Converse agora com nosso suporte
Chat com o suporte

Identity Manager On Demand - Starling Edition Hosted - Compliance Rules Administration Guide

Compliance rules and identity audit
One Identity Manager users for identity audit Basic data for setting up rules Setting up a rule base rule check Mail templates for notifying about identity auditing
Mitigating controls for compliance rules Configuration parameters for Identity Audit

Compliance rules and identity audit

One Identity Manager can be used to define rules that maintain and monitor regulatory requirements and automatically deal with rule violations. Define compliance rules to test entitlements or combinations of entitlements in the context of identity audit for identities in the company. On the one hand, existing rule violations can be found by checking rules. On the other hand, possible rule violations can be preemptively identified and thus prevented.

Figure 1: Identity audit in One Identity Manager

Simple rule examples are:

  • An identity may not obtain two entitlements A and B at the same time.

  • Only identities with a particular department can have a particular entitlement.

  • Every user account has to have a manager assigned to it.

You can use the identity audit function of One Identity Manager to:

  • Define rules for any identity assignments

  • Evaluate the risk of possible rule violations

  • Specify mitigating controls

  • Initiate regular or spontaneous rule checks

  • Detailed testing of edit permissions for identities within an SAP client (using SAP functions)

  • Evaluate rule violations with differing criteria

  • Create reports about rules and rule violations

Based on this information, you can made corrections to data in One Identity Manager and transfer them to the connected target systems. The integrated report function in One Identity Manager can be used to provide information for the appropriate tests.

To use the identity audit function

  • In the Designer, set the QER | ComplianceCheck configuration parameter and compile the database.

If you disable the configuration parameter at a later date, model components and scripts that are no longer required, are disabled. SQL procedures and triggers are still carried out. For more information about the behavior of preprocessor relevant configuration parameters and conditional compiling, see the One Identity Manager Configuration Guide.

One Identity Manager users for identity audit

The following users are included in setting up and administration of the rule base and editing rule violations.

Table 1: Users
Users Tasks

Administrators for Identity Audit

Administrators must be assigned to the Identity & Access Governance | Identity Audit | Administrators application role.

Users with this application role:

  • Enter base data for setting up company policies.

  • Create compliance rules and assign rule supervisors to them.

  • Can start rule checking and view rule violations as required.

  • Create reports about rule violations.

  • Enter mitigating controls.

  • Create and edit risk index functions.

  • Monitor Identity Audit functions.

  • Administer application roles for rule supervisors, exception approvers and attestors.

  • Set up other application roles as required.

Rule supervisors

Rule supervisors must be assigned to the Identity & Access Governance | Identity Audit | Rule supervisors application role or a child application role.

Users with this application role:

  • Are responsible for compliance rule content, for example, an auditor or a auditing department.

  • Edit the compliance rule working copies, which are assigned to the application role.

  • Enable and disable compliance rules.

  • Can start rule checking and view rule violations as required.

  • Assign mitigating controls.

One Identity Manager administrators

One Identity Manager administrator and administrative system users Administrative system users are not added to application roles.

One Identity Manager administrators:

  • Create customized permissions groups for application roles for role-based login to administration tools in the Designer as required.

  • Create system users and permissions groups for non role-based login to administration tools in the Designer as required.

  • Enable or disable additional configuration parameters in the Designer as required.

  • Create custom processes in the Designer as required.

  • Create and configure schedules as required.

Exception approvers

Administrators must be assigned to the Identity & Access Governance | Identity Audit | Exception approvers application role or a child application role.

Users with this application role:

  • Edit rule violations in the Web Portal.

  • Can grant exception approval or revoke it in the Web Portal.

Compliance rules attestors

Attestors must be assigned to the Identity & Access Governance | Identity Audit | Attestors application role.

Users with this application role:

  • Attest compliance rules and exception approvals in the Web Portal for which they are responsible.

  • Can view main data for these compliance rules but not edit them.

NOTE: This application role is available if the module Attestation Module is installed.

Compliance and security officer

Compliance and security officers must be assigned to the Identity & Access Governance | Compliance & Security Officer application role.

Users with this application role:

  • View all compliance relevant information and other analysis in the Web Portal. This includes attestation policies, company policies and policy violations, compliance rules, and rule violations and risk index functions.

  • Edit attestation polices.

Auditors

Auditors are assigned to the Identity & Access Governance | Auditors application role.

Users with this application role:

  • See the Web Portal all the relevant data for an audit.

Basic data for setting up rules

Various basic data is required to create rules, run rule checks and handle rule violation.

Rule groups:

Rule groups

Compliance frameworks:

Compliance frameworks

Extended properties:

Extended properties and property groups

Schedules:

Schedules for checking rules

Functional areas:

Functional areas

Attestors:

Compliance rules attestors

Rule supervisors:

Rule supervisors

Exception approvers:

Exception approvers

Standard reasons:

Standard reasons for rule violations

Mail templates:

Editing mail templates for identity auditing

Rule groups

Use rule groups to group rules by functionality, for example, to group account policies, or to separate functions ("Segregation of duties").

To create or edit a rule group

  1. In the Manager, select the Identity Audit > Basic configuration data > Rule groups category.

  2. Select a rule group in the result list. Select the Change main data task.

    - OR -

    Click in the result list.

  3. Edit the main data of the rule group.

  4. Save the changes.

Enter the following data for a rule group

Table 2: Rule group properties
Property Description

Group name

Name of the rule group.

Description

Text field for additional explanation.

Parent group

Rule group above this one in a hierarchy.

To organize rule groups hierarchically, select the parent rule group in the menu.

Ferramentas de autoatendimento
Base de conhecimento
Notificações e alertas
Suporte a produtos
Downloads de software
Documentação técnica
Fóruns de usuário
Tutorial em vídeo
Feed RSS
Fale conosco
Obtenha assistência de licenciamento
Suporte técnico
Visualizar tudo
Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação