Security Guide SAP Risk Management
Security Guide SAP Risk Management
PUBLIC
Warning
This document has been generated from the SAP Help Portal and is an incomplete version of the official SAP product
documentation. The information included in custom documentation may not re ect the arrangement of topics in the SAP Help
Portal, and may be missing important aspects and/or correlations to other topics. For this reason, it is not for productive use.
This is custom documentation. For more information, please visit the SAP Help Portal 1
7/28/2024
Document History
Note
Before you start the implementation, make sure you have the latest version of this document. You can nd the latest version
at:https://help.sap.com/viewer/p/SAP_RISK_MANAGEMENT.
Introduction
SAP Risk Management enables organizations to balance business opportunities with nancial, legal, and operational risks to
minimize the market penalties from high-impact events. The application allows customers to collaboratively identify these risks
and monitor them on a continuous basis. Stakeholders and owners are provided with such tools as analytic dashboards for
greater visibility in mitigating risks in their areas of responsibility.
This security guide provides an overview of the application-relevant security information. You can use the information in this
document to understand and implement system security, and to understand and implement the application security features.
Caution
This guide does not replace the daily operations handbook that we recommend customers create for their speci c
productive operations.
Target Audience
The security guide is written for the following audience, and requires existing knowledge of SAP security model and of PFCG,
SU01, SAP Fiori launchpad, and Customizing tools:
Technology consultants
System administrators
This area covers the system security issues and addresses them in the following sections:
Communication Destinations
This is custom documentation. For more information, please visit the SAP Help Portal 2
7/28/2024
Integration with Single Sign-on (SSO) Environments
User Administration
This section covers the application security information for the SAP Risk Management application.
Note
For ease of reading, names of applications in the GRC solutions may be abbreviated as follows:
The network topology for SAP Risk Management is based on the topology used by the SAP NetWeaver platform. Therefore, for
information about network security, see the respective sections in the SAP NetWeaver Security Guide at
https://help.sap.com/nw75 > Security Guide.
This is custom documentation. For more information, please visit the SAP Help Portal 3
7/28/2024
For more information, see the following sections of the SAP NetWeaver Security Guide:
Use
The following table contains the communication paths, the connection protocol, and the transferred data type used by the SAP
Risk Management application:
SAP NetWeaver ABAP server DIAG All application data Logon data
using SAP GUI
SAP NetWeaver Business Client HTTP/HTTPS All application data Logon data
DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTPS connections are protected
using the Secure Sockets Layer (SSL) protocol.
More Information
Transport Layer Security in the SAP NetWeaver Security Guide available at
https://help.sap.com/viewer/p/SAP_NETWEAVER_750
Using the Secure Sockets Layer Protocol with SAP NetWeaver Application Server ABAP
Use
You can set up trusted and trusting Remote Function Call (RFC) relationships between two SAP systems. This allows secure RFC
connections between the systems without sending passwords for logging on. The logon user must have the corresponding
authorization object S_RFCACL in the trusting system. This trusted relationship is not speci c to GRC applications, and is a
function of SAP NetWeaver.
More Information
This is custom documentation. For more information, please visit the SAP Help Portal 4
7/28/2024
Trusted/Trusting Relationships Between SAP Systems on the SAP Help Portal under RFC Programming in ABAP.
Communication Destinations
The tables list the various types of Remote Function Calls (RFC) available. These are set up using transaction code SM59.
Recommendation
For more information about non-SAP applications, see solutions provided by SAP partners.
The table below lists the connection destinations for SAP Risk Management to communicate with other SAP components:
Destination Comments
SAP Risk Management to SAP ERP without GRC plug-in SAP Risk Management can use SAP Query or BI Query data sources. The BI
installed Query is available through Operational Data Provisioning (ODP). For ODP use,
verify your NetWeaver system requirements are met.
It supports the Single Sign-On (SSO) mechanisms provided by SAP NetWeaver Application Server ABAP.
It supports the security guidelines for user management and authentication described in the SAP NetWeaver Application
Server Security Guide.
It leverages the SAP NetWeaver ABAP Server and SAP NetWeaver Portal infrastructure.
This is custom documentation. For more information, please visit the SAP Help Portal 5
7/28/2024
In some applications, you can upload documents into the system. The default document management system (DMS) for storing
data is the SAP Content Server and Knowledge Provider (KPro) infrastructure. Once uploaded, the documents can be accessed
using a URL. The application security functions govern authorization for accessing the URL directly in the portal. To prevent
unauthorized access to the document through copying and sending the URL, a URL is only valid for a given user and for a
restricted amount of time (the default is two hours).
If you choose to implement a different document management system, the data storage security issues are deferred to that
particular DMS.
User Administration
The application user administration uses the mechanisms provided by SAP NetWeaver, such as user types, tools, and the
password concept.
User Types
You use user types to specify different security policies for different types of users. For example, your policy may specify that
individual users who perform tasks interactively have to change their passwords on a regular basis, but not those users under
which background processing jobs run.
The following user types are required for the SAP Risk Management application:
Dialog users:
Required for logging on to the SAP GUI, Web Dynpro and SAP Fiori apps
Communication users:
Required for KRI value extractions. (SAP Risk Management application only)
This is a user on the target system. Con gure this user according to the security requirements of the target
system.
Transaction SU01 Use SU01 for ABAP user management: create and update users
and assign authorizations.
Transaction PFCG (Pro le Generator) Use PFCG for ABAP role maintenance and creating authorization
pro les.
SAP Fiori launchpad This is the application front end. Most users can access the
application through the SAP Fiori launchpad.
This is custom documentation. For more information, please visit the SAP Help Portal 6
7/28/2024
SAP NetWeaver Business Client (NWBC) This is the application front end. Most users can access the
application through NWBC.
For more information, see Customizing for Governance, Risk, and Compliance under Risk Management.
Application Authorizations
The following table lists examples of screens on the front-end you see based on the applications installed and licensed on your
system:
Item Application
Caution
SAP does not recommend you customize the information architecture because if SAP provides updates to the content, then
such changes update only the standard SAP-delivered repository and Launchpads. The changes do not directly update any
customized versions.
This is custom documentation. For more information, please visit the SAP Help Portal 7
7/28/2024
You carry out the con guration activities from the transaction SPRO, SAP Reference IMG Governance, Risk, and
Compliance General Settings Maintain Customer Speci c Menus . Modify Maintain Authorizations for Applications Links
and Con gure LaunchPad for Menus according to your users' needs.
Privacy Concerns
Notify your users as required by your company's privacy policy that user information such as rst Name, last Name, E-mail
address, roles, and other personal information is stored by the program GRAC_REPOSITORY_OBJECT_SYNC.
First-Level Authorizations
When rst-level authorization is active, the users assigned to the Business User role (SAP_GRC_FN_BUSINESS_USER) are the
users available for any entity-user-role assignment. Once a user is assigned to an entity-user-role, the user assigned to the
entity inherits the authorizations associated with the corresponding application role, as con gured in PFCG.
Example
The gure illustrates that all users are included in the pool of potential users for the subprocess owner and control owner
roles.
This is custom documentation. For more information, please visit the SAP Help Portal 8
7/28/2024
User assignment restricted to business Any business user can be a delegate and
Business user role assignment
users inherit data and authorizations.
Example
The following gure illustrates that, in Process Control, you can de ne that only users assigned to the Subprocess Owner
application role can be considered for subprocess entity-user-role assignments. Similarly, in Risk Management , you can
de ne that only users assigned to the Opportunity Owner application role can be considered for opportunity entity-user-role
assignments.
This is custom documentation. For more information, please visit the SAP Help Portal 9
7/28/2024
User assignment restricted to users Any business user can be a delegate and
Business user role assignment
assigned to application roles. inherit data and authorizations.
Note
This setting is shared by both the SAP Process Control and SAP Risk Management applications. Therefore,
maintaining the setting for one application affects both applications, if you have licensed both.
This is a global setting and affects all application roles for your application.
Second-Level Authorizations affect only entity-user-role assignments while the feature is enabled. Entity-user-role
assignments maintained prior to enabling Second-Level Authorizations may lose authorizations to perform certain
This is custom documentation. For more information, please visit the SAP Help Portal 10
7/28/2024
activities in the application if they do not have the appropriate entity user-roles assigned. In this case, you must
assign the additional authorizations to the speci c users.
Delivered Roles
SAP_GRC_FN_BASE
SAP_GRC_FN_BUSINESS_USER
GRFN_API
This is the most utilized authorization object. It controls access to the master data objects and drives the user
authorizations for the business entities. It includes the following elements: activity, entity, subentity, and datapart.
GRFN_REP
This authorization object controls the access to retrieve data for reports. It has the elements: Activity and Report Name.
This is custom documentation. For more information, please visit the SAP Help Portal 11
7/28/2024
GRFN_CONN
This authorization object is used to run automated rules testing or monitoring on other systems. It grants Remote
Function Call authority to the user. To assign this authorization to users, use transaction SU01 in the back-end system to
create a new role, add the authorization object to the role, and assign the role to users.
For more information about the possible element values, see Authorization Object Elements.
NWBC Roles
SAP Risk Management delivers the following NWBC role to allow users the authorization to launch NWBC and access menu
items in NWBC. You must copy this role into your own namespace and assign it to all users who need to use NWBC.
Role Description
SAP_GRC_NWBC Gives authorizations to launch NWBC. Assign this role to all NWBC
users.
Note
Do not assign SAP_GRC_NWBC and SAP_GRAC_NWBC to the same user.
Role administrators make tile catalogs and groups available on the end user's page by assigning tile catalogs and tile groups to
a PFCG role to which users can be assigned. Users logging on to the launchpad see all assigned groups on their home page, and
when users open the catalog section, they can access all tiles in the assigned catalogs.
SAP Risk Management 12.0 delivers the following business catalog roles, and customers can create further roles as required.
Users with a given role are authorized to access the corresponding work center. By default, these roles do not have a business
group assigned (when roles are assigned to a group, the related apps appear together on the Launchpad). You can create new
groups, and you can also create customized roles as required.
This is custom documentation. For more information, please visit the SAP Help Portal 12
7/28/2024
By creating customized roles, and then giving users those roles, you can ensure that users have access to the apps needed to
carry out their work.
Introduction
There are three main steps to take to create a customized business role:
2. Create a group, and link it to the catalog. You can link multiple groups to one catalog, multiple catalogs to one group, and
so on.
3. Create a role for the group, and then add the new role to the user.
2. Click the icon on the Catalog tab to open the Create Catalog dialog box, and then add the appropriate title and ID for
the new catalog.
3. To add a tile, open, for example, the pre-determined catalog for SAP Process Control:
X-SAP-U12-ADCAT: SAP_TC_GRC_PC_BE_APPS:SOHGRPC
X-SAP-U12-ADCAT: SAP_TC_GRC_RM_BE_APPS:SOHGRRM
Then select the required tile. You might like to note the Semantic Object and Action, as this information will be needed
for the target mapping step.
To add the tile to the new catalog, click Create Reference, and select the catalog you have just created.
4. Find the Semantic Object and Action in the Target Mapping tab, and create a reference to the new catalog as previously.
Creating a group
1. When you have added all the required tiles and the associated target mappings, switch from the Catalog tab to the
Groups tab.
2. Use the icon to create a new group. If you want users to be able to add and remove tiles from the group on their
Launchpad, check Enable users to personalize their group.
3. Find the catalog, and then select which tiles to add for the particular group.
Z_ABC_DEF_GHI_JKL
2. On the Create Roles screen, go to Menu Transaction SAP Fiori Tile Catalog and nd the correct catalog ID in the
Assign Tile Catalog dialog box.
This is custom documentation. For more information, please visit the SAP Help Portal 13
7/28/2024
3. The catalog will now be visible in the Role Menu. Open the SAP Fiori Tile Group in the same way, and assign the group.
The user can now add the role using SU01 User Maintenance, and will see the con gured tiles in their Launchpad.
General information on the SAP Fiori Launchpad can be found at SAP Fiori Launchpad
Manage Risk Assessments SAP_GRC_BCR_RM_T Front end role for accessing the Fiori app.
Work ow Recipient
The applications determine the agent (or recipient) of a work ow task based on the mapping of business events and roles. You
can override the default con guration and maintain your own agent determination rule in the Customizing activities (using the
SPRO transaction). Carry out the activity Maintain Custom Agent Determination Rules under Governance, Risk, and
Compliance General Settings Work ow
In the Customized Business Events table, you con gure rules for determining the recipient of a work ow task by customizing
the business events, sort, roles, entities, and subentities.
Use
Note
The examples shown in this topic may include references to features of both SAP Process Control and SAP Risk
Management. Features of either of these applications are only available if you possess the corresponding application license.
The value of the sort number has no numerical signi cance. It is only for grouping. The following gure illustrates that the
Perform Assessment business event for SOX Control Owner is in the same group as the SOX Subprocess Owner.
This is custom documentation. For more information, please visit the SAP Help Portal 14
7/28/2024
The business event processing starts with the lowest entity-level role and proceeds upwards. In the following example,
control owner is lower than subprocess owner in the entity-level hierarchy, therefore it is processed rst.
This is custom documentation. For more information, please visit the SAP Help Portal 15
7/28/2024
Entity and subentity are optional. You can leave them empty. You only need to include them in cases to differentiate the
business events. In the following example, Perform Signoff and Perform AOD do not need entities or subentities because
the task can only be performed in one way. Perform Assessment is differentiated so that control owner performs Control
Design assessment (CD) and subprocess owner performs Process Design assessment (PD).
This is custom documentation. For more information, please visit the SAP Help Portal 16
7/28/2024
For all business events (except for Incident_Validate and Master_Data_Change_Notify), the application processes the
business events on the basis of rst group found. In the following example, the application processes the rst group
found (Sort 1) for the Perf_Assessment business event and stops.
This is custom documentation. For more information, please visit the SAP Help Portal 17
7/28/2024
The Incident_Validate business event is processed in serial for All Groups Found. The following example illustrates that
the application rst processes the sort 8 group, then the sort 9 group.
This is custom documentation. For more information, please visit the SAP Help Portal 18
7/28/2024
The MasterData_Change_Noti cation business event is processed in parallel for All Groups Found, The following example
illustrates the noti cation is sent to the control owner, SOX internal control manager, and FDA internal control manager
concurrently.
This is custom documentation. For more information, please visit the SAP Help Portal 19
7/28/2024
You can specify a backup role to receive the work ow task by placing different roles in the same sort group with the same
business event. The following example illustrates that, because the control owner role is lower in the entity hierarchy, it
is processed rst. However, if there is no user assigned to that role, the task is assigned to the subprocess owner.
This is custom documentation. For more information, please visit the SAP Help Portal 20
7/28/2024
0PC_RECE_ISSUE
When the subentity is CO or MO, enter the entity as G_IS. For other all other subentities, enter the entity as
G_AS.
0PC_RECE_REM_PLAN
Enter the entity as G_IS (issue); the entity of the remediation plan creator.
Related Information
SAP Delivered Business Events
Ticket-Based Authorizations
Most users have the authorizations to complete their assigned work item. However, sometimes it is required to pass on a work
item to a user who does not have the required authorizations. Ticket-Based Authorizations provides temporary authorizations
to the user to enable them to complete the work item. Once the work item has been completed, or reassigned to another user,
the ticket expires for this user.
Note
This is custom documentation. For more information, please visit the SAP Help Portal 21
7/28/2024
The delivered ticket-based authorizations cannot be modi ed. Further, the functionality is transparent to the user. This
information is provided for explanatory purposes only.
Time-Related Aspects
Once a user starts to perform the task from the work inbox, the authorization is given to the user.
The authorization is temporary. A user who no longer holds the ticket is no longer authorized to perform the task.
The authorization expires when the task is submitted. If the time has passed beyond the task due date, but the user has
not submitted the task, the authorization remains active.
The general object type Organization (orgunit) is used in SAP Risk Management.
Note
Organizations created in other projects are also available in SAP Risk Management.
The SAP Risk Management analysis, responses, and surveys are stored in Case or Records Management. The
RMS ID for SAP Risk Management is GRRM_RM.
Enterprise Search
GRFN_ES
This authorization object controls the access to enterprise search. It has the element Entity.
GRFN_ODP
This is custom documentation. For more information, please visit the SAP Help Portal 22
7/28/2024
This authorization object checks for access to GRC entities via ODP. The following are the de ned elds:
GRC_ENTITY — The GRC entity (or object type) to which the authorization entry corresponds.
GRFN_ODP_C
This authorization object does an authority check for access to GRC entities with IDs via ODP. The following are the
de ned elds:
GRC_ENTITY — The GRC entity (or object type) to which the authorization entry corresponds.
GRFN_OBJ_C — The Complex IDs of objects which the user can access.
GRFN_ODP_E
This authorization object checks for access to GRC entities via ODP. The following is the de ned eld:
GRC_ENTITY — The GRC entity (or object type) to which the authorization entry corresponds.
GRFN_ODP_R
This authorization object does an authority check for access to GRC regulation-speci c entities via ODP. The following
are the de ned elds:
GRC_ENTITY — The GRC entity (or object type) to which the authorization entry corresponds.
GRFN_ODPRC
This authorization object does an authority check for access to GRC regulation-speci c entities with complex IDs via ODP.
The following are the de ned elds:
GRC_ENTITY — The GRC entity (or object type) to which the authorization entry corresponds.
GRFN_OBJ_C — The Complex IDs of objects which the user can access.
Note
References to SAP Process Control are only relevant if you have implemented and licensed that application in addition to
SAP Risk Management.
This is custom documentation. For more information, please visit the SAP Help Portal 23
7/28/2024
SAP_GRC_FN_ALL Process Control This is the power user role. The role can access both the front-
end and back-end systems. It does not use entity-level
Risk Management
security and therefore bypasses the authorizations from the
SAP_GRC_FN_BUSINESS_USER role.
Recommendation
This role provides extensive access. For security purposes,
we recommend you only use the role in emergencies such
as troubleshooting task issues. It includes the following
authorizations:
Note
The role does not contain the authorizations for
customizing work ows, case management, or Web services
activation. For these authorizations in:
SAP_GRC_FN_BASE Process Control This technical role is required for all users to access the
application.
Risk Management
SAP_GRC_FN_BUSINESS_USER Process Control This is the default role assigned to all users. You must assign
additional entity-level authorizations to users to enable them
Risk Management
to perform activities and act on objects in the application.
Note
Users who set up master data must be assigned additional
rights to perform uploads using program GRPCB_UPLOAD.
SAP_GRC_FN_DISPLAY Process Control This role can access the SAP NetWeaver ABAP Server. This
role contains the display authorizations for Customizing and
Risk Management
entity level authorizations.
Recommendation
Assign this role to external auditors to give them display
access throughout the application. This role bypasses the
SAP_GRC_FN_BUSINESS_USER role to grant display
authorizations in the back-end. If you wish to have more
control over what is displayed, use the
SAP_GRC_FN_BUSINESS_USER instead.
This is custom documentation. For more information, please visit the SAP Help Portal 24
7/28/2024
SAP_GRC_RM_CUSTOMIZING Risk Management This role can access the SAP NetWeaver ABAP Server. This
role contains all authorizations for Customizing settings in the
application. This includes authorization objects for the
following:
Customizing Work ow
Case management
RFC connections
Job scheduling
Note
You may be required to record all your changes in the
Customizing request. Review the client settings in
transaction SCC4 and make sure you have a request
available for you, or you are authorized to create one.
Note
This role does not have authorizations to perform the
following tasks:
SAP_GRC_SPC_CHIP_VIEWER Process Control This role grants the authority to view entry pages and side
panels that are implemented with CHIPs (Collaborative
Risk Management
Human Interface Part).
This is custom documentation. For more information, please visit the SAP Help Portal 25
7/28/2024
SAP_GRC_SPC_CUSTOMIZING Process Control This role can access the SAP NetWeaver ABAP Server. This
role contains all authorizations for Customizing settings in the
application. This includes authorization objects for the
following:
Customizing Work ow
Case management
RFC connections
Job scheduling
Note
You may be required to record all your changes in the
Customizing request. Review the client settings in
transaction SCC4 and make sure you have a request
available for you, or you are authorized to create one.
Note
This role does not have authorizations to perform the
following tasks:
SAP_GRC_SPC_SCHEDULER Process Control This role grants the authority to perform background job
execution.
SAP_GRC_SPC_SETUP Process Control This role grants the authority for system setup and
installation.
GRFN_USER
This authorization object is used to separate business users and power users, and controls the access to perform your
own or central delegation. It has only the Activity element.
GRFN_CONN
This is custom documentation. For more information, please visit the SAP Help Portal 26
7/28/2024
This authorization object is used to run automated rules testing or monitoring on other systems. It grants Remote
Function Call authority to the user. To assign this authorization to users, use transaction SU01 in the back-end system to
create a new role, add the authorization object to the role, and assign the role to users.
Business events are the placeholders for recipient determination in work ow driven scenarios. When the work ow needs to
determine the recipient, it uses the correlated object of the work ow instance and business event.
SAP ships default rules for recipient determination based on the entity, activity, and datapart used in roles. You can overwrite
the default rules with your own rules by using the direct mapping of the business events and their roles.
For information about the delivered business events and where they are used in the application, view the BC Set for the
Customizing activity Maintain Custom Agent Determination Rules, under Governance, Risk, and Compliance General
Settings Work ow .
The following table provides a list of the SAP delivered business events and a description:
0FN_AHISSUE_DEFAULT_PRC Default processor for Ad hoc issue When an ad hoc issue is reported on an
object, the application enters the default
issue owner. This business event suggests
the default ad hoc issue owner.
0FN_ISSUE_NOTIFY Send noti cation to object owner of Ad-hoc When an ad hoc issue is con rmed, the
Issue application automatically sends a
noti cation to the object owner. This
business event determines the recipient
based on the object owner.
0FN_MDCHG_APPR Get master data change approver who has The business event determines the
the change authority of the object recipient of a change request for master
data changes.
0FN_MDCHG_NTFY Get noti ed person who has the display The business event determines the
authority of the object recipients of a noti cation when a master
data change happens.
0FN_MDCHG_NTFY_L Get noti ed person who has the display The business event de nes the recipients
authority of the object on local object level of a noti cation when a local master data
change happens.
This is custom documentation. For more information, please visit the SAP Help Portal 27
7/28/2024
0FN_POLICY_DEFAULT_APPR Default approver for policy This business event determines the
recipients to approve policy, when policy is
sent to approve.
0PC_CONTROL_PROPOSAL_APPR Get control proposal approver who has the This business event determines the
change authority of the object approval recipients of the control proposed
from PC & and RM integration scenario.
0PC_PERF_CRA Perform control risk assessment This business event determines the
recipients of Control Risk Assessments as
it can be scheduled in the planner.
0PC_PERF_CTRL_PERF Perform Manual Control Performance This business event determines the
recipient of Manual Control Performance.
0PC_PERF_IELC_ASSESSMENT Perform indirect Entity-Level Control This business event determines the
Assessment recipients of Indirect Entity-Level Control
Assessment as it can be scheduled in the
planner.
0PC_PERF_IELC_TESTING Perform Indirect Entity-Level Control Testing This business event determines the
recipients of Indirect Entity-Level
Control Testing .
0PC_RECE_ESCALATION Receive escalations of work ow The user is able to con gure escalation
recipients for overdue work ow items. For
more information, see Customizing for
Work ow E-Mail Noti cation under
Governance, Risk and Compliance
General Settings Work ow .
This is custom documentation. For more information, please visit the SAP Help Portal 28
7/28/2024
0PC_RECE_REM_PLAN Default Remediation Plan Owner When users manually assign the
remediation plan owner, this business event
determines the default one.
0PC_VALI_CRA Review control risk assessment This business event determines the
recipients to review Control Risk
Assessment.
0PC_VALI_CTRL_PERF Review Manual Control Performance This business event determines the
recipient to review Manual Control
Performance.
0PC_VALI_IELC_ASSESSMENT Review Entity-Level Control Assessment This business event determines the
recipients to review indirect Entity-Level
Control Assessment.
0PC_VALI_IELC_TESTING Review Indirect Entity-Level Control Testing This business event determines the
recipients to review Indirect Entity-Level
Control Testing.
This is custom documentation. For more information, please visit the SAP Help Portal 29
7/28/2024
0RM_COLLAB_ASSMNT_TOP Consolidate Collaborative Risk Assessment This business event determines the
consolidator of a collaborative risk
assessment. This user receives a work ow
item that allows them to track the progress
of the collaborative risk assessment. Once
the assessment is nished they get another
work ow item to start the consolidation of
the results.
This is custom documentation. For more information, please visit the SAP Help Portal 30
7/28/2024
0RM_RESP_AHISSUE_UPDATE Response update from issue status change The business event determines the
recipients of an e-mail noti cation when
response completeness reaches 100%
based on related issue closing.
0RM_RESP_CONT_UPDATE Response update from Control's cases The business event determines the
recipients of an e-mail noti cation when
response completeness or effectiveness is
changed based on related control rating
change.
0RM_RESP_POLICY_UPDATE Response update from policy status change The business event determines the
recipients of an e-mail noti cation when
response completeness reached 100%
based on related policy status change.
0RM_RESPONSE_PROPOSE Create response or response template This business event determines the
based on response proposal, or reject the recipients who receive and approve or
response proposal reject response proposals.
Activity
Note
The following information is relevant to both SAP Risk Management and SAP Process Control, depending on which of those
applications you have implemented and licensed.
This is custom documentation. For more information, please visit the SAP Help Portal 31
7/28/2024
Activity controls the user behavior on the business object.
CHANGE GRFN_API
CREATE GRFN_API
DELETE GRFN_API
DISPLAY GRFN_API
ANALYZE GRFN_REP
PRINT GRFN_REP
DISTRIBUTE GRFN_USER
EXECUTE GRFN_CONN
Entities
Note
The following information is relevant to both SAP Risk Management and SAP Process Control, depending on which of those
applications you have implemented and licensed.
The entity speci es the business object. Its values are all the business objects within the application. The following table lists the
authorization-relevant entities for the SAP Process Control and SAP Risk Management applications:
Process Control
not applicable
AM_JOB Risk Management Scheduler
Process Control
not applicable
AM_JOBP Risk Management Job Log
Process Control
not applicable
AM_JOBRESULT Risk Management Job Result
Process Control
not applicable
AM_AHQRY Risk Management Ad-Hoc Query
Process Control
not applicable
AM_EVENT Risk Management Event Monitor
Process Control
not applicable
BR Risk Management Business Rule
This is custom documentation. For more information, please visit the SAP Help Portal 32
7/28/2024
Process Control
not applicable
BRA Risk Management Business Rule Assignment
Process Control
not applicable
CONTROL Risk Management Control
Process Control
X
CRGROUP Risk Management Risk Category
Process Control
X
CRISK Risk Management Central Risk
Process Control
not applicable
EO Risk Management Data Source
This is custom documentation. For more information, please visit the SAP Help Portal 33
7/28/2024
Process Control
not applicable
ORGUNIT Risk Management Organization
Process Control
not applicable
PLANNER Risk Management Planner
Process Control
X
REGULATION Risk Management Regulation/Policy
Process Control
X
REG_GROUP Risk Management Regulation/Policy Group
Process Control
X
REG_REQ Risk Management Regulation/Policy Requirement
Process Control
not applicable
RISK Risk Management Risk
Process Control
X
SRV_QUESTION Risk Management Survey Question
Process Control
X
SURVEY Risk Management Survey Template
This is custom documentation. For more information, please visit the SAP Help Portal 34
7/28/2024
Subentities
Note
The following information is relevant to both SAP Risk Management and SAP Process Control, depending on which of those
applications you have implemented and licensed.
Subentities are the subgroup of objects related to an entity. Not all entities have subentities. The following table lists the
subentities and related entities:
This is custom documentation. For more information, please visit the SAP Help Portal 35
7/28/2024
Dataparts
This is custom documentation. For more information, please visit the SAP Help Portal 36
7/28/2024
Note
The following information is relevant to both SAP Risk Management and SAP Process Control, depending on which of those
applications you have implemented and licensed.
Risk Assessment on
ORGUNIT RISK_ASSESSMENT Organizations SAP Risk Management
This is custom documentation. For more information, please visit the SAP Help Portal 37
7/28/2024
Assignment of referenced
control to subprocess, control
SUBPROCESS COR_ORG objective and risk SAP Process Control
Subprocess Scoping
SUBPROCESS INSCOPE Information SAP Process Control
In the SAP governance, risk and compliance solutions (GRC), the synchronization of the authorization data (role, user, pro les,
HR objects) from the ERP and non-ERP systems to the GRC system contain the User IDs, email IDs, telephone numbers,
address, organizational assignments etc. The logs and activities done by the users from different connected ERP systems will be
stored in the GRC system and these contain the personal information. This chapter describes how the SAP Process Control and
SAP Risk Management solutions support the SAP Information Lifecycle Management (ILM) framework. Look at the chart below
to see how each business entity must be handled.
Destruction Required (RTP) after end of retention time. All business entities listed below require destruction after the
end of the retention time.
This is custom documentation. For more information, please visit the SAP Help Portal 38
7/28/2024
Business Entities
This is custom documentation. For more information, please visit the SAP Help Portal 39
7/28/2024
Note
SAP NetWeaver Information Lifecycle Management is a product that requires its own license. After licensing, you
have to activate this product.
2. Use transaction SPRO, ensure that the activity under SAP Reference IMG Governance, Risk, and Compliance
General Settings Blocking and Deletion Global ILM Enablement is completed. Select the GRC components that will
use the ILM functionality. The options are GRC, GRC-AC, GRC-PC, GRC RM or a combination of these components.
Note
To activate personal data blocking and deletion for GRC-PC or GRC-RM, the shared component GRC must be active.
3. Use transaction SPRO, ensure that the activity under SAP Reference IMG Governance, Risk, and Compliance
General Settings Blocking and Deletion ILM Entity Settings is completed. For SAP Process Control and SAP Risk
Management, you can con gure how the SAP ILM component interacts with these products. GRC provides ILM objects
that enhance archiving objects with information for data retention. An ILM object contains the settings for the ILM rules.
These rules are read by GRC while data processing and, based on the rule condition, personal data is blocked and
deleted.
Note
For more information about GRC Archiving objects, see Data Archiving.
Transaction ILMARA
1. Use transaction ILMARA to de ne if SAP Process Control and/or SAP Risk Management are using delivered ILM
Residence Rules (RST) and/or Retention Rules (RTP). An audit area groups ILM objects from a business aspect,
according to common criteria for storage and for queries (such as tax audits). You can de ne the rules for ILM objects
only in active audit areas.
Note
For any Residence Rule (if blocking is required), always use Audit Area GRC.
2. De ne which ILM objects SAP Process Control and SAP Risk Management interact with (see table above
GRFN_AI_DESTRUCTION etc.)
Select Block to hide the information from all except for designated administrators after a certain period of time.
This is custom documentation. For more information, please visit the SAP Help Portal 40
7/28/2024
Select Destroy to destroy the information after a certain period of time.
Select LE ag if the ILM object is de ned as a Legal Entity. Legal Entities are de ned in the Maintain Legal Entity
customizing activity (maintenance view GRFNVLEGALENT). This ag indicates if the condition eld Legal Entity is
used to de ne the ILM Policy for the ILM object. The value of the legal entity eld is picked from the UI eld Legal
Entity from the General tab of the Org Unit. They can be assigned to the Organization Unit from the Org Unit
View. Do not select if it is not required by the rule de nition as it could negatively impact performance.
Note
Select either Legal Entity or Country as needed. Do not select both.
Select Country if the object is de ned for a particular Country and this is used as a selection parameter for the
ILM rule. The Country designation is established in the Organization Hierarchy for SAP Process Control and SAP
Risk Management. This ag indicates if the condition eld Country is used to de ne the ILM policy for the ILM
object. Do not select if it is not required by the rule de nition as it could negatively impact performance.
Note
There can be some objects that are independent of Org Unit, such as Business Rule, or MDCR. For these, do
not select Legal Entity or Country. Select either Legal Entity or Country as needed. Do not select both.
Use transaction SPRO and ensure that the activity under SAP Reference IMG Governance, Risk, and Compliance
General Settings Blocking and Deletion Maintain Legal Entity is completed. For SAP Process Control and SAP Risk
Management, you can group organizations as Legal Entities in the Organization Hierarchy. This allows you to write one
rule that will be applied to all of the organizations. You can designate objects to be blocked or destroyed based on your
business need and legal requirements.
To unblock data, use transaction code GRFN_UNBLOCK. Select the ILM object and choose Execute. Select a record and
choose Unblock. Con rm the action by chooseing Yes in the con rmation window. Objects remain unblocked in the
system until the next scheduled execution of the blocking job blocks them again.
Destruction
Use transaction code ILM_DESTRUCTION to verify your destruction policies. Select Data from the Database and identify the
ILM object. Use test mode.
Logs
Use transaction code SLG1 to verify the logs.
Veri cation
Access the GRC product’s user interface and check the dates to see if your policies and rules are operating as intended. For
example, if you set up the data to be blocked after 2 years, check if any data is shown if you search for dates older than 2 years.
Use ABAP Program GRFN_PI_DBTABLOG_COPY_DES to look at a Simple deletion report to delete contents of GRC plugin
system DB table /GRCPI/GRIA_AM_DBLOG
This is custom documentation. For more information, please visit the SAP Help Portal 41
7/28/2024
Introduction
Generic Fields
Glossary
Consent
<Name of Con gurations 1> <Fields 1> <Describe business context 1>
<Name of Con gurations 1> <Fields 2> <Describe business context 1>
<Name of Con gurations 2> <Fields 1> <Describe business context 1>
<Name of Con gurations 2> <Fields 1> <Describe business context 2>
Information Retrieval
Deletion
End-of-Purpose Check
Blocking
Where-Used Check
Change Log
Change Log
This is custom documentation. For more information, please visit the SAP Help Portal 42
7/28/2024
In the worklist of SAP Product, you can access a change log for each change request and activity.
Note
Change logs can only be displayed if the user is assigned the authorization role SAP_AUTH_MOC_ADMIN.
Under Evaluate New Audit Trail Enhancement Mode (transaction S_AUT10), you can see all changes that have been
processed for the change document objects in SAP product, S_/IAM/ACT (activity) and /IAM/ISSUE (change request).
See Also
For more information on change documents see the documentation at http://help.sap.com/netweaver. Choose the relevant
SAP NetWeaver version and open the following documentation:
Under Application Help, go to SAP NetWeaver Library: Function-Oriented View Application Server ABAP Other
Services Services for Application Developers Change Documents .
Open the SAP NetWeaver Security Guide and go to Security Aspects for Lifecycle Management Auditing and
Logging .
Note
The User Authorization Analysis report does not cover all entities in SAP Risk Management but it covers the majority of
them.
Activities
To open the report, perform the following steps:
1. Log on to NWBC.
4. In the report, enter the user ID, select the related regulations, and choose Go to execute it.
The role assignment and related data objects information are shown according the user ID entered.
5. You can hide or show related column information by choosing Personalize Personalize Fields .
This is custom documentation. For more information, please visit the SAP Help Portal 43
7/28/2024
You must verify that the end-user can no longer access the personal data stored in blocked process tables. Authorization can be
given to speci c users (such as auditors) to read the personal data from blocked process tables.
If you have
created
custom roles
with
authorization
object
GRFN_USER
and activity
set to “*”
then it must
be removed
and speci c
activities
must be
named.
69 Discard
This is custom documentation. For more information, please visit the SAP Help Portal 44
7/28/2024
94 Override
95 Unlock
Data Archiving
ILM-enabled archiving objects in GRC
The SAP governance, risk and compliance solutions (GRC) support the SAP Information Lifecycle Management (ILM) framework
for retention management.
The following table shows the available GRC archiving objects for SAP Risk Management:
Before using the archiving object for the rst time, verify if the GRC Customizing activities under Blocking and Deletion have
been completed to enable the Information Lifecycle Management (ILM) capabilities. When you use the archiving object
GRFNPLAN, data is archived from the following tables:
Tables Affected by
GRFNPLAN
Tables
GRFNPLANRCPT
GRFNTASKPLANGRP
GRFNPLANREG
GRFNPLANRESULT
GRFNTASKPLAN
Programs
GRFN_PLANNER_ARCH_REL
This is custom documentation. For more information, please visit the SAP Help Portal 45
7/28/2024
Programs
GRFN_PLANNER_ARCH_WRI
GRFN_PLANNER_ARCH_READ
GRFN_PLANNER_ARCH_DEL
This is custom documentation. For more information, please visit the SAP Help Portal 46