Chat now with support
Chat with Support

Identity Manager 8.0 - Compliance Rules Administration Guide

Compliance Rules and Identity Audit
One Identity Manager Users for the Identity Audit Base Data for Setting up Rules Setting up a Rule Base Rule check Creating Custom Mail Templates for Notifications
Mitigating Controls Configuration Parameters for Identity Audit

Customizing Email Signatures

Configure the email signature for mail templates using the following configuration parameter.

Table 47: Configuration Parameters for Email Signatures
Configuration Parameter Description
Common\MailNotification\Signature Data for the signature in email automatically generated from mail templates.
Common\MailNotification\Signature\Caption Signature under the salutation.
Common\MailNotification\Signature\Company Company name.
Common\MailNotification\Signature\Link Link to company website.

The script VI_GetRichMailSignature combines the components of an email signature according to the configuration parameters for use in mail templates.

Mitigating Controls

Mitigating Controls

Table 48: Configuration Parameter for Risk Assessment
Configuration parameter Active Meaning
QER\CalculateRiskIndex Preprocessor relevant configuration parameter controlling system components for calculating an employee's risk index. Changes to the parameter require recompiling the database.

If the parameter is set, values can be entered and calculated for the risk index.

Effective permissions of employees, roles or user accounts are checked in the context of Identity Audit on the basis of regulatory requirements. Violation of regulatory requirements can harbor different risks for companies. To evaluate these risks, you can apply risk indexes to compliance rules, and company policies. These risk indexes provide information about the risk involved for the company in violating the respective rule, function. Once the risks have been identified and evaluated, mitigating controls can be implemented.

Mitigating controls are independent on One Identity Manager’s functionality. They are not monitored through One Identity Manager.

Mitigating controls describe controls that are implemented if a compliance rule was violated. The next rule check should not find any rule violations once the controls have been applied.

An example of a mitigating control is the assignment of system entitlements only through authorized requests in the IT Shop. If system entitlements are issued to the employee through the IT Shop, a rule check can be integrated into the request’s approval procedure. System entitlements that would lead to a rule violation are therefore assigned not at all or only after gaining exception approval. The risk that rules are violated is thus reduced.

To edit mitigating controls

  • Set the configuration parameter "QER\CalculateRiskIndex" in the Designer and compile the database.

For more detailed information about risk assessment, see the One Identity Manager Risk Assessment Administration Guide.

General Master Data for a Mitigating Control

General Master Data for a Mitigating Control

To edit mitigating controls

  1. Select the category Risk index functions | Mitigating controls.
  2. Select a mitigating control in the result list. Select Change master data in the task view.

    - OR -

    Click in the result list toolbar.

  3. Edit the mitigating control master data.
  4. Save the changes.

Enter the following master data for mitigating controls.

Table 49: General Master Data for a Mitigating Control
Property Description
Measure Unique identifier for the mitigating control.
Significance reduction When the mitigating control is implemented, this value is used to reduce the risk of denied attestation cases. Enter a number between 0 and 1.
Description Detailed description of the mitigating control.
Functional area Functional area in which the mitigating control may be applied.
Department Department in which the mitigating control may be applied.

Additional Tasks for Mitigating Controls

After you have entered the master data, you can apply different tasks to it. The task view contains different forms with which you can run the following tasks.

Related Documents