Chat now with support
Chat mit Support

Identity Manager 8.1.4 - Web Portal User Guide

Getting started Security keys (WebAuthn) Requests Attestation Compliance Responsibilities
My responsibilities
Employees System entitlements Business roles System roles Departments Cost centers Locations Application roles Resources Assignment resources Multi-request resources Multi-requestable/unsubscribable resources Software Devices Adding tags for service items
Task delegation Ownerships Auditing Governance administration
Applications Calls Settings Discovering your statistics on the start page

Auditing

Auditing is a submenu of Compliance. You can execute various actions, such as viewing all requests or viewing all approved requests, depending on which entitlements you have been assigned. These actions can be called up over tiles.

Detailed information about this topic

Rule violations

NOTE: This function is only available if the module Company Policies Module or Compliance Rules Module is installed.

All employees that have violated rules are displayed under Rule violations. Auditing - Rule violations shows you all rule violations within a selected time period. Rule violations that have been granted or denied exceptions or are pending are shown in Rule violation.

Some functions have already been described in the menu Pending rule violations. You can find all the functions available in this menu listed under "Detailed information about this topic".

To open "Rule violations"

  • Open Compliance | Auditing and click Rule violations.
Detailed information about this topic

Policy violations

NOTE: This function is only available if the module Company Policies Module or Compliance Rules Module is installed.

All employees that have violated policies are displayed under Policy violations. Auditing - Policy violations shows you all rule violations within a selected time period. Policy violations that have been granted or denied exceptions or are pending, are shown in Pending policy violations.

Some functions have already been described in the menu Pending rule violations. You can find all the functions available in this menu listed under "Detailed information about this topic".

To open “Policy violations"

  • Open Compliance | Auditing and click Policy violations.
Detailed information about this topic

Governance administration

NOTE: This function is only available if Compliance Rules Module, Governance Base Module, Company Policies Module ,or Attestation Module is installed.

Companies have different requirements that they need for regulating internal and external employee access to company resources. On the one hand, rules are used for locating rule violations and on the other hand, to prevent them. They may also have to demonstrate that they adhere to legislated regulations such as the Sarbanes-Oxley Act (SOX). The following demands are made on compliance.

  • Rule define to what permissions the employee has or otherwise. For example, a rule could prevent an employee from owning entitlement B if they already have entitlement A.
  • Policies are very flexible, and can be defined around anything you are managing with Manager. For example, a policy could state that only managers in the HR department can have full control over a share on a file share that contains sensitive information.
  • Each item to which an employee has access can be given a risk value. A risk index can be calculated for employees, accounts, organization, roles, and for the groups of resources available for request. You can then use the risk indexes to help prioritize your compliance activities.

Some rules are preventative: A request will not be processed if it is in violation, unless exception approvals are specifically allowed, and an approver allows it. Rules (if appropriate) and policies are run on a regular schedule, and violations appear on the appropriate employee’s Web Portal for handling. Policies may have associated mitigations, which are processes that an employee can do outside of the One Identity Manager solution to reduce the risks posed by the violation. Reports and dashboards give you further insights into your state of compliance. For more information, see What statistics are available?.

Which information you see in Compliance depends heavily on your role. If you do not see a menu item that you think you should, contact your system administrator. The following overview shows which view you can see for which user roles.

Table 43: View "Compliance"

View

Description

Roles

High-risk overview

Provides an overview of critical objects. The overview is divided into several parts.

Compliance and security officer

Compliance frameworks

Provided details about the compliance frameworks in your environment.

Compliance framework administrator

Rule violations

Provides reports on employees who violate policies.

Framework administrator, rule supervisor, and rule-exception approver

Policy violations

Provides reports on objects which violate policies.

Framework administrator, policy supervisor, and rule-exception approver

Rule analysis

Identifies employees who are in violation of rules related to SAP functions. You must configure SAP authorizations for testing. For more detailed information about SAP R/3 Compliance Add-on, see the One Identity Manager Identity Management Base Module Administration Guide.

NOTE: the calculation of SAP functions must be activated by a manager.

Compliance framework administrator

Function analysis

Specifies employees whose access to high-risk SAP function violates the rules.

NOTE: the calculation of SAP functions must be activated by an manager.

Rule supervisors

Detailed information about this topic
Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen