oCFO Solution Update: Finance and Risk Solutions - GRC
oCFO Solution Update: Finance and Risk Solutions - GRC
Vice President, Head, Corporate Head, Finance Head, Corporate Risk, Compliance
CISO, CIO
Finance Reporting Operations Treasury & Audit Officer
Financial Planning & Analysis Accounting & Financial Close Receivables Management Payments and Bank Communication Enterprise Risk and Compliance Cybersecurity and Data Protection
SAP Business Planning and Consolidation SAP RealSpend SAP Receivables Management SAP S/4HANA Finance for cash mgmt. SAP Process Control SAP Enterprise Threat Detection
SAP Analytics Cloud S/4HANA Finance for central finance foundation SAP Cash Application SAP S/4HANA Fin.for cash mgmt, vers. for China SAP Risk Management SAP Privacy Management by BigID
SAP Customer Profitability Analytics SAP S/4HANA for Group Reporting SAP S/4HANA Cloud for customer payments SAP S/4HANA Finance for in-house cash SAP Audit Management SAP Data Privacy Governance
SAP Profitability and Performance Management SAP Business Planning and Consolidation SAP Digital Payments Add-On SAP Card Management SAP Business Integrity Screening SAP Data Custodian
SAP Analytics Cloud SAP S/4HANA Cloud for credit integration SAP Multi-Bank Connectivity SAP Regulation Management by Greenlight UI data protection masking
SAP Profitability and Performance Management UI data protection logging
SAP Disclosure Management Invoice Management and Accounts Payable Cash and Liquidity Management Access Governance SAP Code Vulnerability Analyzer
SAP Financial Closing cockpit SAP Invoice Management by Open Text SAP S/4HANA Finance for cash mgmt. SAP Access Control SAP Fortify by Micro Focus
SAP S/4HANA Cloud for Advanced Financial Closing SAP Information Extraction by OpenText SAP S/4HANA Fin.for cash mgmt, vers. for China SAP Cloud Identity Access Governance
SAP Advanced Payment Management SAP S/4HANA Finance for in-house cash SAP Identity Management
Blackline SAP S/4HANA Goods & Invoice Receipt Reconciliation SAP Business Planning and Consolidation SAP Cloud Platform Identity Provisioning
SAP Account Reconciliation & Automation by BlackLine SAP Analytics Cloud SAP Single Sign-On
SAP Intercompany Financial Hub by Blackline Real Estate Management SAP Cloud Platform Identity Authentication
SAP S/4HANA Real Estate Management Debt and Investment Management SAP Dynamic Authorization Management by NextLabs
• SAP Contract and Lease Mgmt for S4 SAP S/4HANA Finance for treasury & risk mgmt. SAP Access Violation Management by Greenlight
• SAP Real Estate Portfolio Mgmt for S4 Trading Platform Integration
SAP S/4HANA for asset retirement obligation (ARO) SAP Market Rates Management International Trade Management
SAP Common Area Maintenance Expense Recovery SAP Global Trade Services
Financial Risk Management SAP S/4HANA for international trade
Financial Shared Services SAP S/4HANA Finance for treasury & risk mgmt. SAP Watch List Screening
SAP Shared Service Framework for S/4HANA SAP Trade Repository Reporting by Virtusa
SAP Treasury and Risk Management, Impairment
Travel and Expense Management Accounting Extension for Expected Losses (RCS)
SAP Concur S/4HANA Financial Products Subledger (IFRS 9 & 17)
Vice President, Head, Corporate Head, Finance Head, Corporate Risk, Compliance
CISO, CIO
Finance Reporting Operations Treasury & Audit Officer
Financial Planning & Analysis Accounting & Financial Close Receivables Management Payments and Bank Communication Enterprise Risk and Compliance Cybersecurity and Data Protection
SAP Business Planning and Consolidation SAP RealSpend SAP Receivables Management SAP S/4HANA Finance for cash mgmt. SAP Process Control SAP Enterprise Threat Detection
SAP Analytics Cloud S/4HANA Finance for central finance foundation SAP Cash Application SAP S/4HANA Fin.for cash mgmt, vers. for China SAP Risk Management SAP Privacy Management by BigID
SAP Customer Profitability Analytics SAP S/4HANA for Group Reporting SAP S/4HANA Cloud for customer payments SAP S/4HANA Finance for in-house cash SAP Audit Management SAP Data Privacy Governance
SAP Profitability and Performance Management SAP Business Planning and Consolidation SAP Digital Payments Add-On SAP Card Management SAP Business Integrity Screening SAP Data Custodian
SAP Analytics Cloud SAP S/4HANA Cloud for credit integration SAP Multi-Bank Connectivity SAP Regulation Management by Greenlight UI data protection masking
SAP Profitability and Performance Management UI data protection logging
SAP Disclosure Management Invoice Management and Accounts Payable Cash and Liquidity Management Access Governance SAP Code Vulnerability Analyzer
SAP Financial Closing cockpit SAP Invoice Management by Open Text SAP S/4HANA Finance for cash mgmt. SAP Access Control SAP Fortify by Micro Focus
SAP S/4HANA Cloud for Advanced Financial Closing SAP Information Extraction by OpenText SAP S/4HANA Fin.for cash mgmt, vers. for China SAP Cloud Identity Access Governance
SAP Advanced Payment Management SAP S/4HANA Finance for in-house cash SAP Identity Management
Blackline SAP S/4HANA Goods & Invoice Receipt Reconciliation SAP Business Planning and Consolidation SAP Cloud Platform Identity Provisioning
SAP Account Reconciliation & Automation by BlackLine SAP Analytics Cloud SAP Single Sign-On
SAP Intercompany Financial Hub by Blackline Real Estate Management SAP Cloud Platform Identity Authentication
SAP S/4HANA Real Estate Management Debt and Investment Management SAP Dynamic Authorization Management by NextLabs
• SAP Contract and Lease Mgmt for S4 SAP S/4HANA Finance for treasury & risk mgmt. SAP Access Violation Management by Greenlight
• SAP Real Estate Portfolio Mgmt for S4 Trading Platform Integration
SAP S/4HANA for asset retirement obligation (ARO) SAP Market Rates Management International Trade Management
SAP Common Area Maintenance Expense Recovery SAP Global Trade Services
Financial Risk Management SAP S/4HANA for international trade
Financial Shared Services SAP S/4HANA Finance for treasury & risk mgmt. SAP Watch List Screening
SAP Shared Service Framework for S/4HANA SAP Trade Repository Reporting by Virtusa
SAP Treasury and Risk Management, Impairment
Travel and Expense Management Accounting Extension for Expected Losses (RCS)
SAP Concur S/4HANA Financial Products Subledger (IFRS 9 & 17)
Manage risks, controls, and Manage identities, authorized Protect data, control access, Manage import and export
regulatory requirements in business information access, data use, and detect threats compliance as well as free trade
operations and sharing conditions agreements in global supply chains
Help ensure compliance with
Screen third parties and detect Mitigate access risk violations information security standards Optimize trade utilizing special
anomalies and fraud and monitor financial impact customs procedures such as bonded
Identify vulnerabilities in code warehouses, processing trade in
Provide independent assurance of and remote function call China, and free trade zones in NA
risk and compliance standards (RFC) connections
Manage Intrastat and export
compliance in S/4HANA
✓ SAP Process Control ✓ SAP Access Control ✓ SAP Enterprise Threat Detection ✓ SAP Global Trade Services
✓ SAP Risk Management ✓ SAP Identity Management ✓ SAP Privacy Management by BigID ✓ SAP S/4HANA for international
trade
✓ SAP Audit Management ✓ SAP Single Sign-On ✓ SAP Data Privacy Governance
✓ SAP Watch List Screening
✓ SAP Business Integrity Screening ✓ SAP Cloud Identity Access ✓ SAP Data Custodian
Governance
✓ SAP Regulation Management by ✓ UI data protection masking
Greenlight ✓ SAP Cloud Platform Identity
Provisioning Service ✓ UI data protection logging
✓ SAP Process Control ✓ SAP Access Control ✓ SAP Enterprise Threat Detection ✓ SAP Global Trade Services
✓ SAP Risk Management ✓ SAP Identity Management ✓ SAP Privacy Management by BigID ✓ SAP S/4HANA for international
trade
✓ SAP Audit Management ✓ SAP Single Sign-On ✓ SAP Data Privacy Governance
✓ SAP Watch List Screening
✓ SAP Business Integrity Screening ✓ SAP Cloud Identity Access ✓ SAP Data Custodian
Governance
✓ SAP Regulation Management by ✓ UI data protection masking
Greenlight ✓ SAP Cloud Platform Identity
Provisioning Service ✓ UI data protection logging
SAP Process Control | SAP Risk Management | SAP Audit Management | SAP Business Integrity Screening
SAP Regulation Management by Greenlight
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL 10
Three Lines of Defense: The concept applied to GRC
Multiple teams, each with different responsibilities but working together to protect and drive the
enterprise by:
• Managing day-to-day risks and • Overseeing enterprise risk and • Providing independent assurance and
controls compliance oversight
• Complying with internal policies and • Providing guidance on risk and • Assessing effectiveness of risk
procedures compliance management practices management and internal controls
• Identifying and remediating issues • Consolidating risk and compliance • Reporting the status of risk and
information for management reporting control frameworks to management
Use a risk-focused approach: Use collaborative tools and automation: Ensure GRC information is always
▪ Keep your GRC program costs under up-to-date, transparent, and
▪ Identify key value-adding risks
control reliable for effective decisions:
▪ Respond to compliance, financial
▪ Use of best-practice and intuitive user ▪ Evaluation progress
and operational risks
tools ▪ Policy acceptance
▪ Scan the horizon for emerging
▪ Automate testing and monitoring ▪ Continuous control monitoring
risks and opportunities
(CCM)
▪ Issue status
Workflow-driven processes
…the right task to the right person at the right time
Automated notifications
…what you need to know when you need it,
including key risk indicators
Continuous monitoring
…getting the data you need faster
and with less effort
Document Report
Insightful reporting for
Single source of truth shared
analysis and accountability
across the enterprise
Enterprise Risk
& Compliance
Plan Evaluate
Planning of focused actions to End-to-end test and issue
help ensure timeliness resolution
Identify Respond
Link risks, risk drivers, risk Respond to risk after balancing
indicators, impacts and responses costs and benefits
Analyze
Analyze risk via scenarios, modeling, and
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL other factors to understand exposure 16
SAP Audit Management
Transform audit. Move beyond assurance.
Set-up Investigate
Define detection strategy Manage alert workload with
through simulation and efficient evaluation, qualification
calibration and remediation of issues
Detect
Execute mass and real-time detection and
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL stop anomalies or irregular transactions 18
SAP Regulation Management by Greenlight
SAP Process Control
Intake Report
Maintain authoritative Demonstrate comprehensive
sources for multiple auditability of regulatory
regulatory alerts and Enterprise Risk compliance
mandates & Compliance
Evaluate Monitor
Identify and address compliance Align compliance requirements
gaps to meet new or changed with operational activities and
regulatory requirements automate testing of controls
Collaborate
Establish accountability and unify requirements and
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL
controls across operations and compliance stakeholders 19
SAP GRC solutions
Solution mapping to key themes
✓ SAP Process Control ✓ SAP Access Control ✓ SAP Enterprise Threat Detection ✓ SAP Global Trade Services
✓ SAP Risk Management ✓ SAP Identity Management ✓ SAP Privacy Management by BigID ✓ SAP S/4HANA for international
trade
✓ SAP Audit Management ✓ SAP Single Sign-On ✓ SAP Data Privacy Governance
✓ SAP Watch List Screening
✓ SAP Business Integrity Screening ✓ SAP Cloud Identity Access ✓ SAP Data Custodian
Governance
✓ SAP Regulation Management by ✓ UI data protection masking
Greenlight ✓ SAP Cloud Platform Identity
Provisioning Service ✓ UI data protection logging
Analyze Risk
Find and remediate Monitor Privileges
segregation of duties and Monitor emergency access
critical access violations Access and transaction usage
Governance
Maintain Roles
Define and maintain roles in business terms
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL 22
SAP Cloud Identity Access Governance
Optimize role definition and streamline governance
Privileged Access
Access Analysis Management
Achieve account-based access,
Analyze access, refine user log consolidation, and review
assignments, manage controls Access with automated log assessment
Governance
Access Request
Optimize access, workflow, policy-based
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL assignment, and processes 23
SAP Identity Management
Covering the entire identity lifecycle, business-driven and compliant
Hiring Resignation/
Achieve account-based Termination
access, log Are permissions
consolidation, and review Access automatically adjusted if
with automated log someone is promoted to a
assessment
Governance new position?
Access
Governance
Integrate Protect
Quickly adopt new Prevent risks due to
business processes across excessive access rights
multiple applications and segregation-of-duties
violations
Integrate Simplify
Seamlessly integrate with Provide optimal user
existing infrastructure and experience and easy to
applications Access consume self services
Governance
Protect
Reduce exposure to cyber attacks with flexible
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL
configuration for strength of authentication 27
SAP Dynamic Authorization Management application by NextLabs
Enhancing security for data and business applications
Extend Report
Extend the capabilities of
Summarize financial exposure
SAP Access Control
Access due to SoD violations
across enterprise systems
Governance
Notify Monitor
Notify business owners when Correlate business transactions to users
SoD violations are executed to identify materialized SoD violations
✓ SAP Process Control ✓ SAP Access Control ✓ SAP Enterprise Threat Detection ✓ SAP Global Trade Services
✓ SAP Risk Management ✓ SAP Identity Management ✓ SAP Privacy Management by BigID ✓ SAP S/4HANA for international
trade
✓ SAP Audit Management ✓ SAP Single Sign-On ✓ SAP Data Privacy Governance
✓ SAP Watch List Screening
✓ SAP Business Integrity Screening ✓ SAP Cloud Identity Access ✓ SAP Data Custodian
Governance
✓ SAP Regulation Management by ✓ UI data protection masking
Greenlight ✓ SAP Cloud Platform Identity
Provisioning Service ✓ UI data protection logging
security standards
Data
Security
SAP Enterprise Threat Detection| SAP Privacy Management by BigID | SAP Data Privacy Governance | SAP Data Custodian
UI data protection masking | UI data protection logging | SAP Code Vulnerability Analyzer| SAP Fortify by Micro Focus
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL 31
SAP Enterprise Threat Detection
Effectively identify and analyze threats
Analyze Integrate
Efficiently enrich, analyze, Integration of SAP and
and correlate logs Cybersecurity non-SAP log data
and Data
Protection
Evaluate Investigate
Automatically evaluate attack detection Forensic analysis and modeling of
patterns with real-time alerting existing and new attack detection
patterns and dashboards
Cybersecurity
and Data
Protection
Integrate
Log Data Access
Integration with UI Masking for
Coherent log of users’ input Cybersecurity SAP for better data protection,
and system output on the UI and Data and with SAP Enterprise Threat
level, enriched with meta Protection Detection for advanced and
information for analysis automated analysis of access
Report
Gain Insight
Understand how and which data are Draw on comprehensive access data
accessed, and set up alerts in case of to report internally and externally
access to critical or sensitive data
Investigate
Receive alerts to specific, questionable activities, and deep-dive
into the log file to identify and prove improper data access
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL 36
SAP NetWeaver AS, add-on for code vulnerability analysis
Identify and remedy security vulnerabilities in ABAP custom code
Analyze Integrate
Analyze security Integrate with other elements
vulnerabilities Cybersecurity of the SAP landscape as
and Data well as non-SAP solutions
Protection
Evaluate Remedy
Evaluate security Remedy security
vulnerabilities vulnerabilities
✓ SAP Process Control ✓ SAP Access Control ✓ SAP Enterprise Threat Detection ✓ SAP Global Trade Services
✓ SAP Risk Management ✓ SAP Identity Management ✓ SAP Privacy Management by BigID ✓ SAP S/4HANA for international
trade
✓ SAP Audit Management ✓ SAP Single Sign-On ✓ SAP Data Privacy Governance
✓ SAP Watch List Screening
✓ SAP Business Integrity Screening ✓ SAP Cloud Identity Access ✓ SAP Data Custodian
Governance
✓ SAP Regulation Management by ✓ UI data protection masking
Greenlight ✓ SAP Cloud Platform Identity
Provisioning Service ✓ UI data protection logging
SAP Global Trade Services | SAP S/4HANA for international trade | SAP Watch List Screening
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL 39
SAP S/4HANA for international trade
Run global trade in SAP S/4HANA
Embargo Intrastat
Block transactions related Support for European
to embargoed countries requirements around order-
International Trade to-cash and procure-to-pay
Management processes
Restricted Party
Special Customs
Screening Procedures
Ensure proper screening Leverage foreign-trade zones,
of restricted or denied processing trade in China,
parties with inline process International bonded warehousing, inward
blocking and release Trade and outward processing relief
Management (IPR/OPR), Intrastat, Excise
Movement and Control System
(EMCS), and others
Import Management
Effectively manage import compliance, classification, inbound
© 2019 SAP SE or an SAP affiliate company. All rights reserved. ǀ INTERNAL
trade finance, and customs services with direct filling
41
SAP Watch List Screening
Avoid risk and improve screening compliance
International Trade
Management
SAP Cloud Identity Access Governance SAP Cloud Identity Access Governance 1.0 Open-ended Program
SAP Cloud Platform Identity Provisioning Identity and Access Management in SAP Cloud Platform (e-book SECCL1_EN_Col11)
Cybersecurity and Data Protection Solutions openSAP Thought Leaders – Cybersecurity – The essential challenge for digital transformation (COURSE openSAP_cs1-tl_EN_10)