan for issue remediation.
● Monitor Issue: You can monitor issue processing statuses
Prerequisites
Complete the Customizing activities under Governance, Risk, and Compliance Process Control Evaluation
Setup .
Procedure
A screen displays the issue details. The system presents the following options:
○ Assign Remediation Plan / Assign CAPA (if CAPA is enabled for the regulation of the issue)
If the issue requires a remediation plan, you must assign a remediation plan owner, start date, due
date, and description. To do so, select OK and Submit.
○ Close Without Plan
If permitted, you can close the issue without a remediation plan. For example, you can use this option
for a minor change. To do so, enter remediation comments and select OK to save and close the issue.
Then select Submit.
○ Reassign the Issue
You can reassign the issue to another user. To do so, select a user and choose OK. Then select Submit.
The issue is rerouted to the selected user.
○ Void
If the issue must be canceled, select Void and enter comments. The system changes the status to
Canceled. Select Submit.
4. The system sends the Enter Details for Remediation Plan task to the remediation plan owner. Depending on
whether you set Review Required during the configuration or maintenance of local objects, one of two
process flows occurs: With Plan Review or Without Plan Review.
Note
If the issue owner and the remediation owner are the same user, the workflow is streamlined.
Use
Corrective and Preventive Action (CAPA) is a regulatory concept within Good Manufacturing Practice (GMP). It
focuses on the systematic investigation of discrepancies (failures and/or deviations) in an attempt to prevent
their recurrence. Process Control enables you to use CAPA remediation processes in your compliance and
regulatory initiatives.
Note
Use
To use CAPA remediation, you must enable the CAPA business process in the Customizing activities and assign
the CAPA relevant roles to users. You can also choose to enable e-signature, approval, and audit trail.
Prerequisites
1. Open the Customizing activity. Select Governance, Risk, and Compliance Process Control Multiple-
Compliance Framework Configure Compliance Initiatives . The Define Regulation Configuration screen
appears.
2. Select Define Regulation Type and choose Operational.
3. Select Business Transaction.
4. Choose CAPA.
5. Select Enable.
6. Choose Save.
Procedure
1. Open the Customizing activity. Select Governance, Risk, and Compliance Process Control Multiple-
Compliance Framework Configure Compliance Initiatives . The Define Regulation Configuration screen
appears.
To authorize users to perform CAPA approval activities, you must assign them the following roles:
You assign the roles at the compliance initiative level. For more information, see Assigning Users to Roles for
Corporate and Organization Objects [page 508].
For ad hoc issue reporting, you have completed the Customizing activity Governance, Risk and Compliance
Common Component Settings Ad Hoc Issues Enable CAPA by Regulation Type .
For more information, see Identifying, Creating and Assigning Ad Hoc Issues [page 385].
More Information
Use
You use e-signatures as a formal method of confirming actions and assigning accountability in the CAPA
remediation process. The e-signature in Process Control complies with the requirements of 21 CFR Part 11.
Prerequisites
For the CAPA remediation process, the following roles and activities require e-signatures:
You commit the e-signature by entering your password in the e-signature screen and selecting Sign. You can
also enter a comment.
Use
The CAPA audit trail tracks the details of the activities performed by users associated with a specific CAPA
remediation. The audit trail is visible as a tab within the CAPA plan, and can also be exported to a write-
protected (PDF) format.
Prerequisites
Features
● Issue owner
● Task performer
● Root cause
● Immediate cause
Activities
1. On the Issue Evaluation screen, choose the CAPA Worklog/Audit Trail tab.
○ You can filter the audit trail by user or date range. Leave those fields empty to view all activities related
to the issue.
2. Select Go.
Procedure
Process Control provides a list of default values for fields on the CAPA remediation screens. However, you can
also customize the values through the Customizing activities.
● Potential Impact
● Seriousness
1. Open the Customizing activity. Select Governance, Risk, and Compliance Process Control Multiple
Compliance Framework Edit Business Process Transactions . The Business Transactions Overview
screen appears.
2. Select Business Transactions.
3. Choose CAPA.
4. Select Attributes. The following attributes appear:
○ Immediate Causes – This attribute affects the values listed for the Immediate Causes field.
○ Potential Impacts
○ Seriousness
More Information
Use
CAPA remediation is available for issues coming from manual test of controls, automated test of controls, and
self-assessment. It is also available for ad hoc issues.
If CAPA is configured for your compliance initiative through the Customizing activities, the following CAPA
functions are available:
Prerequisites
● You have configured the CAPA business process. See Configuring CAPA. [page 60]
● You have configured e-signature and approval. This is only required if you use e-signature and approval in
the CAPA remediation process. See Configuring CAPA Plan Values [page 63].
● An issue has been triggered by manual or automated tests, or by self-assessment. Or, an issue has been
created through the ad hoc process.
Note
All corrective actions must be completed before the preventive actions. If you are assigned both
actions, you must complete and submit all corrective actions before the preventive action tasks are
available in your Work Inbox.
4. The CAPA plan execution approver reviews and approves the execution.
More Information
The issue owner opens the remediation task in their Work Inbox, selects the Issues tab, and performs the
following tasks:
A status message is displayed at the top of the screen confirming the submission.
If the CAPA plan approval step is enabled in the Customizing activity at Governance, Risk, and Compliance
Process Control Multiple-Compliance Framework Configure Compliance Initiatives , the plan is submitted
to the CAPA Plan Approver for approval.
Use
You can assign one or more tester and remediator for each manual test plan and the associated issues and
remediations. Primary testers and remediators may choose to complete a portion of a task and assign the
remainder of the task to a different user.
Flexible retesting is also allowed for processes, subprocesses, and indirect entity-level controls.
Features
● Multiple testers can perform a manual test plan – Each step can be associated with a specific user, or the
same test step can be forwarded to other tester(s). The process starts and ends with the test owner.
For more information, see Assigning Multiple Testers. [page 68]
● The remediation process supports multiple remediators. The process captures the comments and all
executed activities.
For more information, see Assigning Multiple Remediators. [page 68]
● Authorized users can configure what triggers a retest and reassessment task through the Customizing
activities located under Governance, Risk, and Compliance Process Control Evaluation Setup
For more information, see Reevaluations [page 69].
Use
Process
1. The test owner opens the task from the Work Inbox.
2. The test owner then has the choice to Assign to Next Tester.
3. The assigned tester opens the task from the Work Inbox.
4. On the General tab, the assigned tester performs the first step.
5. The assigned tester then selects Submit to send the task back to the test owner.
6. The test owner receives the test plan in their Work Inbox and opens it.
7. The test owner performs the second step in the test plan.
8. The test owner finds an issue and reports it. The test owner assigns an issue owner who can remediate the
issue. When the test owner selects Submit, it is forwarded to this person, if a new review is required.
9. The assigned issue owner receives the plan and remediates the issue.
Use
Process
1. The remediation owner starts the issue remediation. The remediation owner opens the task from their
Work Inbox.
2. On the Remediation Plan tab, the remediation owner selects Start the Plan.
3. The remediation owner then selects Assign to Next Processor and selects the correct user from the user
search result.
4. The assigned processor opens the task from their Work Inbox and selects Complete after the work is
finished.
5. The issue owner receives the completed remediation plan in their Work Inbox.
6. The issue owner selects the task. After evaluating it, they select Reopen due to deficiencies.
7. The issue owner reassigns it to another Owner on the Remediation Plan tab.
Use
You can customize the reevaluation of assessments and tests. You can automatically extend the due date of the
reassessment. You can configure different retesting procedures for controls and subprocesses. You can decide
if an action requires a review.
Prerequisites
You have configured the following Customizing activities under Governance, Risk, and Compliance Process
Control Evaluation Setup :
Process
1. To enable the reassessment, retest or review for a process, subprocess or indirect entity-level control,
access the General tab.
2. Configure the Repeat Settings and Review Settings sections to fit your business needs.
Use
SAP Interactive Forms by Adobe enables a process by which auditors and reviewers can download and
complete the manual test plans offline. This might be useful when the tester has unreliable network access or
perhaps wants to complete test documentation when not connected. SAP Interactive Forms by Adobe test
plans can be configured to resemble the format of existing test plans. Auditors can download the test plan and
input results later.
Prerequisites
Some configuration is required to map the test plan. SAP solution experts can configure test plan input screens
to resemble existing processes. The SAP Interactive Forms by Adobe option is enabled by default. To disable it,
access the Customizing activity Governance, Risk, and Compliance Process Control Evaluation Setup
Enable SAP Interactive Forms by Adobe .
The following steps summarize utilizing SAP Interactive Forms by Adobe for test plans:
1. Access test plans from the My Home work center, Work Inbox.
2. Choose Download Forms to enter offline data.
3. Review the manual test offline. Store data for future upload.
4. Upload the test plan after you have collected the data.
5. Load attachments to support the test results
We provide a Fiori app Complete Sign-off , in addition to the old NWBC UI, to help you perform sign-off tasks.
This chapter is intended for the introduction to the Fiori app.
Prerequisites
The Fiori app Complete Sign-off is available on your Fiori Launchpad. To be able to use the app, you have to
switch it on in the Customizing activity Process Control Sign-off Maintain settings for Sign-off Fiori App
by checking the option Enable Fiori app for sign-off. This Customizing activity is also where you do the
configurations for the app.
The Fiori Launchpad is the only access to the app. You'll still be redirected to the old NWBC UI upon clicking on
a sign-off task in your work inbox .
To perform a sign-off task, select it and complete all the required steps on its detail page. The detail page shows
whether this is a sign-off at organizational unit or corporate level and includes all or some of the following
sections, depending on the configurations.
Note
The configurations described below are all done in the Customizing activity Maintain settings for Sign-off
Fiori App.
Instructions Instructions provides written guid The instructions can be customized. Follow the steps
ance on performing sign-off, such as described under Templates to create instructions.
the background information, how to do
a sign-off, what happens after a sign-
off and any thing that the person who
is doing sign-off may want to know.
Review state of Internal In the section, you review the internal ● The issue types that are shown for review can be
Controls
control work in your organizational unit configured via Choose the columns to be displayed
and the subordinate organizational on Fiori app. The available types are Self
units , if any. Assessment,Design Assessment and Testing
● It's possible to provide information about this step
Issues found during the tests, evalua
on UI to help the person who is performing sign
tions and assessments, etc, are listed
off, which will be shown in an info box under the
here. To see issues details, export
section title. To provide the information, enter it in
them to a worksheet.
Notes Internal Control Note .
At the end of the section there is a con
● The checkbox text is customizable. Type the de
sent checkbox. By ticking the check
sired text, such as "I hereby confirm that....", in
box, you confirm that you've reviewed
the internal control status. Confirmation Texts Internal Control .
Additional Documents Here you see the documents provided ● To enable Additional Documents, check the op
for the sign-off, if any.
tion Show Additional Documents; otherwise, the
At the end of the section there is a con section is not visible on UI.
sent checkbox. By ticking the check ● It's possible to provide information about this step
box, you agree that you've read the on UI to help the person who is performing sign
documents. off, which will be shown in an info box under the
section title. To create the information, enter it in
Documents .
Respond to Survey The section is a survey. You answer the To enable this section, check the option Enable
questions and leave your comments
Response to Survey and then when creating a sign-off
for each question.
task in Planner, you can choose a survey from Survey
Library for the task. When the option is not checked,
the section is not visible on UI, and it's impossible to
choose a survey while creating sign-off tasks.
Sign-off and Comment This is the last step. By ticking the con ● The checkbox text is customizable. Type the de
sent checkbox at the end, you agree to
sign off. You can also leave comments sired text in Confirmation Texts Sign off .
in the Comments box. ● It's possible to provide a placeholder text in the
Comments input box as an example. Follow the
steps described under Templates to create the pla
ceholder text .
After you've finished all the steps above, click the Sign-Off button at the bottom.
Use
The Process Control multiple-compliance framework enables you to implement a variety of compliance
initiatives, such as financial compliance, operational compliance, or others as needed.
Prerequisites
● Complete all activities under Governance, Risk and Compliance Process Control Multiple-
Compliance Framework
● Governance, Risk and Compliance General Settings Workflow Maintain Custom Agent
Determination Rules
● After compliance initiatives have been set up, complete the following activities:
○ Governance, Risk and Compliance Process Control Authorizations Maintain Regulation Role
Assignment
○ Governance, Risk and Compliance General Settings Authorizations Maintain Entity Role
Assignment
Features
● Compliance initiative agnostic framework: You can implement any compliance initiative.
● Multiple-compliance initiatives: You can implement one or more compliance initiatives and document their
requirements. You can also group compliance initiatives.
● Common compliance processes and reporting: You can implement shared testing and assessments across
compliance initiatives.
Example
A company may choose to implement both financial (SOX) and operational (FDA) compliance initiatives.
Sample SOX and FDA data is provided in the Business Configuration (BC) sets, downloaded from the
Customizing activity: Governance, Risk and Compliance General Settings Activate Business
Configuration (BC) Sets
More Information
SAP Access Control 12.0 /Process Control 12.0 and Risk Management 12.0 Security Guide
Use
The figure illustrates the continuous monitoring process in the Process Control application.
The relevant business owner is notified of the exception, reviews the issue, and determines whether any
remedial action must be taken. Dashboards and reporting give management access to the results of the
continuous monitoring and issue remediation process.
Use
The structure contains the documents that describe operational reporting for Governance, Risk, and
Compliance based on Operational Data Provisioning (ODP). ODP is a metadata concept in SAP NetWeaver that
provides a technical infrastructure that you can use to support application scenarios such as data replication
and operational analytics. With ODP, you can use operational reporting for real-time analysis of data, and you
can also access the data in your system directly without having to replicate it into a separate BW system.
In GRC, predefined search and analysis models are delivered for reporting and enterprise search. You can use
these models directly or create your own models in the modelling environment.
For more information about ODP and models, see the documentation at http://help.sap.com , under SAP
NetWeaver SAP NetWeaver Platform SAP NetWeaver 7.3 Including Enhancement Package 1 Application
Help SAP NetWeaver Library: Function-Oriented View Search and Operational Analytics Operational Data
Provisioning .
Related Information
5.8.1 Authorization
An authorization allows a user to perform a specific action on a specific object. You can define authorization
checks to be performed for the nodes in a business object by adding authorization objects to the node. In this
way, you can configure that only authorized users can access the data in search results or reporting.
Note
Ad-hoc Issue and Policy use role-user assignment authorization. The assignment information is stored in
table GRFNROLEASSNMT.
Some objects contain special entity IDs that cover two HR object types. In such cases, the object ID length of
these entities are extended to 9, allowing one extra character for identification. These objects use the special
complex ID authorization check GRFN_AUTH_C. The following is a list of special HR objects that uses complex
ID authorization check.
Use
This chapter discusses how to add customer defined fields (CDF) in ODP models which has BW data source.
Prerequisites
You have implemented CDF support to the master data used in the ODP model.
Procedure
1. Go to transaction RSA6, find your data source and choose Enhance Extraction Structure.
2. Enter the structure name and choose continue to create a new structure.
3. Enter the necessary fields according to the CDF definition. Make sure the field name completely matches
the CDF structure. Now the BI structure should have the newly created structure appended.
Note
As the data source extractor always pass values according to the field name, normally this should work
and return the CDF value in the data source. If not, check if the datamart is filled with the CDF.
4. Go to the ODP modeler, open the corresponding model and update the node. The newly appended field
appears. Adjust the related settings and generate the ODP again.
For more information, see SAP NetWeaver help document at http://help.sap.com under SAP NetWeaver
SAP NetWeaver Platform SAP NetWeaver 7.3 Including Enhancement Package 1 Application Help SAP
A search and analytic model reflects a business entity consisting of segments modeled via nodes. Nodes can
be connected to other nodes by means of composition or association relationships using foreign-key
dependencies.
The following structure contains both common models and product specific models.
Related Information
The following structure contains the common search and analytics models shared between Process Control
and Risk Management.
Related Information
Use
This search and analytics model is used to get the ad-hoc issue data.
Technical Data
DataSource 0GFN_AI_ATTR
ODP-Semantics Texts
Node 0GFN_AI_TEXT
Association
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_AIPRIO.0GFN_AI_PRIORITY_TEX
Association 0GFN_AI_ATTR20GFN_AI_PRIORITY_TE
Cardinality Arbitrary
Foreign Key
Node 0GFN_AI_STATUS.0GFN_AI_STATUS_TEXT
Association 0GFN_AI_ATTR20GFN_AI_STATUS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GFN_AI_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GFN_AI_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GFN_AI_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the business rule data.
Technical Data
DataSource 0GFN_BR_ATTR
ODP-Semantics Texts
Node 0GFN_BR_TEXT
Association
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GFN_BR_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GFN_BR_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GFN_BR_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_EO.0GFN_DS_ATTR
Association 0GFN_BR_ATTR20GFN_DS_ATTR
Sub-query No
Foreign Key
Node 0GFN_BRANTY.0GFN_BR_ANYSTYPE_TEX
Association 0GFN_BR_ANYSTYPE_TEX20GFN_BR_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_BRCATE.0GFN_BR_CATEGORY_TEX
Association 0GFN_BR_CATEGORY_TEX20GFN_BR_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_BRSTAT.0GFN_BR_STATUS_TEXT
Association 0GFN_BR_STATUS_TEXT20GFN_BR_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_JP.0GFN_JP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the data source attributes.
Technical Data
ODP-Semantics Texts
Authorization Checks
Node 0GFN_DS_TEXT
Association
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GFN_DS_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GFN_DS_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GFN_DS_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_EOSUBS.0GFN_DS_SUBSCENARIO
Association 0GFN_DS_ATTR20GFN_DS_SUBSCENARIO
Sub-query No
Foreign Key
Node 0GFN_EOCOTP.0GFN_DS_CONN_TYPE
Sub-query No
Foreign Key
Node 0GFN_EOCONN.0GFN_DS_CONNECTOR_TE
Association 0GFN_DS_ATTR20GFN_DS_CONNECTOR_T
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_BR.0GFN_BR_ATTR
Association 0GFN_BR_ATTR20GFN_DS_ATTR
Cardinality Arbitrary
Foreign Key
Use
This search and analytics model is used to get the organization unit attributes.
Technical Data
DataSource 0GFN_OU_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GFN_OU_TEXT
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GFN_OUQAPP.0GFN_OU_QAPP_TEXT
Association 0GFN_OU_ATTR20GFN_OU_QAPP_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_REGION.0REGION_TEXT
Association 0GFN_OU_ATTR20REGION_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_COUNTRY.0COUNTRY_TEXT
Association 0GFN_OU_ATTR20COUNTRY_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GFN_OU_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GFN_OU_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_ENTTYP.0GFN_ENTTYP_TEXT
Association 0GFN_OU_ATTR20GFN_ENTTYP_TEXT
Cardinality Arbitrary
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GFN_OU_ATTR20GFN_OU_ATTR
Sub-query No
Foreign Key
Node 0GPC_OUINSC.0GPC_OUINSC_TEXT
Association 0GFN_OU_ATTR20GPC_OUINSC
Cardinality Arbitrary
Sub-query No
Node 0GPC_OUISPR.0GPC_OUISPR_TEXT
Association 0GFN_OU_ATTR20GPC_OUISPR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Association 0GFN_OU_ATTR20GFN_USER_TEXT
Sub-query No
Foreign Key
Node 0GFN_OUVAMC.0GFN_OUVAMC_TEXT
Association 0GFN_OU_ATTR20GFN_OUVAMC
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OUVAMT.0GFN_OUVAMT_TEXT
Association 0GFN_OUVAMT.0GFN_OUVAMT_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OUREMC.0GFN_OUREMC_TEXT
Association 0GFN_OU_ATTR20GFN_OUREMC
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OUREMT.0GFN_OUREMT_TEXT
Association 0GFN_OU_ATTR20GFN_OUREMT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPSRC.0GPC_SP_RS_SOURCE_AT
Association 0GPC_SP_RS_SOURCE_AT20GFN_OU_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PR.0GPC_PR_ATTR
Association 0GPC_PR_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_RS.0GPC_CN_RS_ATTR
Association 0GPC_CN_RS_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_CN_ATTR20GFN_OU_ATTR_1
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS.0GRM_OU_AC_RS
Association 0GRM_OU_AC_RS20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_OR.0GRM_OU_AC_OR
Association 0GRM_OU_AC_OR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_OR_EP.0GRM_OU_AC_OR_RP
Association 0GRM_OU_AC_OR_RP20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS_RP.0GRM_OU_AC_RS_RP
Association 0GRM_OU_AC_RS_RP20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS_IN.0GRM_OU_AC_RS_IN
Association 0GRM_OU_AC_RS_IN20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EG.0GPC_EG_ATTR
Association 0GPC_EG_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC.0GPC_EC_ATTR
Association 0GPC_EC_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_JP.0GFN_JP_ATTR
Association 0GFN_JP_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_CN_ATTR20GFN_OU_ATTR_2
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_EP.0GRM_EP_ATTR
Association 0GRM_EP_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OR.0GRM_OR_ATTR
Association 0GRM_OR_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SP.0GPC_SP_ATTR
Association 0GPC_SP_ATTR20GFN_OU_ATTR_O
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SP.0GPC_SP_ATTR
Association 0GPC_SP_ATTR20GFN_OU_ATTR_SS
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU_HIER.HIERARCHY_ELEMENT
Association HIERARCHY_ELEMENT20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KN_KRI_VALUES.0GRM_KN_KRI_VALUES
Association 0GRM_KN_KRI_VALUES20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_AC.0GRM_AC_ATTR
Association 0GRM_AC_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IL.0GRM_IL_ATTR
Association 0GRM_IL_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN.0GRM_IN_ATTR
Association 0GRM_IN_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN_IL_IC.0GRM_IN_IL_IC
Association 0GRM_IN_IL_IC20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KN.0GRM_KN_ATTR
Association 0GRM_KN_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_RP.0GRM_RP_ATTR
Association 0GRM_RP_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_W5_ATTR.0GRM_W5_ATTR
Association 0GRM_W5_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
OBJID OU Equal
Node 0GRM_AL.0GRM_AL_ATTR
Association 0GRM_AL_ATTR20GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_M3.0GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the organization hierarchy attributes.
Technical Data
DataSource 0GFN_OU_GFNH_HIER
Node HIERARCHY_ELEMENT
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node HIERARCHY_FOLDERTEXT
Association
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association HIERARCHY_ELEMENT20GFN_OU_ATTR
Cardinality Up to One
Sub-query No
Foreign Key
Node HIERARCHY_HEADERTEXT
Association
Cardinality Arbitrary
Sub-query No
Foreign Key
5.8.3.1.6 Policy
Use
This search and analytics model is used to get the policy data.
DataSource 0GFN_PO_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GFN_PO_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_POCATEG.0GFN_PO_CATEG_TEXT
Association 0GFN_PO_ATTR20GFN_PO_CATEG_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_POSTATUS.0GFN_PO_STATUS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_POTYPE.0GFN_PO_TYPE_TEXT
Association 0GFN_PO_ATTR20GFN_PO_TYPE_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
5.8.3.1.7 Risk
Use
This search and analytics model is used to get the risk data.
DataSource 0GFN_RS_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GFN_RS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_RSL.0GRM_RSL_TEXT
Association 0GFN_RS_ATTR20GRM_RSL_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_RSSTAT.0GFN_RS_STATUS_TEXT
Association 0GFN_RS_ATTR20GFN_RS_STATUS_TEXT
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GFN_RS_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GFN_RS_ATTR20GFN_TF_YEAR
Sub-query No
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GFN_RS_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GRM_PBL.0GRM_PBL_TEXT
Association 0GFN_RS_ATTR20GRM_PBL_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Association 0GFN_RS_ATTR20GPC_SP_RS_CN_ALL
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_RS.0GPC_CN_RS_ATTR
Association 0GFN_RS_ATTR20GPC_CN_RS_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS.0GRM_OU_AC_RS
Association 0GFN_RS_ATTR20GRM_OU_AC_RS
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS_RP.0GRM_OU_AC_RS_RP
Association 0GFN_RS_ATTR20GRM_OU_AC_RS_RP
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS_IN.0GRM_OU_AC_RS_IN
Association 0GFN_RS_ATTR20GRM_OU_AC_RS_IN
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KN_KRI_VALUES.0GRM_KN_KRI_VALUES
Association 0GFN_RS_ATTR20GRM_KN_KRI_VALUES
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IL.0GRM_IL_ATTR
Association 0GFN_RS_ATTR20GRM_IL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN.0GRM_IN_ATTR
Association 0GFN_RS_ATTR20GRM_IN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN_IL_IC.0GRM_IN_IL_IC
Association 0GFN_RS_ATTR20GRM_IN_IL_IC
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KN.0GRM_KN_ATTR
Association 0GFN_RS_ATTR20GRM_KN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_RP.0GRM_RP_ATTR
Association 0GFN_RS_ATTR20GRM_RP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_W5_ATTR.0GRM_W5_ATTR
Association 0GFN_RS_ATTR20GRM_W5_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
RS_ID RS Equal
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Association 0GFN_RS_ATTR20GFN_USER_TEXT
Sub-query No
Foreign Key
Node 0GRM_AL.0GRM_AL_ATTR
Association 0GRM_AL_ATTR20GFN_RS_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
5.8.3.1.8 Timeframe
Use
This search and analytics model is used to get the timeframe attributes.
Technical Data
DataSource 0GFN_TF_ATTR
ODP-Semantics Texts
Node 0GFN_TF_TEXT
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GFN_OU_ESH.0GFN_OU_ATTR_ESH
Association 0GFN_OU_ATTR_ESH20GFN_TF_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_COBJ.0GPC_COBJ_ATTR
Association 0GPC_COBJ_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AG.0GPC_AG_ATTR
Association 0GPC_AG_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC.0GPC_EC_ATTR
Association 0GPC_EC_ATTR20GFN_TF_ATTR_1
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TP.0GPC_TP_ATTR
Association 0GPC_TP_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_BR.0GFN_BR_ATTR
Association 0GFN_BR_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TL.0GPC_TL_ATTR
Association 0GPC_TL_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Foreign Key
Node 0GFN_EO.0GFN_DS_ATTR
Association 0GFN_DS_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OC.0GRM_OC_TEXT
Association 0GRM_OC_TEXT20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OR.0GRM_OR_ATTR
Association 0GRM_OR_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_OR_EP.0GRM_OU_AC_OR_RP
Association 0GRM_OU_AC_OR_RP20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS.0GRM_OU_AC_RS
Association 0GRM_OU_AC_OR_RP20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS_IN.0GRM_OU_AC_RS_IN
Association 0GRM_OU_AC_RS_IN20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS_RP.0GRM_OU_AC_RS_RP
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KN_KRI_VALUES.0GRM_KN_KRI_VALUES
Association 0GRM_KN_KRI_VALUES20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN_IL_IC.0GRM_IN_IL_IC
Association 0GRM_IN_IL_IC20GFN_TF_ATTR
Cardinality Arbitrary
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GPC_RE20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC_REG.0GPC_EC_ATTR_ALL_REG
Association 0GPC_EC_ATTR_ALL_REG20GFN_TF_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GFN_TF_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EG.0GPC_EG_ATTR
Association 0GPC_EG_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_RG.0GRM_RG_ATTR
Association 0GRM_RG_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_EP.0GRM_EP_ATTR
Association 0GRM_EP_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AS.0GPC_AS_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_CN_ATTR20GFN_TF_ATTR_1
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Association 0GPC_CN_ATTR_ALL_REG20GFN_TF_ATT
Cardinality Arbitrary
Foreign Key
Node 0GPC_CN_RS.0GPC_CN_RS_ATTR
Association 0GPC_CN_RS_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_M3.0GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_AI.0GFN_AI_ATTR
Association 0GFN_AI_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Association 0GPC_SP_RS_CN_ALL20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_H2E.0GPC_EC_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_AC.0GRM_AC_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IL.0GRM_IL_ATTR
Association 0GRM_IL_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN.0GRM_IN_ATTR
Association 0GRM_IN_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Foreign Key
Node 0GRM_CA.0GRM_CA_ATTR
Association 0GRM_CA_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KN.0GRM_KN_ATTR
Association 0GRM_KN_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_RP.0GRM_RP_ATTR
Association 0GRM_RP_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KT.0GRM_KT_ATTR
Association 0GRM_KT_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_OR.0GRM_OU_AC_OR
Association 0GRM_OU_AC_OR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OG.0GRM_OG_ATTR
Association 0GRM_OG_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PL.0GPC_PL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OB.0GRM_OB_ATTR
Association 0GRM_OB_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_RS.0GFN_RS_ATTR
Association 0GFN_RS_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Foreign Key
Node 0GRM_AL.0GRM_AL_ATTR
Association 0GRM_AL_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_F5.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_IS_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AG_ASSERTION.0GPC_V9_ATTR
Association 0GPC_V9_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the timeframe frequency attributes.
Technical Data
DataSource 0GFN_TF_FREQ
ODP-Semantics Texts
Node 0GFN_TFFRQ_TEXT
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_COBJ.0GPC_COBJ_ATTR
Association 0GPC_COBJ_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AG.0GPC_AG_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC.0GPC_EC_ATTR
Association 0GPC_EC_ATTR20GFN_TF_FREQ_1
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TP.0GPC_TP_ATTR
Association 0GPC_TP_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GFN_OU_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_BR.0GFN_BR_ATTR
Association 0GFN_BR_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TL.0GPC_TL_ATTR
Association 0GPC_TL_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_EO.0GFN_DS_ATTR
Association 0GFN_DS_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OR.0GRM_OR_ATTR
Association 0GRM_OR_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_OR_EP.0GRM_OU_AC_OR_RP
Association 0GRM_OU_AC_OR_RP20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_AC.0GRM_AC_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS.0GRM_OU_AC_RS
Association 0GRM_OU_AC_RS20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS_IN.0GRM_OU_AC_RS_IN
Association 0GRM_OU_AC_RS_IN20GFN_TF_FREQ
Cardinality Arbitrary
Foreign Key
Node 0GRM_OU_AC_RS_RP.0GRM_OU_AC_RS_RP
Association 0GRM_OU_AC_RS_RP20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KN_KRI_VALUES.0GRM_KN_KRI_VALUES
Association 0GRM_KN_KRI_VALUES20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KT.0GRM_KT_ATTR
Association 0GRM_KT_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_CA.0GRM_CA_ATTR
Association 0GRM_CA_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN_IL_IC.0GRM_IN_IL_IC
Association 0GRM_IN_IL_IC20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GPC_RE20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC_REG.0GPC_EC_ATTR_ALL_REG
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GFN_TF_FRE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EG.0GPC_EG_ATTR
Association 0GPC_EG_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Foreign Key
Node 0GRM_RG.0GRM_RG_ATTR
Association 0GRM_RG_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OC.0GRM_OC_TEXT
Association 0GRM_OC_TEXT20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_EP.0GRM_EP_ATTR
Association 0GRM_EP_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AS.0GPC_AS_ATTR
Association 0GPC_AS_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_CN_ATTR20GFN_TF_FREQ_1
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Association 0GPC_CN_ATTR_ALL_REG20GFN_TF_FRE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_RS.0GPC_CN_RS_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_M3.0GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Foreign Key
Node 0GFN_AI.0GFN_AI_ATTR
Association 0GFN_AI_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Association 0GPC_SP_RS_CN_ALL20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_H2E.0GPC_EC_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IL.0GRM_IL_ATTR
Association 0GRM_IL_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN.0GRM_IN_ATTR
Association 0GRM_IN_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KN.0GRM_KN_ATTR
Association 0GRM_KN_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_RP.0GRM_RP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_OR.0GRM_OU_AC_OR
Association 0GRM_OU_AC_OR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OG.0GRM_OG_ATTR
Association 0GRM_OG_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Foreign Key
Node 0GPC_PL.0GPC_PL_ATTR
Association 0GPC_PL_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OB.0GRM_OB_ATTR
Association 0GRM_OB_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_RS.0GFN_RS_ATTR
Association 0GFN_RS_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_AL.0GRM_AL_ATTR
Association 0GRM_AL_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_F5.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_IS_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AG_ASSERTION.0GPC_V9_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the timeframe year attributes.
Technical Data
DataSource 0GFN_TF_YEAR
Node 0GPC_COBJ.0GPC_COBJ_ATTR
Association 0GPC_COBJ_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AG.0GPC_AG_ATTR
Association 0GPC_AG_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC.0GPC_EC_ATTR
Association 0GPC_EC_ATTR20GFN_TF_YEAR_1
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TP.0GPC_TP_ATTR
Association 0GPC_TP_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GFN_OU_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_BR.0GFN_BR_ATTR
Association 0GFN_BR_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TL.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_EO.0GFN_DS_ATTR
Association 0GFN_DS_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OC.0GRM_OC_TEXT
Association 0GRM_OC_TEXT20GFN_TF_YEAR
Cardinality Arbitrary
Foreign Key
Node 0GRM_OR.0GRM_OR_ATTR
Association 0GRM_OR_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_OR_EP.0GRM_OU_AC_OR_RP
Association 0GRM_OU_AC_OR_RP20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS.0GRM_OU_AC_RS
Association 0GRM_OU_AC_RS20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS_IN.0GRM_OU_AC_RS_IN
Association 0GRM_OU_AC_RS_IN20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_RS_RP.0GRM_OU_AC_RS_RP
Association 0GRM_OU_AC_RS_RP20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KN_KRI_VALUES.0GRM_KN_KRI_VALUES
Association 0GRM_KN_KRI_VALUES20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN_IL_IC.0GRM_IN_IL_IC
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GPC_RE20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC_REG.0GPC_EC_ATTR_ALL_REG
Association 0GPC_EC_ATTR_ALL_REG20GFN_TF_YEA
Cardinality Arbitrary
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GFN_TF_YEA
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EG.0GPC_EG_ATTR
Association 0GPC_EG_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_RG.0GRM_RG_ATTR
Association 0GRM_RG_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_EP.0GRM_EP_ATTR
Association 0GRM_EP_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AS.0GPC_AS_ATTR
Association 0GPC_AS_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_CN_ATTR20GFN_TF_YEAR_1
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_RS.0GPC_CN_RS_ATTR
Association 0GPC_CN_RS_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_M3.0GPC_CN_ATTR
Cardinality Arbitrary
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_AI.0GFN_AI_ATTR
Association 0GFN_AI_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Association 0GPC_SP_RS_CN_ALL20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_H2E.0GPC_EC_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_AC.0GRM_AC_ATTR
Association 0GRM_AC_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU_ESH.0GFN_OU_ATTR_ESH
Association 0GFN_OU_ATTR_ESH20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IL.0GRM_IL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_IN.0GRM_IN_ATTR
Association 0GRM_IN_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_CA.0GRM_CA_ATTR
Association 0GRM_CA_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Foreign Key
Node 0GRM_KN.0GRM_KN_ATTR
Association 0GRM_KN_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_RP.0GRM_RP_ATTR
Association 0GRM_RP_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_KT.0GRM_KT_ATTR
Association 0GRM_KT_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OU_AC_OR.0GRM_OU_AC_OR
Association 0GRM_OU_AC_OR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OG.0GRM_OG_ATTR
Association 0GRM_OG_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PL.0GPC_PL_ATTR
Association 0GPC_PL_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_OB.0GRM_OB_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_RS.0GFN_RS_ATTR
Association 0GFN_RS_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GRM_AL.0GRM_AL_ATTR
Association 0GRM_AL_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Foreign Key
Node 0GPC_F5.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_IS_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AG_ASSERTION.0GPC_V9_ATTR
Association 0GPC_V9_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
The following structure contains search and analytics models used in Process Control.
Use
This search and analytics model is used to get the account group data.
DataSource 0GPC_AG_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GPC_AG_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_AG_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_AG_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_AG_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Association 0GPC_SP_RS_CN_ALL20GPC_AG_ATTR
Cardinality Arbitrary
Sub-query No
5.8.3.2.2 Assessment
Use
This search and analytics model is used to get the assessment data.
Technical Data
DataSource 0GPC_AS_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GPC_AS_TEXT
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GFN_RATING_TEXT.0GFN_RATING_TEXT
Association 0GPC_AS_ATTR20GFN_RATING_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_PL_CF_T.0GPC_PL_CF_T
Association 0GPC_AS_ATTR20GPC_PL_CF_T
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_RE.0GPC_RE
Sub-query Yes
Foreign Key
Node 0GPC_EC_REG.0GPC_EC_ATTR_ALL_REG
Association 0GPC_AS_ATTR20GPC_EC_ATTR_ALL_RE
Sub-query Yes
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Association 0GPC_AS_ATTR20GPC_CN_ATTR_ALL_RE
Sub-query Yes
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_AS_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_AS_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_AS_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Association 0GPC_AS_ATTR20GFN_REPORTER
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_STATUS_TEXT.0GFN_STATUS_TEXT
Association 0GPC_AS_ATTR20GFN_STATUS_TEXT
Cardinality Arbitrary
Foreign Key
Node 0GPC_AS_CAT.ASSESSMENT_CATEGORY
Association 0GPC_AS_ATTR2ASSESSMENT_CATEGORY
Sub-query No
Foreign Key
Node 0GPC_EVLTYP.0GPC_EVLTYP_TEXT
Association 0GPC_AS_ATTR20GPC_EVLTYP_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PL.0GPC_PL_ATTR
Association 0GPC_PL_ATTR20GPC_AS_ATTR
Sub-query No
Foreign Key
Node 0GPC_CASES.0GPC_CASES
Association 0GPC_CASES20GPC_AS_ATTR
Sub-query No
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GPC_AS_ATT
Sub-query No
Foreign Key
Node 0GPC_SP_REG.0GPC_SP_ATTR_ALL_REG
Association 0GPC_SP_ATTR_ALL_REG20GPC_AS_ATT
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_IS_ATTR20GPC_AS_ATTR_1
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the control data.
Technical Data
DataSource 0GPC_CN_ATTR
ODP-Semantics Texts
Node 0GPC_CN_TEXT2
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNCATE.0GPC_CNCATE_TEXT
Association 0GPC_CN_ATTR20GPC_CNCATE_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_TP.0GPC_TP_ATTR
Association 0GPC_CN_ATTR20GPC_TP_ATTR
Sub-query Yes
Foreign Key
Node 0GPC_CNAUTO.0GPC_CN_AUTOM_TEXT
Association 0GPC_CN_ATTR20GPC_CN_AUTOM_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNEVID.0GPC_CN_EVIDENCE_TEX
Association 0GPC_CN_ATTR20GPC_CN_EVIDENCE_TE
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNGRP.0GPC_CN_CNGROUP_TEXT
Association 0GPC_CN_ATTR20GPC_CN_CNGROUP_TEX
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNNATU.0GPC_CN_NATURE_TEXT
Association 0GPC_CN_ATTR20GPC_CN_NATURE_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNPURP.0GPC_CN_PURP_TEXT
Association 0GPC_CN_ATTR20GPC_CN_PURP_TEXT1
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNTTEC.0GPC_CN_TTECH_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CN_SIG.0GPC_CN_SIG_TEXT
Association 0GPC_CN_ATTR20GPC_CN_SIG_TEXT1
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNTAUT.0GPC_CN_TSTAUT_TEXT
Association 0GPC_CN_ATTR20GPC_CN_TSTAUT_TEXT
Cardinality Arbitrary
Foreign Key
Node 0GPC_CNDTEV.0GPC_CN_DTEVT_TEXT
Association 0GPC_CN_ATTR20GPC_CN_DTEVT_TEXT1
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_SP.0GPC_SP_ATTR
Association 0GPC_CN_ATTR20GPC_SP_ATTR1
Sub-query Yes
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Cardinality Up to One
Sub-query Yes
Foreign Key
Node 0GPC_CNCNRS.0GPC_CN_CNTR_RISK_T
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_CN_ATTR20GFN_OU_ATTR_1
Sub-query Yes
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_CN_ATTR20GPC_CN_ATTR
Sub-query Yes
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_CN_ATTR20GFN_OU_ATTR_2
Sub-query Yes
Foreign Key
Node 0GPC_CNMATA.0GPC_CN_MATAR_TEXT
Association 0GPC_CN_ATTR20GPC_CN_MATAR_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GFN_ENTTYP.0GFN_ENTTYP_TEXT
Association 0GPC_CN_ATTR20GFN_ENTTYP_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNORIG.0GPC_CN_ORIGIN_TEXT
Association 0GPC_CN_ATTR20GPC_CN_ORIGIN_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNTBTS.0GPC_CNTBTS_TEXT
Association 0GPC_CN_ATTR20GPC_CNTBTS_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNALREF.0GFN_CNALREF_TEXT
Association 0GPC_CN_ATTR20GFN_CNALREF_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_CNISCN.0GPC_CNISCN_TEXT
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_CN_ATTR20GFN_TF_YEAR_1
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_CN_ATTR20GFN_TF_ATTR_1
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_CN_ATTR20GFN_TF_FREQ_1
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Association 0GPC_SP_RS_CN_ALL20GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_RS.0GPC_CN_RS_ATTR
Association 0GPC_CN_RS_ATTR20GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CASES.0GPC_CASES
Association 0GPC_CASES20GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_JP.0GFN_JP_ATTR
Association 0GFN_JP_ATTR20GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the control and risk matrix data.
Technical Data
DataSource 0GPC_CN_RS_ATTR
Authorization Checks
Node 0GPC_SP.0GPC_SP_ATTR
Association 0GPC_CN_RS_ATTR20GPC_SP_ATTR
Sub-query Yes
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Sub-query Yes
Foreign Key
Node 0GPC_PR.0GPC_PR_ATTR
Association 0GPC_CN_RS_ATTR20GPC_PR_ATTR
Sub-query Yes
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_CN_RS_ATTR20GPC_CN_ATTR
Sub-query Yes
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_CN_RS_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_CN_RS_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_CN_RS_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_RS.0GFN_RS_ATTR
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the control objective data.
Technical Data
ODP-Semantics Texts
Authorization Checks
Node 0GPC_COBJ_TEXT
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_COBJ_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_COBJ_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_COBJ_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GPC_COBJCG.0GPC_COBJ_OBJCAT_TEX
Association 0GPC_COBJ_ATTR20GPC_COBJ_OBJCAT_
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Association 0GPC_SP_RS_CN_ALL20GPC_COBJ_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the PC control risk coverage data.
Technical Data
DataSource 0GPC_SP_RS_CN_ALL
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_SP_RS_CN_ALL20GFN_OU_ATTR
Sub-query No
Foreign Key
Node 0GPC_SP.0GPC_SP_ATTR
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_SP_RS_CN_ALL20GPC_CN_ATTR
Sub-query No
Foreign Key
Node 0GPC_COBJ.0GPC_COBJ_ATTR
Association 0GPC_SP_RS_CN_ALL20GPC_COBJ_ATTR
Sub-query No
Foreign Key
Node 0GPC_ASS.0GPC_ASS_TEXT
Association 0GPC_SP_RS_CN_ALL20GPC_ASS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AG.0GPC_AG_ATTR
Association 0GPC_SP_RS_CN_ALL20GPC_AG_ATTR
Sub-query No
Foreign Key
Node 0GPC_SPSRC.0GPC_SP_RS_SOURCE_AT
Association 0GPC_SP_RS_CN_ALL20GPC_SP_RS_SOU
Sub-query No
Foreign Key
Node 0GFN_ENTTYP.0GFN_ENTTYP_TEXT
Association 0GPC_SP_RS_CN_ALL20GFN_ENTTYP_TE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_RS.0GFN_RS_ATTR
Association 0GFN_RS_ATTR20GPC_SP_RS_CN_ALL
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the GRC indirect entity-level control (IELC) data.
Technical Data
DataSource 0GPC_EC_ATTR
ODP-Semantics Texts
Node 0GPC_EC_TEXT
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_EC_ATTR20GFN_TF_ATTR_1
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_EC_ATTR20GFN_TF_FREQ_1
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_EC_ATTR20GFN_TF_YEAR_1
Sub-query No
Foreign Key
Node 0GPC_EG.0GPC_EG_ATTR
Association 0GPC_EC_ATTR20GPC_EG_ATTR
Sub-query No
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_EC_ATTR20GFN_OU_ATTR
Sub-query No
Foreign Key
Node 0GPC_TP.0GPC_TP_ATTR
Association 0GPC_EC_ATTR20GPC_TP_ATTR
Cardinality Up to One
Sub-query No
Foreign Key
Node 0GFN_RATING_TEXT.0GFN_RATING_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_RATING_TEXT.0GFN_RATING_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_STATUS_TEXT.0GFN_STATUS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_STATUS_TEXT.0GFN_STATUS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EVLTYP.0GPC_EVLTYP_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EVLTYP.0GPC_EVLTYP_TEXT
Cardinality Arbitrary
Foreign Key
Node 0GFN_ENTTYP.0GFN_ENTTYP_TEXT
Association 0GPC_EC_ATTR20GFN_ENTTYP_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_ECTBTE.0GPC_ECTBTE_TEXT
Association 0GPC_EC_ATTR20GPC_ECTBTE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GPC_EC_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the indirect entity-level control (IELC) group data.
DataSource 0GPC_EG_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GPC_EG_TEXT
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_EG_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_EG_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_EG_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Cardinality Up to One
Sub-query No
Foreign Key
Node 0GPC_EC.0GPC_EC_ATTR
Association 0GPC_EC_ATTR20GPC_EG_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the issue data.
Technical Data
DataSource 0GPC_IS_ATTR
ODP-Semantics Texts
Node 0GPC_IS_TEXT
Association
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Sub-query No
Node 0GPC_PRIORITY_TEXT.0GPC_PRIORITY_TEXT
Association 0GPC_IS_ATTR20GPC_PRIORITY_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_IS_CATEGORY_TEX.0GPC_IS_CATEGORY_TEX
Association 0GPC_IS_ATTR20GPC_IS_CATEGORY_TE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_STATUS_TEXT.0GFN_STATUS_TEXT
Association 0GPC_IS_ATTR20GFN_STATUS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PR.0GPC_PR_ATTR
Association 0GPC_IS_ATTR20GPC_PR_ATTR
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Sub-query No
Foreign Key
Node 0GPC_TL.0GPC_TL_ATTR
Association 0GPC_IS_ATTR20GPC_TL_ATTR_1
Sub-query Yes
Foreign Key
Node 0GPC_AS.0GPC_AS_ATTR
Association 0GPC_IS_ATTR20GPC_AS_ATTR_1
Sub-query Yes
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_IS_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_IS_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_IS_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GPC_PL.0GPC_PL_ATTR
Sub-query No
Foreign Key
Node 0GPC_CASES.0GPC_CASES
Association 0GPC_CASES20GPC_IS_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Association 0GPC_CN_ATTR_ALL_REG20GPC_IS_ATT
Sub-query No
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GPC_RE20GPC_IS_ATTR
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_EC_REG.0GPC_EC_ATTR_ALL_REG
Association 0GPC_EC_ATTR_ALL_REG20GPC_IS_ATT
Sub-query Yes
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GPC_IS_ATT
Sub-query Yes
Foreign Key
Node 0GPC_SP_REG.0GPC_SP_ATTR_ALL_REG
Association 0GPC_SP_ATTR_ALL_REG20GPC_IS_ATT
Sub-query No
Foreign Key
5.8.3.2.10 Process
Use
This search and analytics model is used to get the process data.
DataSource 0GPC_PR_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GPC_PR_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_PR_ATTR20GFN_OU_ATTR
Sub-query No
Foreign Key
Node 0GFN_ENTTYP.0GFN_ENTTYP_TEXT
Association 0GPC_PR_ATTR20GFN_ENTTYP_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Association 0GPC_PR_ATTR20GFN_USER_TEXT
Sub-query No
Foreign Key
Node 0GPC_PRVAPD.0GPC_PRVAPD_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PRVAPL.0GPC_PRVAPL_TEXT
Association 0GPC_PR_ATTR20GPC_PRVAPL
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PRRTPD.0GPC_PRRTPD_TEXT
Association 0GPC_PR_ATTR20GPC_PRRTPD
Cardinality Arbitrary
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_IS_ATTR20GPC_PR_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SP.0GPC_SP_ATTR
Association 0GPC_SP_ATTR20GPC_PR_ATTR
Cardinality Arbitrary
Sub-query No
Node 0GPC_CN_RS.0GPC_CN_RS_ATTR
Association 0GPC_CN_RS_ATTR20GPC_PR_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SP_REG.0GPC_SP_ATTR_ALL_REG
Association 0GPC_SP_ATTR_ALL_REG20GPC_PR_ATT
Cardinality Arbitrary
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GPC_PR_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_JP.0GFN_JP_ATTR
Association 0GFN_JP_ATTR20GPC_PR_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the regulation data.
Technical Data
DataSource 0GPC_RE_TEXT
ODP-Semantics Texts
Node 0GPC_RE_TEXT
Association
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_RE20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_RE20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_RE20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GPC_SPSRC.0GPC_SP_RS_SOURCE_AT
Association 0GPC_RE20GPC_SP_RS_SOURCE_AT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_RE20GPC_IS_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PL.0GPC_PL_ATTR
Association 0GPC_RE20GPC_PL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CASES.0GPC_CASES
Association 0GPC_RE20GPC_CASES
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Association 0GPC_RE20GPC_CN_ATTR_ALL_REG
Sub-query No
Foreign Key
Node 0GPC_TL.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC_REG.0GPC_EC_ATTR_ALL_REG
Association 0GPC_EC_ATTR_ALL_REG20GPC_RE
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GPC_RE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_JP.0GFN_JP_ATTR
Association 0GFN_JP_ATTR20GPC_RE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GPC_RE
Sub-query No
Foreign Key
Node 0GPC_SP_REG.0GPC_SP_ATTR_ALL_REG
Association 0GPC_SP_ATTR_ALL_REG20GPC_RE
Sub-query No
Foreign Key
Node 0GPC_AS.0GPC_AS_ATTR
Association 0GPC_AS_ATTR20GPC_RE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_F5.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_M3.0GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the regulation-specific IELC attributes data.
Technical Data
DataSource 0GPC_EC_ATTR_ALL_REGS
Operational Data Provider: GRC PC Indirect Entity-Level Control Attributes All Regs
Authorization Checks
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_EC_ATTR_ALL_REG20GFN_TF_ATT
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_EC_ATTR_ALL_REG20GFN_TF_FRE
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_EC_ATTR_ALL_REG20GFN_TF_YEA
Sub-query No
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_EC_ATTR_ALL_REG20GPC_IS_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CASES.0GPC_CASES
Association 0GPC_EC_ATTR_ALL_REG20GPC_CASES
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GPC_EC_ATTR_ALL_REG20GPC_RE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_RATING_TEXT.0GFN_RATING_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_RATING_TEXT.0GFN_RATING_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_STATUS_TEXT.0GFN_STATUS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_STATUS_TEXT.0GFN_STATUS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_ENTTYP.0GFN_ENTTYP_TEXT
Association 0GPC_EC_ATTR_ALL_REG20GFN_ENTTYP
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_ECTBTE.0GPC_ECTBTE_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EVLTYP.0GPC_EVLTYP_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EVLTYP.0GPC_EVLTYP_TEXT
Cardinality Arbitrary
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GPC_EC_ATT
Sub-query No
Foreign Key
Node 0GPC_AS.0GPC_AS_ATTR
Association 0GPC_AS_ATTR20GPC_EC_ATTR_ALL_RE
Cardinality Arbitrary
Foreign Key
Node 0GPC_TL.0GPC_TL_ATTR
Association 0GPC_TL_ATTR20GPC_EC_ATTR_ALL_RE
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the regulation-specific attributes of an organization unit.
Technical Data
DataSource 0GFN_OU_ATTR_ALL_REGS
Authorization Checks
Node 0GFN_OUQAPP.0GFN_OU_QAPP_TEXT
Association 0GFN_OU_ATTR_ALL_REG20GFN_OU_QAP
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_REGION.0REGION_TEXT
Association 0GFN_OU_ATTR_ALL_REG20REGION_TEX
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_COUNTRY.0COUNTRY_TEXT
Association 0GFN_OU_ATTR_ALL_REG20COUNTRY_TE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GFN_OU_ATTR_ALL_REG20GFN_TF_ATT
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GFN_OU_ATTR_ALL_REG20GFN_TF_YEA
Sub-query No
Foreign Key
Node 0GPC_SP_REG.0GPC_SP_ATTR_ALL_REG
Association 0GFN_OU_REG20GPC_SP_ATTR_SS
Cardinality Arbitrary
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GFN_OU_ATTR_ALL_REG20GPC_RE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GPC_CN_ATT
Sub-query No
Foreign Key
Node 0GPC_PR.0GPC_PR_ATTR
Association 0GFN_OU_ATTR_ALL_REG20GPC_PR_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PL.0GPC_PL_ATTR
Association 0GFN_OU_ATTR_ALL_REG20GPC_PL_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GFN_OU_ATTR_ALL_REG20GPC_IS_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GFN_OU_ATTR_ALL_REG20GPC_V0_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AS.0GPC_AS_ATTR
Association 0GFN_OU_ATTR_ALL_REG20GPC_AS_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC_REG.0GPC_EC_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GPC_EC_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_ENTTYP.0GFN_ENTTYP_TEXT
Association 0GFN_OU_ATTR_ALL_REG20GFN_ENTTYP
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_OUINSC.0GPC_OUINSC_TEXT
Association 0GFN_OU_ATTR_ALL_REG20GPC_OUINSC
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_OUISPR.0GPC_OUISPR_TEXT
Association 0GFN_OU_ATTR_ALL_REG20GPC_OUISPR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Association 0GFN_OU_ATTR_ALL_REG20GFN_USER_T
Sub-query No
Foreign Key
Node 0GFN_OUVAMC.0GFN_OUVAMC_TEXT
Association 0GFN_OU_ATTR_ALL_REG20GFN_OUVAMC
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OUVAMT.0GFN_OUVAMT_TEXT
Association 0GFN_OU_ATTR_ALL_REG20GFN_OUVAMT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OUREMC.0GFN_OUREMC_TEXT
Association 0GFN_OU_ATTR_ALL_REG20GFN_OUREMC
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OUREMT.0GFN_OUREMT_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Association 0GPC_CN_ATTR_ALL_REG20GFN_OU_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TL.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SP_REG.0GPC_SP_ATTR_ALL_REG
Association 0GPC_SP_ATTR_ALL_REG20GFN_OU_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_F5.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AG_ASSERTION.0GPC_V9_ATTR
Association 0GPC_V9_ATTR20GFN_OU_ATTR_ALL_RE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_H2E.0GPC_EC_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the regulation-specific subprocess attributes data.
DataSource 0GPC_SP_ATTR_ALL_REGS
Authorization Checks
Node 0GPC_SPINDU.0GPC_SPINDU_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPINDU
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPSSAM.0GPC_SPSSAM_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPSSAM
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPTRTY.0GPC_SPTRTY_TEXT
Association 0GPC_SP_REG20GPC_SPTRTY_L
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PR.0GPC_PR_ATTR
Association 0GPC_SP_ATTR_ALL_REG20GPC_PR_ATT
Sub-query No
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GPC_SP_ATTR_ALL_REG20GPC_RE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Association 0GPC_SP_ATTR_ALL_REG20GPC_CN_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PL.0GPC_PL_ATTR
Association 0GPC_SP_ATTR_ALL_REG20GPC_PL_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_SP_ATTR_ALL_REG20GPC_IS_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CASES.0GPC_CASES
Association 0GPC_SP_ATTR_ALL_REG20GPC_CASES
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_SP_ATTR_ALL_REG20GPC_V0_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_AS.0GPC_AS_ATTR
Association 0GPC_SP_ATTR_ALL_REG20GPC_AS_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_JP.0GFN_JP_ATTR
Association 0GPC_SP_ATTR_ALL_REG20GFN_JP_ATT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPINSC.0GPC_SPINSC_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPINSC
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPISPR.0GPC_SPISPR_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPISPR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_ENTTYP.0GFN_ENTTYP_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GFN_ENTTYP
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GFN_USER_T
Sub-query No
Foreign Key
Node 0GPC_SPTRTY.0GPC_SPTRTY_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPISCOM.0GPC_SPISCOM_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPISCO
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GPC_SP_ATTR_ALL_REG20GFN_OU_ATT
Foreign Key
Node 0GPC_SPVACD.0GPC_SPVACD_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPVACD
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPVACE.0GPC_SPVACE_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPVACE
Cardinality Arbitrary
Foreign Key
Node 0GPC_SPVATE.0GPC_SPVATE_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPVATE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPVAPL.0GPC_SPVAPL_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPVAPL
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPRTCD.0GPC_SPRTCD_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPRTCD
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPRTCE.0GPC_SPRTCE_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPRTCE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPRTTE.0GPC_SPRTTE_TEXT
Association 0GPC_SP_ATTR_ALL_REG20GPC_SPRTTE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_REG20GPC_SP_ATTR_SS
Sub-query No
Foreign Key
Node 0GPC_F5.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the remediation plan data.
Technical Data
DataSource 0GPC_PL_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GPC_PL_TEXT
Association
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_PL_ATTR20GPC_IS_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_STATUS_TEXT.0GFN_STATUS_TEXT
Association 0GPC_PL_ATTR20GFN_STATUS_TEXT
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Sub-query No
Node 0GPC_AS.0GPC_AS_ATTR
Association 0GPC_PL_ATTR20GPC_AS_ATTR_1
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_PL_CF_T.0GPC_PL_CF_T
Association 0GPC_PL_ATTR20GPC_PL_CF_T
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PL_CG_T.0GPC_PL_CG_T
Association 0GPC_PL_ATTR20GPC_PL_CG_T
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_PL_ATTR20GFN_TF_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_PL_ATTR20GFN_TF_FREQ
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_PL_ATTR20GFN_TF_YEAR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CASES.0GPC_CASES
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_REG.0GPC_CN_ATTR_ALL_REG
Association 0GPC_CN_ATTR_ALL_REG20GPC_PL_ATT
Sub-query No
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GPC_RE20GPC_PL_ATTR
Sub-query Yes
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GPC_PL_ATT
Sub-query Yes
Foreign Key
Node 0GPC_SP_REG.0GPC_SP_ATTR_ALL_REG
Association 0GPC_SP_ATTR_ALL_REG20GPC_PL_ATT
Sub-query No
Foreign Key
5.8.3.2.17 Subprocess
Use
This search and analytics model is used to get the subprocess data.
DataSource 0GPC_SP_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GPC_SP_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPINDU.0GPC_SPINDU_TEXT
Association 0GPC_SP_ATTR20GPC_SPINDU_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPSSAM.0GPC_SPSSAM_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPTRTY.0GPC_SPTRTY_TEXT
Association 0GPC_SP_ATTR20GPC_SPTRTY_TEXT_L
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_PR.0GPC_PR_ATTR
Association 0GPC_SP_ATTR20GPC_PR_ATTR
Foreign Key
Node 0GPC_SPINSC.0GPC_SPINSC_TEXT
Association 0GPC_SP_ATTR20GPC_SPINSC
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPISPR.0GPC_SPISPR_TEXT
Association 0GPC_SP_ATTR20GPC_SPISPR
Cardinality Arbitrary
Sub-query No
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_SP_ATTR20GFN_OU_ATTR_O
Sub-query No
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_SP_ATTR20GFN_OU_ATTR_SS
Sub-query No
Foreign Key
Node 0GFN_ENTTYP.0GFN_ENTTYP_TEXT
Association 0GPC_SP_ATTR20GFN_ENTTYP_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Association 0GPC_SP_ATTR20GFN_USER_TEXT
Sub-query No
Foreign Key
Node 0GPC_SPISCOM.0GPC_SPISCOM_TEXT
Association 0GPC_SP_ATTR20GPC_SPISCOM
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPTRTY.0GPC_SPTRTY_TEXT
Association 0GPC_SP_ATTR20GPC_SPTRTY_TEXT_C
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPVACD.0GPC_SPVACD_TEXT
Association 0GPC_SP_ATTR20GPC_SPVACD
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPVACE.0GPC_SPVACE_TEXT
Association 0GPC_SP_ATTR20GPC_SPVACE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPVAPL.0GPC_SPVAPL_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPVATE.0GPC_SPVATE_TEXT
Association 0GPC_SP_ATTR20GPC_SPVATE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPRTCD.0GPC_SPRTCD_TEXT
Association 0GPC_SP_ATTR20GPC_SPRTCD
Cardinality Arbitrary
Foreign Key
Node 0GPC_SPRTCE.0GPC_SPRTCE_TEXT
Association 0GPC_SP_ATTR20GPC_SPRTCE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_SPRTTE.0GPC_SPRTTE_TEXT
Association 0GPC_SP_ATTR20GPC_SPRTTE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Association 0GPC_SP_RS_CN_ALL20GPC_SP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN_RS.0GPC_CN_RS_ATTR
Association 0GPC_CN_RS_ATTR20GPC_SP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_CN_ATTR20GPC_SP_ATTR1
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CASES.0GPC_CASES
Association 0GPC_CASES20GPC_SP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GPC_SP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_JP.0GFN_JP_ATTR
Association 0GFN_JP_ATTR20GPC_SP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_M3.0GPC_CN_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the data of subprocess as risk source.
DataSource 0GPC_SP_RS_SOURCE_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GPC_SP_RS_SOURCE_TE
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_SP_RS_SOURCE_AT20GFN_OU_ATT
Sub-query No
Foreign Key
Node 0GPC_RSCN.0GPC_SP_RS_CN_ALL
Association 0GPC_SP_RS_CN_ALL20GPC_SP_RS_SOU
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GPC_RE20GPC_SP_RS_SOURCE_AT
Cardinality Arbitrary
Sub-query No
Foreign Key
5.8.3.2.19 Testing
Use
This search and analytics model is used to get the testing data.
Technical Data
DataSource 0GPC_TL_ATTR
ODP-Semantics Texts
Node 0GPC_TL_TEXT
Association
Cardinality Arbitrary
Sub-query Yes
Foreign Key
Node 0GPC_TLEXCE.0GPC_TL_EXCEPTION_T
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EVLTYP.0GPC_EVLTYP_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_RATING_TEXT.0GFN_RATING_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_STATUS_TEXT.0GFN_STATUS_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_TL_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_TL_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GPC_RE.0GPC_RE
Cardinality Arbitrary
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_TL_ATTR20GFN_OU_ATTR_1
Sub-query No
Foreign Key
Node 0GPC_SP.0GPC_SP_ATTR
Association 0GPC_TL_ATTR20GPC_SP_ATTR
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_TL_ATTR20GPC_CN_ATTR_1
Sub-query No
Foreign Key
Node 0GPC_EC.0GPC_EC_ATTR
Association 0GPC_TL_ATTR20GPC_EC_ATTR
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Cardinality Up to One
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Cardinality Up to One
Sub-query No
Foreign Key
Node 0GPC_TLCATE.0GPC_TL_CATEGORY_T
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_USER_TEXT.0GFN_USER_TEXT
Cardinality Up to One
Sub-query No
Foreign Key
Node 0GPC_TLTSTA.0GPC_TL_TEST_AUTOM_T
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TLTSTM.0GPC_TL_TEST_METH_T
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TLTSTM.0GPC_TL_TEST_METH_T
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TP.0GPC_TP_ATTR
Sub-query No
Foreign Key
Node 0GPC_CNTTEC.0GPC_CN_TTECH_TEXT
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_IS.0GPC_IS_ATTR
Association 0GPC_IS_ATTR20GPC_TL_ATTR_1
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the PC test plan data.
Technical Data
ODP-Semantics Texts
Authorization Checks
Node 0GPC_TP_TEXT
Association
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_TF.0GFN_TF_ATTR
Association 0GPC_TP_ATTR20GFN_TF_ATTR
Sub-query No
Foreign Key
Node 0GFN_TF_FREQ.0GFN_TF_FREQ
Association 0GPC_TP_ATTR20GFN_TF_FREQ
Sub-query No
Foreign Key
Node 0GFN_TF_YEAR.0GFN_TF_YEAR
Association 0GPC_TP_ATTR20GFN_TF_YEAR
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_CN_ATTR20GPC_TP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0.0GPC_V0_ATTR
Association 0GPC_V0_ATTR20GPC_TP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_EC.0GPC_EC_ATTR
Association 0GPC_EC_ATTR20GPC_TP_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_TL.0GPC_TL_ATTR
Cardinality Arbitrary
Sub-query No
Foreign Key
Use
This search and analytics model is used to get the test step data.
Technical Data
DataSource 0GPC_V0_ATTR
ODP-Semantics Texts
Authorization Checks
Node 0GPC_V0_TEXT
Association
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_CN.0GPC_CN_ATTR
Association 0GPC_V0_ATTR20GPC_CN_ATTR
Sub-query No
Foreign Key
Node 0GPC_EC.0GPC_EC_ATTR
Association 0GPC_V0_ATTR20GPC_EC_ATTR
Sub-query No
Foreign Key
Node 0GFN_OU.0GFN_OU_ATTR
Association 0GPC_V0_ATTR20GFN_OU_ATTR
Sub-query No
Foreign Key
Node 0GPC_PR.0GPC_PR_ATTR
Association 0GPC_V0_ATTR20GPC_PR_ATTR
Sub-query No
Foreign Key
Node 0GPC_SP.0GPC_SP_ATTR
Association 0GPC_V0_ATTR20GPC_SP_ATTR
Sub-query No
Foreign Key
Node 0GPC_RE.0GPC_RE
Association 0GPC_V0_ATTR20GPC_RE
Sub-query No
Foreign Key
Node 0GPC_TP.0GPC_TP_ATTR
Association 0GPC_V0_ATTR20GPC_TP_ATTR
Sub-query No
Foreign Key
Node 0GPC_V0FAILEND.0GPC_V0FENDS
Association 0GPC_V0_ATTR20GPC_V0FENDS
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0RESULT.0GPC_V0_TRESULT_TEXT
Association 0GPC_V0_ATTR20GPC_V0_TRESULT_TEX
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0SAMP.0GPC_V0_SAMPL_MTD_TE
Association 0GPC_V0_ATTR20GPC_V0_SAMPL_MTD_T
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GPC_V0TYPE.0GPC_V0_IS_TEST_TEXT
Association 0GPC_V0_ATTR20GPC_V0_IS_TEST_TEX
Cardinality Arbitrary
Sub-query No
Foreign Key
Node 0GFN_OU_REG.0GFN_OU_ATTR_ALL_REG
Association 0GFN_OU_ATTR_ALL_REG20GPC_V0_ATT
Sub-query No
Foreign Key
Node 0GPC_SP_REG.0GPC_SP_ATTR_ALL_REG
Association 0GPC_SP_ATTR_ALL_REG20GPC_V0_ATT
Sub-query No
Foreign Key
Node 0GPC_EC_REG.0GPC_EC_ATTR_ALL_REG
Association 0GPC_EC_ATTR_ALL_REG20GPC_V0_ATT
Sub-query No
Foreign Key
Work centers provide a central access point for the entire GRC functionality. They are organized to provide easy
access to application activities, and contain menu groups and links to further activities.
This documentation is structured according to the structures within the individual work centers, and contains
links to further documentation for the menu groups and links.
Note
The application provides a standard set of work centers. However, your system administrator can
customize them according to your organization's internal structures. Depending on the product or
products that you have licensed, different areas of the GRC application are displayed (SAP Access Control,
SAP Process Control, SAP Risk Management).
Related Links:
● My Home
● Master Data
● Rule Setup
● Assessments
● Access Management
● Reports and Analytics
6.1 My Home
Use
The My Home work center is shared by the Access Control, Process Control, and Risk Management products in
the GRC Application. The menu groups and quick links available on the screen are determined by the
applications you have licensed. The content in this topic covers the functions specific to Process Control. If you
have licensed additional products, such as Access Control or Risk Management, refer to the relevant topics
below for the application-specific functions.
The Process Control My Home provides a central location where you can view and act on your assigned tasks,
and accessible objects: organizations, processes, subprocesses, controls. It contains the following sections:
● View, access, and address workflow tasks assigned to you, including completed reports that you
scheduled.
● Search for objects and documents throughout the system.
● Assign delegates to perform your tasks or activities.
● View and process your user data.
More Information
Please also see the My Home Work Center topic in the documentation for SAP Access Control.
Please also see the My Home topic in the documentation for SAP Risk Management.
Use
The Work Inbox lists the tasks you need to process using GRC applications.
Activities
To process a task, choose a hyperlink in the table. The appropriate workflow window appears. Process the task
as required.
To change the displayed columns, choose Settings, maintain the columns as required, and save the view.
Use
From the My Home work center, the Ad Hoc Tasks section enables you to process risk proposals, incidents, and
issues, depending on the applications you have licensed.
● Risk Proposals — Refer to the topic Proposing a Risk in the application help for SAP Risk Management.
● Ad Hoc Risk Escalation — Refer to the topic Ad-Hoc Risk Escalation in the application help for SAP Risk
Management.
● Response Proposals — Refer to the topic Creating Response Proposals in the application help for SAP Risk
Management.
● Incidents — Refer to the topic Reporting an Ad-Hoc Incident in the application help for SAP Risk
Management.
● Issues — Identifying, Creating, and Assigning Ad Hoc Issues [page 385]
Use
Issues that did not arise from an evaluation-based test can be an issue, question, action item, or planned task.
Ad hoc issues can be prompted by compliance or business events or result from identifying a problem area. An
ad hoc issue can be created for any object, depending on the configuration done through the Customizing
activities.
If an Issue Owner or an object has not been identified, the issue is sent to the Issue Administrator. This person
can then assign an owner, an object or both. The Issue Administrator or the designee then processes the issue.
Prerequisites
Complete the Customizing activities at Governance, Risk and Compliance Common Component Settings
Ad Hoc Issues .
Procedure
An object owner is not required. If this field is left blank, the issue is routed to the issue
administrator.
○ Source
○ Issue Date (required)
○ Due Date
○ Notes
3. If you need to gather information, save your issue as a draft and return to complete it later.
4. Choose Add to select a regulation from the dialog box on the Regulation tab.
5. Attach files or links on the Attachment and Links tab.
6. Choose Save Draft to save changes or Cancel to abort the session. If the issue was raised in error, you can
void the issue.
7. Choose Submit after you have completed all information.
Web service GRFNAHISSUEIN is provided to create ad hoc issues and trigger workflows to the issue admin.
For more information about ad hoc issue web service, see Issue Management [page 525].
6.1.3 My Objects
Use
You can view and manage objects to which you have access using the My Objects section of the My Home work
center. Specifically, you can view and maintain the following objects:
● My Processes: View and maintain all local organizations, processes, subprocesses, and controls for which
you are responsible
● My Risks: View all risks for which you are the owner or for which you have change authorization
More Information
Please also see the My Responses topic in the documentation for SAP Risk Management.
Please also see the My Incidents topic in the documentation for SAP Risk Management.
6.1.3.1 My Processes
Use
Access My Processes from the work center My Home My Objects My Processes . Here you can view,
access, and edit all the local organizations, processes, and subprocesses for which you are responsible.
Note
If you are an organization owner but not an owner of lower-level objects within your organization (such as
controls or subprocesses), you still see those objects within My Processes. This is because you are
responsible for them although you are not the direct owner.
You must be responsible for objects, either as an owner of a higher-level object or as the owner of the object
itself, to be able to see data within My Processes.
Features
● Hierarchical view — The hierarchical view is most useful if you want to view objects in context or if you are
not sure of the name of an object and you want to explore the hierarchy.
● List view — The list view is useful if you have a few objects or if you want to use filtering to search for a
particular object.
Both views display general information about the object including whether or not you can change it. Once you
select an object, you can choose to open it to access more information or to edit the fields that allow changes.
Use
Access My iELCs (Indirect Entity-Level Controls) from the work center My Home My Objects My iELCs .
Here you can view, access, and edit all iELCs for which you are responsible.
Prerequisites
You must be responsible for objects, either as an owner of a higher-level object or as the owner of the object
itself, to be able to see data within My iELCs.
Features
● Hierarchical view — The hierarchical view is most useful if you want to view objects in context or if you are
not sure of the name of an object and you want to explore the hierarchy.
● List view — The list view is useful if you have a few objects or if you want to use filtering to search for a
particular object.
Both views display general information about the object including whether or not you can change it. Once you
select an object, you can choose to open it to access more information or to edit the fields that allow changes.
Under the My Home work center, you can see all the risks for which you are the owner and for which you have
change authorization under My Objects My Risks .
For more information, see the topic Risk and Opportunities in the application help for SAP Risk Management.
6.1.3.4 My Policies
Use
The My Policies section contains the policies that pertain to your responsibilities (either created by you or
requiring your review or approval).
Under the My Home work center, you can see all the policies with your involvement under My Objects My
Policies .
More Information
Use
An issue is an exception, actual problem, or incident that has been identified for review. In such cases, a
remediation plan may be implemented to resolve or deal with the issue identified.
Under the My Home work center, you can see all issues for which you have reporting authorization under My
Objects Open Issues . Here you can access both evaluation test issues and ad hoc issues.
● Reporting authorization is granted based on the objects to which the issue is linked to. If you have
reporting authorization for the objects, you also have authorization for the linked issues.
● Ad hoc issues are also located under My Home Ad Hoc Tasks Issues .
More Information
Under Open Remediation Plans, you can maintain all the remediation plans for which you have change
authorization. You assign a remediation plans to an issue when you create a control in Process Control.
Use
The Embedded Search function in SAP Process Control and SAP Risk Management allows you to search for
objects and documents in a browser-based user interface. The search results include basic information of
objects and documents with hyperlinks, through which you can directly access the related applications and
documents.
Features
In SAP Process Control and SAP Risk Management, the following objects are available for search:
● Account Group
● Activity
● Ad-hoc Issue
● Assessment
● Business Rule
● Control
● Documents
You can configure Embedded Search by activating and deactivating these objects in Customizing activity Open
Administration Cockpit under Governance, Risk and Compliance General Settings Search .
Activities
You can use the advanced search function to specify the search scope, save your search terms, and hide/show
search criteria. You can filter the search results by choosing the categories on the left side.
You can delegate the access rights and tasks of one user, the delegator, to another user, the delegate, for a
specific time period or indefinitely. From the My Home work center, choose My Delegation
Caution
Authorization granted to power users through the role SAP_GRC_FN_ALL cannot be delegated to
business users. If the power user needs to delegate his authorization to others, he must ask the IT
department to assign the PFCG role SAP_GRC_FN_ALL to that user. This delegation is not entity
dependent. For more information, see Central Delegation [page 513] and Standard Roles and
Authorization Objects [page 37].
Delegation does not remove access or tasks from the delegator. Instead, it allows the delegate to work with the
same access and tasks on behalf of the delegator. Both the delegator and the delegate can access the system
at the same time, as long as they do not access the same objects or activities.
Context
You can authorize another business user to perform your tasks, exercise your access rights, and specify the
duration of the delegation.
Caution
Authorization granted to power users through the role SAP_GRC_FN_ALL cannot be delegated to business
users. If power users needs to delegate their authorization to others, they must ask the IT department to
assign the PFCG role SAP_GRC_FN_ALL to specified users. This delegation is not entity-dependent.
Procedure
To delegate your tasks and access rights to another user, proceed as follows:
The Assign Own Delegate screen displays your existing delegations. You can create a new delegation, open
and edit an existing delegation, or delete a delegation.
2. To create a new delegation, choose Create.
Note
4. Select a user name and choose OK. The system completes the Delegator and User ID fields.
5. For the Delegation Period the following points apply:
○ The Start Date field defaults to the date the delegation is created. You can change this field.
○ The End Date field defaults to unlimited (December 31, 9999). You can change this field. If you accept
the default of an unlimited End Date, you can change the date later or delete the delegation when it is
no longer needed.
To edit an existing delegation, proceed as follows:
6. Choose the delegation assignment.
7. Choose Open.
The Own Delegation screen appears. You can only change the End Date.
8. Choose Save.
To delete an existing delegation, proceed as follows:
These features allow you to access the most commonly used applications, view user-specific entity data and
status, search for objects, and perform various other tasks.
SAP Process Control and SAP Risk Management provide the following features:
Use
Entry page is a role-based Web Dynpro home page that provides user-specific contents and easy access to the
most commonly accessed work center items. Entry page can be configured according to specific user
behaviors. Entry page consists of containers and Collaborative Human Interface Parts (CHIPs). You can
personalize the entry page by adding or removing containers and CHIPs.
Note
SAP Process Control roles are only valid if you have also installed and possess a license for the SAP Process
Control application).
More Information
For more information about available SAP Risk Management CHIPs, see GRC CHIP Catalog [page 394]
Use
Note
The following information is only relevant if you have licensed SAP Process Control.
Side panel is a CHIP-based widget-type panel that can be accessed from an existing Web Dynpro application. It
provides additional information and easy access to work center items.
In SAP Process Control, side panel is user-specific. It is available for the following users:
In Process Control, you can configure the side panel for My Processes for a single role or a group of roles using
the Customizing activity Configure Side Panel for My Process under Governance, Risk and Compliance >
General Settings > UI Settings.
More Information
Use
A CHIP (Collaborative Human Interface Part) is a small, widget-type, encapsulated, stateful piece of software
that can be combined in a layout with other CHIPs to form a page or a panel. Entry page and side panel are both
implemented using the CHIP technology.
The following CHIPs are available in SAP Risk Management (and in SAP Process Control, if you have installed
and possess a license for the SAP Process Control application):
Ad Hoc Issues for Audit Ac GRFN_ACTION_ADIS Display a list of ad hoc issues Use in entry page
tions SUE_LIST_CHIP for audit actions
Audit Action and Ad Hoc Is GRFN_ACTION_ISSUE_CHIP Allows you to view ad hoc is Use in side panel
sue sues under specified audit
actions
Audit Dashboard GRFN_DAB_AUDITA Provides risks and audit pro Use in entry page
BLE_CHIP posal information in graphics
Audit Dashboard: Risks by GRFN_DAB_AUDITA Provides risk information by Use in entry page
Auditable Entities BLE_RISKS auditable entities in graphics
Audit Dashboard: Audit Pro GRFN_DAB_AUDITA Provides audit proposal infor Use in entry page
posals by Auditors BLE_APA mation by auditors in graph
ics
Audit Dashboard: Audit Pro GRFN_DAB_AUDITA Provides audit proposal infor Use in entry page
posals by Auditable Entities BLE_APAE mation by auditable entities
in graphics
Audit Plan Proposal GRFN_UIBB_AP_CHIP Displays the information of a Use in side panel
specific audit plan proposal
Criteria Data CRITERIA_CHIP_4_EN Used together with other Use in entry page
TRY_PAGE CHIPs to provide criteria data
for entry page
Evaluation Status (Pie View) GRPC_CHIP_EVAL_STAT Presents the status of evalu Use in side panel
ations in graphics
Evaluation Status (Column GRPC_CHIP_EVAL_STAT_CO Presents the status of evalu Use in entry page
View) LUMN ations in graphics
Issue Status (Pie View) GRPC_CHIP_ISSUE_STAT Presents the status of issues Use in side panel
in graphics
Issue Status (Column View) GRPC_CHIP_IS Presents the status of issues Use in entry page
SUE_STAT_COLUMN in graphics
Open Issues GRFN_OPEN_ISSUE_CHIP Displays open issues accord Use in side panel
ing to a specific object, such
as subprocess, control, etc.
Risk Heatmap GRRM_CHIP_HEATMAP Displays risks by level and Use in entry page
impact in matrix
Timeframe Filter GRFN_TIMEFRAME_FIL A filter used together with Use in entry page
TER_CHIP other CHIPs
Passed/failed of Control GRRM_CHIP_PASS_FAIL_CN Displays the passed/failed Use in the side panel of risk
TL status of controls that are OIF
used in risks as response
Open Issues GRRM_CHIP_OPEN_ISSUE Displays the ad-hoc issues Use in entry page
New Entered Risks in the last GRRM_CHIP_NEW_RISKS Displays newly entered risks Use in entry page
14 days in the last 14 days
Risk heat map GRRM_CHIP_HEATMAP Displays risk heat map Use in entry page
Scope Selection GRRM_CHIP_SCOPE Provides the selection of date Use in entry page
and organization, which will
be used as a scope for other
chips in the entry page
Top Risks GRRM_CHIP_TOP_RISKS User report CHIP Top Risks This chip is not used in the
(Variant of GRRM_R5) to get default delivery
the top risks
Workflow Monitor GRRM_CHIP_WI_MONITOR Monitors all the work inbox This chip is not used in the
tasks for all users in the sys default delivery
tem. Only the power user
who has the authorization is
allowed to do this activity.
Recent Loss Events GRRM_OB_CHIP_RE Displays the recent Loss Use in entry page
CENT_LOSSES Events from Banking created
during the last 14 days
Top Losses GRRM_OB_CHIP_TOP_LOSS Risk Banking Top Losses dis Use in entry page
ES plays the Top 5 loss events
comparing with Estimated
Loss
Loss Event Workflow Pipeline GRRM_OB_CHIP_WF_PIPE Displays the Loss Event Use in entry page
LINE Workflow in the form of Pipe
line and table list
More Information
For more information about standard SAP CHIPs, see CHIP Catalog.
For more information about creating CHIPs, see Creating Mashups with the Page Builder.
Use
The Master Data work center is shared by the Access Control, Process Control, and Risk Management products
in the GRC Application. The menu groups and quick links available on the screen are determined by the
applications you have licensed. The content in this topic covers the functions specific to Process Control.
The Process Control Master Data work center contains the following sections:
More Information
● For information relating to Master Data functions in Risk Management, see https://help.sap.com/viewer/
51bbedc6646d4ff5b35b9d883be390a6/12.0.00/en-US/646bde178c07438187431e6c1746ea88.html
Definition
Use
You can use the functions on the Organizations screen to create and maintain an organizational structure within
the application that mirrors the organizations in your company.
Integration
● If you have licensed Risk Management, Process Control and Access Control and want to use them for the
same organization, the application must share a common organizational view. Complete the Customizing
activity Maintain Organization Views, under Governance, Risk, and Compliance General Settings
Workflow
● To create the root organization and its first child organization in the specified organization view, complete
the Customizing activity Create Root Organization Hierarchy, under Governance, Risk, and Compliance
General Settings Workflow
More Information
Also see the Organizations topic in the documentation for SAP Access Control.
Also see the Working with Organizational Units topic in the documentation for SAP Risk Management.
Use
You create and edit organizations as a step in documenting your compliance initiative. The configurations you
choose affect authorizations and workflows.
The following prerequisites must be fulfilled before you can work with organizations:
● To assign roles, complete the Customizing activity Maintain Entity Role Assignment, under Governance,
Risk, and Compliance General Settings Authorizations .
● For the Issues tab to display for organizations, complete the Customizing activity Enable Ad Hoc Issues by
Object Type, under Governance, Risk, and Compliance Common Component Settings Ad Hoc
Issues .
● If you are using SAP workflow functions, ensure that the corresponding roles are assigned to business
events in the Customizing activity Maintain Custom Agent Determination Rules, under Governance, Risk,
and Compliance General Settings Workflow .
Process
Note
Organizations are time-dependent. Ensure that you select the right time duration.
2. Assign subprocesses.
Note
The default assignment method for subprocesses is to not allow local changes, but you can change this
default assignment method in Customizing for Governance, Risk and Compliance under Shared
Master Data Settings Define Default Subprocess Assignment Method .
More Information
Note
The View field enables you to switch between different views of the organizational entities in a hierarchy
by making a selection in this dropdown field. You can also select by date, seeing organizational units
that were created on an earlier date.
3. To create an organization in the hierarchy, put the cursor on the parent organization or on the organization
for which you wish to create a suborganization. The screen of the organization opens.
4. Click Add. You are prompted to specify whether you want to create a new organization or reuse an existing
organization:
○ If you create a new organization, proceed as described in the section Working with the Organization
Tabs below.
○ If you want to reuse an existing organization, click Reuse existing organization. Then select the
organization that you want to reuse and click OK. After this, select the organization in the overview
screen and proceed as described below.
1. On the General tab, enter values for all required fields and other fields as needed.
2. On the Subprocess tab, you see the subprocess assigned to this organization. Select Assign Subprocess
and follow the guided activity to assign a new one.
Note
The default assignment method for subprocesses is to not allow local changes, but you can change this
default assignment method in Customizing for Governance, Risk and Compliance under Shared
Master Data Settings Define Default Subprocess Assignment Method .
3. On the Indirect Entity-Level Controls tab, you can see and assign a new iELC to this organization.
4. On the Regulation tab, you can see the assigned regulations and the values of regulation-specific
attributes. Regulation in the organization is inherited from the assigned subprocesses and iELC. See
Regulations [page 401].
5. On the Policies tab, you can see the policies that have been created for this organization. See Policies [page
402].
6. On the Assignments tab, you can see which views pertain to the organization and the relevant application
components.
7. On the Issue tab, you can see the ad hoc issues which were raised for this organization. See Open Issues
[page 389].
Use
Regulations and Policies gives you visibility into your compliance landscape.
More Information
6.2.2.1 Regulations
Use
In the regulation hierarchy, you document which compliance initiatives your company supports. For each
compliance initiative, you can document the regulation and its requirements. After defining a new regulation,
you specify the subprocesses and controls that are relevant to that regulation.
Prerequisites
● Maintain Regulation Role Assignments under Governance, Risk, and Compliance Process Control
Authorizations
● Relate Regulation to Plan Usage under Governance, Risk and Compliance Process Control Multiple
Compliance Framework
Example
You have a group of financial compliance initiatives that could include SOX, J-SOX, and IDS or a group of
operational compliance initiatives that include FDA and Life Sciences regulations.
Maintain your regulation hierarchy to the individual requirement level, if desired. For example, you can maintain
SOX compliance down to the regulation requirement SOX 302. If you maintain regulation requirements, you
can assign them to controls and track the affected requirements at the control level.
More Information
6.2.2.2 Policies
Use
A policy is a set of principles, rules, and guidelines that are formulated or adopted by an organization to reach
its long-term goals. Policies are designed to influence major decisions and actions, and all activities take place
within the boundaries set by them. They are used in Process Control and Risk Management.
A policy contains a written description of an organization's position on important subjects and its response to
specific situations. Policies support managerial decision-making, to help the company achieve its objectives.
Policies are an element of a complete governance process. This process involves an analysis of regulations,
best practices, and corporate business objectives, after which they are codified into policies affecting the
business actions of all employees.
Policies need to be created, reviewed, approved, and distributed; there is an ongoing process of policy
acknowledgment, self-assessment, and updates. Policies must be managed throughout their lifecycle.
Prerequisites
According to your business needs, complete the Customizing activities under Governance, Risk, and
Compliance Common Component Settings Policy Management .
Procedure
You must create a policy group before you can create a policy.
Description (optional) Enter information to tell users the contents of the Policy
Group.
Note
You must have previously created an Approval Survey
in the Survey Library.
Prerequisites
You must create a policy group before you can create a policy.
Context
Policies are principles, rules, and guidelines formulated or adopted by an organization to reach its long-term
goals.
Example
A Global Travel Policy is one example of a business policy. The goal might be to reduce costs and increase
efficiency by mandating that everyone in the company adhere to this policy.
Procedure
Note
The Policy Object Types are configured during the Customizing activity Maintain Policy Types and
Distribution Methods under Governance, Risk, and Compliance Common Component Settings
Policy Management .
Description (optional) Enter information to tell users the contents of the policy.
Policy Category (optional) Select the categories this policy belongs to.
Responsible Organization (required) Enter the organization responsible for the policy.
Created by (optional) The default is the person who created the policy.
Valid From (required) Enter the first date of effectiveness for the policy.
Valid To (required) Enter the last day of effectiveness for the policy.
Date for Next Revision (optional) Enter the date for the next revision. This date must be be
tween the Valid From and Valid To dates.
6. Select the Policy Document tab. Attach the actual policy documents (word files, excel files, images) that
contain the written policy. The policy documents may reside in SAP Document Management Systems
(DMS) or you may include links to documents residing in external DMSl.
7. Select the Policy Scope tab.
You document who is in scope and subject to the policy. You may also explicitly specify who is excluded
from the scope of this policy. Define which Organizations, Processes (contained in the Organization),
Activities, People (can be roles, user groups, or specific users) or Exclusions you want to identify (text field).
This is who receives the policy when it is published.
8. Select the Risks tab.
This is the risk associated with the nonadherence to the policy. If the company is not compliant with the
policy, this is the risk that could occur.
9. Select the Controls tab.
Assign the controls or indirect entity-level controls that pertain to the policy.
10. Select the Policy Sources tab.
Note
The Policy Sources are configured during the Customizing activity Maintain Policy Source Categories
under Governance, Risk, and Compliance Common Component Settings Policy Management .
If there are any ad hoc issues related to this policy that need to be addressed, they will be displayed in this
tab.
12. On the Roles tab you can assign users to individual roles (such as Policy Owner, Policy Approver and Policy
Reviewer), as well as replace or remove them. To assign a user, select the line of the role to which you want
to assign a user. Then choose Assign. In the dialog box then displayed, you can search for and select the
user to be assigned to this role. You can assign multiple approvers and reviewers.
13. Select the Review and Approval tab to view the status or the approvals. If you did not assign specific
reviewers or approvers, the Default Approvers (usually the Organization Owner — the owner of the
organization specified in the Policy Scope tab) are asked to approve the policy.
14. Choose Save.
15. Decide if you can immediately Submit for Approval or if you need to Send for Review.
Next Steps
Prerequisites
Policy reviewers were set up by the policy owner (author of the policy).
After the policy owner submits the newly created policy for review, the policy review workflow is sent to the
reviewer. If the policy owner has set up more than one reviewer, then a parallel policy review workflow is sent to
all the reviewers at once.
Procedure
Note
If you accept the policy draft with no changes, then comments are optional. Before submitting the
comments, the reviewer can delete comments he or she has entered. The reviewer cannot delete
comments entered by other reviewers. Once a reviewer submits a comment, it cannot be modified or
deleted.
5. After the comments have been submitted, the policy owner can see all comments in a compiled format.
The policy owner revises the policy draft based on the review comments. As long as the policy owner does
not submit the policy for approval, reviewers can continue to enter comments by selecting the Review
Policy link in their Work Inbox.
Next Steps
Prerequisites
The policy approvers must be set up by the policy owner or the default approvers may be determined by the
workflow engine (based on the organizations and processes assigned to the policy).
Note
● If the policy applies to an organization, then that organization owner becomes the default approver.
Since all the users in the organization are subject to this new policy, the organization owner must
approve it.
● If the policy applies to a certain process and/or subprocess, then the respective owner becomes the
default approver. Since all the users in the process and/or subprocess are subject to this new policy,
the process/subprocess owners must approve it.
● There may be other roles assigned to the policy approver role in the configuration, for a certain
organization, process or subprocess, who also receive the approval workflow.
Context
After the policy owner ensures that all the review comments have been incorporated, the owner submits the
final draft of the policy for approval. One or more approvers may be responsible for this policy, as determined
by the workflow engine and as specified by the policy owner. The defined approvers receive the approval
workflow in their GRC Inbox.
Procedure
Next Steps
Prerequisites
The policy must have been reviewed by the policy reviewers and approved by the policy approvers. After
approval, the policy is published directly.
Context
A new policy is published to the Policy Library and is then available to all authorized users for viewing and is
available for distribution and policy attestation.
Note
The Distribution Method (Quiz, Survey, or Acknowledgement) is also defined when the policy is
created.
Next Steps
6.2.3 Objectives
Depending on the products you have licensed, in the Objectives section of the Master Data work center, you can
maintain Control Objectives [page 410] and https://help.sap.com/viewer/
51bbedc6646d4ff5b35b9d883be390a6/10.1.19/en-US/8ddd8b4c9b4140c3a8e23baa6ab9ecc5.html .
Use
Control objectives define statements of desired results or purposes. You assign these statements to the
relevant subprocesses. Control objectives document the objectives that are relevant for the specific
subprocess.
Activities
Control Objective - required Enter a name for the control objective. This is a 40-char
acter text field that the system uses in reports that are re
lated to control objectives.
Objective Category - required Select the objective category from the dropdown menu.
This value is used with the control type attribute within the
control. Your choices include the following categories:
Valid To and Valid From - required Enter a date range for the control objective to be valid or
accept the default Valid To date of December 31, 9999
(preferred).
4. On the Subprocesses tab, choose Add to associate the desired subprocesses to your control objective.
5. On the Risks tab, select Add to associate the risks with your control objective.
6. On the Attachments and Links tab, choose Add to associate documents or links to your control objective.
7. Choose Save.
Note
To change a control objective, follow the same procedure except, in step 2, you select an existing control
objective and then choose Open.
The Activities and Processes section in the Master Data work center is where you maintain your company's
activities, business processes, subprocesses, and controls. It contains the following links:
Use
Business processes in the Activities and Processes section of the Master Data work center enable you to create
a business process structure containing all your central business processes, to which individual controls are
assigned.
A process refers to a set of activities that relate to a function in an organization’s operations. These activities,
when carried out, produce the desired output or process result.
The activities detail the flow of material and information between the process steps and the business decisions
that determine how a process step is accomplished. A process can contain subsets of activities called
subprocesses.
A process includes controls to ensure that the process, and corresponding subprocesses, can be performed
according to the company’s requirements. These controls are activities designed to address control objectives
and to mitigate risks in the company’s internal control environment.
Example
An example of a process is the order-to-cash process, which starts with sales order creation and ends with
receipt of cash from customers for goods delivered or services rendered.
A subprocess for this activity can be sales order processing, which pertains to the receipt, processing, and
execution of a sales order.
A control activity within the subprocess can be the review of sales orders to ensure that only sales orders
within the customer’s authorized credit line are processed.
The process structure allows you to create processes, add subprocesses within a process, create controls
within a subprocess, and associate the relevant account groups and control objectives, or risks, to specific
subprocesses and controls.
● The process is the highest level node to which the subprocesses and controls are assigned.
● Each subprocess can have one or more controls assigned to it. Control objectives, account groups, risks,
and regulations are also assigned to subprocesses.
● Risks can be identified on subprocesses, control objectives, or account group assertions.
● Controls can be assigned to mitigate the risks identified.
Activities
Use
You use this procedure to create and edit processes and controls.
You can load values by activating the delivered business configuration sets (BC sets) during the
Customizing activity, Activate Business Configuration (BC) Sets under Governance, Risk, and Compliance
General Settings .
Procedure
Valid To and Valid From - required Enter the validity date range. In most cases, the Valid To
date should be unlimited.
8. (Optional) On the Attachment and Links tab, choose Add to add a file or a link. You can attach a process
flow diagram or a process narrative.
9. Choose Save. The Process Structure screen displays your new, or edited, process in the hierarchy.
Note
Processes may be nested under other processes to support hierarchical process definitions. For example,
to reflect the needs of the business, you might define the top-level process as a business cycle, and the
next level process as a major process.
Once you have created a process, you can create subprocesses or edit existing subprocesses.
Recommendation
For more information, see Creating and Editing Processes and Controls [page 413]
3. Select the process under which you want to add a new subprocess.
○ To create a subprocess, choose Create Subprocess .
○ To edit a subprocess, choose the subprocess you want to edit and choose Open.
The Central Subprocess screen appears.
4. On the General tab, enter or edit the following information:
Field Description
Valid To and Valid From - required Enter or edit the validity date range for the subprocess. In
most cases the Valid To should be unlimited.
Industry Specific – optional This allows tracking of subprocesses related to specific in
dustries. Select Yes or No. If you select Yes, an Industry
field appears. Select the industry from the dropdown list.
5. On the Control Objectives tab, you can add or edit the control objectives associated with the subprocess.
This indicates which control objectives are supported by controls within this subprocess.
1. Choose Add to add a control objective.
The Add Control Objectives table appears a list of your control objectives.
2. Choose the desired Control Objective to highlight and select it.
3. Choose OK.
Based on your selection, the system fills the following fields on the Control Objectives tab:
6. On the Accounts Groups tab, you can add account groups to the subprocess. This indicates which account
groups and assertions are supported by controls within this subprocess.
1. Choose Add.
A selection screen of account groups appears.
2. Choose the desired account groups to highlight and select them.
3. Choose OK.
7. On the Risks tab, you can add, edit, or remove the risks that you want to associate with your subprocess.
1. Choose Add to assign a new risk, or, choose Open to modify a risk that is already assigned to the
subprocess.
2. Select the desired risks from the Add Risks table and choose OK.
3. If you want to change a risk that is already assigned to your subprocess, choose Open.
The Central List screen appears.
4. If you want to remove a risk from your subprocess, select the risk and choose Remove.
8. (Optional) On the Attachment and Links tab, choose Add to add a file or a link. For example, you can attach
a process documentation file for your subprocess.
9. On the Regulations tab, choose Add to assign a new regulation. Select the desired regulation and choose
OK.
○ If you want to remove a regulation from your Subprocess, select the regulation and choose Remove.
10. Select Save.
The Subprocess Structure screen appears your new or edited subprocess under the process hierarchy that
you selected.
Prerequisites
Indirect entity-level controls (iELC) must be created before they can be assigned to organizations.
Procedure
Recommendation
Holding down the CTRL key allows you to select multiple lines. Holding down the SHIFT key allows
you to select consecutive items. If you want to remove an indirect entity-level control from the
selection, hold the CTRL key and choose the control to deselect and remove it from the list.
○ Choose OK once all desired indirect entity-level controls are selected. The system displays a table
showing all selected indirect entity-level controls.
6. Choose Save.
Note
The system creates indirect entity-level controls that are local to that organization. Users with access
to indirect entity-level controls within that organization can display or edit them in Process Control
My Home My Objects My iELCs. .
Definition
The Risks and Responses section of the Master Data work center enables you to maintain your organization's
risk, opportunity, and response catalogs. It contains the following Quick Links:
● Risk Catalog
● Opportunity Catalog
● Response Catalog
More Information
Please also see the following topics in the documentation for SAP Risk Management:
● Risk Catalog
● Opportunity Catalog
● Classifying Risks, Opportunities, and Responses
Definition
A Risk Catalog provides a structured view of all risks to your company. The catalog allows you to sort risks
hierarchically, as well as to classify risks according to the categories of risks that you wish to track. The catalog
also facilitates reporting, for example, to evaluate the risks per risk category defined for your company.
Structure
To access the Risk Catalog, go to the Risks and Responses section of the Master Data work center.
More Information
Please also see the Risk Catalog (Risk Management) topic in the documentation for SAP Risk Management.
6.2.6 Accounts
Use
You use the Accounts menu group to create account groups that are relevant to your compliance initiatives.
The account group hierarchy represents accounts that include external financial statements.
Each account group has its own attributes, such as the significance of the account group at the corporate level;
and, assertions regarding the account group relative to the financial statements. In the account group
hierarchy, you can see which accounts are significant and for what reasons.
For Sarbanes-Oxley purposes, an account is deemed to be significant if there is a reasonable possibility that a
misstatement in the account will result in a material effect on the financial statements. Other compliance
initiatives related to financial reporting may use similar concepts.
Financial assertions are declarations made by management about an entity’s significant accounts that are
reported on their financial statements. For Sarbanes-Oxley purposes, financial assertions cover completeness,
existence or occurrence, rights or obligations, valuation or allocation, presentation and disclosure. The Process
Control-delivered business content provides these values, which can be configured as needed.
Activities
Procedure
1. Choose Master Data Accounts. The account group hierarchy displays based upon the selected
period and year.
2. In the hierarchy, choose an account group under which you want to create a lower level account group.
Note
If you need to create the top node, select the Account Group Hierarchy (top) row.
Field Instructions
Valid From and Valid To (required) The Valid From date defaults based upon the date of the
parent object, your current timeframe, and sign-off status.
You may change the default if desired.
Significant You can see which accounts are designated significant and
for what reasons.
6. On the GL Accounts tab, you can manually define specific general ledger accounts that includes the
account group. This entire tab is optional, as many auditors focus more on the financial statement level
accounts than on individual general ledger accounts.
7. On the Risks tab, you can add or remove risks that are associated with the account group and account
assertions.
8. On the Attachments and Links tab, you can optionally attach or link supporting files to an account group.
9. Once the required and desired information for all tabs has been entered, select Save. The new account
group added displays beneath the node in the account group hierarchy that you originally selected.
10. Repeat this process to create additional nodes for your account group hierarchy, if needed. The account
group you are adding becomes a subnode (at the next lower level in the hierarchy) of the account group
that you initially selected.
● Change the structure of an account group hierarchy or search for an account group.
● Edit the attributes of an account group.
1. Choose Master Data Accounts. The account group hierarchy displays based upon the selected
period and year.
2. Choose the account group you want to move. You can rearrange the order of account groups within a node;
or, you can move account groups to a different node.
3. Choose Actions and select Cut, Paste, Up, or Down to move the accounts to the desired location.
Note
You cannot move an account group under another account group with a different validity period unless
the child account group validity is within the parent account group validity. You cannot delete an
○ Select Expand All or Collapse All to display or hide all subnodes in the account group hierarchy.
○ Select Find and Find Next to search for a specific account group.
Recommendation
The Creating Account Groups topic contains details on each tab where edits are possible. For more
information, see Creating Account Groups [page 419].
Use
● Enter or upload balances for the account groups that you defined at the global level.
● Determine the significance threshold for consolidated account group balances.
● Apply a significance threshold to flag consolidated account groups as significant.
Note
Activities
Note
You can manually mark an account group balance as significant or you can let the system do it for you
based on Significance Threshold that you specified.
Use
You use the Organization-Level Balances and Significance function to do the following:
● Enter or upload balances for the account groups at the compliance-initiative specific level.
● Determine the significance threshold for compliance-initiative specific account group balances.
● Apply a significance threshold to mark account groups as significant, or not.
Note
The system flags organizations and subprocesses as in scope if the account groups assigned to its
subprocesses are identified as significant. Organizations and subprocesses can be in scope for one
timeframe and not for another. This attribute can be adjusted by users with appropriate access privileges.
Activities
This topic lists the reports available under the Reports section of the Master Data work center.
Note
The Reports section is shared by Risk Management and Process Control. Based on the applications you
have licensed, you may see only a subset of the reports.
Risk and Control Matrix This report provides information on control and risk matrix.
You can find out what risks specific controls are covering,
under different risk models (Subprocess – Accounts Group
and Assertions – Risk – Control; Subprocess – Control Ob
jective – Risk – Control; Subprocess – Risk – Control).
Risk Coverage This report provides visibility into the coverage of risks by
controls by organization and process. For each risk associ
ated with a subprocess, it shows the list of controls as
signed. You can review this report and understand the risk
gaps to determine if new controls are needed.
Organization and Process Structure This report provides visibility into the organization - process
- subprocess - control hierarchy. You can review this report
and understand what controls and processes are assigned
under each of the business entities.
Indirect Entity-Level Control (iELC) Structure This report provides visibility into the organization - indirect
entity-level control structure. You can review this report and
understand what indirect entity-level controls are imple
mented under each business entity and determine if new
iELCs are needed.
Test Plan by Control This report provides visibility into the coverage of test plans
by controls by organization and process. For each control, it
shows the list of test plans assigned. You can review this re
port and determine if test plans have been assigned properly
to all controls to be tested.
Change Analysis This report provides visibility into all process control object
changes and details within a selected time period. You can
review this report and find out what changes (creation, mod
ification, removal, and role assignment) have been per
formed to each object.
Audit Log This report shows chronologically all changes to local and
central objects within a time period. You can review this re
port and find out what changes have been performed to
each central or local object.
Risk-Based Compliance Management This report provides visibility into the coverage of both Risk
Management and Process Control risks by organization and
process. For each risk, it shows the list of controls assigned
as well as the control design and testing status. You can re
view this report and understand the risk gaps to determine if
new controls are needed.
Policies by Regulation This report provides a method to access all policies, proce
dures, work instructions, and so on, that the company has in
place to address a certain regulation and/or requirement.
Policies Versions This report provides the capability to look at the different
versions of a policy, procedure, work instruction, and so
forth, to provide an idea of how the policy has progressed
and evolved over time. This report also shows the docu
ments (with the version numbers) that were attached to the
policy object in its different versions. The ownership and cre
ation information for each of the versions is also available in
this report.
Risks Associated with Policies This report provides the ability to access the local Risk Man
agement risks associated with a certain policy, procedure,
work instruction, and so on. It also can retrieve a report that
lists all the policies, procedures, work instructions, and so
forth, that the company associated with a risk.
Processes and Controls with Policies This report details the processes that are impacted by a cer
tain policy. It also lists which controls are in place to ensure
compliance with the policy.
Regulation/Policy Requirement-Control Coverage This report provides visibility into the coverage of controls by
requirement by regulation or policy. For each regulation re
quirement, it shows the list of controls assigned. You can re
view this report and determine whether further controls are
needed.
Control-Regulation/Policy Requirement Coverage This report provides visibility into the coverage of require
ments by controls by organization and process. For each
control, it shows the list of requirements assigned. You can
review this report and determine whether further require
ments could be covered by a specific control.
Use
The Rule Setup work center is shared by the Access Control, Process Control, and Risk Management products
in the GRC Application. The menu groups and quick links available on the screen are determined by the
applications you have licensed. The content in this topic covers the functions specific to Process Control. If you
have licensed additional products, such as Access Control or Risk Management, refer to the relevant topics
below for the application-specific functions.
More Information
● Please also see the Rule Setup topic in the documentation for SAP Access Control.
● Please also see the Rule Setup topic in the documentation for SAP Risk Management.
Definition
Depending on the products you have licensed, the Continuous Monitoring section of the Rule Setup work center
gives you access to the following:
More Information
Definition
A data source is a set of fields that provides the information for Continuous Monitoring. From a technical
viewpoint, the data source is a set of logically-related fields that retrieve a flat structure from a system, such as
an ERP system, that is monitored.
Data sources supply the metadata description of source data. They extract the data description (including
name, type, and a source path from a source system). They are the foundation to create a Continuous
Monitoring business rule.
● Data source — records what is monitored, and where and how to load the information.
● Business rule — contains information about how to filter the data and detect deficiencies.
● ABAP Report
● SoD Integration
● BW Query
● Configurable
● Event
● External Partner
● Process Integration
● Programmed
● SAP Query
● HANA
Integration
To perform this function, you must be assigned to the Data Source Specialist role. Different subscenarios
require different prerequisites.
SoD Integration No connector required. SAP Access Control has been activated
Configurable X ● For Connection Type: SAP System, the GRC plug-in (RTA) must
be installed on the ERP system.
Note
SAP ERP 4.6 C and below are not supported. These con
nectors are not shown in the list.
Event No connector required. Define the event definition in the Customizing activities.
You are receiving the
event from another sys
tem.
External Partner X For external partners who implement Web service based on Web
Service Definition Language (WDSL) provided by SAP. Create a log
ical port.
Process Integration No connector required Process Integration development is done. The proxy must contain
both import and export parameter.
SAP Query X SAP query (not implemented by logical database). Use transaction
code SQ01 to choose a valid query.
1. Choose Rule Setup Continuous Monitoring Data Sources . The Data Source List screen displays.
2. Choose one of the following options:
○ Create — Use this option to create a data source.
○ Open — Use this option to view or edit an existing data source. You cannot change a data source that a
business rule is using.
○ Delete — Use this option to delimit a data source. You cannot delete a data source a business rule is
using.
○ Copy — Use this option to copy an existing data source and change it.
Parameter Instructions
Valid From (required) Enter the start date for the validity period of the data source.
Valid To (required) Enter the end date for the validity period of the data source.
Note
The Valid To date must be later than the Valid From date.
Status Select the data source status from the dropdown menu. You can select one
of the following options:
○ New – The data source is a draft. From this status, you can only change
it to In Review.
○ In Review – The data source is in review. From this status, you can only
change it to Active.
○ Active - Once a data source is Active, you can assign it to a business
rule. You can set the status to In Review to make any changes. From this
status, you can change it to Inactive or In Review.
○ Inactive - The data source is no longer in use. From this status, you can
only change it to In Review.
Note
A data source must be Active before you can assign a business rule to it.
Example
You can search for data sources that are classified with search terms,
such as SOX or FDA.
4. On the Object fields tab, enter or edit the parameters as shown below:
Parameter Instructions
Subscenario Name the subscenario and connection type of the data source. The connec
tion type is automatically entered if there is only one connection type.
Fields List the fields of the data source, such as their type, amount or quantity, de
scription, and so on. You can change the field descriptions to make them
more useful for your business needs.
5. On the Connector tab, maintain additional connectors. By default, the main connector retrieves the
backend metadata such as query fields and field descriptions.
Note
On the Ad Hoc Query tab (only applicable to the Configurable subscenario), you ensure the tables and
joins used retrieve the expected data.
6. On the Attachments and Links tab, attach a file or link to the rule.
7. Select Save. The system displays a message to confirm that all data was saved.
Use
Business Rule Parameters (BRPs) are system parameters on the organization level that can be assigned to
business rules. Like OLSPs, BRPs can also make it easier to assign rule criteria when common systems or
system parameters must be assigned to several rules. The mechanism of BRPs is similar to that of OLSPs.
However, unlike OLSPs which limit the use of parameters within four fields, BRPs allow you to create any
named parameter and use them in business rules, provided that these supported data types are used:
Both ABAP data type and ABAP dictionary type are supported by BRP. You might see mixed data types in
the Field Type column of the source data. For more information about data types, see http://help.sap.com
Technology Platform SAP NetWeaver SAP NetWeaver 7.0 Application Help Function-Oriented
View English Application Platform by Key Capability ABAP Technology ABAP Workbench (BC-DWB)
BC - ABAP Dictionary Data Types in the ABAP Dictionary Mapping of the ABAP Data Types .
● Configurable
● Programmed
● SAP Query
● BW Query
● ABAP Report
● HANA
With BRP, you can use a more complicated value determination to include both single values and value ranges
to filter data and define deficiency criteria.
More Information
The BRP feature is an improved alternative to the OSLP feature in Legacy Automated Monitoring. You can use
both BRPs and OLSPs in the same environment. For more information about OLSPs, see Organizational Level
System Parameters (OLSPs) [page 463].
Use
Follow the procedure below to create, edit, and delete Business Rule Parameters (BRPs).
Procedure
1. Choose Rule Setup Continuous Monitoring Business Rule Parameters . The Business Rule
Parameters screen appears.
2. Choose one of the following actions:
○ Create: Use this action to create a new BRP.
○ Open: Use this action to open and edit a BRP.
Note
○ Char
○ Decimal
○ Date
○ Integer
○ Number
Note
Name, Type, and Data Type cannot be modified once the BRP is saved.
4. On the Maintain Rule Parameter Value screen, maintain or modify the BRP values for the organizations that
you want to apply the BRP to.
You can use the Value set option to define multiple values and value ranges for an organization in a single
field. Use a semicolon (;) to separate values and a tilde (~) to indicate a value range.
5. Confirm the details of the BRP and finish.
Prerequisites
To perform this function, you must be assigned to the Business Rule Specialist role. You must have already
created a data source. For more information, see Creating and Changing Data Sources [page 425].
A business rule provides a scalable user interface, which can support various data sources such as
configurable rules, programmed rules, SAP Query and BI Query.
1. Select Rule Step Business Rule (in the Continuous Monitoring section) . The Business Rule Overview
screen appears.
2. Choose Create.
3. Choose a Data Source. Only data sources with a status of Active are valid. If you do not know the name of
the data source, search by name, subscenario, connection type, search term, or validity date. Choose
Search Data Source. After you have selected the data source, choose OK.
4. Choose Start to create a Business Rule.
Based on the subscenario defined in the data source, the guided activity has different steps. Provide the
input required for the subscenario of your data source.
Subscenario/ Basic In Data Input Filter Defi- Conditions Output Techni Ad- Attach
Step forma for Parame Crite ciency and Calcu Format cal Set hoc ments
tion Analy ters ria Criteria lations tings Query and Links
sis
Configurable X X X X X X X X X
Programmed X X X X X X X
ABAP Report X X X X
SAP Query X X X X X X X X
Event X X X X X X
SoD Integra X X X X
tion
BW Query X X X X X X X X
External Part X X X X X X
ner
Process Inte X X X X X X X X
gration
HANA X X X X X X X X X X
○ Basic Information
— Enter the required fields (Name, Description, Category, Analysis Type, Valid From, Valid to, and
Status) and any optional fields that apply to your business rule.
Note
The values of Category and Analysis depend on the subscenario defined in the Data Source. The
only two statuses that are eligible at this stage are: New and In Review.
Note
In some subscenarios (such as Programmed), the filter fields are predefined and cannot be
changed.
○ Deficiency Criteria
— Select fields as deficiencies. Enter the deficiency thresholds or indicator to each deficiency field. If
the Field Analysis type is Changes or Blank Check, the deficiency value is Indicator (High, Medium, or
Low). If the Field Analysis type is another type, the deficiency value is Threshold.
Note
In some subscenarios (such as Programmed), the deficiency fields are predefined and cannot be
changed.
In some subscenarios, the Calculated Field is visible. You can create a calculated field as an
additional deficiency field; if so, the calculations function is defined in the Conditions and
Calculations step.
Note
The Currency Conversion calculation function is available only for the data type Amount.
For the Event subscenario, you can choose Send Notification and/or Trigger a Monitoring Job.
○ Output Format
— Each deficiency field with an exception is generated as a job result. The output columns of the job
result can be adjusted here. You can choose which columns to hide or display. You can also change the
sequence number to set the order of the columns displayed. For example, a sequence number of 001
would appear to the left of 002.
○ Technical Settings
— These settings are for users with a technical background. They are settings for runtime usage and
vary based on each subscenario. Default values are defined for each parameter, but you can override
the value to adjust the behavior or outcome of the job result during runtime.
5. Choose Save. A confirmation message appears. If more changes are needed, choose the Change the
Business Rule link to navigate to the same business rule in change mode.
Use
If your business environment has changed, you can change a business rule. You can change:
● Basic Information
● Data for analysis
● Filter criteria
● Deficiency criteria
● Conditions and calculations
● Output format
● Technical settings
● Ad hoc query
● Controls
● Attachment and links
Prerequisites
A business rule must already be created. For more information, see Creating a Business Rule [page 431].
Procedure
The business rule is presented on a screen with several tabs. The tabs vary, based on the subscenarios
selected in the data source. Each tab corresponds to a step to create a business rule (for example, Filter
Criteria and Output Format). The Control tab shows additional information when changing the business rule. It
also displays the controls assigned to the business rule.
Definition
You can use business rules for compliance initiatives. You assign rules to controls for automated testing and
monitoring. You can also specify the testing frequency of a rule assigned to a control.
Use
Prerequisites
● A business rule has been created, rule status is active, and is in a valid period.
● A control has been created.
● (Optional) The Customizing activity Set Number of Business Rules Assigned to Each Control has been
completed. The activity is located at Governance, Risk, and Compliance Common Component Settings
Continuous Monitoring Set Number of Business Rules Assigned to Each Control . If the activity is not
completed, the default limit of the number of business rules assigned to each control is 10.
Procedure
Caution
This value impacts all subsequent operations and business rule assignments. Business Rule
Assignment uses the valid period concept (like HR master data). For every business rule assigned to a
control, the assignment relationship period is the intersection of the valid period of the control, the
business rule, and this date value (taken as a Valid From value).
3. Search for the control to assign to the business rule. You can search by Organization, Process, Subprocess,
Control, or Business Rule.
In the Control Search Result table, controls are displayed with Control, Description, Organization, Process,
Subprocess, Test Automation, and Trigger. The system only lists sem-iautomated and automated controls
(manual controls cannot be used). One row is selected by default. Highlight a row to select a control. If
business rules are already assigned to this control, the rules will display in the Common Business Rules or
Regulation-Specific Business Rules tabs.
Note
The Control's Trigger field is required. The value of this attribute field determines which business rules
can be assigned to the control:
○ If the Trigger value is Date, only nonevent based business rules can be assigned to it.
○ If the Trigger value is Event, only business rules with a subscenario of Event can be assigned to it.
If the control has no regulation assigned, only common business rules can be added. The regulation-
specific business rule cannot be added to a cross-regulation control.
Note
You can maintain separate schedules for monitoring and compliance purposes.
6. Choose Professional View to view the business rule assignment information. The Professional View provides
detailed business rule assignment information such as the assignment valid period for monitoring or
compliance separately.
Use
In Process Control, all continuous monitoring is set up through the scheduler. Job schedules can be established
for monitoring rules assigned to local controls, and can be immediate, for a fixed date and time, or recurring.
This page would be used by administrators creating continuous monitoring jobs, monitoring job status, tracing
any job execution problems, maintaining continuous monitoring job schedules, and so forth.
Example
You have assigned business rules to a control and want to create a job in the Continuous Monitoring
scheduler. Or, you have created some jobs in the Continuous Monitoring Scheduler and want to find them.
You have the proper role assigned to the continuous monitoring job and job step.
Process
1. Create a query to find existing jobs using the following search criteria:
○ Timeframe/year: Every job has timeframe/year attributes. Indicate the correct timeframe/year to
search.
○ Max Rows: The maximum number of search results. The default value is 50.
2. Customize the result table. You can customize the results table by revealing the hidden columns through
the settings filter result table.
3. Create or open an existing job.
4. Cancel a job if you have the authorization and the following conditions apply:
○ If the job type is an Automated Monitoring Job, the following is true:
○ If the job Execution Type is Immediate or Date/Time: This job cannot be canceled unless its status
is New.
○ If the job Execution Type is Event Trigger, this job can be canceled regardless of its status.
○ If the job type is an Incoming Event Handling Job, the following is true:
○ If the job Execution Type is Single Mode, this job can be canceled regardless of its status.
○ If the job Execution Type is Batch Mode, the job can be canceled regardless of its status.
Prerequisites
● A business rule has been created and assigned to a control. See Creating a Business Rule [page 431].
● A business rule has been assigned to a control. See Assigning a Business Rule to a Control [page 435].
Context
From the Rule Setup work center, select Automated Monitoring under the Scheduling section. You can schedule
the following types of monitoring jobs:
For simplicity, scheduling Standalone Jobs is described separately in Scheduling Standalone Jobs [page 439]
Procedure
After you choose Continue, you cannot return to the Create a Job initial screen from the other steps.
Note
Example
You can share your SOX data with your JSOX regulations.
6. On the Select controls screen, search for and select controls that have business rules assigned. You can
enter combinations of organization, process, subprocess, control, business rule to search controls and
reduce search time. If the control cannot be found, check the following points:
○ The regulation indicated in the Share Regulation step is applied as a default search criteria in this step.
○ Only automated or semi-automated controls are presented. Manual controls cannot be used with the
Continuous Monitoring Scheduler.
— For automated monitoring jobs, the system only displays controls whose trigger is Date.
— For automated monitoring jobs except SoD Integration and Process Integration subscenarios, you
must have authorization to the applied connectors defined in the business rule.
— For automated monitoring jobs with Configurable and Programmed subscenarios, if the control’s
corresponding organization has OLSPs maintained, the system only displays the connectors
maintained in these OLSPs.
— For Incoming Event Handling Jobs, the system displays only controls with an Event trigger.
○ If a target connector is selected in the previous header step, only this particular target connector is
shown.
○ You must assign business rules to the control under the regulation indicated in the previous Share
Regulation step. You must also set the Monitoring/Compliance indicator if applicable.
Note
Pay attention to the Business Rule Assignment Valid Period, which can be seen by selecting the
Professional View in the Business Rule Assignment screen. The date of the Test Period selected in
the previous header step must be covered by the corresponding Business Rule Assignment Valid
Period.
7. Control Details — Review all the matched business rules and target connectors of every selected control. If
there is no problem, choose Save. For optimal performance, do not exceed 1500 generated job steps.
8. Confirmation — Choose Close to close the screen. On the Scheduler screen, the job you just created is
shown.
Prerequisites
● A business rule has been created. See Creating a Business Rule [page 431].
From the Rule Setup work center, select Automated Monitoring under the Scheduling section. This opens
Continuous Monitoring Scheduler - All, and from here you can Create Job.
On the following screen, select Standalone Job as the Job Type and then Continue. This will take you to the
Continuous Monitoring Scheduler: Step 1 (Header) screen.
Be aware that after you click Continue, you cannot return to the initial screen from the later steps without
discarding the new job and beginning the process again.
Procedure
1. Enter the required information on the Step 1 (Header) screen, then click Next.
○ Job Name: The maximum length of a job name is 32 characters. Special characters are not allowed.
○ Execution Type:
○ Immediate: The job step is executed immediately at the scheduled time.
○ Date/Time The job step is executed according to the date or time chosen. This can occur before or
after the scheduled time.
○ Event Trigger: The job step is executed when an event that meets the conditions defined in the
business rule occur.
○ Frequency:
○ There is no Frequency for Event Trigger jobs.
○ Hourly has a maximum Test Period of one week. The Hour Recurring From and Hour Recurring To
fields define the period during which the job will be repeated every day. For example, if you want to
run a job from 20:00 to 23:00 every day, you set Hour Recurring From as 20:00 and Hour
Recurring To as 23:00
○ Test Period From and Test Period To:
○ Default values come from the time interval defined by the timeframe and year values.
○ Values cannot be changed when the job execution type is Event Trigger
○ If a change is allowed, you can only narrow the timeframe (not extend it).
○ The test period cannot exceed one week for the Hourly frequency.
○ The test period cannot exceed half a year for the Daily frequency
○ A Weekly test period must always begin on the first day of a week, and finish on the last day of a
week.
○ A Monthly test period must always begin on the first day of a month, and finish on the last day of a
month.
○ A Quarterly test period must always begin on the first day of a quarter, and finish on the last day of
a quarter.
○ (Optional) Target Connector:
○ Indicate specific target connector, on which every job step runs. Use this option if you want to
restrict the monitoring to the target connector.
○ There is no target connector for SOD and PI subscenarios.
2. Enter the required information on the Step 2 (Select Business Rules) screen.
○ The Deficiency Value tab in the Check Parameter Value function shows you any previously defined
parameters and the resulting deficiency values.
○ The Filter Value tab enables you to edit the value of any previously defined parameters.
If the job was Immediate, then after you Save the job and refresh the Continuous Monitoring Scheduler
screen, you will be able to view the results in the Job Monitor as you would with other job types.
Context
Procedure
Note
You can customize the POWL results table by unhiding the hidden columns through Settings screen,
filter result table, and so on.
2. Jobs can be canceled if you have authorization and the following conditions are met:
○ If the Job type is an Automated Monitoring Job, then:
— If the Job Execution Type is Immediate or Date/Time, the job cannot be canceled unless its status is
New
— If the Job Execution Type is Event Trigger, this job can be canceled regardless of its status.
○ If the Job Type is an Incoming Event Handling Job, then:
— If the Job Execution Type is Single Mode, this job can be canceled regardless of its status
If the Job Execution Type is Batch Mode, this job can be canceled regardless of its status.
3. You can perform the following functions if you have the proper authorizations
○ Cancel Job Step — If the Job Execution Type is immediate or Date/Time and its status is New
○ Cancel All Job Steps — Call all the remaining New job steps for the job whose execution type is
Immediate or Date/Time
Use
Process
1. View Job Header — In the Scheduler main window, select one job and choose Open Job. The header tab is
displayed as the default.
2. View Job Share Regulation — In the job window, choose the Share Regulation tab to see if the results are
shared with more than one regulation.
3. View Job Step — in the job window, view the generated job step list for this job. You can select any job step
and choose the Job Step Log button to view its application log. You can conduct the following functions if
you have proper authorization:
○ Cancel Job Step — Job step can be canceled only when its job execution type is Immediate or Date/
Time and the status is New.
○ Cancel All Job Steps — Cancel all remaining New job steps for the job whose execution type is
Immediate or Date/Time.
○ Reschedule Job Step — The job step can be rescheduled only when its status is Error. After
rescheduling, a new job step is created and the original job step status is set to Replaced.
○ Reschedule All Job Steps — All erroneous job steps can be rescheduled at once, rather than having to
reschedule each one individually.
○ Obsolete Job Step — Job step can be set to obsolete only when the status is Error.
The Queries Center app allows you to execute ad hoc queries for the following, with specified filters or
deficiency criteria, without impacting on existing business rule or data source definitions:
● Business rules
Activities
In the Business Rule or Table/View tabs, enter the required data to execute ad hoc queries.
When querying a business rule, in the Business Rule tab, the following apply:
● The Field Analysis section allows you to define what fields will display in the results, and what fields can be
added in the deficiency criteria.
● The Filter Criteria section allows you to select the fields whose values you want to filter from the business
rule and define the filter conditions.
Note
● The Deficiency Criteria controls the criteria that determines if matching data is considered deficient.
● In the Ad Hoc Query Result section, enter a timeframe and a year.
● To select data from the data source with the defined filter criteria, choose the Data Collection button.
● To display results that meet the filter and deficiency criteria defined in the previous steps, choose the Apply
Rule button.
● To export the results to an Excel file, choose Export. You can also export the business rule itself by choosing
Export Business Rule.
When querying a data source, in the Table/View tab, the following apply:
● To change related tables, you can use the Related Table Lookup button after entering a base table.
6.3.2 Scheduling
The Scheduling section of the Rule Setup work center enables you to maintain schedules for continuous control
monitoring, and track job progress in the areas of monitoring and automated testing. This functionality
pertains to Process Control and Risk Management. It contains the following links:
You can also choose to create a Standalone Job, and execute it immediately.
Related Information
Scheduling Automated Monitoring and Incoming Event Handling Jobs [page 437]
Scheduling Standalone Jobs [page 439]
Use
The Job Monitor allows you to view the execution status of scheduled automated testing jobs. It displays
whether a scheduled job performed successfully and shows results of executed tests. Jobs could have been
scheduled using the following functionality:
● For Process Control or Risk Management Continuous Monitoring jobs, choose Rule Setup Scheduling
Automated Monitoring. .
● For Process Control or Risk Management Legacy Automated Monitoring jobs, choose Rule Setup
Legacy Automated Monitoring Monitoring Scheduler .
Prerequisites
Jobs must have been scheduled using the Scheduling Automated Monitoring and Incoming Event Handling
Jobs [page 437] or Legacy: Using the Monitoring Scheduler [page 473].
Features
● To search for executed jobs, perform the steps in Searching for Executed Jobs [page 445].
● To view results of executed jobs, perform the steps in Viewing Job Results [page 446].
Context
Jobs can be created and scheduled through the Continuous Monitoring functionality or the Legacy Automated
Monitoring.
● For Continuous Monitoring jobs, choose Rule Setup Scheduling Job Monitor. .
● For Legacy Automated Monitoring jobs, choose Rule Setup Legacy Automated Monitoring Job
Monitor. .
Procedure
1. The Job Monitor screen displays the criteria that you can use to search for executed jobs.
2. Select the desired year and period in the time frame fields, and choose Go. This limits your search to those
jobs that were executed during the specified time frame.
3. (Legacy only) Select the type of Regulation.
4. Enter the search criteria: job name, frequency, target connector, execution date from, execution date to (or
any combination) to narrow your search results.
5. Choose Search.
The Job Monitor screen displays all executed jobs that match your search criteria.
6. To export search results to a file, select Export. To convert results to a printable format, select Print Version.
7. To further customize the view of your search results, use the Filter and Settings located at the upper right
hand of the screen.
Prerequisites
Context
Based on search results returned from Searching for Executed Jobs, you can view information about the results
of jobs. Jobs can be created and scheduled through the Continuous Monitoring functionality or the Legacy
Automated Monitoring.
● For Continuous Monitoring jobs, choose Rule Setup Scheduling Job Monitor. .
● For Legacy Automated Monitoring jobs, choose Rule Setup Legacy Automated Monitoring Job
Monitor. .
Procedure
1. Select View Result link to view the job result details. The Job Result screen displays the following
information:
○ Result: Header data specific to the job (for example: rule, number of exceptions, organization)
○ Details: Test result line item data showing exceptions
○ Attachment (if any): Report of actual test results.
2. Special displays:
○ Legacy Automated Monitoring
○ If the job is executed for rules other than ABAP reports or SAP standard or custom program from
Process Control, the results display in the grid below the job header information. There is one row
for each exception.
○ If the job is executed for a control which uses an SAP standard or custom program, the results are
linked. Select the report link to view the report.
○ Continuous Monitoring
○ If the job is executed for a control which uses ABAP reports, the results are linked. Select either
Open in HTML or Open in TEXT.
3. If there are no exceptions, the lower grid does not display. Only the header information with a deficiency
rating of Adequate displays. To export the exception list to a file, select Export. To convert results to a
printable format, select Print Version.
You can transform queries and SAP reports into Process Control scripts for rule definition and testing. You can
also set up automated tests for controls that have been assigned to organizations, including configuration of
rules, definition of criteria for application systems, and assignment of rules to controls.
Caution
You need to activate the Business Configuration (BC) Set GRPC-AMF-MENUITEM-UPGRADE twice using
the Customizing activity Maintain Authorizations for Application Links under Governance, Risk and
Compliance General Settings Maintain Customer Specific Menus . This BC set enables you to continue
to use Automated Rules Framework (ARF) in Process Control 10.0.
Use
You can automate the testing of control effectiveness and monitoring of controls in the ERP system.
All automated tests of effectiveness and monitoring of controls use automated test rules to determine the
exception data to extract from the ERP system. The following graphic illustrates that an automated test rule is
● Transaction data — Identify transactions based on specified thresholds or identify transactions that are
outside of the tolerance settings
● Configuration data — Monitor all or specific changes to configuration settings, identify specific values
within configuration settings, or perform blank checks.
● Master data — Monitor all or specific changes to master data, identify specific values of critical fields, or
perform blank checks.
Process Control records historical information in a change log to monitor changes to configuration settings and
master data over the entire timeframe of the control.
You can use automated test rules to fully or partially automate the testing of a control, as follows:
● Fully automated testing — The system determines the control rating and creates issues for remediation
processing, based on test results.
● Semi-automated testing — You manually review the test results and determine the control rating and the
issues for remediation.
1. Create a rule
You must create a rule and select the rule script and criteria to define your testing or monitoring
parameters. You create and maintain the rules at the global compliance level: Rule Setup Legacy
Automated Monitoring Rule .
2. Assign rules to controls
You assign one or more automated test rules to the control that you want to test or monitor. You can also
specify one or more testing or monitoring frequencies for each control-rule assignment. You assign the
rules to the controls at the compliance initiative level: Rule Setup Legacy Automated Monitoring
Control Rule Assignment .
○ For more information, see Control Rule Assignment [page 473].
3. Schedule the monitor
○ You use the Monitoring Scheduler [page 473] to schedule a control monitoring job. This executes the
rules based upon the control-rule assignments. The monitoring schedule can be set to recur regularly
or to execute on a one-time basis.
1. At the start date, the process control system automatically executes the test or monitoring activities and
passes the rule information to the program (RTA) in the ERP system.
2. The program executes based upon the control-rule assignment.
1. The rules identify exceptions in configuration data and transaction data based on the rule criteria for a
given period.
2. When the rule execution is complete, the program on the ERP system sends an exception report to the
process control application.
Use
Process Control facilitates the monitoring of data to ensure controls in your ERP system are operating
effectively, and to identify weaknesses or potential deficiencies on a timely basis. You can create the following
monitoring controls within Process Control to identify exceptions in your ERP system based on your deficiency
parameters:
● Configuration Controls – to identify potential unauthorized configuration settings or parameters in the ERP
system.
● Master Data Controls – to identify suspect master data in the ERP system.
● Transaction Data Controls – to identify unusual business transactions in the ERP system.
You can customize your automated monitoring controls to review data based on your filter parameters and test
period. You then schedule the automated monitoring controls at any frequency you choose based upon your
configuration.
● If exceptions are found, the system automatically creates an issue when exceptions are Identified.
● If no exceptions are found, no results are returned but the activity is logged with Adequate deficiency rating
in the Job Monitor.
The following figure illustrates the steps in performing automated controls monitoring:
A monitoring control may be semi-automated based on its control design. However, if issues are found, there is
no difference in the workflow tasks between automated and semi-automated control monitoring. Shown below
is the test failure routing for automated and semi-automated control monitoring based upon delivered
business content.
For more information about the prerequisites to performing control monitoring, see Legacy: Performing
Automated and semi-automated Tests of Effectiveness [page 452].
Activities
Note
If issues are identified for automated control monitoring, redoing the monitoring control for the same
period returns the same results. For this reason and to ensure that issues are identified on a timely basis,
some companies perform control monitoring on a more frequent basis than either manual testing or
automated testing of control effectiveness.
Procedure
1. Process Control performs automated control monitoring based on the job schedule you create in the
Monitoring Scheduler. The job schedule triggers execution of monitoring activities in the ERP system
based upon rules and parameters to determine which ERP data represents a monitoring exception. For
more information, see Legacy: Performing Automated and semi-automated Tests of Effectiveness [page
452]. For more information about rules and control-rule assignments, see Legacy: Automated Test Rules
[page 467], and Legacy: Control Rule Assignment [page 473]
2. The ERP system returns any monitoring exceptions to Process Control. The issues have a deficiency rating
of High, Medium, Low, or Review Required, depending on the rule settings. You define your tolerance
settings for deficiencies in the rule parameters associated with the rule.
3. If no exceptions are identified, the monitoring job schedule is completed and no workflow is required. The
job monitor reflects that the job has completed its execution with Adequate deficiency rating.
4. If exceptions are identified, this automatically creates an issue. The system routes the issue to the person
assigned the task to receive the issues. In the delivered business content (BC Set), this person has the role
Control Owner.
Note
You have the option of assigning the task to another role, depending on your business requirements
and organizational structure.
Perform steps in Legacy: Performing Automated and Semi-automated Test of Effectiveness [page 452]
Use
Process Control can facilitate automation of the effectiveness testing of controls that exist in your ERP system.
This increases testing efficiency and standardizes testing if several organizations have similar controls. You can
customize your automated tests based on filter parameters. You can also run the automated tests at any
frequency based upon your configuration. Automated test rules automate the test procedures. These rules use
a script and rule criteria to identify control exceptions on data in the ERP system. Automated test rules can
fully or partially automate your tests of effectiveness.
Test of Effectiveness
In a fully automated test of effectiveness, the system creates an issue when the system identifies exceptions
based upon your rule criteria. The following figure displays the process flow for an automated test of
effectiveness scenario:
1. The system performs the test of control effectiveness. If the test passes, the work flow is complete.
2. If the test fails, the system creates issues and routes them to the issue owner.
3. The issue owner reviews the issues for validity. If it is not a valid issue, the work flow is complete.
4. If it is a valid issue, the issue owner assigns a remediation plan owner and submits it.
The plan owner creates, executes, and completes the plan.
In a semi-automated test of effectiveness, the tester receives the test results, with any issues if the system has
identified exceptions. The tester must review and validate the exceptions. The tester can then void the issue or
assign the issue to an owner for processing.
Automated and semi-automated tests of effectiveness have differences in certain workflow tasks. Shown below
is the routing of tasks for automated and semi-automated tests of effectiveness.
Prerequisites
Activities
Note
Automatic retesting is not applicable to automated and semi-automated tests of effectiveness. This is
because if the test is rerun for the same period, it would return the same results based upon the ERP data.
For this reason, some companies perform automated testing on a more frequent basis than manual testing.
Procedure
1. Process Control performs automated tests based on the plan you created in the Planner. The plan includes
information such as start and due date of testing, organization name, and control selection. When the plan
start date occurs, the test executes in the ERP system based on control-rule assignments. For more
information, see Planner [page 497] and Legacy: Control Rule Assignments [page 473].
2. The ERP system returns any test exceptions to Process Control. The exceptions have a deficiency rating of
High, Medium, Low, or Review Required depending on the rule settings and the data in your ERP system.
You define your tolerance settings for High, Medium, Low deficiencies within the rule parameters for
specific rule criteria.
Note
For monitoring, no task is generated if no exceptions are found. For testing purposes, a task is
generated, even if no exceptions are found.
4. If exceptions are identified, the system performs the following depending on whether the test is fully or
partially automated:
○ Automated Test of Effectiveness — The system automatically creates an issue. The system routes
the issue to the person assigned the task Receive Issues from Automated Test of Control Effectiveness.
In the delivered business content (BC Set), this person has the role Subprocess Owner.
○ Semi-automated Test of Effectiveness — The system automatically creates an issue. The system
routes the test results to the person assigned the task Perform semi-automated Test of Effectiveness.
In the BC set, this person has the Process Tester role. The tester can void the issue or assign the issue
to an owner for processing.
Note
You can assign this task to another role, depending on your business requirements.
To access your tasks for compliance tests or control monitoring, choose a path from the following:
● My Home Work Inbox Work Inbox – lists all tasks and reports delivered to your Work Inbox.
● Evaluation Results My Tasks My Tasks – lists all your tasks.
● Evaluation Results Compliance My Tasks – lists just your compliance tasks.
Note
The overall rating of the test is based upon the issues. A test with no open issues has passed and
displays a green icon. A test with open issues (not voided) has failed and displays a red or yellow icon,
depending upon the priority of the issues. If at least one issue with high priority exists, the rating is red.
If no issues with high priority exist, the rating is yellow.
3. To perform tasks related to remediation, see Remediation of Open Issues [page 55].
Use
Automated test rules consist of rule scripts and rule criteria that filter and monitor exception data extracted
from the ERP systems.
Use Rule Criteria to specify the data type to be extracted for a given system type.
Note
Rule criteria for Process Control 3.0 rules are maintained by the system. For more information, see Legacy:
Creating Automated Test Rules [page 468].
Process
Attribute Explanation
Recommendation
It is useful to have a consistent naming convention.
Criteria Type (required) Choose from the following dropdown menu options:
○ Table Based
Use this type to refer to table-specific data. Enter the
table and field names on the Connector tab.
○ Data-type Based
Use this type to refer to specific values such as a nu
meric or string. You enter the specific value on the
Connector tab.
Note
The delivered scripts for SAP ERP systems work with
the following criteria as OLSPs:
○ Company Code
○ Plant Code
○ Purchase Organization
○ Sales Organization
4. On the Connector tab, enter the target connector based on the system type that you are using.
Note
A connector refers to the interface between the backend system and the process control application.
The connector that you specify in the rule criteria and the rule script must match exactly to obtain the
desired results.
You can assign values in the target connector field for any of the following available systems:
○ SAP Access Control
○ Local System
○ Multiple Applications Query
○ Oracle
○ PeopleSoft
○ SAP System
Note
If you want to extract data from all installed instances of your SAP systems, you must leave the target
connector blank.
If you only want to retrieve data from one SAP system, you must specify the target connector for
particular system that you want.
Attribute Description
Table Name Enter the exact name of the table within the SAP backend
system from which you want to extract data.
Field Name Enter the exact name of the field within the SAP backend
system from which you want to extract data.
Data Type Select the data type, such as date or, numeric, that you
want to extract from the SAP backend system.
6. Choose Save.
Use
The rule script is the key link between a rule, the ERP system, and the associated rule criteria. The rule script
maps to the program that executes in the ERP system when you run a rule to test or monitor a control. The rule
script uses the rule criteria to determine the data to be extracted from the ERP system.
Features
● Create new rules, called configurable rules, by browsing for a table, or a view in the backend system. Then
specify your deficiencies based on the fields in the backend tables or views.
● Specify the following analysis types for the configurable rules:
○ Change Check
This type of analysis monitors changes to configuration and master data by automatically
reconstructing change history from the change logs.
○ Value Check
This type of analysis monitors the value of specified objects.
● For the output report, choose the:
○ Fields
○ Sequence of the fields
● Create a new rule by browsing for an SAP Query and importing its definition. Use the definition to specify a
deficiency condition
● Create a new rule by browsing an SAP report.
A rule script can employ one of the following data extraction vehicles:
The rule scripts for the Process Control 3.0 delivered rules are maintained by the system. You only create rule
scripts if you choose to create custom rules.
More Information
Context
The rule scripts for the Process Control 3.0 delivered rules are maintained by the system. You only create rule
scripts if you create custom Process Control 3.0 rules.
1. Select Rule Setup Legacy Automated Monitoring Rule Script . The Rule Script screen appears.
2. Do the following to create or copy a rule script:
○ To create a rule script, select Create.
○ To copy an existing rule script, choose a rule script and select Copy.
3. On the General tab, complete all required fields.
Note
Process Control enables you to create rule scripts to work with different target ERP systems. When you
choose a Script Type, the user interface dynamically displays the appropriate fields and tabs for each.
For example, the GRC Configurable script type displays the Table Lookup button, whereas the Query
script type displays the Query Lookup button.
Note
The Script Criteria tab is not available for SAP Standard Report and Custom (report) script types.
Next Steps
You can use the following script types with automated test rules:
● GRC Configurable
For more information about script types and configuring rules, see SAP Note 1329589 - Automated Rules
Framework.
When you choose a Script Type, The user interface dynamically displays the available fields and tabs for each.
The following table lists the available attributes and functions for each script type:
GRC Configurable SAP Change Log Check Changes, Monitor, Table, view (database
Number of changes or projection)
GRC 2.5 SAP (Read-only – can Configuration control Changes, Monitor, ABAP program
not create a new Rule Number of changes,
Greenlight RTA pro
Script with SAP Sys Existence
gram
tem Type)
For more information about script types and configuring rules, see SAP Note 1329589 - Automated Rules
Framework.
Available Tabs
GRC Configurable x x
GRC Programmed x x
Query x x
Business Warehouse x x
Use
You use OLSPs to assign systems and system-specific organization parameters at the global level, rather than
at the rule level. This facilitates the assignment of rule criteria when common systems or system parameters
must be assigned to several rules.
Features
OLSPs enable individual organizations to run tests using a common set of rules but with their own organization-
specific systems and values.
Example
If you want to extract test data from the SAP backend system for company code US01:
● You define an organization USA in Process Control. The USA organization is responsible for company code
US01 in the SAP backend system PRD.
Instead of defining the system value as PRD and the company code value as US01 in the rule criteria for all 12
rules, you can assign the system and criteria value at the OLSP level. Then you assign the OLSP to the
organization USA. When you execute the rule, it captures the OLSP value for the company code in the rule
criteria.
Note
OLSPs can only be used for rules of type GRC Configurable, GRC Programmed, and GRC 2.5 (only
applicable to Legacy Automated Monitoring rules).
For SAP Business Suite, the following rule criteria are valid OLSPs:
Context
Use the procedure below to create, edit, and delete Organizational Level System Parameters (OLSPs).
Procedure
1. Choose Rule Setup Legacy Automated Monitoring Organizational Level System Parameters .
Caution
3. To create or edit an OLSP, select the General tab. Enter or edit the following information:
OLSP Parameters
Parameters Instructions
Name (required) Give a name to the OLSP if you are creating a new one. If
you are in edit mode, you cannot change this field.
4. Select the System Parameters tab. Choose Add to specify the connector or system parameter that you
want to assign. Select one of the following commands:
Command Instruction
Add Connectors If you select this option, the system displays a list of available
connectors, the related system type, and description.
Add System Parameters If you select this option, you can add system parameters under a se
lected connector.
Note
To ensure a rule criterion is available for OLSP, the rule criterion
must be marked with Yes for OLSP indicator. Each OLSP system pa
rameter can have multiple connectors with multiple rule criteria val
ues.
5. Select Save.
Use
You use Query to execute query programs that reside in target ERP systems. You can use the queries to
perform unplanned tests of non-SAP and SAP Query scripts.
Before setting up and running queries with Process Control, the query must already exist in the target ERP
system. For more information about creating a query in the target system, see your system administrator.
Note
In the target SAP systems, we recommend that you create your queries using the user group type Standard
Area. You may also create a rule using a rule script with type Query to automate query execution. For more
information, see Rule Script Types [page 460].
Procedure
To execute or search for queries in target applications, perform the steps below.
Query Filters
Filter Description
Target Connector (required) Enter the target system where you want to search for a
query program. To search for the available connectors, se
lect the value help. Choose the desired connector and se
lect OK.
Query Name (optional) If you know the query name, enter it here.
User Group (optional) If you know the name of the user group in the target sys
tem, enter it here.
3. Select Go.
The Query screen displays all queries based on your search criteria and authorization.
Note
The system only displays those queries on the target system that you are authorized to run.
Use
You use automated test rules to automate the testing and monitoring of controls in your backend system.
Using automated test rules, you can monitor your backend controls and data and identify transactions or
changes that are outside of prescribed tolerance settings. You can track changes to configuration settings and
monitor changes to master data. All tests of effectiveness and automated controls use automated test rules to
determine what exception data to extract from the backend system.
Activities
● Rule
Maintain and configure rules and rule criteria.
● Organizational Level System Parameters (OLSPs)
Maintain and configure OLSPs.
More Information
Use
An automated test rule is composed of a rule script and rule criteria. A user creates an automated test rule by
creating a rule script first and identifying the associated rule criteria. You create a rule by associating an
existing rule script to the rule.
Process Control 3.0 provides the following options for creating automated test rules:
Prerequisites
The prerequisites are dependent on the script type you choose. Some script types are defined within the
Process Control application and do not have prerequisites. Some script types, such as SAP Queries, SAP
Reports, and GRC Programmed, require you have installed the programs or Real Time Agents (RTA) on the
target ERP systems.
For more information, see SAP Note 1329589 - Automated Rules Framework .
Process
You create automated test rules in Rule Setup Legacy Automated Monitoring Rule . Depending on the
rule creation option you choose, different activities are required in the user interface. The following table
summarizes the rule creation options and the required activities in the user interface:
User Interface Element PC 3.0 Delivered Rules Custom PC 3.0 Rules PC 2.5 Rules
Automated Monitoring X X X
Rule
Rule Script
Rule Criteria
● Rule name
● Validity dates
● Rule description
● Connector
● Values and tolerance limits for the rule criteria
For more information, see Creating and Editing Rules [page 469].
For the PC 3.0 custom rules, you must create the rule scripts and the rules. The rule criteria are provided by
the system. For more information, see:
PC 2.5 Rules
The functions to use existing PC 2.5 rules are provided for backward compatibility. Only users upgrading from
PC 2.5 and with existing PC 2.5 formatted rules can use this function. Users can create new PC 2.5 formatted
rules only for non-SAP systems. The activities required for creating a PC 2.5 formatted rules are unchanged
from the PC 2.5 release:
1. You create rule criteria in Rule Setup Legacy Automated Monitoring Rule Criteria . For more
information, see Creating Rule Criteria. [page 455]
2. You create a rule script and associate it with the rule criteria in Rule Setup Legacy Automated
Monitoring Rule Script . For more information, see Rule Script [page 457].
3. You create a rule and associate it with the rule script and rule criteria in Rule Setup Legacy Automated
Monitoring Rule . For more information, see Creating and Editing Rules [page 469].
Context
Process Control 3.0 provides the following options for creating automated test rules:
Depending on the rule creation option you choose, different activities are required in the user interface.
Procedure
Note
For the PC 3.0 delivered rules, the system provides the rule, rule script, and rule criteria. You change
the following as needed:
○ Rule name
○ Validity dates
○ Rule description
○ Connector
○ Values and tolerance limits for the rule criteria
3. On the General tab, enter or edit the parameters as shown in the table below:
General tab
Parameter Instructions
Script (required) Select the script that you want to assign to the rule. You
can directly enter the script name or search for the script.
Script Description, Script Type, Script Category The system automatically populates these fields based on
the script that you select.
Connector Choice, Single Connector Value(optional) You can choose to have the rule use all the associated con
nectors or a specific connector.
Valid From (required) Enter the start date for the validity period of the rule.
Valid To (required) Enter the end date for the validity period of the rule.
Note
The Valid To date must be later than the Valid From
date.
Rule Group (optional) You can choose a rule group for filtering and reporting.
Note
You create rule groups in the Process Control Custom
izing activities.
Rule Status (required) Select the rule status from the dropdown menu. You can
select one of the following options:
Note
A rule must be Released before you can assign it to a
control.
Action Instructions
Set Deficiency Select Low, Medium, High, or Review Required as the defi-
ciency indicator of exceptions identified based on the rule
criteria.
Note
You cannot assign rule criteria to a rule that has a script type of SAP Standard Report or Custom.
5. The Operator table is below the Rule Criteria table. You can use this table to filter extracted data based on
the rule script and rule criteria. Choose from the any of the filter commands listed in the table below:
Include Use this operator if you want the test results to include
only values specified in the Value From /Value To range.
Exclude Use this operator if you want the test results to exclude
values specified in the Value From /Value To range.
In Between Use this operator if you want the test results to include
only data between the range specified in the Value From
and Value To fields.
Less Than Use this operator if you want the test results to include
only data less than the range specified in the Value From
and Value To fields.
Less Than or Equal To Use this operator if you want the test results to include
only data less than or equal to the range specified in the
Value From and Value To fields.
Greater Than Use this operator if you want the test results to include
only data greater than the range specified in the Value
From and Value To fields.
Greater Than or Equal To Use this operator if you want the test results to include
only data greater than or equal to the range specified in
the Value From and Value To fields.
6. In the Attachments and Links tab, you can attach a file or a link to the rule.
7. Select Save to save the rule settings.
Definition
Control Rule Assignment is done for specific initiatives. You assign rules to controls for automated testing and
monitoring. Rules can be assigned to controls that have a test automation of either Automated or Semi-
automated.
You can specify the testing frequency of a rule that has been assigned to a control. Set up the time intervals
initially through the Customizing activities. You can assign multiple testing frequencies to a rule. You can
choose any combination of annually, semiannually, quarterly, monthly, weekly or any.
Rule frequency can be specified for the two types of control testing:
● Compliance – to test effectiveness of control for the purpose of reporting to your internal or external
auditors.
● Monitoring – to monitor continuous operating effectiveness of control. A control can be assigned multiple
rules that may have different testing frequencies.
Example
A rule can have quarterly and monthly frequencies for compliance tests, and a weekly frequency for
monitoring activities.
Use
Prerequisites
Rules must be created and defined before performing the control rule assignment. For more information, see
Creating Automated Test Rules [page 468].
Use
The Monitoring Scheduler allows you to schedule jobs to monitor your controls. You schedule a job to execute
based upon the control-rule assignments that are defined to monitor business transactions and configuration
settings in target back end systems. These scheduled jobs run automatically based on the frequency, test
period, and timeframe that you specify.
Rules must be assigned to controls. For more information, see Control Rule Assignment. [page 473]
Features
Activities
● To create a new job schedule to monitor controls, see Creating a Monitoring Schedule. [page 476]
● To view details about a scheduled job or to cancel scheduled jobs, see Viewing and Canceling Schedules or
Jobs. [page 478]
Example
You have a control in your financial process that prohibits journal entries in excess of $100,000 for prior
periods for company code 0475 for a target back end system.
You can create a monitoring schedule containing a job (control and the assigned rule) that checks journal
entries each month for the entire year (January to December) for company code 0475. The Monitoring
Scheduler runs the job 12 times (once a month) and reports any exceptions (journal entries in excess of
$100,000 in a prior period).
Alternatively, you may set the frequency to daily during the quarter-end months (for example, March, June,
September, December). For those four months, you can create another job within the same schedule to run
the monitoring test on a daily basis.
More Information
Use
After performing the Control Rule Assignment of the created Configurable Rule, you can schedule it to do the
monitoring. In the Scheduler, you can use the Target Connector to filter the control-rule assignments by
system. The connectors are specified in the following places.
● In the Rule Script – This is the list of all the possible connectors that this control can run.
● In the Rule – The assigned user chooses either all the connectors defined in the underlying Rule Script or
one of the Rule Script’s connectors. If you choose only one of the connectors, this restricts the control to
that connector.
● In the OLSP – This has a list of connectors together with the parameters for each connector.
Activities
The following list explains the process the system uses to determine the connector to use:
● The scheduler requires pairing the Control Rule Assignment with the OLSP sets of the associated
organization.
● Process Control must bring together the connectors allowed by the underlying rule and the connectors
specified for the OLSP.
● The scheduler allows the scheduling of jobs only for those connectors allowed by both the rule and the
associated OLSP.
● If the OLSP does not have any connectors, the scheduler allows the scheduling of a job for any connector
that the rule allows.
● If both the OLSP and the rule specify a connector, the system uses any connector valid for both.
● If there is no connector in the OLSP, the system uses the connector defined by the rule or rule script.
● If a rule does not have any connector, the system uses any connector that is valid for both the rule script
and the OLSP.
Example
Rule Script Connectors Rule Connectors OLSP Connectors Scheduler Uses This Con
nector:
A, B, C, D A B, C, D None
A, B, C, D D None D
A, B, C, D D D D
A, B, C, D Any B, C B, C
A, B, C, D Any E, F, G None
A, B, C, D Any None A, B, C, D
A A A, B, C, D A
1. Choose Rule Setup Legacy Automated Monitoring Monitoring Scheduler. . The Monitoring
Scheduler screen displays current job schedules based on the displayed timeframe.
2. Select the year and period in the timeframe fields and choose Go if you have changed them. This provides
the default Test Period From and Test Period To dates for the job schedule you create.
3. Select the correct Regulation that this job pertains to.
4. Choose Create Schedule to design a new schedule. The Create Schedule screen displays the fields where
you enter the following information:
Field Description
Job Name - required Give a name to your schedule. Use a naming convention
so you can select and filter your job schedules easily using
wildcards.
Frequency - required Specify the intervals you want the schedule to run within
the test period. Your frequency choices were set up during
initial configuration.
Test Period From - required Enter the beginning of the period of the transaction data
that you want to monitor.
Test Period To - required Enter the last date of the monitoring period of the transac
tion data.
Start Job - required This refers to when the schedule starts executing.
Note
If you enter a combination that produces a
date in the past, the execution start date de
faults to Immediate.
Note
6. Choose Search. All the control-rule assignments matching your search parameters display on the upper
grid.
If you do not specify any search criteria, all control-rule assignments for all valid organizations (based on
your specified timeframe) display.
7. Highlight and select the control-rule assignments you want to add.
Note
Hold down the CTRL key to select multiple control-rule assignments. Hold down the SHIFT key to
select consecutive rows.
8. To add the selected controls to the selected grid (lower grid on the screen), use the single or double down
arrows (located in the middle of the screen between the upper and lower grid). Four arrows are presented,
each with a different functionality – add, add all, remove, remove all (rolling over the arrows with your
cursor displays the functionality of each). Conversely, to remove control-rule assignments from the job,
select the single or double up arrows. This shifts the control-rule assignments from the lower grid to the
upper grid.
9. Once you have moved the control-rule assignments into the lower grid, select Add in the lower right hand
corner of the screen (scroll down if you cannot see it). This brings you back to the Create Schedule screen.
If the automated test rules are related to SAP Reports or Custom Reports from SAP, you can select a
variant to use when executing the report. The variants are defined in the SAP ERP system.
10. Select Schedule to complete the Job Schedule creation.
Context
The Monitoring Scheduler allows you to view and cancel scheduled jobs. It allows you to search for a scheduled
job based on a timeframe and/or based on filter criteria. You can use the filter and settings options to
customize your view of the results of your search.
Note
Automated tests that are scheduled by the Planner for compliance are also listed in the Monitoring
Scheduler list.
Procedure
The Monitoring Scheduler screen displays schedules based on the timeframe displayed. It also presents
information about the schedules including the status.
2. To export the list of schedules for the selected timeframe to a file, choose Export.
3. To cancel a schedule, select a schedule and choose Cancel Job.
Note
Schedules and jobs can only be canceled when they are in scheduled status. A schedule may have any
of the following statuses:
Schedule status
Status Description
Scheduling Conflict A duplicate schedule exists for event-based jobs (for the
same frequency and period). The most recent schedule
(that is similar to an existing schedule) has a status of
Scheduling Conflict and cannot execute.
Invalid Control The schedule has failed a validation test (for example,
an invalid control-rule assignment) in Process Control
and was not sent to the target system.
Canceled The schedule was canceled before it was sent to the tar
get system.
4. To view the log for a specific schedule, select a schedule to highlight and select it. Choose Show Log. The
screen displays the job header information and a job log list that shows all the control-rule assignments
that were executed in the schedule.
5. To print the job log list to a file, choose Print Version. To export the log to a file, choose Excel.
6. To cancel or reschedule jobs, select the job and choose one of the options:
○ Cancel - You can only cancel jobs if they are in a scheduled status.
Note
If a job has a status of Invalid control on the Monitoring Scheduler screen, you can use Job
Status to determine the reason the job did not execute.
○ Job Detail – Select the job. Choose Job Detail. The screen displays the job header information, the
number of deficiencies, and their ratings.
Note
Use
The Job Monitor allows you to view the execution status of scheduled automated testing jobs. It displays
whether a scheduled job performed successfully and shows results of executed tests. Jobs could have been
scheduled using the following functionality:
● For Process Control or Risk Management Continuous Monitoring jobs, choose Rule Setup Scheduling
Automated Monitoring. .
● For Process Control or Risk Management Legacy Automated Monitoring jobs, choose Rule Setup
Legacy Automated Monitoring Monitoring Scheduler .
Prerequisites
Jobs must have been scheduled using the Scheduling Automated Monitoring and Incoming Event Handling
Jobs [page 437] or Legacy: Using the Monitoring Scheduler [page 473].
Features
Activities
● To search for executed jobs, perform the steps in Searching for Executed Jobs [page 445].
● To view results of executed jobs, perform the steps in Viewing Job Results [page 446].
Context
Jobs can be created and scheduled through the Continuous Monitoring functionality or the Legacy Automated
Monitoring.
● For Continuous Monitoring jobs, choose Rule Setup Scheduling Job Monitor. .
● For Legacy Automated Monitoring jobs, choose Rule Setup Legacy Automated Monitoring Job
Monitor. .
Procedure
1. The Job Monitor screen displays the criteria that you can use to search for executed jobs.
2. Select the desired year and period in the time frame fields, and choose Go. This limits your search to those
jobs that were executed during the specified time frame.
3. (Legacy only) Select the type of Regulation.
4. Enter the search criteria: job name, frequency, target connector, execution date from, execution date to (or
any combination) to narrow your search results.
5. Choose Search.
The Job Monitor screen displays all executed jobs that match your search criteria.
6. To export search results to a file, select Export. To convert results to a printable format, select Print Version.
7. To further customize the view of your search results, use the Filter and Settings located at the upper right
hand of the screen.
Prerequisites
Context
Based on search results returned from Searching for Executed Jobs, you can view information about the results
of jobs. Jobs can be created and scheduled through the Continuous Monitoring functionality or the Legacy
Automated Monitoring.
● For Continuous Monitoring jobs, choose Rule Setup Scheduling Job Monitor. .
● For Legacy Automated Monitoring jobs, choose Rule Setup Legacy Automated Monitoring Job
Monitor. .
Procedure
1. Select View Result link to view the job result details. The Job Result screen displays the following
information:
○ Result: Header data specific to the job (for example: rule, number of exceptions, organization)
○ Details: Test result line item data showing exceptions
○ Attachment (if any): Report of actual test results.
2. Special displays:
○ Legacy Automated Monitoring
○ If the job is executed for rules other than ABAP reports or SAP standard or custom program from
Process Control, the results display in the grid below the job header information. There is one row
for each exception.
○ If the job is executed for a control which uses an SAP standard or custom program, the results are
linked. Select the report link to view the report.
○ Continuous Monitoring
○ If the job is executed for a control which uses ABAP reports, the results are linked. Select either
Open in HTML or Open in TEXT.
3. If there are no exceptions, the lower grid does not display. Only the header information with a deficiency
rating of Adequate displays. To export the exception list to a file, select Export. To convert results to a
printable format, select Print Version.
You use the following functions to activate, track, and review your event-driven controls:
Use
Controls or monitoring rules that respond to messages that external systems send to Process Control are
called event-driven controls. Such controls are scheduled and run in Process Control. They execute a query
against a back end system to gather data. The external system decides when an event is significant enough to
send to the application.
Example
The external system could be a network management tool that monitors network traffic, watching for
intrusions, system failures, and so on. The process uses a Web service interface that you enable in SAP
NetWeaver, to communicate from the external system to Process Control.
Integration
1. You configure the schema for the event in the Customizing activities for Process Control.
2. You define a rule to work with that event. These are event-driven rules. The name of the rule must be
exactly the same as the name of the event.
3. Based on the number of events, you specify the criteria that the rules use to create issues.
4. Associate your event-driven rule with a control. This combination is an event listener. It is ready to receive
and process events as defined.
5. Decide if the event listener is active or inactive. You set this parameter on the Event Monitoring Activation
screen.
When Process Control judges a received event to be significant, the system creates an issue, and a workflow
message to notify the appropriate user that an issue has been created.
● The external system notifies Process Control when the defined event occurs. Job scheduler does not
schedule event-driven controls.
● Process Control uses the Event Monitor to track and monitor events. For more information, see Event-
Based Control Monitoring [page 483]
The Reports section of the Rule Setup work center contains the following reports:
Report Description
Data Source Business Rule Assignment This report lists all data sources that can be used for busi
ness rules and indicates the business rules that use a partic
ular data source. You can use this report to understand the
data being analyzed by a particular rule, by drilling-down into
the data source details for table and field information.
Control Monitoring History with Ratings This report provides visibility into the automated control and
transaction monitoring results by regulation, by organiza
tion, by process and by control. You can use this report to fa
cilitate root-cause identification of the automated monitor
ing issues by drilling-down into the specific details of the is
sues.
Monitoring Issue Status This report provides visibility into the status of automated
monitoring issues by regulation, by organization, by process
and by control. You can review this report to determine
which critical monitoring issues remain open and do not
have any assigned remediation plans. You can drilldown into
the automated monitoring issue details.
Monitoring Remediation Status This report provides visibility into the status of remediation
plans for automated monitoring issues. You can use this re
port to determine which critical monitoring issues do not
have any remediation plans or have remediation plans that
are still open. You can drilldown into the remediation plan de
tails.
Automated Control Rule Assignment This report shows the assignment between the control and
the rule from the Legacy Automated Monitoring work center.
Automated Control Rule and Rule Criteria This report shows the assignment between rule criteria and
rule from the Legacy Automated Monitoring work center.
Automated Control Business Rule Assignment This report shows the assignment between control and busi
ness rule from the Continuous Monitoring work center.
6.4 Assessments
Use
The Assessments work center is shared by the Access Control, Process Control, and Risk Management
products in the GRC Application. The menu groups and quick links available on the screen are determined by
the applications you have licensed. The content in this topic covers the functions specific to Process Control.
The Process Control Assessments work center contains the following sections:
6.4.1 Surveys
Use
A survey is a structured list of questions. Within GRC, surveys are used to obtain information about the
existence and evaluation of risks (RM) or the design or operational adequacy of controls (PC). Surveys are
used to carry out assessments of objects such as risks, activities, or policies, for example. These assessments
are defined via plans in the Planner [page 496].
Surveys are created and maintained in the Survey Library [page 487] and sent via the workflow (which can be
routed to an inbox and/or e-mail).
Prerequisites
● To send e-mails with interactive PDF survey data, complete the Customizing activity Maintain Inbound E-
Mail Settings for Survey under Governance, Risk, and Compliance General Settings Workflow .
● Users who receive survey PDFs by e-mail must have stored their e-mail address in the GRC back-end
system (SU01) under System User Profile Own Data (Address Tab) .
More Information
Definition
The Question Library lists the user-defined questions that you can use within your surveys. Each question
comprises the following information:
● Create new questions. You can create a new question, or copy and change an existing question.
● Open questions for editing. You can only edit questions that are not being used in a survey.
● Delete questions. You can only delete questions that have not been assigned to any survey.
● Upload questions from a file stored on your local machine.
You can use the questions defined in the Question Library with the surveys listed in the Survey Library.
More Information
Definition
The Survey Library lists the user-defined surveys that you can use to obtain information on the existence and
evaluation of risks (RM) or the adequacy of controls (PC). Each survey comprises the following information:
Use
● Create new surveys. You can create a new survey, or copy and change an existing survey.
● Open surveys for editing. You can only edit surveys that have not been scheduled.
● Delete surveys. You can only delete surveys that have not been scheduled.
More Information
Prerequisites
Procedure
To create a survey:
Note
Using valuation for risk analyses requires additional settings through the Customizing activities.
Complete the activities listed under Governance, Risk, and Compliance Common Component
Settings Surveys .
Note
You cannot activate a survey without first creating one or more questions for it.
Example
Survey A has two questions (Q1 and Q2). The answers and scores are defined as following:
The total score of the survey is the sum of all the answers. In the example, a submission with
answers Q1 – Answer 1.1 + Q2 – Answer 2.1 = 50 as a total score. The highest possible score for
this survey would be 100.
8. Save the survey. Your survey can now be included in a plan when you call up the Planner [page 496].
Note
○ Your survey becomes visible on the Survey tab of the Risk or Activity screen after you create a plan
in the Planner and have sent out the survey.
○ You can display the results of the survey by running the Survey Results report under Reports and
Analytics Compliance .
More Information
Use
For each type of survey, you can create user-defined questions to be attached. You can create questions in the
Question Library [page 486], or you can open a specific survey in the Survey Library [page 487] and create
questions for it. Furthermore, you can define your own answer types, which you can attach to question or
survey categories if necessary.
Note
If a question is already being used in a survey, you cannot change any data for it, but you can deactivate it.
Complete the Customizing activity Define Ratings for Survey Questions, found under Governance, Risk, and
Compliance Common Component Settings Surveys .
Procedure
To create a question:
Note
If you are not finished formulating the question, or if you want to make a question obsolete, deactivate
the question. You cannot delete questions that are already used in surveys.
5. Enter one of the following answer types (answer types vary based upon the survey category):
Rating Requires the entry of a rating type. If you select this an
swer type, you are asked if the answer requires a com
ment.
Probability Level Requires the entry of a probability level. If you select this
answer type, you are asked if the answer requires a com
ment.
Impact Level Requires the entry of an impact level. If you select this an
swer type, you are asked if the answer requires a com
ment.
Speed of Onset Requires the entry of a speed of onset value. If you select
this answer type, you are asked if the answer requires a
comment.
Note
The answer types Yes/No/NA, Rating and Choice support user-defined scoring for each answer option.
A number score is assigned to each answer option at the design time. At runtime, users receive the
scores according to their selections. A final score is based on aggregating the scores from each
question.
○ For the answer type Rating, scores are defined during the Customizing activity, Define Ratings for
Survey Questions, located under Governance, Risk and Compliance Common Component
Settings Surveys .
○ For the answer type Choice, scores can be defined in the frontend, or they can be defined in the
corresponding column of the survey upload Excel file.
○ For the answer type Yes/No/NA, question scores are defined when the survey is defined.
Recommendation
For more information, see Score-Based Valuation for Surveys and Questions [page 492].
6. If you are creating a question directly from a survey, choose Actions Create Question . On the Create
Question screen, you can specify if the question is local (only used for this survey). If you choose No, the
question can be used in other surveys.
7. Save your data.
Result
Note
If you want to upload new questions from your hard disk, you can do so by choosing Actions Upload .
The format of the file must be .csv, which can be created from a Microsoft Excel spreadsheet. For Choice
type questions, this spreadsheet can define the scores given to each choice, using the CHOICE_SCORE
column.
Use
You can use the valuation and scoring function built into survey and question creation to assist in risk analysis
and process control evaluation.
● Surveys can be created with the type No Valuation or Score-Based Valuation. If you choose Score-Based
Valuation, a Set Score link appears on the right side of each line for all score-based questions that you have
created or that you have added from the Question Library [page 486].
Note
Certain question types, such as those requiring a text entry, cannot be scored. The Set Score link will
not appear next to these kinds of questions. For more information about the different question types,
see Creating Questions for Surveys [page 489].
● When you choose the Set Score link, an Override Question Score window appears. You can choose to use
any maintained values that were preset through the Customizing activities, or you can override those
values with those of your own choosing.
Note
If you override the preset values, the values you enter are valid only for this instance of the question. If
you use the same question type for another question in a survey, the default values are assigned to it
unless you override them again.
● If you wish to revert to the values set in the Customizing activities, click the Reset button in the Override
Question Score window.
● You can indicate whether a question is to be local (one-time only for a survey) or if it is to be global (stored
in the Question Library after creation). The default setting is global.
More Information
SAP Process Control currently provides the following categories of surveys in the Survey Library for evaluations
of different purposes:
● Self-assessment
● Control Design
Use
Disclosure surveys evaluate the disclosure status of a company. With the SAP Process Control Disclosure
Survey, you can perform evaluations on three different entity levels: organization level, subprocess level, and
control level. Accordingly, the following three types of surveys are available in the Survey Library:
In the Planner [page 496], you can plan a survey based on one of the entities. During planning, you can define
the following attributes for the survey:
● Survey period
● Start date and due date
● Object survey template and disclosure survey template
You can choose a survey based on the specific object, or based on the disclosure status as a whole; you
can also choose both.
● Regulation
● Organization
● Subprocess or control
Depending on the entity level, you can choose the relevant subprocesses or controls. In organization
disclosure survey, this option is not available.
Disclosure surveys can be performed in Online Mode or Offline Mode. In Online Mode, the recipient receives the
survey in the work inbox. In Offline Mode, a PDF version of the survey is sent via e-mail to the recipient, who
answers the questions in the PDF file and sends back the result.
Note
In Offline Mode, a valid e-mail address must be assigned to the relevant roles first in order to receive the
survey.
More Information
Use
A manual test plan consists of a sequence of test steps that are performed during testing to determine that a
control is operating effectively. A manual test plan may test either a manual or an automated control. If you
define the test method as manual, a manual test plan applies.
When you create a manual test plan, you assign the following attributes to it:
● Test steps comprising the test plan and the required steps
● Sampling methodology and initial sample size
● Indicator that says whether or not a test step failure results in a failed control and requires further action
All required test steps must be completed, in sequence, before the final validation of a manual control.
Prerequisites
A control must be in place before a test plan can be assigned, and the control must have Test Automation set to
Manual. For more information, see Business Processes [page 412].
Features
Note
You can assign manual test plans directly to controls while creating or editing a control.
Activities
● To create and assign attributes to a manual test plan, or to edit an existing plan, perform the steps in
Creating and Editing Manual Test Plans. [page 495]
Valid From / Valid To Enter the date range for which the test plan is valid.
5. On the Test Steps pane, select Add to add new steps or, to delete an existing step, select the step and then
select Remove..
6. In the Step Name field, enter the name of the step for the manual test.
7. In the Step Description field, enter a short description for this step.
8. In the Step or Test dropdown menu, select either Step or Test to indicate if this step is for manual controls
or is a test for automated controls.
9. In the Required dropdown menu, select Yes or No to indicate whether or not this step is required.
10. In the Fail Ends Test dropdown menu, select Yes or No to indicate whether or not to end the test if this step
fails.
11. In the Initial Sample field, enter a description for the initial sample.
12. In the Sampling Method dropdown menu, select the desired sampling method.
13. Optionally, select the Attachments and Links tab to attach files or links to your test plan.
14. Select Save when you have completed your plan definition or when you have finished your edits.
In the Assessment Planning section of the Assessments work center, you have the following options:
● Planner
● Planner Monitor
● Sign-Off Monitor
Use
You can access the Planner under Assessment Planning in the Assessments work center. The window that
opens displays all Process Control and Risk Management plans and associated activities.
● Display existing plans, create a new plan, or copy and change an existing plan.
● Display the organizations for which plans are to be used.
● Display planning dates, including the start date, due date, and actual end date.
● Display the status of a plan.
● Split a plan, which has not executed, involving more than one organization.
Caution
Prerequisites
Process
You can use the Planner for Process Control and Risk Management, triggering workflow procedures for
assessment, testing, and sign-off, among other purposes. You can use it to trigger e-mail surveys as well for
policy distribution.
More Information
Please also see the Risk Management Planner topic in the documentation for SAP Risk Management.
Use
Using the Planner, you can define workflow procedures for validation and sign-off, schedule ad hoc issues, and
plan surveys to be carried out for Risk Management.
During planning, you can select the time period to be evaluated, the type of evaluation, the survey to be used (if
any), the items to be evaluated, and the start date and due date. This triggers a workflow to be sent to relevant
users beginning on the start date.
Prerequisites
User roles are assigned to organizations and to the local process hierarchy objects. This is done through the
Customizing activities.
More Information
Use
During planning, you enter the plan information following the guided activity steps. The plan executes the
specific logic beginning on the start date.
Prerequisites
1. Navigate to Assessments Assessment Planning Planner . The Planner table displays existing
plans. The period and year selected determine the default period and year for the next step.
2. Choose Create. The guided activity screen for creating a plan displays.
3. Enter the name of the plan and select a Plan Activity. Depending on the selection you make here, the fields
below it vary.
4. To use a survey for the plan, select it from the dropdown list.
5. For some plans that involve the sending of PDF questionnaires, you must set the Delivery: Via E-Mail
Indicator. This means that you receive a survey in Offline Mode. Otherwise, you receive a work item in your
work inbox, which is considered as the Online Mode.
6. Enter the start and due dates, and for assessments, the analysis date.
Note
The due date cannot be the same as the start date, it must be at least one day later. However, for risk
analyses, the analysis date can be the same as the start date. If workflow is not completed by the
planned due date, the workflow remains open until it is completed. The Due Date can be configured
with reminders and escalations to notify users of tasks approaching or past their due dates.
Note
11. In the next step, Select Objects, you can further narrow the selection criteria (depending on the
configuration), if applicable.
(Risk Management only) For an activity validation, you have the following options:
○ If you select all activities, all existing activities in the organization are used in the plan.
○ If you select by activity attributes, for example, you can specify the activity category and type, and the
number of risks to be included. In particular, you can specify the inherent and residual risk levels, as
well as enter a validity period for the plan.
○ If you select specific activities, you must specify which ones are to be included in the plan.
12. Select the Recipients for the plan (depending on configuration). Only Policy Survey, Policy Quiz and Policy
Acknowledgement use this choice.
13. After choosing Next, you access the Review section of the Guided Procedure, where you can check whether
the plan details and the selections you made are correct. If you choose the View Objects, the system
outputs a list of the selected objects and the corresponding e-mail recipient or recipients.
Note
If you receive the status Error for your plan, you can see the reason in the Events tab of the plan. In
this case, you must check the application log using transaction SLG1.
Copying a Plan
1. From the Planner overview list, put your cursor on the plan to be copied and choose Copy.
2. A Guided Procedure for copying the plan displays.
3. You can change the plan details by entering other data. The start date cannot be in the past.
4. The steps to be followed for copying are the same as for creation — see Steps above.
A plan can be deleted or split over several organizations. In the latter case, you can use one plan for all
organizations or have the plan replicated for each organization.
1. From the Planner overview list, put your cursor on the plan to be deleted or split and choose the correct
action.
Note
You can only delete or split a plan that has not been executed yet. Only a plan whose status is Planning
and whose start date is tomorrow or later can be deleted or split. To split a plan, you must previously
have selected at least two different organizations.
2. The plan is either split or deleted. If it is split, two lines are displayed in the list. If deleted, the line for this
plan no longer displays.
You can use the Planner Monitor to track and monitor the execution status of workflow, e-mail survey, and
user-defined objects created by the planner within the application.
You can filter plan items, as required, by plan name, plan activity, organization, as well as by a date range, and
manually send notifications to recipients, as appropriate.
Auto Notifications
You can enable automatic notifications about plans in status "Error". To do this, in transaction SE36 set the
report GRFN_PLANNER_SEND_ERROR_NOTIF as a background job. The job will check plans on a regular basis
and upon plans in status "Error" are found, automatic email notifications will be sent to persons responsible.
Use
This functionality monitors the sign-off process. The sign-off monitor shows the full organization hierarchy.
For organizations marked as subject to sign-off, the sign-off begins with the lower organizations and proceeds
to the higher organizations in the hierarchy. You can see if an organization has been signed off or not, the sign-
off date, and any attachments.
Activities
The following selection criteria are available for the sign-off monitor:
● Timeframe, Timeframe Year — You can choose which timeframe you want to see.
● Regulation — The sign-off is regulation specific. You can choose which regulation data you want to see.
The sign-off monitor displays the organization hierarchy, and the following information for each organization:
● If the organization is subject to sign off. The values are Yes or No.
Assessment reports pertain to all design assessments and tests of effectiveness. Which reports are available
varies by person, based upon the role assigned.
Note
The Case Selection field is used in several Assessment Reports. Use this field to see evaluation cases of:
● All in reporting timeframe: The report shows all evaluation cases per evaluation type that occurred in
the reporting timeframe.
● One per evaluation timeframe: The report only shows one evaluation case per evaluation type for each
evaluation timeframe, according to the setting in Include Assessment.
● One per reporting timeframe: The report only shows one evaluation case per evaluation type for the
reporting timeframe, according to the setting in Include Assessment.
Example
Case 3: planned for timeframe Year 2012, performed on 2012.1.30 and Include Assessments is set to Most
Recent Assessments/Tests in Timeframe. Run report in timeframe Year 2012, regarding to different
selections in Case selection:
Evaluation Results by Organization This report provides a hierarchical view into the evaluation results of
different types of organizations. You can review this report to under
stand the evaluation status of controls and subprocesses for each
evaluation type. You can focus on failed controls and processes and
drilldown to see if further remediation actions must be taken.
Evaluation Management This report provides a list of organizations that have not yet per
formed certain evaluations in a specific timeframe. You can review
this report to understand the evaluation coverage gaps to see if fur
ther assessments or tests must be planned.
Indirect Entity-Level Control (iELC) Evaluations This report provides indirect entity-level control evaluation results
by iELCs by organization. You can review this report to understand
the evaluation status of iELCs for each evaluation type. You can fo
cus on failed iELCs and drilldown to see if further remediation ac
tions must be taken.
Indirect Entity-Level Control (iELC) Evaluations by This report provides a hierarchical view of indirect entity-level con
Organization trol evaluation results by organization. You can review this report to
understand the evaluation status of iELCs for each evaluation type.
You can focus on failed iELCs and drilldown to see if further reme
diation actions must be taken.
Subprocess Design Assessment This report provides visibility into subprocess design assessment by
organization and process. For each subprocess, it shows the results
of the performed subprocess design assessment. You can review
this report and focus on failed subprocesses and drilldown to see if
further remediation actions must be taken.
Control Ratings This report provides visibility into the control evaluation results of
different evaluation types by organization and process. You can re
view this report to understand the evaluation status of controls for
each control evaluation type. You can focus on failed controls and
drilldown to see if further remediation actions must be taken.
Control Test History with Ratings This report provides visibility into control testing results by controls
by organization and process for multiple periods (if available). You
can review this report to understand the testing status of controls.
You can focus on controls that failed the effectiveness test and drill
down to see if further remediation actions must be taken.
Test Step Status This report provides visibility into the test step details of control
testing results for each organization and process. For each effective-
ness test, it shows results for each test step. You can review this re
port to understand what step failures contribute to the overall test
deficiency.
Risk Coverage with Evaluations This report focuses on evaluation results with risk coverage by con
trols by organization and process. You can review this report to un
derstand, for each risk, whether or not the control assigned for miti
gation is designed and executed correctly. This could help see if an
other control is needed or further remediation actions must be
taken.
Risk Coverage with Ratings by Organization This report shows evaluation results risk coverage in a hierarchical
layout. You can review this report to understand, for each risk,
whether or not the control assigned for mitigation is designed and
executed correctly. This could help determine if another control is
needed or further remediation actions must be taken.
Assessment Survey Results This report provides visibility into assessment results of each evalu
ation type by control for each organization and process. For each
control or subprocess, it shows the evaluation results of the per
formed subprocess design, control design, and self-assessment.
You can review this report and focus on failed subprocesses and
controls. You can drilldown to see if further remediation actions
must be taken.
Issue Status This report provides visibility into issue statuses of each evaluation
type. You can review this report to find out whether there are open
issues under specific organizations, processes, subprocesses, or
controls and drilldown to open the issue details.
CAPA Status This report provides visibility into CAPA plan statuses of each evalu
ation type, if applicable. You can review this report to check whether
all addressed CAPA plans are processed in a timely fashion. You can
also drilldown to see the CAPA plan details.
Recommendation
For more information, see Key Assessment Report: CAPA Sta
tus Report.
Remediation Status This report shows the status of the remediation plan for each evalu
ation type. You can review this report to see whether all addressed
remediation plans are processed in a timely fashion and drilldown to
see remediation plan details.
Test Status by Organization This report provides a hierarchical view into high level statistics on
evaluation status by organization. For each organization, it shows
the total number of key controls as well as the evaluation pass rate
of each evaluation type. You can review this report to compare inter
nal control compliance status among different organizations.
Test Status by Process This report provides a hierarchical view into high-level statistics on
evaluation status by process. For each organization and process, it
shows the total number of key controls as well as the evaluation
pass rate on each evaluation type. You can review this report to
compare the internal control compliance status among different
processes.
Scoping Coverage This report provides a hierarchical view into the result of consoli
dated materiality analysis by accounts group. For each central ac
counts group, it shows the consolidated accounts group signifi-
cance decisions together with account groups balance and material
ity threshold. Additionally, this report shows the overall scoping cov
erage status, in terms of scope control numbers and risk coverage.
You can review this report to see if more account groups must be
added to the scope.
Organization-Level Materiality Analysis Results This report provides a hierarchical view into the result of organiza
tion-level materiality analysis by organization and accounts group.
For each local accounts group, it shows the organization-level ac
counts group significance decisions together with the accounts
group balance and materiality threshold. You can review this report
to see if further accounts group, process, and controls must be
added to the scope.
Testing Strategy by Control This report provides visibility into the results of control risk assess
ment results by control by organization and process. For each con
trol, it shows the value of control risk rating from assessment as well
as the level of evidence calculation result. A use could review this re
port and understand the decisions of testing strategy suggestion to
each control following the risk-based compliance approach.
Risk Assessment Results This report provides visibility into the results of risk assessment re
sults by risk by organization and process. For each risk, it shows the
assessed value of probability, impact level, and overall risk level. You
can review this report and use its output as evidence for risk-based
compliance.
Organizational Sign-off Status This report provides visibility into the status of sign-off by organiza
tion. You can review this report to find out whether business owners
have performed the sign-off for their areas of responsibility. You can
drilldown for the detailed sign-off results.
Aggregation of Deficiency (AOD) Status This report provides visibility into the status of aggregation of defi-
ciency by organization. You can review this report to find out
whether business owners have performed aggregation of deficiency
for their areas of responsibility and drilldown to check the detailed
AOD results.
Policy Profile This report provides an overall summary of the policy, its current
status and where it is currently in the workflow.
Policy Distribution Survey Results This report provides visibility into the results of policy distribution on
question and answer level. You can review this report for audit trail
purpose or you can perform analytics on the feedback from specific
survey questions.
Policy and Issue Status This report provides an overall summary of all issues (both evalua
tion and ad hoc) related to a specific policy. You can review this re
port to help evaluate the effectiveness of a policy based on the eval
uation issues of controls in the policy scope or on the ad hoc issues
of the policy.
Ad Hoc Issue Report This report provides an overall summary of the ad hoc issues.
Policy Distribution Survey Results This report provides visibility into the results of policy distribution on
question and answer level. You can review this report for audit trail
purpose or you can perform analytics on the feedback from specific
survey questions.
Policy and Issue Status This report provides an overall summary of all issues (both evalua
tion and ad hoc) related to a specific policy. You can review this re
port to help evaluate the effectiveness of a policy based on the eval
uation issues of controls in the policy scope or on the ad hoc issues
of the policy.
Policy Distribution Survey Results This report provides visibility into the results of policy distribution on
question and answer level. You can review this report for audit trail
purpose or you can perform analytics on the feedback from specific
survey questions.
Policy and Issue Status This report provides an overall summary of all issues (both evalua
tion and ad hoc) related to a specific policy. You can review this re
port to help evaluate the effectiveness of a policy based on the eval
uation issues of controls in the policy scope or on the ad hoc issues
of the policy.
Policy Distribution Survey Results This report provides visibility into the results of policy distribution on
question and answer level. You can review this report for audit trail
purpose or you can perform analytics on the feedback from specific
survey questions.
Policy and Issue Status This report provides an overall summary of all issues (both evalua
tion and ad hoc) related to a specific policy. You can review this re
port to help evaluate the effectiveness of a policy based on the eval
uation issues of controls in the policy scope or on the ad hoc issues
of the policy.
Policy Distribution Survey Results This report provides visibility into the results of policy distribution on
question and answer level. You can review this report for audit trail
purpose or you can perform analytics on the feedback from specific
survey questions.
Policy and Issue Status This report provides an overall summary of all issues (both evalua
tion and ad hoc) related to a specific policy. You can review this re
port to help evaluate the effectiveness of a policy based on the eval
uation issues of controls in the policy scope or on the ad hoc issues
of the policy.
The Corrective Action and Preventive Action (CAPA) status report provides the condition of all the CAPA
initiatives that have been taken in your company to remediate issues rising out of operations. You can also drill
down into each of the CAPA plans and view the details of the plan. The report can help determine the number
of CAPA plans that have been initiated in the company:
The CAPA status report can be used for different reasons by various users. An organization owner may use this
report to check how many CAPA plans have been initiated in the organization. A process owner could use the
report to see the number of CAPA plans that have been planned in the owner's process, as well as how many of
them are overdue, and the status of completion of these plans.
Example
Use
The Access Management work center is shared by the Access Control, Process Control, and Risk Management
products in the GRC Application. The menu groups and quick links available on the screen are determined by
the applications you have licensed. The content in this topic covers the functions specific to Process Control. If
The Process Control Access Management work center has the GRC Role Assignments [page 507] section.
More Information
Please also see the following topics in the documentation for SAP Access Control and SAP Risk Management:
Use
The GRC Role Assignments menu group is shared by the Access Control, Process Control, and Risk
Management products in the GRC Application. The quick links that appear on the screen are determined by the
applications you have licensed. The content in this topic covers the functions specific to Process Control.
In the GRC Role Assignments section of the Access Management work center you can specify owners for the
delivered roles and the conditions that require approval from role owners.
● Organizations [page 507] – To maintain the organization structure within the application for you
company.
● Business Processes [page 510]
● Replacements [page 511]
● Central Delegation [page 513]
6.5.1.1 Organizations
Use
You use the Organizations link under the Access Management work center to assign corporate and organization
roles.
Note
There is also an Organizations link under the Master Data work center. You use its functions to create and
maintain the organizational structure in the application. For more information, see Organizations [page
398] (in the Master Data work center).
For the Organizations link under the Access Management work center you can do the following activities are
available for assigning corporate and organization roles:
● Select timeframes
● Select organizations
● Choose and assign corporate and organization-level roles to organizations
● Choose users and assign them to roles
More Information
Context
You can use this function to assign users to roles for corporate and organization objects. You typically perform
this task during initial setup, when organizations or roles (corporate or organization) are added, or when
multiple users are assigned to roles.
To assign users to roles at the corporate and organization levels, perform the steps in the following categories:
1. Select a timeframe
2. Select organizations
Choose the corporate and organization-level roles that you want to assign.
3. Assign roles
Choose the users that you want to assign to the roles.
4. Review selection
Review the users assigned to selected roles.
5. Confirm selection
Confirm the role assignments.
Procedure
1. Navigate to Access Management Organizations . The Assign Corporate and Organization Roles screen
appears.
Recommendation
To select multiple fields, press the CTRL key. To select consecutive fields, press the SHIFT key.
3. Select Next. The Assignments table displays the selected organizations and the respective corporate
and organization-level roles.
Note
Some roles allow multiple users to be assigned. If a role allows multiple assignments, it always
presents an editable cell for additional assignments, whether or not an assignment already exists.
2. To copy the same users to multiple roles, select the entire row you want to copy.
3. Select Copy Action and choose either:
○ Copy to ALL – to copy the user to all editable fields (whether empty or not), or
○ Copy to Empty – to copy the user to only empty editable fields.
4. The Copy Assignment screen appears. Select All roles or Only selected roles for roles to which you want
the users copied. Select OK. The Assignments table populates based on your selection.
Example
The copy action is based upon assignments made in the selected row. For example, a row might
contain the process-level role assignments for Process Owner as Denise Smith and Tester as Oleg
Kopp. Choosing Copy to Empty and then All Roles copies Denise Smith to all empty Process Owner
cells and Oleg Kopp to all empty Tester cells. However, choosing Only selected roles and choosing
Tester copies just Oleg Kopp to all empty Tester cells.
5. Select Next. The Proposed Changes screen displays the assignments to be made.
3. Step 4 - Review
Review your selections in the Proposed Changes results table. Select Previous to go back and make any
changes, if desired. Otherwise, choose Next (the Confirmation screen appears) or select Finish.
4. Step 5 - Confirm
Confirm your selection and select Finish. Your assignments have been made, and any changes require a
replacement or removal.
● Business Process: Assign Process, Subprocess, and Control Roles [page 510]
● SAP Process Control 12.0 Security Guide at https://help.sap.com/pc
Prerequisites
Complete the Customizing activity located either at Governance, Risk, and Compliance General Settings
Authorizations Maintain Entity Role Assignment or Governance, Risk, and Compliance Process Control
Authorizations Maintain Regulation Role Assignment
Recommendation
For more information, see the SAP Process Control 12.0 at .https://help.sap.com/pc
Context
You can use this function during initial setup to assign users to roles for local process objects. For example,
when new process objects are added, when roles are added for process hierarchy levels, or when additional
users are assigned to roles that can be assigned to multiple users. To assign users to roles in the process,
subprocess and control levels, you perform steps in the following four categories:
1. Select Role and Filter – to select the roles you want to assign.
2. Assign Roles – to select the user(s) you want to assign to the role(s).
3. Review selection – to review users assigned to selected roles.
4. Confirm selection – to confirm user-role assignments.
Note
You can also perform mass role assignment to cross-regulation roles or specific regulations.
Procedure
1. Navigate to Access Management GRC Role Assignments Business Processes . The Assign Process,
Subprocess, and Control Roles screen appears. Perform the following guided activity steps:
Note
If you do not choose to filter the selection, the Assignments table displays all organizations,
processes, and roles available for the selected role level (process, subprocess, control). To work
with manageable amounts of data, limit the number of role levels and use filters to refine your
selections.
Note
Some roles allow multiple users to be assigned. If a role allows multiple assignments, it displays an
editable cell for additional assignments (whether or not an assignment already exists).
6.5.1.3 Replacements
Use
The Replacement function allows you to remove a user from a role or to replace a user in a role. You use this
function when employee status changes due to job transfers, new hires, or terminations. This changes the role
assignments and transfers the open workflow from the user being replaced to his or her replacement.
1. Navigate to Access Management GRC Role Assignments Replacements . The Replacements and
Removals screen appears.
2. Since you select a user in the upper pane, the lower pane shows role replacements or removals for the
highlighted user. This listing is display-only.
Note
In the lower pane, Level represents the authorization level of the role and Object pertains to the object
(such as process, subprocess, control) to which the role has access.
3. Select the desired year and period in the timeframe fields, and choose Go. The earliest possible date for a
replacement is tomorrow (that is, system date plus one day).
4. To replace or remove a user from a role, select Replace or Remove. The Role Replacement and Removal
screen displays a guided activity.
5. Select user
○ In the Find field, enter the name or user ID of the user you want to replace or remove. Choose Go. Wild
cards (*) are not supported on this screen.
○ Select the row of the user to be replaced or removed and select Next. The Assignments table displays
the current role assignments for the user selected.
6. Define Replacement
○ To replace a user in a role, select the Replacement field of the role for which you want to enter a
replacement.
○ Enter the user name or select the value help to search by user or user ID. Provide a partial user name
or user, using wild cards (*) as needed. Select the row containing the desired replacement and choose
OK.
○ In the Effective Date field, enter the date that you want the replacement to take effect. Optionally, leave
the field blank to default to the earliest possible date, usually the following day.
○ Continue selecting roles and making replacements until all desired roles have replacements.
○ To copy a user name and effective date to multiple roles (rows), select the source row for the copy and
choose Copy Action. If you have not selected a row, Copy Action is disabled.
○ Choose any of the following options from the Copy Action dropdown:
○ Copy to ALL – to copy to all Replacement and Effective Date fields (whether target cells are empty
or not). If the fields are not empty, the fields are overwritten with the new user and effective date.
○ Copy to Empty – to copy to only empty Replacement and Effective Date fields. If these fields are
populated with a different user/date, the fields retain the user/date content and are not replaced.
○ To remove a user from a role without replacing him or her, select the user name and select Remove.
This is useful when a role allows multiple users to be assigned.
Note
If your removal causes a role assignment to become empty, the system displays a warning.
○ Select Next. The Proposed Changes screen displays the changes to be made.
7. Review your selections in the Proposed Changes results table. Select Previous to go back and make
changes. Otherwise, choose Next or select Finish. The Confirmation screen appears.
8. Confirm your selection and choose Finish. Your replacements and removals are effective on the date you
provided. For replacements, the system reroutes open workflow tasks to the replacements on that date.
Use
You authorize users to perform tasks and exercise access rights on behalf of other users. The system
administrator must grant you authorization to perform central delegation.
● You can authorize a user (the delegate) to perform the tasks and to exercise the access rights of another
user (the delegator).
● You delegate access rights by creating a new delegation in which you designate one user as the delegator
and another as the delegate. The delegator’s access rights and tasks become accessible to the delegate for
the validity period that you specify.
Recommendation
Companies limit access to Central Delegation because it authorizes users to access all delegations and to
delegate on another user’s behalf.
Caution
Authorization granted to power users through the role SAP_GRC_FN_ALL cannot be delegated to business
users. If a power user needs to delegate his or her authorization to others, he or she must ask the IT
department to assign the PFCG role SAP_GRC_FN_ALL to that user. This delegation is not entity-
dependent. For more information, see Standard Roles and Auzthorization Objects.
Prerequisites
You have authorization for central delegation. For more information, see the SAP Process Control 12.0 Security
Guide at https://help.sap.com/pc.
Procedure
To delegate the access rights of one user to another, follow the steps below.
1. Select Access Management work center, choose GRC Role Assignments Central Delegation
The Central Delegation screen displays all existing delegations. From here, you can create a new delegation,
open and edit an existing delegation, or delete a delegation.
2. To create a new delegation, choose Create.
The Central Delegation screen displays.
3. Enter the information as follows:
1. In the Delegator User field, select the value help to display the User List dialog box.
2. Enter, or search for, the user name. Select a user name and choose OK.
The Delegator and User ID fields are automatically filled when you select a user.
3. In the Delegate User field, select the delegate in the same manner as you selected a delegator.
The system fills in the Full Name field when you select a user.
4. In the Delegation Period field, adjust the defaults as needed.
○ The Start Date defaults to the date the delegation is created.
Enter the date you want the delegation to begin.
○ The End Date defaults to unlimited (December 31, 9999).
Enter the date you want the delegation to end. If you accept the default of an unlimited End Date,
you can change the date later, or delete the delegation when it is no longer needed.
With Mass Role Assignment, you don't need to remove roles, replace role assignees or replicate role
assignment one by one. You can select multiple users to remove some or all roles assigned to them, or replace
them with new assignees, or copy their role assignment to other users .
To remove roles from users and re-assign the roles to new assignees,
Note
Please note if you choose multiple target users, all the selected roles will be assigned to each target user.
Different from replacing role assignees, to replicate role assignment is to assign the selected roles of source
users to target users while keeping the role assignment of source users.
Use
The Reports and Analytics work center is shared by the Access Control, Process Control, and Risk Management
products in the GRC Application. The menu groups and quick links available on the screen are determined by
the applications you have licensed. The content in this topic covers the functions specific to Process Control. If
you have licensed additional products, such as Access Control or Risk Management, refer to the relevant topics
below for the application-specific functions.
The Process Control Reports and Analytics work center contains the Compliance [page 515] section.
More Information
Also see the Reports and Analytics topic in the application help for SAP Access Control and SAP Risk
Management.
6.6.1 Compliance
The following reports are contained in the Reports and Analytics work center in the Compliance section.
Evaluation Status Dashboard Shows a high-level picture of the overall status of corporate
compliance throughout different business entities and pro
vides analytics and drilldown capabilities to view data on dif
ferent levels and dimensions.
Overall Compliance Status Dashboard Shows a high-level picture of the overall status of corporate
compliance throughout different business entities and pro
vides analytics and drilldown capabilities to view data on dif
ferent levels and dimensions.
Recommendation
For more information, see Datasheets.
6.6.1.1 Datasheets
Datasheets provide access to detailed information related to a control or subprocess. They offer the following
functionality:
● Ability to have a single point view for the information related to a control or subprocess, including the
attributes, long texts, and all the related entities such as control objectives, risks, account groups.
● Ability to export the reports in standard formats that you can share and print.
● Internal Auditors
These reports can document a picture of the controls and subprocesses in an organization.
● Process owners and control owners
These roles may request datasheets to obtain an overview of their subprocesses. Information includes the
definition of the subprocess, any assessments done on the subprocess, the controls encompassed by the
subprocess, and the assessments and testing done on these controls. Control owners may request
datasheets to find out about the design of their controls. They may also want to know about the testing and
assessment of these controls to understand the effectiveness of the controls.
Note
Process and control owners may not have access to printing datasheet reports, depending on company
policy.
● External Auditors
Auditors may request information to research controls or subprocesses.
Some companies allow external auditors to access their systems and data, and some do not. If external
auditors are not granted access, then the internal auditors may retrieve the reports and e-mail them to
the external auditors.
Output Sections
The data in the control datasheet is divided into the following sections:
Activities
Related Information
Manages policies including creating, maintaining, reviewing, approving, and publishing of policies.
Technical Data
7.1.1 Policy
A set of principles, rules, and guidelines that are formulated or adopted by an organization to reach its long-
term goals.
The Policy business object is used to maintain policy metadata and its related documents. It allows external
applications to search, create, update, and generate new versions of policies in the SAP GRC system.
7.1.1.1 Search In
Technical Data
Direction Inbound
The Search In synchronous inbound service interface groups operations that search policies and policy groups
in the SAP GRC system.
Namespace N/A
Direction Inbound
Mode Synchronous
Business Context
The Search Policy operation searches the policies in the SAP GRC system according to the search criteria, and
returns the result of relevant policies.
More Information
For more information about searching a policy using the web service, see SAP Note 1726512 - Policy
Management SOA enablement (Custom Development Guide).
Namespace N/A
Direction Inbound
Mode Synchronous
Business Context
The Search Policy Group operation searches the policy groups in the SAP GRC system according to the search
criteria, and returns the result of relevant policy groups.
More Information
For more information about searching a policy using the web service, see SAP Note 1726512 - Policy
Management SOA enablement (Custom Development Guide).
7.1.1.2 Update In
Direction Inbound
The Update In synchronous inbound service interface groups the operations that create policies, update policy
documents, and generate new policy versions in the SAP GRC system.
To create a policy.
Technical Data
Direction Inbound
Mode Synchronous
When a policy document is created in the external DMS, the Create Policy operation allows the external
application to create a policy in the SAP GRC system using the input document created in the external DMS as
an attachment.
Features
The Create Policy operation creates a policy in the SAP GRC system with the input policy document as an
attachment.
More Information
For more information about searching a policy using the web service, see SAP Note 1726512 - Policy
Management SOA enablement (Custom Development Guide).
Technical Data
Direction Inbound
Mode Synchronous
Business Context
When a policy is published in the SAP GRC system, the Generate Policy Version operation allows the external
application to generate a new policy version in the SAP GRC system.
Features
The Generate New Policy Version operation adds the input document in the SAP GRC system as a new version
of the original document and generates a new policy version.
More Information
For more information about searching a policy using the web service, see SAP Note 1726512 - Policy
Management SOA enablement (Custom Development Guide).
Technical Data
Direction Inbound
Mode Synchronous
Business Context
When a policy is created in the SAP GRC system from web service and the policy document has just been
updated in the external DMS, the Update Policy Document operation allows the external application to update
the policy document in the SAP GRC system so that both policy documents are up-to-date.
Features
The Update Policy Document operation updates the policy document in the SAP GRC system when the policy
document in the external DMS is updated.
More Information
For more information about searching a policy using the web service, see SAP Note 1726512 - Policy
Management SOA enablement (Custom Development Guide).
Definition
Manages issues identified outside the standard testing and assessment process.
Compliance and operational issues arise outside the control evaluation. These issues need to be documented
and tracked for the improvement of organizational compliance status.
Definition
Technical Data
Definition
Technical Data
Direction Inbound
The Update In synchronous inbound service interface groups operations that create ad hoc issues in the SAP
GRC system.
Definition
Technical Data
Direction Inbound
Mode Synchronous
The Create Issue operation allows the external application to create ad hoc issues in the SAP GRC system.
Features
The Create Issue operation creates an ad hoc issue in the SAP GRC system with the input issue name,
description and reporter name.
More Information
You can use transaction AOBJ to create archiving objects. You can specify archiving objects for preprocessing,
writing, and deleting activities. For more information, see Customizing for SAP NetWeaver under Application
Server System Administration Data Archiving Archiving Object-Specific Customizing . Archiving for SAP
Process Control is carried out with the help of archiving objects.
The following table shows the available GRC archiving objects for SAP Process Control:
For further information, see the section Data Protection: Process Control and Risk Management in the Security
Guide for SAP Process Control at: https://help.sap.com/pc
You can also extend these standard archiving objects to suit your own business requirements. You can specify
the database tables from which the system archives the information for the archiving object.
You can use transaction SARA to schedule when the system executes the preprocessing, writing, and deleting
activities for an archiving object. For more information, see SAP Easy Access Tools Administration
SARA - Data Archiving . You can use the following features in transaction SARA:
● Preprocessing
We provide each business object with separate selection criteria to identify the instances of the business
object that are ready for archiving. We provide each query with the same logic. The query selects the
instances that are ready and calls the CHECK_ARCHIVABILITY action. The action checks the residence
period and sets the archiving status to Archiving in Process. The action only runs across the relevant
business object.
You can control the memory used during archive preprocessing by specifying the package size, and
describing the number of documents being processed together in one SAP Logical Unit of Work (SAP
LUW) . Before the next package is selected and processed, allocated memory is released to keep the
memory consumption for the preprocessing batch job constant.
● Writing
The system selects all instances of a business object that have the archiving status Archiving in Process. It
copies the instances into the archive. You can control the memory used during writing in the same way as
for preprocessing.
● Deleting
The system deletes all records that are archived from the registered database tables.
● Deleting from Archive
All SAP Process Control archiving objects are ILM-enabled. For more information about SAP Information
Lifecycle Management (SAP ILM), seehttp://help.sap.com/erpInformation published on SAP site SAP
You can load archived documents into the standard SAP Process Control screens. The system uses only the
display mode for these archived documents. We provide each business object in SAP Process Control with the
following settings:
Features
Why Archive?
Archiving data from the production database makes the production database faster as it is carrying less
unproductive data. Searching archived documents is possible via the provided POWLs for archived documents.
From there it is possible to open archived documents in the standard SAP NFE UIs in display mode, as if they
were in the production database.
The system archives charge information, address information, or information from texts or attachments when
you archive a business object. It also archives other objects that are used in business objects for tendering. It
does not archive master data objects in general (with the exception of business partner master).
Index Criteria
You can specify database indexes to enable a query to search for data records efficiently. Ideally, you should
have no more than 8 indexes defined for a database table; otherwise the performance of the query decreases.
The database indexes in SAP NFE improve the performance of active business queries, and not archiving
queries. For example, you usually do not search the database table for a product ID in forwarding order items
for business reasons. For this reason, we do not provide database indexes for archiving. The system in general
performs a full table scan during preprocessing.
More Information
For more information about the Archive Information System, see SAP Library for SAP NetWeaver on SAP Help
Portal at http://help.sap.com/nw . Under Application Help for Function-Oriented View, open SAP Library and
choose Solution Life Cycle Management Data Archiving Data Archiving in the ABAP Application System
Data Archiving with Archive Development Kit (ADK) Archive Information System .
For more information about tables and archiving objects, see SAP Library for SAP NetWeaver on SAP Help
Portal at http://help.sap.com/nw . Under Application Help for Function-Oriented View, open SAP Library and
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
● Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your
agreements with SAP) to this:
● The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
● SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
● Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering a SAP-hosted Web site. By using such
links, you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this
information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax
and phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of
example code unless damages have been caused by SAP's gross negligence or willful misconduct.
Gender-Related Language
We try not to use gender-specific word forms and formulations. As appropriate for context and readability, SAP may use masculine word forms to refer to all genders.
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.