06-03 GRC Training - Risk Owners
06-03 GRC Training - Risk Owners
06-03 GRC Training - Risk Owners
for
Risk Owners
June 3, 2013
Agenda
Overview
SOD Project
GRC System
Risk Owner Role
Break
5
30
Project Overview
Controls in place
Background
MIT approach to SAP Authorizations
Approach to SAP security has been largely unchanged since implementation
in late 1990s
Distributed
responsibility
Designed around
people, not roles
Relies on manual
processes
Delay in implementing
corrective action
Customer
Creation
Employ
ee 1
Employ
ee 2
Invoice /
Billing
Employ
ee 2
Job Role
Job Role
1
2
Custom
er
Invoice
Creatio
/ Billing
n
Lower Risk
High Risk
Segregation
Segregation of
of Duties
Duties
Method
Approach
Notes
On Target
Emergency Access
Management
Emergency Access
Management
Emergency Access
Management
GRC Documentation
Overview
Training Documentation:
Additional Documentation:
FireFighter procedures
Risk
Involvement
1
2
3
4
5
BREAK 1
Risk
Involvement
1
2
3
4
5
Very
2 Mitigation Analysis/Design
Medium
4 FireFighter Maintenance/Use
Light
01 Risk Violations
Working Session
Follow the GRC report Job Aids for:
01
02
03
Risk Violations
User Analysis
Violations Comparisons
Working Session
Using GRC Reports to find answers to our
authorizations and SOD questions.
If you have a question, try using the Job Aids
or Reference Documents!
If you still have a question, please feel free
to ask.