Title of the Presentation This is the Subtitle

SAP and Novell Collaborate on
Comprehensive, Integrated
Governance, Risk, and Compliance
Solutions
Agenda
• Addressing today’s GRC challenges
• Demo
• Real-World Insights
Challenges Surround the Enterprise
Reducing
Duplicated Processes
Complexity
Integrating
Disparate
Systems
Enabling
a Mobile
Workforce
Lowering
IT Management
Costs
Competition
Cost
Eliminating
Security
Vulnerabilities
Compliance
Addressing
Compliance
Demands
Determining
“Who has access
to what?”
Addressing Risk
Management
Requirements
Gaining
Insight
Into Risk
What’s Required to Be
Effective in Compliance?
Application Access and IT Controls Management
IT Security, Application Management,
Change Management, Identity Management
Business Processes
Etc…
Business Processes
Logistics
Controls in financial and business process applications
Business Processes
Finance
Business Processes
Business Processes
Manufacturing
Executive Management
Policies, and Executive Directives
IT Services
SIEM/Identity Mgmt/Roles Mgmt/Access Mgmt
SAP and Novell: Uniquely Covers the Entire
Stack of GRC from Application to IT Controls
Executive Management
Policies, and Executive Directives
Application Access and IT Controls Management
Covered by Novell Compliance Management Platform
Business Processes
Etc…
Business Processes
Logistics
Covered by SAP GRC
Business Processes
Manufacturing
Business Process Controls
Business Processes
Finance
Covered through a variety of mechanisms including SAP
IT Services
SIEM/Identity Mgmt/Roles Mgmt/Access Mgmt
Content, Policy and
Events Unify Disparate Systems
Consulting
Partners
Problem: The CIO Cannot Provide BusinessRelevant Risk Data to the CFO
Toni
CIO
The enterprise is setup with distributed security domains
Issue: Volumes of disparate data make it hard to assess the risk to the enterprise
Convert Raw Data into Information that
Provides Full Visibility by
Monitoring all
events in the
enterprise, injecting
identity into access
events and
correlating those to
defined business
processes and KRIs
Integrating Security and Access
Bill
Accounting Manager
The security officer noticed
some change in department
jobs and wanted to review the
activities of John and Bill
Problem: The CIO Wastes
Resources on Duplicate Efforts
Toni
PCI
SOX
Privacy
…
Information
Security
3rd Party
HIPAA
CIO
Functional
Leads
Compliance
Managers
Line of Business
Legal
Audit
Corporate
Information
Security
Service/ Arch
Leads
Compliance
Managers
IT
Enterprise groups demand the same data from IT in separate requests
Issue: Duplication of efforts consume IT resources and create inconsistencies for the business
Eliminate Duplication of Controls by
Mapping controls to
defined objectives
and processes as
well as mapping the
process to business
owners
Problem: The CIO Cannot
Sustain Compliance Demands
Toni
Auditor
CIO
User Entitlements &
Security Controls
App Owner
Users
Audit
Processes
Roles
Exchange
Server
Mainframe
Site 1
User Entitlements &
Security Controls
User Entitlements &
Security Controls
User Entitlements &
Security Controls
App Owner
App Owner
App Owner
Users
Audit
Processes
Roles
Exchange
Server
PeopleSoft HR DB
Site 2
Users
Audit
Processes
Roles
Exchange
Server
Users
Audit
Processes
Roles
Exchange
Server
SOAP
Java App
Site 3
Site n…
The enterprise is structured with siloed security domains
Issue: The sheer volume of disparate processes makes it costly
to provide compliance-related data
Contain Compliance Costs
through a Sustainable Infrastructure
Auditor
Automating
and enforcing
common controls
while providing
transparency
to business
processes across
the enterprise
User Entitlements
and Security Controls
App Owner
App Owner
App Owner
Users
Processes
Roles
Mainframe
App Owner
Exchange
Server
Audit
SOAP
PeopleSoft HR DB
Java App
Building the Crucial Bridge
Between Strategic Applications
SAP BusinessObjects
Risk
Management
Process
Control
Access
Control
SAP ERP
HCM
FIN
OPS
SAP NetWeaver
Novell Compliance
Management
Platform
extension for
SAP environments
IT Processes
IT Systems
IT Infrastructure
Strategic Business
Applications
Novell CMP Logical Architecture
The following Novell solutions have
been integrated to form CMP:
• Sentinel: user activity
monitoring and compliance
reporting
• Identity Manager: user
lifecycle management and
account provisioning
• Access Governance: user
access certification and role
management
• Access Manager: single
sign-on for web applications
and VPN
• Identity Vault: identity and
credential repository
Novell Sentinel
Novell Identity
Manager
Novell Access
Governance
Administration
Web UI
Management
Console
Event Collectors
Correlation
Engine
Event Correlation
Incident
Management
Compliance
Reporting
Log Archive
Workflow
Novell Access
Manager
Reporting
Reverse Proxy
Provisioning
Policy Engine
Drivers
Provisioning Engine
Authentication
Authorization
Workflow
Processing
Auditing
Policy Controls
Role & Policy
Controls
Role
Management
Identity Vault
Solution Boundary
Looking Forward
2007: SAP and Novell
deepen a long-standing
partnership with a focus on
Linux
2010: Integration with
Process Control,
Risk Management
2009: CMP becomes the
first solution certified with
Access Control
DEMO
Real-World Insights
Security Focus Areas in 2009
Protecting
data assets
• Regulatory and contractual obligations
• Reducing risk of data breach
Streamlining
security and
compliance
• Addressing fragmented, one-off approaches to compliance with GLBA,
SOX, HIPAA,, EU Data Protection Directive, PCI DSS and enterprise
policies
• Risk-rationalized approach to controls and testing, automate manual
processes
Securing a
changing IT
infrastructure
• Protect the full range of enterprise IT assets
• Support mobility, virtualization, cloud computing and other disruptive
changes
Enterprise
Risk
Management
• Managing IT risks within a more comprehensive enterprise framework
• IT security and controls as a business enabler
Enterprise Risk Management, Access Risks
and Controls
Compliance Program Management
GLBA
HIPAA
SOX
Privacy
PCI
SAS 70
Enterprise Policies
Risk Management
Controls
Risks
Enterprise Risk Management Program
Access to
resources occurs
without proper
business
authorization
Access is
controlled in a
manner
consistent with
business and
security
requirements.
Unauthorized
access is gained
via weak or
improperly
protected
password
Systems for
managing
password are
interactive and
ensure quality
passwords
.
Enterprise Risk-Control Framework -
Unauthorized
users are able to
gain access to
systems by
claiming to be an
authorized user
Users gain
access to
information that
is beyond their
appropriate level
of privilege
All users are
assigned a unique
ID for their
personal use only,
substantiated by
Authentication &
Reporting
The allocation and
use of privileges
is restricted and
controlled
through a formal
authorization
process
Integrated Novell CMP – SAP Solution
Conceptual View
1. Leverage SAP roles in
user management and
compliance reporting
processes across nonSAP environment
2. Report business-relevant
security events to SAP
GRC Suite components,
extending their breadth of
coverage and business
value
SAP
GRC Suite
SAP ERP
SAP NetWeaver
Novell CMP
Enterprise
Applications
LoB
Applications
IT
Applications
IT Processes
IT Systems
IT Infrastructure
Integrated Novell-SAP Solution in Deloitte
SNet Lab
An enterprise solution for managing user access risk and compliance across SAP
and broader IT landscapes
Business Users
AGS Users
4
Compliance
Certification
Manager
Access
Certification
People Mgr.
Compliance
Role
Management
Audit
Enterprise Applications & Systems
Access Governance
Collection
SAP Business User
Roles Lifecycle
Manager
GRC Access
Control
App. Owner
IT Security
3
Sentinel Users
SAP ERP
Monitoring
IT Operations
Log Manager
Reporting
CUA
OPS
FIN
Audit
Legal
IT Security
2
Contractors
Business Partners
Access Management
SAP NetWeaver
SecureLogin
Employees
Requestors
GRC Risk
Management
SIEM
Sentinel
Alerting
Compliance
GRC Process
Control
Authentication
Access Manager
NW Portal
UME
Authorization
Audit
SSO
Privileged User
Management
Customers
IT Applications
Help Desk
Config. Mgt.
IT Systems
1
Provisioning
Email
DB
AD
User Lifecycle Administration
Administration
Manage User
Accounts
Provisioning Engine
Authoritative Sources
BU 1 HR
Data Feeds
Identity Vault
BU 2 HR
CMP System Boundary
IT Infrastructure
Win2K8
UNIX
IT Foundation
HR
Novell CMP Component Functionality and
Controls Provided
Functionality
4
Access
Governance
Suite
3
Sentinel
2
Access
Manager
• Certifying User Access
• Managing Roles
• Security Event
Monitoring & Logging
• Compliance Reporting
• Managing User Access
• AuthN & AuthZ
• Audit
• Single Sign-On
1
• Managing Accounts
Identity
Manager
• Assigning Roles
• Managing Passwords
Controls Provided
• Management reviews user
access rights at regular
intervals using a formal process
• Access to information resources
is controlled in a manner
consistent with business and
security requirements.
• All users are assigned a unique
ID for their personal use only,
substantiated via appropriate
authentication techniques
• Formal procedures to control
allocation of access rights to
information systems
• Interactive password reset
© SAP 2008 / Page 25 Geoffrey Coulehan, SAP Market Development
Questions?
Contact Information
• Jay Roxe ([email protected])
• Rick Wagner ([email protected])
• Ranga Bodla ([email protected])
• Eli Fisk ([email protected])