RSA Archer 6.2 Loss Event MGT Guide
RSA Archer 6.2 Loss Event MGT Guide
Contents
3
RSA Archer Loss Event Management Use Case Guide
4
RSA Archer Loss Event Management Use Case Guide
Enhancement Description
l Risk Catalog
l Executive Management
l Risk Manager
Applications The Risk Register and Risk Hierarchy Solutions have been added to the Risk
Catalog sub-solution.
Key Features
l Consolidated loss event catalog including actual losses, near misses, and calibrated external loss
events
l Consolidated list of remediation plans to reduce likelihood and impact of similar future loss events
l Loss events can be correlated to risk and control procedure registers used to inform risk
assessments and Monte Carlo simulations, if those use cases are employed
Key Benefits
Loss Event Management provides:
l Consolidated view of loss events by frequency amount, type, source, and owner
l Clear understanding of the cause of loss events and the actions being taken to remediate problems
that led to the loss event including whether remediation plans are being executed on time, as
planned
Get started
l Learn more about the use case design
Architecture Diagram
The following diagram shows the relationships between the applications in the Loss Event
Management use case.
Note:
1. Feeds that create Metrics from a metric library (either the Business Process or Risk Register) do
not also create Risk Register records from the associated Risk Library records.
2. Business Asset Catalog objects and their associated assessments are not automatically scoped
into Risk Project and must each be scoped in manually.
Ap p lic a tio n s
Applications
Application Description
Contacts The Contacts application serves as a central repository for contact information, is
utilized across multiple areas of RSA Archer, and contains information that is
often leveraged by other use cases. Updates to a profile record within this
application automatically propagate in any records where that contact information
is displayed.
Loss Events The Loss Events application allows you to respond to internal exposures and
external events that present a financial risk to your organization. You can
document, classify, and manage actual losses, near misses, and external
comparable loss events if tracked by the organization and loss classification,
capture event impacts, and perform root cause analyses and remedial activities.
You can also relate loss events to statements of potential risk in the Risk Register
to quantify the likelihood and impact of a risk.
Ac c e s s r o le s a n d r e c o r d p e r mis s io n s
RM: Admin This role serves as the administrator for the use case. (Risk Manager, Risk
Manager Specialist)
RM: Executives This role provides the appropriate access levels within the use case to the
executives team (CFO, CEO, Controller).
RM: Manager This role provides create, read, and update access to management stakeholders
within the use case.
RM: Owner This role provides create, read, and update access to business process owners
within the use case.
RM: Read Only This role provides read-only access for the use case.
Note: For detailed, page-level access rights, see the Data Dictionary.
The following are specific roles (fields) within the Loss Event Management applications. These
fields may correspond to different members of the team depending on the actual nature of the
policies or standards. As part of the implementation process, these roles should be designated.
Role Description
Business Unit Can be used to create loss events records and to accept or reject
Manager assessments.
Risk Manager Can be used to review and update loss events records or to reassign them to
a Risk Specialist.
Risk Specialist Can be used to review and update loss events records.
Controller Can be used to review, sign-off on, or reject loss events records that have
exceeded thresholds.
CFO Can be used to review, sign-off on, or reject loss events records that have
exceeded thresholds.
CEO Can be used to review, sign-off on, or reject loss events records that have
exceeded thresholds.
Da s h b o a r d s
Dashboards
The use case provides the following dashboards.
Dashboard Description
Business This persona-based dashboard is used by Business Unit Managers and Business
Unit Unit Coordinators to create new loss events, unapproved loss events, and loss
Manager events requiring executive review or sign-off.
Executive This persona-based dashboard is used by Controllers, CFOs, and CEOs to track
Management risk exposure and review loss events that require executive sign-off.
Risk This persona-based dashboard is used by Risk Managers and Risk Specialists to
Manager view loss events awaiting review.
Ad v a n c e d Wo r k flo w
Advanced Workflow
The following advanced workflow is applied to all loss events in the use case.
l You have already installed the following use case: Issues Management.
3. Obtain the Data Dictionary for the use case by contacting your RSA Archer Account
Representative or calling 1-888-539-EGRC. The Data Dictionary contains the configuration
information for the use case.
4. Read and understand the Packaging Data section of the RSA Archer Online Documentation.
5. Review the Release Notes to understand any known issues before installing and configuring the
solution.
Ste p 2 :Up d a te th e lic e n s e k e y
Note: All customers who are upgrading from version 6.0 or earlier are required to get a new license
key for 6.1 or later. Ensure that you are using a valid 6.1 or later license key prior to installing
packages.
The administrator (a web or database administrator) on the server on which the Archer Control
Panel resides must update the license key in the Archer Control Panel before the application
package is imported in order for the new items to be available for use.
1. Open the RSA Archer Control Panel.
2. From the Instance Management list, click to expand the Instances list.
3. Right-click the instance that you want to update, and click Update License Key.
4. Update the applicable information: Serial Number, Contact Info, and Activation Method.
5. Click Activate.
Important: If you do not update your license key to 6.1 or later prior to installing the package, you
will not be able to access workspaces, dashboards and applications.
3. Click Add New, then locate and select the package file that you want to import.
4. Click OK.
The package file is displayed in the Available Packages section and is ready for installation.
Ste p 3 :Ma p o b je c ts in th e p a c k a g e
1. In the Available Packages section, select the package you want to map.
Note: This process can take several minutes or more, especially if the package is large, and may
time out after 60 minutes. This time-out setting temporarily overrides any IIS time-out settings
set to less than 60 minutes.
When the analyzer is complete, the Advanced Package Mapping page lists the objects in the
package file and corresponding objects in the target instance. The objects are divided into tabs,
depending on whether they are found within Applications, Solutions, Access Roles, Groups, Sub-
forms, or Questionnaires.
3. On each tab of the Advanced Mapping Page, review the icons that are displayed next to each
object name to determine which objects require you to map them manually.
Awaiting Indicates that the system could not automatically match the object or
Mapping children of the object to a corresponding object in the target instance.
Review Objects marked with this symbol must be mapped manually through the
mapping process.
Important: New objects should not be mapped. This icon should remain
visible. The mapping process can proceed without mapping all the objects.
Note: You can execute the mapping process without mapping all the
Mapping Indicates that the object and all child objects are mapped to an object in
Completed the target instance. Nothing more needs to be done with these objects in
Advanced Package Mapping.
Do Not Indicates that the object does not exist in the target instance or the object
Map was not mapped through the Do Not Map option. These objects will not be
mapped through Advanced Package Mapping, and must be remedied
manually.
Undo Indicates that a mapped object can be unmapped. This icon is displayed in
the Actions column of a mapped object or object flagged as Do Not Map.
l To map each item individually, on the Target column, select the object in the target instance
to which you want to map the source object. If an object is new or if you do not want to map
an object, select Do Not Map from the drop-down list.
Important: Ensure that you map all objects to their lowest level. When objects have child or
related objects, a drill-down link is provided on the parent object. Child objects must be
mapped before parent objects are mapped. For more details, see "Mapping Parent/Child
Objects" in the RSA Archer Online Documentation.
l To map all objects in a tab automatically that have different system IDs but the same object
name as an object in the target instance, do the following:
Option Description
Ignore Select this option to match objects with similar names regardless of the case
case of the characters in the object names.
Ignore Select this option to match objects with similar names regardless of whether
spaces spaces exist in the object names.
c. Click OK.
The Confirmation dialog box opens with the total number of mappings performed. These
mappings have not been committed to the database yet and can be modified in the
Advanced Package Mapping page.
d. Click OK.
l To set all objects in the tab to Do Not Map, in the toolbar, click Do Not Map.
Note: To undo the mapping settings for any individual object, click in the Actions column.
When all objects are mapped, the icon is displayed in the tab title. The icon is displayed
next to the object to indicate that the object will not be mapped.
6. (Optional) To save your mapping settings so that you can resume working later, see "Exporting
and Importing Mapping Settings" in the RSA Archer Online Documentation.
8. Select I understand the implications of performing this operation, and then click OK.
The Advanced Package Mapping process updates the system IDs of the objects in the target
instance as defined on the Advanced Package Mapping page. When the mapping is complete, the
Import and Install Packages page is displayed.
Important: Advanced Package Mapping modifies the system IDs in the target instance. Any
Data Feeds and Web Service APIs that use these objects will need to be updated with the new
system IDs.
2. In the Available Packages section, locate the package file that you want to install, and click
Install.
3. In the Configuration section, select the components of the package that you want to install.
l To install only specific global reports in an already installed application, select the checkbox
associated with each report that you want to install.
Note: Items in the package that do not match an existing item in the target instance are selected
by default.
4. In the Configuration section, under Install Method, select an option for each selected component.
To use the same Install Method for all selected components, select a method from the top-level
drop-down list.
Note: If you have any existing components that you do not want to modify, select Create New
Only. You may have to modify those components after installing the package to use the changes
made by the package.
5. In the Configuration section, under Install Option, select an option for each selected component.
To use the same Install Option for all selected components, select an option from the top-level
drop-down list.
Note: If you have any custom fields or formatting in a component that you do not want to lose,
select Do not Override Layout. You may have to modify the layout after installing the package to
use the changes made by the package.
6. To deactivate target fields and data-driven events that are not in the package, in the Post-
Install Actions section, select the Deactivate target fields and data-driven events that are not in
the package checkbox. To rename the deactivated target fields and data-driven events with a
user-defined prefix, select the Apply a prefix to all deactivated objects checkbox, and enter a
prefix. This can help you identify any fields or data-driven events that you may want to review
for cleanup post-install.
7. Click Install.
8. Click OK.
Ste p 5 :Re v ie wth e p a c k a g e in s ta la tio n lo g
3. In the Package Installation Log page, in the Object Details section, click View All Warnings.
For a list of packaging installation log messages and remediation information for common
messages, see Package Installation Log Messages.
column lists the use case(s) that you may or may not have licensed. If you have licensed any of the
listed use cases, you can skip that row. If you have not licensed any of the listed use cases, then the
dependencies apply to your installation and you may want to resolve them.
Note: Resolving these dependencies is not required. You may opt to skip this step, but leaving these
fields as they are may cause confusion or generate calculation errors.
Review the following sections and resolve any dependencies that apply to your installation. You only
need to resolve any dependencies that apply to use cases you have not licensed.
Audit Planning The following reference fields are not available: No action
needed.
l Audit Engagement
l Audit Entity
Bottom-Up Risk The following reference fields are not available: No action
Assessment needed.
l Red Flag Rules Assessment
l Risk Project
Controls Assurance The following calculated fields do not validate: Drag off layout
Program Management / delete.
l % of Non-Compliant Controls
l Compliance Rating
Controls Monitoring The following calculated fields do not validate: Drag off layout
Program Management / delete.
l Corporate Objectives
Enterprise Management The following calculated fields do not validate: Drag off layout
/ delete.
l Total Applications
l Total Devices
l Total Facilities
l Total Processes
Key Indicator Management The following calculated fields do not validate: Drag off layout
/ delete.
l Average % of Failed KRIs
l Calculated Risk
l Key Indicator
l Metrics Library
l Warning Indicator
Incident Management The following reference fields are not available: No action
needed.
l Incident
l Investigations
IT Risk Management The Threat Project (Business Unit) calculated Drag off layout
field does not validate. / delete.
IT Security Vulnerabilities The following reference fields are not available: No action
Program needed.
l Vulnerability Trending (Business Unit)
l Vulnerability Scans
Operational Risk The following reference fields are not available: No action
Management needed.
l Assessment Campaign
l Self-Assessment History
Operational Risk The following calculated fields do not validate: Drag off layout
Management / delete.
l Currently Included in Open Assessment
Security Incident The following reference fields are not available: No action
Management needed.
l Incident Investigations
Third Party Risk The Engagements reference field is not available. No action
Management needed.
Top-Down Risk The following calculated fields do no validate: Drag off layout
Assessment / delete.
l Count of Controls
l Heat Map
l Inherent Risk
l Residual Risk
l Risk Scorecard
l Business Processes
l Contacts
l Control Procedures
l Devices
l Facilities
l Metrics
l Information
Company application
Controls Assurance Program The following calculated fields do not Drag off layout /
Management validate: delete.
l % of Non-Compliant Controls
l Compliance Rating
Controls Monitoring Program The following calculated fields do not Drag off layout /
Management validate: delete.
l % or Certified Divisions
Enterprise Management The following calculated fields do not Drag off layout /
validate: delete.
l Total Applications
l Total Devices
l Total Facilities
l Total Processes
Key Indicator Management The following calculated fields do not Drag off layout /
validate: delete.
l Calculated Residual Risk
Top-Down Risk Assessment The following calculated fields do not Drag off layout /
validate: delete.
l Count of Controls
l Inherent Risk
l Residual Risk
Contacts application
l Expense Reports
l Training Courses
l Product/Service Contact
Business Impact Analysis The following reference fields are not No action
available: needed.
l BIA (Audit Participant)
Bottom-Up Risk Assessment The Risk Project (Participant) reference field No action
is not available. needed.
Security Incident Management The following reference fields are not No action
available: needed.
l Security Alerts (Related Contact)
Security Operations & Breach The following reference fields are not No action
Management available: needed.
l BIA (Audit Participant)
l Team Membership
l Training Courses
Third Party Catalog The Third Party Profile reference field is not No action
available. needed.
Division application
Controls Assurance Program The following calculated fields do not Drag off layout /
Management validate: delete.
l % of Non-Compliant Controls
l Compliance Rating
Controls Monitoring Program The following calculated fields do not Drag off layout /
Management validate: delete.
l % of Certified Business Units
Enterprise Management The following calculated fields do not Drag off layout /
validate: delete.
l Total Applications
l Total Devices
l Total Facilities
l Total Processes
Key Indicator Management The following calculated fields do not Drag off layout /
validate: delete.
l Average Risk Level Status
Top-Down Risk Assessment The following calculated fields do not Drag off layout /
validate: delete.
l Count of Controls
l Inherent Risk
l Residual Risk
Related Use
Dependency Resolution
Case
Bottom-Up Risk The following reference fields are not available: No action
Assessment needed.
l Facility Risk Assessments
l Risk Staging
l Associated Risks
Operational Risk The Set Read Only page has layout discrepancies, and the No action
Management following reference fields are not available: needed.
l Insurance
Policy Program The Violated Policies reference field is not available. No action
Management needed.
Crisis The Related Crisis Events reference field is not available. No action
Management needed.
Related Use
Dependency Resolution
Case
Third Party The Associated Engagements reference field is not available. No action
needed.
Ste p 2 :De le te o b s o le te o b je c ts
l Evaluate your need for certain data driven events (DDE), pre-existing rules, and actions that were
not updated through Packaging. Delete any obsolete rules and actions.
l Evaluate pre-existing notifications and reports that Packaging did not update. Delete obsolete
notifications and reports.
To ensure that all obsolete objects are deleted, compare the Data Dictionary to your environment.
For more information about objects, see "Packaging" in the RSA Archer Online Documentation.
Ste p 3 :V a lid a te fo r mu la s a n d c a lc u la tio n o r d e r s
o If a field is not needed, delete the field or remove it from the layout. If the field is not deleted,
removing the formula prevents errors from being written in the log files when records are
saved.
l Verify the order of calculations for each application and sub-form in the use case. See the Data
Dictionary for calculation orders for each individual application or sub-form.
l Update the order of calculations as needed for each application and subform in the use case.
For more information about deleting objects, see "Deleting Fields" in the RSA Archer Online
Documentation.
Ste p 4 :V e r ify k e y fie ld s
Object
Message Explanation Remediation
Type
Alias Object Name This message is an informational warning This message is only
Alias was indicating that the Alias was updated on the potentially an issue if
changed from object. There are two reasons for an alias in the change occurs on
Original Alias the Target Instance to have been updated: a field that is utilized
to New Alias. in a Mail Merge
l Update was in the Source Package.
Template or Data
l Alias has to be unique in the Target Publication Service.
Instance. If the alias already exists in In that scenario,
update the DPS or the
Target, packaging adds a unique
mail merge template
identifier to the end. with the new alias.
Field Field Name in This message is an informational warning Change the field to
the notifying you that packaging does not public manually
application change a private field in the target instance (optional).
Application to a public field.
Name cannot
be changed
from a private
field to a
public field.
Object
Message Explanation Remediation
Type
Field Field Field This message is seen when a cross- If the use case is not
Name could reference or related record field could not licensed, no action is
not be saved be created because the related application necessary.
due to does not exist in the target instance. This
inability to message usually occurs because the field is Note: If you later
identify the part of a related use case that is not license a use case
related licensed or has not been updated in the that contains that
module. target instance. application, you may
re-install the Use
Case Name package
in order to resolve this
warning.
2. Reapply the
original package
to resolve the
warning.
See the Data
Dictionary.
Object
Message Explanation Remediation
Type
Object
Message Explanation Remediation
Type
Field Field Field This warning may be seen on Inherited 1. Install the
Name was not Record Permission fields, cross- package for the
found and reference/related record fields (record
use case
removed from lookup and grid display), or as a display
a collection. field in a report. The warning means that containing the
the field could not be found in the target related application
instance and was not included in the (to obtain the
package. This is usually because the field is missing field).
part of an application in a related core
You must have a
solution that has not been updated in the
target instance or is not licensed. license for the
related
application.
2. Reapply the
original package
to resolve the
warning.
See the Data
Dictionary.
If you do not have a
license for the related
application, you may
ignore this message,
and the field remains
omitted from the
object.
Advanced The advanced All advanced workflows are installed as Go to the Advanced
Workflow workflow was inactive. You must review and activate the Workflow tab in the
installed, but workflow. application or
is inactive. questionnaire, review
Please review the workflow, then
and activate. click Activate.
Object
Message Explanation Remediation
Type
Advanced Minor failure: This failure message may appear if certain 1. Verify that the
Workflow Advanced services were not running when you Advanced
workflow installed the package.
Workflow Service
HTTP request
error: 404 not and the Job
found. Service are
running.
2. Reapply the
package.
Object
Message Explanation Remediation
Type
Event Module Name This warning usually occurs when a cross- Review the DDE and
Action DDE Name reference or related record field is on the the layout and
was updated layout in the package but is not licensed or determine if any
but has page does not exist in the target instance. Occurs modifications should
layout on Apply Conditional Layout actions. be made to the layout.
discrepancies. If you later license a
use case that contains
that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Object
Message Explanation Remediation
Type
Field History Log This message usually occurs when a history None.
Field log field includes a cross-reference or If you later license a
Selection related record as a tracked field, but that use case that contains
field : Field cross-reference or related record could not that application, you
Name was not be created because the related application may re-install the Use
found in the either does not exist in the target or is not Case Name package
target licensed. in order to resolve this
instance and warning.
was removed
from history
log field :
History Log.
Object
Message Explanation Remediation
Type
iView The following Page Name belongs to an application in a Modify the iView to
page use case that does not exist in the target or remove the
referenced in is not licensed. unresolved link or
a link cannot delete the iView
be resolved: If you later license a
Page Name. use case that contains
that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Object
Message Explanation Remediation
Type
Report Display field : Field Name belongs to an application in a If the report functions
Field Name use case that does not exist or that is not without that field,
was not found licensed. then no action is
in the target needed. Otherwise,
instance and modify the report or
was removed remove it.
from report: If you later license a
Report Name. use case that contains
that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Report Field : Field Field Name belongs to an application in a If the report functions
Name use case that does not exist or is not without that field,
referenced by licensed. then no action is
a statistic step needed. Otherwise,
was not found modify the report or
in the target remove it.
instance and If you later license a
was removed use case that contains
from report : that application, you
Report Name. may re-install the Use
Case Name package
in order to resolve this
warning.
Object
Message Explanation Remediation
Type
Report Field : Field Field Name belongs to an application in a If the report functions
Name used use case that does not exist or is not without that field,
for charting licensed. then no action is
was not found needed. Otherwise,
in the target modify the report or
instance and remove it.
was removed If you later license a
from report : use case that contains
Report Name. that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Report Field : Field Occurs when a filter condition in a report is If the report functions
Name was not referencing an application that does not without that field,
found in the exist or is not licensed. then no action is
target needed. Otherwise,
instance and modify the report or
the condition remove it.
was removed If you later license a
from the use case that contains
filter. that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Object
Message Explanation Remediation
Type
Report Module Occurs with n-tier reports when the report If the report functions
Module Name includes display fields from a related without that field,
was not application that does not exist or is not then no action is
found. The licensed. needed. Otherwise,
relationship modify the report or
and remove it.
associated If you later license a
display fields use case that contains
were removed that application, you
from a search may re-install the Use
report. Case Name package
in order to resolve this
warning.