Explaining SAP Cloud Identity Access Governance

Objective

After completing this lesson, you will be able to understand SAP Cloud Identity Access Governance.

SAP Identity Access Governance

Access and Authorization Risks

Without proper controls, accidental and intentional activities due to excessive access privileges can impact performance and reputation.

Addressing regulatory mandates with manual activities and fragmented processes increases cost and complexity.

Complexity impacts access and authorization management, making it inefficient. Consequently, risks are not identified and managed in time and no proper remediation or mitigation is possible.

With the ongoing digital transformation, many of the traditional business functions shift from on-premise to the cloud. At the end of the day, the SAP customer has to deal with access governance in these hybrid landscapes.

SAP Cloud Identity Access Governance (SAP IAG) and SAP Access Control are solutions in the area of identity and access management (IAM). IAM tools must provide automated and repeatable ways to govern the identity lifecycle from start to finish. Organizations must manage user identities and govern identity and access requests on-premise and in the cloud consistently and compliantly, including the following:

  • User provisioning
  • Self service
  • Workflows and approval workflows
  • Segregation of duties (SoD)
  • Delegated administration
  • Organizational management
  • Role management
  • Privileged user management/firefighter
  • Single sign-on (SSO)
  • Reporting

These capabilities and security controls are leveraged using SAP IAG that (in a best-case scenario) integrates with and covers all types of users and applications (on-premise and in the cloud) for the entire lifecycle – from hire to retire.

Diagram displaying the SAP Identity and Access Management: User Lifecycle

SAP IAG offers a similar capability to the HR Trigger in SAP Access Control that allows you to automatically create access requests based on input from HR. You can integrate the SAP Cloud Identity Access Governance solution with SAP SuccessFactors Employee Central as your HR system. This allows you to capture changes to the employment status in the HR system and to initiate access requests automatically through IAG. The access request service converts the HR triggers to change requests, which are then provisioned to target applications (cloud and on-premise) through predefined business roles.

Diagram providing an overview of the SAP Cloud Identity Access Governance

SAP Cloud Identity Access Governance helps customers to achieve access control and governance through the following key services:

Access Request
The Access Request service provides customers the opportunity to utilize access request for others and self-service access request forms for user and role provisioning into the cloud applications along with the power of workflow driven access provisioning mechanisms along with any other features.
Role Design
Role Design allows users to design access roles with the power of Machine Learning (ML) based algorithms to optimally define and refine the required roles with a bottom up approach.
Access Certification
The Access Certification service in SAP Cloud Identity Access Governance provides the option to certify access spread across multiple cloud solutions by allowing reviewers to regularly audit and certify the roles assigned.
Access Analysis
The Access Analysis service is primarily the application meant for security administrators and compliance teams to analyze access risks across cloud applications and refine or remediate access according to the auditory requirements.
Privileged Access Management
Privilege Access Management (PAM) is another service that is provided in SAP Cloud Identity Access Governance to manage and monitor emergency access.

Note

Currently PAM is only supported for on-premise solutions, such as SAP S/4HANA on-premise. Cloud applications are not supported yet.

Access Analysis Service

SAP Cloud Identity Access Governance, access analysis service is a service that lets you streamline access with real-time visualizations.

Diagram displaying an overview of access analysis.

You use the Access Analysis app to analyze the master list of users with the number of Segregation of Duties (SoD) risks and critical access risks.

The Access Analysis application is the starting point to analyze all of your users' Segregation of Duty (SoD) risks and critical access risks. In addition to the risks, the email and department of the users are listed.

  1. Search for a user whose access analysis you want to analyze.
  2. Review the access risks of the user (SoD risks and critical access risks).
  3. Select the user to drill-down for more information. This leads to the User Access Analysis page with user access analysis results. From this page, you can remediate the risks by refining the access and assigning mitigation controls.
Diagram displaying the access analysis service with a view of the dashboard app.

You use the Dashboard app to view an overview of your access compliance. Drill-down on high-risk individuals from the By Risk Score table.

The Dashboard app provides a snapshot of information critical to your access compliance, such as users with the highest risk scores, business process with the most risk, and so on.

Access Certification Service

SAP Cloud Identity Access Governance is an access certification service that is a cloud solution for the purposes of periodically reviewing and certifying access to business applications in the cloud and on-premise.

This service provides integrated processes for designing and managing certification campaigns. It reduces complexity in processing periodic certifications. It ensures users have optimized access assignments.

Diagram displaying an overview of the access certification.

Access certification is a periodic process in which approvers validate access rights within applications and systems. Such validation ensures that users only have the access needed to perform their job function. Access certification is required for proper compliance and security risk management.

Campaign administrators begin the process by deciding which users, access, and systems they want to review - for example, based on a department. They also decide over what period the access certification campaign will run, for example, the first quarter. In the next steps, the scope of the campaign is selected, meaning the set of users, access, and systems that are to be reviewed, and the workflow template for the review process is chosen. When all review steps defined in the workflow template are finished, users’ access is updated, and the campaign is closed.

Diagram displaying the access certification service with various process steps.

Access certification helps automate compliance and audit requirements. The periodic review process can be carried out for single roles, composite roles, and profiles.