<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>authorization - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/authorization-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/authorization-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 02 Jan 2020 10:41:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>authorization - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/authorization-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ERPs: How to control permission-related risks (PART 2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-2/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 01 Jul 2019 13:35:32 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[authorization]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ERP]]></category>
		<category><![CDATA[industrialization]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tooling]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11959</guid>

					<description><![CDATA[<p>As we’ve seen in the previous article, a serious consideration of &#8220;permissions&#8221; (also known as rights, authorizations, roles, and access profiles) should significantly reduce the risk of fraud and human error, and contribute to the company’s compliance with relevant legislation....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-2/">ERPs: How to control permission-related risks (PART 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure>As we’ve seen in the <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/"><u>previous article</u></a>, a serious consideration of &#8220;<strong>permissions</strong>&#8221; (also known as rights, authorizations, roles, and access profiles) should significantly reduce the <strong>risk of fraud and human error</strong>, and contribute to the company’s <strong>compliance</strong> with relevant legislation.</p>
<p>We have cited <strong>five key success factors</strong> needed to deliver an ERP permissions risk-remediation project:</figure>
<figure id="post-11952 media-11952" class="align-none"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-11952 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png" alt="" width="1477" height="807" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png 1477w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-768x420.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-71x39.png 71w" sizes="(max-width: 1477px) 100vw, 1477px" /></figure>
<p style="text-align: center;"><em>The key success factors for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>The first two key success factors were discussed in the previous article; and the other three are covered in this one.</p>
<p>&nbsp;</p>
<h3>3. Preparing for large-scale deployment</h3>
<p>Services, business lines, geographical or legal entities&#8230; the remediation of permission-related risks means reviewing user accounts across varied—and often numerous—functional areas. To be able to keep to schedules, limit workloads, and reassure those involved in the project locally, it’s best to deploy things at as larger scale as possible. Doing this means:</p>
<ul>
<li>Defining and communicating the risk analysis and remediation methodology;</li>
<li>Putting in place a steering plan;</li>
<li>Introducing analytical tools, automated as far as possible, to cope with volumes;</li>
<li>Formally preparing materials for workshops and consolidation sessions;</li>
<li>The documentation for the methodology and the tool in order to be able to train users.</li>
</ul>
<p>These documents will form the <em>deployment kit</em> to be used in the different areas of work of the project phase; this can also continue to be used when the project phase is complete.</p>
<p><img decoding="async" class="wp-image-11964 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5.png" alt="" width="1526" height="563" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5.png 1526w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5-437x161.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5-768x283.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image5-71x26.png 71w" sizes="(max-width: 1526px) 100vw, 1526px" /></p>
<p style="text-align: center;"><em>The deployment kit for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>The deployment methodology will need to cover the following activities, and will need to be recreated for each area of work:</p>
<ul>
<li>Risk assessments and the definition of KPIs.</li>
<li>Remediation workshops for user-related risks.</li>
<li>Validation and execution of remediation plans.</li>
<li>Training and support for upskilling.</li>
</ul>
<p>Obviously, the methodology must be adapted to the company’s organizational structure and the resources available to it: the workforce, local variations in business processes, the degree of maturity in risk and permissions management, etc.</p>
<p>In particular, this will involve engaging local experts both on the technical aspects of permissions (access rights officers, application owners, security officers), and on the business-function aspects of processes (business-function representatives, process owners, internal controllers, team managers, etc.). <em>The contribution that will be expected from them</em>, and the effort they will need to put in, should be clear from the start and must remain &#8220;reasonable&#8221;. Local managers should therefore be involved, to ensure that those who need to take part do so, and to help in decision-making.</p>
<p>During remediation workshops, participants will, in particular, analyze user-related risks, but they will also have to consider various remediation strategies, such as the ones described below:</p>
<p><img decoding="async" class="aligncenter wp-image-11966 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6.png" alt="" width="1521" height="985" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6.png 1521w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6-295x191.png 295w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6-768x497.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image6-60x39.png 60w" sizes="(max-width: 1521px) 100vw, 1521px" /></p>
<p style="text-align: center;"><em>Strategies to consider in an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>It’s always preferable to <strong>validate the methodology using a pilot project</strong> that is small enough to limit work volumes, but large enough to be representative of the company. In some cases, a better strategic choice may be to select a work area that&#8217;s likely to be more fruitful for the project; or, conversely, one that’s expected to require more support. The lessons learned at the pilot stage will allow the methodology and tools to be adjusted before they are deployed more widely.</p>
<h3>4. Selecting the right tools</h3>
<p>The tools put in place must aid success during the project phase, but also—and more importantly—provide long-term support for the chosen approach;<strong> <em>both these phases must be complementary</em></strong>.</p>
<p>Being well equipped is about <em>being clear on the initial controls to be applied</em> (at the point when new permissions are requested) as well as on the <em>ongoing controls</em> (those applied once permissions have been granted). Having more initial controls will help reduce risks, but operational efficiency may also suffer (delays, difficulties in processing requests, etc.); a balance needs to be found.</p>
<p>From a functional point of view, it’s a question of putting in place the families of controls typically found in such projects, namely:</p>
<ul>
<li><strong>Data quality controls:</strong> completeness and coherence of data; respect for nomenclature, etc.</li>
<li><strong>IT security-rule controls:</strong> orphan, dormant, and administrator accounts; temporary and residual permissions; IT accounts with business-function permissions and <em>vice versa</em>, etc.</li>
<li><strong>Business-functions rules/compliance controls:</strong> discrepancies between jobs and the associated permissions; discrepancies in permissions between members of the same team; breaches of rules on the segregation of duties; users having access to areas that are beyond the scope of their responsibility, etc.</li>
<li><strong>Usages and behavior control:</strong> excessive or unusual uses, suspicious behavior, typical fraud scenarios, etc.</li>
</ul>
<figure></figure>
<figure id="post-11960 media-11960" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11960 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7.png" alt="" width="1593" height="805" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7.png 1593w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7-378x191.png 378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7-768x388.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image7-71x36.png 71w" sizes="auto, (max-width: 1593px) 100vw, 1593px" /></figure>
<p style="text-align: center;"><em>Families of typical controls for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>Being well equipped is also about <strong>prioritizing and automating the controls that are worth putting in place</strong>. The return on investment must be assessed in terms of each control’s relevance to the company’s situation (does the control cost more than dealing with the consequences of the risk it’s designed to cover?), and the potential benefits of automation (how much will be saved compared with a manual process?).</p>
<p>The volumes and complexities associated with ERP authorization models means turning to tools specifically designed for the task: for example, it&#8217;s not unusual to see SAP systems with several thousand roles and over a hundred thousand fine-grained permissions (transactions and authorization objects).</p>
<p>These needs fall at the intersection of several different segments of the software market; these are currently highly dynamic and far from mutually exclusive: &#8220;Identity and Access Management&#8221;, &#8220;Continuous Control&#8221;, &#8220;Specialized Governance-Risk-Compliance tools on a given ERP”, and so on. Given this, the approach taken, degree of maturity, functional coverage, and mode of delivery (on site or cloud/SaaS), can vary substantially from one product to another.</p>
<p>When selecting a tool, it’s a question of considering the following elements carefully:</p>
<ul>
<li><strong>Ergonomics and ease of use</strong>: once the project is finished, the tool’s users will be mostly from business functions—not from IT.</li>
<li><strong>Customization options</strong>: such that the tool really can be used to support the methodology taken (vocabulary and screens, rules and controls, dashboards and reports customized to company needs, etc.).</li>
<li><strong>A package of</strong> <strong>preconfigured</strong> <strong>controls</strong>: usually based on good practice, for the company ERP.</li>
<li><strong>The ability to put in place</strong> <strong>controls on other applications, and between applications: </strong>over the medium-term.</li>
<li><strong>Analysis and decision support functionality</strong>: to highlight anomalies, simulate changes in permissions, conduct in-depth analyses, suggest remediation measures, etc.</li>
</ul>
<p>Although the tools are generally not intrusive, in terms of their effect on applications, there’s still a need to automate the transfer of data, in a reliable way—from the ERP and other potential repositories. Involvement of the relevant IT teams will thus be needed too.</p>
<p>&nbsp;</p>
<h3>5. Getting things right for the long term</h3>
<p>Projects of this type only make good sense if permission-related risks can be controlled effectively over the long-term. Doing so avoids the problem of risks that have been brought under control during the project appearing again—some time later.</p>
<p>To encourage long-term buy-in to the approach and tools put in place, it’s essential to <strong>invest in change management from the start—and throughout the project</strong><em>—</em>by means of meetings and regular newsletters, training and coaching sessions, documentation and tutorials, etc. It&#8217;s best to use a diversity of channels and communication supports to reach the maximum number of people without giving the impression of over-marketing.</p>
<p>It’s also important to help those responsible for permission-related risks to apply new controls to their recurring activities. In fact, the frequencies of advanced controls, the objectives to be achieved, and the levels of risk that must not be exceeded, can be explicitly defined. <strong>These objectives must be realistic and progressive</strong>: “What’s needed is to envision a long road—but with short milestones.”</p>
<p>There must be an emphasis on community too: it’s important to encourage interactions between managers from different functions, which will enable them to share experiences and good practice. There may even be a value in introducing a degree of healthy competition between different business functions; perhaps even organizing some low-key challenges. However, you should ensure that the fact of making progress is valued more highly than achieving any specific numerical objective, because the various work areas will have to progress from very different starting points.</p>
<p>Finally, an<em> “</em><strong>ongoing</strong><em>” </em><strong>mode</strong> needs to be <strong>implemented</strong>—to ensure that permission-related risks remain under control once the project is completed. This should include:</p>
<ul>
<li>Choosing a designated contact for the methodology and tools put in place;</li>
<li>Upskilling the technical teams to ensure in-service support for tools, and that reports and controls can be developed when necessary;</li>
<li>Documenting and capitalizing on the knowledge acquired during the project phase.</li>
</ul>
<p>This must give consideration to developing a roadmap for other future activities that will address new processes, risks, applications, or populations.</p>
<p>&nbsp;</p>
<figure id="post-11962 media-11962" class="align-none"><img loading="lazy" decoding="async" class="wp-image-11962 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8.png" alt="" width="330" height="295" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8.png 899w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8-214x191.png 214w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8-768x686.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image8-44x39.png 44w" sizes="auto, (max-width: 330px) 100vw, 330px" /></figure>
<p style="text-align: center;"><em>Long-term control of the risks related to ERP permissions</em></p>
<p>&nbsp;</p>
<h2>In conclusion: it can be done!</h2>
<p>As we’ve seen in the two articles on this topic, controlling the risks related to ERP permissions means pursuing a number of key workstreams—from putting in place the right tools, through holding workshops for the business functions, to training and change management.</p>
<p>But with a good methodology and committed participants from IT and the business functions on board, anything is possible! Tangible results can be achieved—and corporate momentum built—within a reasonable timeframe, to regain control of permissions across the IS. And, lastly, the key success factors presented here are broadly applicable to applications other than ERPs.</p>
<figure id="post-11964 media-11964" class="align-none"></figure>
<figure id="post-11966 media-11966" class="align-none"></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-2/">ERPs: How to control permission-related risks (PART 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ERPs: how to control permission-related risks (Part 1)</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 01 Jul 2019 13:24:08 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[authorization]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ERP]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11945</guid>

					<description><![CDATA[<p>Enterprise Resource Planning (ERP) applications support businesses’ most critical processes and workflows. As such, it carries many inherent risks—the main ones being internal fraud and human error. And statutory auditors, internal controllers, and auditors, are only too well aware of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/">ERPs: how to control permission-related risks (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Enterprise Resource Planning (ERP) applications support businesses’ most critical processes and workflows. As such, it carries many inherent risks—the main ones being <strong>internal fraud and human error</strong>.</p>
<p>And statutory auditors, internal controllers, and auditors, are only too well aware of this; they’ve been increasing pressure for several years now to bring these risks under control and ensure <strong>compliance </strong>with the relevant regulations.</p>
<p>&nbsp;</p>
<figure id="post-11948 media-11948" class="align-none"></figure>
<figure id="post-11950 media-11950" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-11950 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1.png" alt="" width="1182" height="635" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1.png 1182w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1-356x191.png 356w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1-768x413.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1-71x39.png 71w" sizes="auto, (max-width: 1182px) 100vw, 1182px" /></figure>
<p style="text-align: center;"><em>ERP permission-related risks that need to be brought under control</em></p>
<p>&nbsp;</p>
<p>What’s needed is to take a serious look at the topic of &#8220;<strong>permissions </strong>&#8221; (which are also called rights, authorizations, roles, or access profiles). In fact, the permissions granted to users on a company’s ERP enable them to carry out a large part of their activities—legitimate or otherwise. By ensuring you provide only the right people with the right permissions at the right time, you can significantly reduce the risks mentioned above.</p>
<p><strong>Over two articles, we present our vision for this area, and share proven good practices that can bring the risks associated with ERP permissions under control.</strong></p>
<p>&nbsp;</p>
<h2>Companies show little rigor when it comes to ERP permissions</h2>
<p>ERP ecosystems are complex, and companies typically spend a great deal of time and energy setting their ERPs up. <em>Yet a minimalist approach is often taken to the &#8220;identity and access management&#8221; aspect of ERPs. </em>Over time, this results in a deterioration in levels of control and security:</p>
<ul>
<li>Obsolete, generic, and shared accounts accumulate.</li>
<li>The number of roles explodes.</li>
<li>The principle of least privilege is not properly applied.</li>
<li>Toxic combinations of rights (infractions of the segregation of duties principle) occur, etc.</li>
</ul>
<p>All of these factors tend to increase the risks mentioned above.</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="alignnone wp-image-11952 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png" alt="" width="1477" height="807" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png 1477w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-768x420.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-71x39.png 71w" sizes="auto, (max-width: 1477px) 100vw, 1477px" /><em>Key Success Factors for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>As a result, few companies can claim to have complete mastery of the identities and permissions aspects of their ERPs. To illustrate this, consider the <em>indicative questions</em> below to assess your understanding of the subject:</p>
<ul>
<li>How many accounts can’t actually be associated with a single individual (generic accounts, accounts not reconciled with an HR repository or Active Directory, etc.)?</li>
<li>How many users can change the access rights of other users?</li>
<li>How many users have profiles with high levels of privilege (such as &#8220;SAP_ALL&#8221; and &#8220;SAP_NEW&#8221; in SAP ECC)? Of these, how many are really legitimate?</li>
<li>How many users can change the suppliers master data?</li>
<li>On average, how many roles are assigned to users? Is it typically two or three roles per user, or do numbers of roles often reach double digits?</li>
<li>How many IT roles are assigned to business-function users and <em>vice versa</em>?</li>
<li>How many roles give more rights in reality than they should theoretically provide (roles that should be read-only but have write permissions too; roles whose applicability is broader than it should be; etc.)?</li>
</ul>
<p>&nbsp;</p>
<h2>How can you address the issue?</h2>
<p>Now that the problem has been defined, what can be done about it? It’s important not to feel overwhelmed or discouraged by the apparently huge task that the issue suggests! It is possible to improve the situation and bring risks related to ERP permissions under control. In addition to the obvious point of providing sufficient resources to do it, there are a number of key success factors that must be met; and these that are the subject matter of our two articles.</p>
<h3>1. Steering things carefully</h3>
<p>When embarking on such a project, you clearly can&#8217;t address everything straight away. It’s more a case of <strong>strategically targeting defined scopes</strong> which will yield significant results within a reasonable amount of time. For example, it might be a key application or a central ERP module, a process that’s been highlighted in a recent audit, or a series of risks already identified as critical in the corporate risk register. <strong>The analysis of real data </strong>extracted from ERP systems can be a great help in knowing what to prioritize, and in justifying the priorities chosen.</p>
<p>In terms of approach, there are three areas that the project must cover:</p>
<ul>
<li>The analysis and control of permission-related risks—the core work of such a project.</li>
<li>Implementing a technical solution that supports the chosen methodology.</li>
<li>Steering and change management—both essential for the success of such a project.</li>
</ul>
<p>It’s important to <strong>pace the project by incorporating regular milestones</strong> for each of the three areas—and for each project phase:</p>
<ul>
<li>The preparation phase, which includes the detailed framing of the project, putting in place the tools, and completing the prerequisites.</li>
<li>The deployment phase—known as Get-Clean—aims to control the current risks, by demonstrating the approach at pilot scale, rolling it out more widely, and adjusting the tools according to user feedback.</li>
</ul>
<p>The ongoing operating mode—known as Stay-Clean—can take the project to the next stage, but the groundwork for it must be done during the initial phase, if the risks are to be controlled over the long term.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11954 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3.png" alt="" width="1526" height="594" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3.png 1526w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3-437x170.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3-768x299.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3-71x28.png 71w" sizes="auto, (max-width: 1526px) 100vw, 1526px" /></p>
<p style="text-align: center;"><em>A model approach to an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>It’s imperative to <strong>closely monitor </strong>the actions taken by the various people and decision makers involved, and, more generally, to check that the commitments made at each step are being successfully achieved. These commitments can be represented by results that are both quantitative (a reduction of X% in the number of critical risks; no more than 5 risks per user, etc.) and qualitative (the development of processes or compensatory controls). There will also be a need to <strong>measure and demonstrate the value of these results to the project’s sponsors</strong> and representatives from the business functions.</p>
<h3>2. Preparing the ground</h3>
<p>Technical and business-function-related questions are closely linked in projects that address permissions, something especially true in the case of ERPs. As a result, you need to put in place the <em>right sponsors</em> from the start: from both the security and IT sides, and the business-function and Internal Control sides.</p>
<p>There may also be a need to involve numerous other players: access rights officers, security managers, representatives from the business functions, process managers, team managers, internal controllers, etc. Coordination is essential throughout the project, and future contributors, as well as those affected by the changes, need to be <strong>brought on board and engaged </strong>from the start—in terms of sharing the challenges, objectives, and approach. <strong>The approach must be framed positively</strong>: it must not be about stigmatizing states of affairs or behaviors, or comparing one part of the business with another; rather, it should be about moving the company and its employees forward in the management of risks.</p>
<p>The preparation phase first involves <strong>gathering the various inputs </strong>needed for the project, and especially those that will enable an initial analysis of the data: organizational information about users (department, function, etc.), permissions, access logs, control repositories, segregation of duties matrices, etc. For this last item, in particular, workshops are a must if the matrices are to be completed and &#8220;translated&#8221; into technical permissions that can become automated controls within a tool.</p>
<p>There is also a need to define the indicators, dashboards, and reports that will be used both during the project phase and also in the long term by those in charge of continuous monitoring.</p>
<p>Another important activity during this preparatory phase is <strong>to improve data quality</strong>. This prerequisite becomes all the more indispensable when a company’s maturity level, in identity and access management terms, is low. Improving quality isn’t just about user accounts though, it’s also—and especially—about the ERP authorization model. If the roles or access profiles themselves carry risks (in particular, in terms of the segregation of duties), this must be remedied before tackling the individual risks introduced by users.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-11948 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4.png" alt="" width="1323" height="737" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4.png 1323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4-343x191.png 343w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4-768x428.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4-71x39.png 71w" sizes="auto, (max-width: 1323px) 100vw, 1323px" /></p>
<p style="text-align: center;"><em>Examples of prerequisites for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p><em>We’ve now discussed the first two key success factors in an ERP permissions risk-remediation project: close steering and preparing the ground. Three other key success factors will be discussed in a <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-2/">second article</a>, to follow.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/">ERPs: how to control permission-related risks (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
