To open the Auditing – Policy Violations page go to Compliance > Auditing > Policy Violations.
On the Auditing - Policy Violations page, you can display all policy violations in the system (see Displaying all policy violations).
The following tables give you an overview of the various features and content on the Auditing – Policy Violations page.
Table 250: Controls
Select approver |
Click Assign and select the identity whose approvals you want to display. |
Table 251: Columns
Employee |
Shows you the name of the identity that violated the policy. |
Policy |
Shows you the name of the violated policy. |
State |
Shows you the current status of the policy violation.
The following status' are possible:
-
Approval decision pending: The policy violation has yet to be decided.
-
Exception granted: The exception was approved. In the details pane, on the Policy violation tab, you can see why the exception was granted approval.
-
Exception denied: The exception was denied. In the details pane, on the Policy violation tab, you can see why the exception was denied approval. |
TIP: You can show less data by using the column filters. For more information, see Filtering.
TIP: On the following tabs in the details pane, you can view other useful information about each rule violation. To do this, click the corresponding entry in the list.
-
Policy violation: Shows you general information about the policy violation.
-
Object: Shows you general information about object that was violated the policy.
-
Policy: Shows you general information about policy that was violated.
To open the Governance Administration page go to Attestation > Governance Administration.
On the Governance Administration page, you can manage compliance rules and company policies and related functions.
To do this, click on one of the tiles:
To open the Risk Assessment page go to Compliance > Governance Administration > Risk Assessment.
Everyone with IT system authorization in a company represents a security risk for that company. For example, a person with permission to edit financial data in SAP carries a higher risk than an employee with permission to edit their own personal data. To quantify the risk, you can enter a risk value for every company resource in One Identity Manager. A risk index is calculated from this value for every person who is assigned this company resource, directly, or indirectly. Company resources include target system entitlements (for example, Active Directory groups or SAP profiles), system roles, subscribable reports, software, and resources. In this way, all the people that represent a particular risk to the company can be found.
In the context of Identity Audit, compliance rules can also be given a risk index. With each rule violation, the security risk of all identities that violate the rule may increase. Therefore, these risk indexes are also included in the identities' risk calculation. You can define appropriate countermeasures through mitigating controls, and store them with the compliance rules.
Other factors can influence the calculation of identities' risk indexes. These include: the type of resource assignment (approved request or direct assignment), attestations, exception approvals for rule violations, identity's responsibilities, and defined weightings. Furthermore, the risk index can be calculated for all business roles, organizations, and system roles that have company resources assigned to them. The user account risk index is calculated based on the system entitlements assigned.
For more information about risk assessment, see the One Identity Manager Risk Assessment Administration Guide.
On the Risk Assessment page, you can perform the following actions for the risk index calculation rules that contribute to the calculation of these indexes:
The following table gives you an overview of the various features on the Risk Assessment page.
Table 253: Columns
Object type |
Shows you which objects are affected by the risk index function. |
Name |
Shows you the risk index function's name. |
Calculation type |
Shows you the calculation type used for risk assessment.
The following calculation types are possible:
-
Maximum (weighted): The highest value from all relevant risk indexes is determined, weighted and used as the basis for further calculation.
-
Maximum (normalized): The highest value from all relevant risk indexes is calculated, weighted with the normalized weighting factor and taken as basis for the next calculation.
-
Increment: The risk index of table column (target) is incremented by a fixed value. You can see this value in the Weighting/Change value column.
-
Decrement: The risk index of the table column (target) is decreased by a fixed value. You can see this value in the Weighting/Change value column.
-
Average (normalized): The average of all relevant risk indexes is calculated with the normalized weighting factor and taken as basis for the next calculation.
-
Average (weighted): The average of all relevant risk indexes is calculated, weighted, and taken as basis for the next calculation.
-
Reduction: Used when calculating the reduced risk index for compliance rules, SAP functions, company policies, and attestation policies. You cannot add custom functions with this calculation type! |
Weighting/change value |
Shows, depending on the type of calculation, the value used to weigh the determined risk index in the final calculation or the value used to alter the risk index respectively. |
TIP: You can show less data by using the column filters. For more information, see Filtering.
To open the Compliance Frameworks page go to Compliance > Governance Administration > Compliance Frameworks.
Compliance frameworks are used for classifying attestation policies, compliance rules, and company policies according to regulatory requirements.
On the Compliance Frameworks page, you can display all the compliance frameworks (see Displaying compliance frameworks).
The following table gives you an overview of the various features on the Compliance Frameworks page.
Table 254: Columns
Name |
Shows you the compliance framework's name. |
Description |
Shows you a description of the compliance framework. |
Manager/supervisor |
Shows you who is responsible for the compliance framework. |
TIP: You can show less data by using the column filters. For more information, see Filtering.