SAP and Novell Collaborate on Comprehensive, Integrated Governance, Risk, and Compliance Solutions Agenda • Addressing today’s GRC challenges • Demo • Real-World Insights Challenges Surround the Enterprise Reducing Duplicated Processes Complexity Integrating Disparate Systems Enabling a Mobile Workforce Lowering IT Management Costs Competition Cost Eliminating Security Vulnerabilities Compliance Addressing Compliance Demands Determining “Who has access to what?” Addressing Risk Management Requirements Gaining Insight Into Risk What’s Required to Be Effective in Compliance? Application Access and IT Controls Management IT Security, Application Management, Change Management, Identity Management Business Processes Etc… Business Processes Logistics Controls in financial and business process applications Business Processes Finance Business Processes Business Processes Manufacturing Executive Management Policies, and Executive Directives IT Services SIEM/Identity Mgmt/Roles Mgmt/Access Mgmt SAP and Novell: Uniquely Covers the Entire Stack of GRC from Application to IT Controls Executive Management Policies, and Executive Directives Application Access and IT Controls Management Covered by Novell Compliance Management Platform Business Processes Etc… Business Processes Logistics Covered by SAP GRC Business Processes Manufacturing Business Process Controls Business Processes Finance Covered through a variety of mechanisms including SAP IT Services SIEM/Identity Mgmt/Roles Mgmt/Access Mgmt Content, Policy and Events Unify Disparate Systems Consulting Partners Problem: The CIO Cannot Provide BusinessRelevant Risk Data to the CFO Toni CIO The enterprise is setup with distributed security domains Issue: Volumes of disparate data make it hard to assess the risk to the enterprise Convert Raw Data into Information that Provides Full Visibility by Monitoring all events in the enterprise, injecting identity into access events and correlating those to defined business processes and KRIs Integrating Security and Access Bill Accounting Manager The security officer noticed some change in department jobs and wanted to review the activities of John and Bill Problem: The CIO Wastes Resources on Duplicate Efforts Toni PCI SOX Privacy … Information Security 3rd Party HIPAA CIO Functional Leads Compliance Managers Line of Business Legal Audit Corporate Information Security Service/ Arch Leads Compliance Managers IT Enterprise groups demand the same data from IT in separate requests Issue: Duplication of efforts consume IT resources and create inconsistencies for the business Eliminate Duplication of Controls by Mapping controls to defined objectives and processes as well as mapping the process to business owners Problem: The CIO Cannot Sustain Compliance Demands Toni Auditor CIO User Entitlements & Security Controls App Owner Users Audit Processes Roles Exchange Server Mainframe Site 1 User Entitlements & Security Controls User Entitlements & Security Controls User Entitlements & Security Controls App Owner App Owner App Owner Users Audit Processes Roles Exchange Server PeopleSoft HR DB Site 2 Users Audit Processes Roles Exchange Server Users Audit Processes Roles Exchange Server SOAP Java App Site 3 Site n… The enterprise is structured with siloed security domains Issue: The sheer volume of disparate processes makes it costly to provide compliance-related data Contain Compliance Costs through a Sustainable Infrastructure Auditor Automating and enforcing common controls while providing transparency to business processes across the enterprise User Entitlements and Security Controls App Owner App Owner App Owner Users Processes Roles Mainframe App Owner Exchange Server Audit SOAP PeopleSoft HR DB Java App Building the Crucial Bridge Between Strategic Applications SAP BusinessObjects Risk Management Process Control Access Control SAP ERP HCM FIN OPS SAP NetWeaver Novell Compliance Management Platform extension for SAP environments IT Processes IT Systems IT Infrastructure Strategic Business Applications Novell CMP Logical Architecture The following Novell solutions have been integrated to form CMP: • Sentinel: user activity monitoring and compliance reporting • Identity Manager: user lifecycle management and account provisioning • Access Governance: user access certification and role management • Access Manager: single sign-on for web applications and VPN • Identity Vault: identity and credential repository Novell Sentinel Novell Identity Manager Novell Access Governance Administration Web UI Management Console Event Collectors Correlation Engine Event Correlation Incident Management Compliance Reporting Log Archive Workflow Novell Access Manager Reporting Reverse Proxy Provisioning Policy Engine Drivers Provisioning Engine Authentication Authorization Workflow Processing Auditing Policy Controls Role & Policy Controls Role Management Identity Vault Solution Boundary Looking Forward 2007: SAP and Novell deepen a long-standing partnership with a focus on Linux 2010: Integration with Process Control, Risk Management 2009: CMP becomes the first solution certified with Access Control DEMO Real-World Insights Security Focus Areas in 2009 Protecting data assets • Regulatory and contractual obligations • Reducing risk of data breach Streamlining security and compliance • Addressing fragmented, one-off approaches to compliance with GLBA, SOX, HIPAA,, EU Data Protection Directive, PCI DSS and enterprise policies • Risk-rationalized approach to controls and testing, automate manual processes Securing a changing IT infrastructure • Protect the full range of enterprise IT assets • Support mobility, virtualization, cloud computing and other disruptive changes Enterprise Risk Management • Managing IT risks within a more comprehensive enterprise framework • IT security and controls as a business enabler Enterprise Risk Management, Access Risks and Controls Compliance Program Management GLBA HIPAA SOX Privacy PCI SAS 70 Enterprise Policies Risk Management Controls Risks Enterprise Risk Management Program Access to resources occurs without proper business authorization Access is controlled in a manner consistent with business and security requirements. Unauthorized access is gained via weak or improperly protected password Systems for managing password are interactive and ensure quality passwords . Enterprise Risk-Control Framework - Unauthorized users are able to gain access to systems by claiming to be an authorized user Users gain access to information that is beyond their appropriate level of privilege All users are assigned a unique ID for their personal use only, substantiated by Authentication & Reporting The allocation and use of privileges is restricted and controlled through a formal authorization process Integrated Novell CMP – SAP Solution Conceptual View 1. Leverage SAP roles in user management and compliance reporting processes across nonSAP environment 2. Report business-relevant security events to SAP GRC Suite components, extending their breadth of coverage and business value SAP GRC Suite SAP ERP SAP NetWeaver Novell CMP Enterprise Applications LoB Applications IT Applications IT Processes IT Systems IT Infrastructure Integrated Novell-SAP Solution in Deloitte SNet Lab An enterprise solution for managing user access risk and compliance across SAP and broader IT landscapes Business Users AGS Users 4 Compliance Certification Manager Access Certification People Mgr. Compliance Role Management Audit Enterprise Applications & Systems Access Governance Collection SAP Business User Roles Lifecycle Manager GRC Access Control App. Owner IT Security 3 Sentinel Users SAP ERP Monitoring IT Operations Log Manager Reporting CUA OPS FIN Audit Legal IT Security 2 Contractors Business Partners Access Management SAP NetWeaver SecureLogin Employees Requestors GRC Risk Management SIEM Sentinel Alerting Compliance GRC Process Control Authentication Access Manager NW Portal UME Authorization Audit SSO Privileged User Management Customers IT Applications Help Desk Config. Mgt. IT Systems 1 Provisioning Email DB AD User Lifecycle Administration Administration Manage User Accounts Provisioning Engine Authoritative Sources BU 1 HR Data Feeds Identity Vault BU 2 HR CMP System Boundary IT Infrastructure Win2K8 UNIX IT Foundation HR Novell CMP Component Functionality and Controls Provided Functionality 4 Access Governance Suite 3 Sentinel 2 Access Manager • Certifying User Access • Managing Roles • Security Event Monitoring & Logging • Compliance Reporting • Managing User Access • AuthN & AuthZ • Audit • Single Sign-On 1 • Managing Accounts Identity Manager • Assigning Roles • Managing Passwords Controls Provided • Management reviews user access rights at regular intervals using a formal process • Access to information resources is controlled in a manner consistent with business and security requirements. • All users are assigned a unique ID for their personal use only, substantiated via appropriate authentication techniques • Formal procedures to control allocation of access rights to information systems • Interactive password reset © SAP 2008 / Page 25 Geoffrey Coulehan, SAP Market Development Questions? Contact Information • Jay Roxe ([email protected]) • Rick Wagner ([email protected]) • Ranga Bodla ([email protected]) • Eli Fisk ([email protected])
© Copyright 2026 Paperzz