Professional Documents
Culture Documents
Template SAP Risk Management 3.0 Business BluePrint - 1.0 PDF
Template SAP Risk Management 3.0 Business BluePrint - 1.0 PDF
Marko Hamel
Template_SAPRiskManagement3.0_BusinessBlueprint_1.0.doc – 21.12.2010
PoC SAP BO Risk Management 3.0
Template Business Blueprint
Table of Contents
1 Overview 5
1.1 Project Objectives 5
1.2 Technical Environment 5
1.2.1 System requirements 5
1.2.2 System Landscape 5
2 Use Cases 6
2.1 Use Cases: General 6
2.2 Use Cases: Risk Data Model 6
2.3 Use Cases: Risk Input 7
2.4 Use Cases: Risk Calculation 7
2.5 Use Cases: Risk Reporting 7
3 Processes 8
3.1 Business Processes 8
3.1.1 Process 1 8
3.2 Risk Management Process 8
3.2.1 Risk Planning 8
3.2.2 Risk Identification 9
3.2.3 Risk Analysis 9
3.2.4 Risk Response 9
3.2.5 Risk Monitoring 9
4 Organization Structure 10
4.1 Risk Management Organization 10
4.2 Activity Management 10
5 Risk Data Model 11
5.1 Risk Input Form Mapping 11
5.2 Risk Calculation at <CUSTOMER> 12
6 Risk Management Workflows 14
6.1 Workflows within the <CUSTOMER> Risk Management Process 14
6.1.1 Risk Planning Workflow 14
6.2 Workflows within SAP Risk Management 15
7 Roles and Responsibilities 16
7.1 RM: Risk Operations Manager 16
7.2 AM: Accountable Manager 16
7.3 RE: Risk Expert 16
7.4 AO: Assessment Owner 16
7.5 RV: Risk Validator 17
7.6 RO: Risk Owner 17
7.7 ReO: Response Owner 17
7.8 AA: Auditor and Analyzer 17
7.9 Authorization Matrix 17
8 Authorization Concept 18
8.1 ABAP Standard Roles 18
8.2 SAP NetWeaver Portal Role 19
1 Overview
The current blueprint document helps to streamline and collect the detailed requirements of <CUSTOMER>
including the specification of use cases for SAP BusinessObjects Risk Management. It is essential to gain a
comprehensive understanding of processes, roles and responsibilities, organization structure, risk calculation
model and risk workflows. This information is used as a source to specify and describe the customizing
settings that need to be implemented to achieve the project goals.
<to be defined.>
2 Use Cases
A detailed description of use cases will ensure a user-oriented and measurable implementation of the
requirements regarding a software-based Risk Management solution. For an easier handling the use cases
will be defined using the following categorization:
General GEN
Risk Data Model MDL
Risk Input INP
Risk Calculation CAL
Risk Reporting REP
GEN02 Role Concept All in the risk management process involved persons need to
be authorized following a role based approach.
GEN03 Risk Management Process The risk management process of <CUSTOMER> including
the following steps need to be implemented:
Risk Planning
Risk Identification (incl. Risk Survey)
Risk Analysis
Risk Response
Risk Monitoring
Risk Reporting
MDL03 Risk Categories Usage of the Common Risk ID’s as part of the „Project Risk
Register“ (PRR)
INP01 Risk Forms Simple input of new risks using survey-based offline-forms. The
layout of the Customer Standard should be utilized.
INP02 Online Input After the initial upload of the offline forms all data needs to be
available for online maintenance.
CAL01 Risk Calculation The current excel-based approach acts as the foundation for the
calculation of risks. For more details see Risk Data Model
REP01 PDF Printout-Report The report should show the most important attributes of an risk
like:
Description
Driver
Impact
Probability
Total loss
Expected loss
Risk level
Response details
REP02 Risk Dashboard / Heat Map The risk dashboard presents the most important risks based on a
chosen Org. Unit aggregating the levels below. Furthermore it is
important to show a heat map highlighting the distribution of risks
in reference to probability and impact.
3 Processes
3.1 Business Processes
3.1.1 Process 1
The <CUSTOMER> Risk Management process is based on the internal Risk Management Methodology and
contains the following steps:
1. Risk Planning
2. Risk Identification
3. Risk Analysis
4. Risk Response
5. Risk Monitoring
6. Risk Reporting
1. Risk Planning C R R A
2. Risk Identification C R A I
3. Risk Analysis C R A I
4. Risk Response C C R R A
5. Risk Monitoring R C R R A I
6. Risk Reporting C R R A
During this step the approach how to perform risk management in each business area or project is
determined.
Activities:
Meet with the Risk Experts on a monthly basis
Discuss / Identify risk topics and areas.
Plan and align risk activities and goals for risk assessments
Presentation of updates
Contact business owners.
1
Project Manager or delegate
The uncovering of risks to each business area or project before they turn into problems as well as the
initiation of the Risk Assessment are characteristics of this steps.
Activities:
Organization-/ Project-/ process interviews (risk survey)
Identification of KRI´s (e.g. global, strategic, operational ...)
Identification of relevant / corresponding KPI´s
Meet with business experts
Setup Risk Assessments according established Processes
The main objectives of this phase are the evaluation of risk attributes as well the prioritization of the risks.
Activities:
Perform the Risk Analysis in terms of: Condition, Indicator, Consequences
Probability of Occurrence
Impact in terms of quantity or on a qualitative scale
Timeline and mitigation (response) actions which must be realized to minimize / eliminate the risk
This phase closes the Risk Assessment by making the decision what should be done to mitigate handle the
risks. As a final step the risks are validated by management.
Activities:
Clarify the questions in terms of:
- Do we know enough about the risk?
- Can we live with the risk?
- Is it possible to do something against the risk?
- Are financial and timely efforts adequate in relation to the risk?
- Who is responsible to take the action?
Keeping track of the risks and evaluating the effectiveness of the response actions is the essential task of the
monitoring.
Activities:
Check reporting needs in terms of:
o Are the identified risks still relevant?
o Is the analysis still valid?
o Are there any new risks?
o Are the response strategies actively taken effective?
o Do we have to escalate certain risks?
4 Organization Structure
The chart bellow describes the organization of the <CUSTOMER> unit from a risk management perspective:
<picture>
Since the work of the different UNIT’s inside the <CUSTOMER> unit is very project-driven, the usage of so
called Activities, as specific operations that may lead to actual risks in the different organization units will be
implemented within the PoC environment. As a consequence an Activity Owner (represented by the
Assessment Owner) is able to structure the risks within his unit based on processes, projects, initiatives or
planning objects with the main advantage of having a much better and granular reporting and control
possibility.
The <customer> defines a risk as an uncertain event or condition that, if it occurs, has a negative aspect on
business or project objective. This part of the document describes how risks are collected, calculated and
managed via dedicated responses.
At the moment risks are collected offline using the Project Risk Register Tool (PRR) and Risk Forms (PPT).
In order to use Adobe Interactive Forms in combination with SAP BusinessObjects Risk Management 3.0 the
valid terms need to be mapped to the new terminology internally.
Common Risk ID Key attributes to classify a risk in detail. For more Risk Category
information see Appendix A
Organization Unit Specifies the Organization Unit a risk belongs to. Organization Unit
Condition The condition describes what is actually causing the Risk Description
concern that certain business, financial or strategic
objectives may not be achieved as planned.
Total Loss The magnitude of the actual loss value accrued when Total Loss
a risk event occurs before the response actions are
implemented. It is also called the quantitative financial
impact.
Inside SAP BusinessObjects Risk Management the probability as well as the quantitative/qualitative Impact
mapping will be implemented as described in the table below. The system is able to calculate the Total Loss if
the qualitative Impact Level is available and vice versa.
The RM application will use the provided data to calculate the Risk Level and the Expected Loss.
PRR Term Description Mapping to SAP BO RM 3.0
Expected Loss A measure of the loss associated with a risk, Expected Loss
taking into account the Probability of the risk
and the Total Loss in EUR (P*Total Loss).
The defined Risk Levels rated as High (H), Medium (M) or Low (L) depend on the assessed Probability and
the Impact and will be implemented as highlighted in the Risk-Level-Matrix below.
Qualitative Impact
Probability at
Analysis
1 2 3 4 5
Level 1: 01–19 % L L L L M
Level 2: 20–39 % L L L M M
Level 3: 40–59 % L L M M H
Level 4: 60–79 % L M M H H
Level 5: 80–99 % L M H H H
After the calculation of the risk level a prioritization using the time input (Speed of Onset) needs to
be determined. The risk priority is defined with a numeric value indicating the urgency, where the
lowest number equals the highest priority. The defined risk priorities depend on the assessed
timeframe and the Risk Level during Analysis.
<xxx>
There are two kinds of workflows in Risk Management 3.0: planner-based and event-based workflows.
Planner-based workflows are scheduled and triggered through the Planner, such as “Update Risk” or “Risk
Survey”. They reflect the organizations Risk Management Calendar to perform regular activities like updating
existing risk information or preparing for risk reportings. Event-based-workflows on the other side are
predefined end-to-end processes triggered by end-user action, such as “Propose Risk”.
In Risk Management so called Business Events are use used to map the different workflow tasks to one or
several recipients.
Activity Survey Identify new risks related to an activity by Assessment Owner (AO)
sending out survey questions.
Activity Validation Allows a planner to get sign-off and Risk Validator (RV)
confirmation on the current risk situation for
an activity (process or project).
Opportunity Assessment Supports Risk Managers to get an update for (1) Assessment Owner (AO)
opportunities in their area by sending out a
(2) Risk Expert (RE)
risk assessment work item.
Opportunity Validation Allows a planner to get sign-off and Risk Validator (RV)
confirmation on the current opportunity
(analyses and assigned enhancement plans).
Response Update Helps Risk Managers and Risk Owners to Response Owner (ReO)
keep track on the current state of the risk
responses by sending a work item to the
Response Owner.
Risk Assessment Supports Risk Managers to get an update for (1) Assessment Owner (AO)
risks in their area by sending out a risk
(2) Risk Expert (RE)
assessment work item.
Risk Survey Perform a risk survey in preparation to a (1) Assessment Owner (AO)
planned risk re-assessment through a set of
(2) Risk Expert (RE)
survey questions.
Risk Validation Allows a planner to get sign-off and Risk Validator (RV)
confirmation on the current risk (analyses
and assigned responses).
The Opportunity Assessment, Risk Assessment and Risk Survey will be routed to the Assessment Owner as
a first step. If no Assessment Owner is responsible, because the risk was not assigned to an activity it will be
sent to the Risk Expert.
The following roles are involved in the <CUSTOMER> Risk Management Process:
Risk Operations Manager (RM)
Accountable Manager (AM)
Risk Expert (RE)
Risk Assessment Owner (AO)
Risk Validate (RV)
Risk Owner (RO)
Response Owner (ReO)
Auditor and Analyzer (AA)
The Risk Operations Manager is a senior person responsible for all risk management activities in his
respective unit. He reports to the unit head.
Main Tasks:
Planning, coordination and aggregation of risk management activities inside the unit
Aggregation of reportings
Interface to Corporate Risk Management
Risk Management planning for the unit
Generation of risk reports (content, process compliance) on unit
The Accountable Manager is a manager responsible for an org unit or the delivery of a project.
Every unit has named a Risk Expert, who supports the UnitHead in his responsibility for risk management.
The Risk Expert has deep knowledge about risk management theory and the GRC Methodology.
Main Tasks:
Risk Management planning together with the UNIT Head and others
Schedule and organizing the initial risk assessment
Moderating risk assessments, including recording risk data in risk register (PPT; PRR)
Driving the risk monitoring process
Generating risk reports on UNIT level
Support project leads and others of the UNIT in driving risk management in their area of responsibility
The Assessment Owner defined in the general project data has primary accountability for the project risk
assessment. The Assessment Owner can change all project and risk data, including the creation of new risks.
The Assessment Owner is informed of his/her role via a work item notification once the project is created. For
projects the assessment owner can be the project lead or his/her delegate.
Remark: Inside the unit <XXX> a neutral person, the so called Risk Assessment Moderator, might support the
moderation of a Risk Assessment.
Main Tasks:
Execution of Risk and Change Management Process in the responsible area (Planning, Identification,
Analysis, Response and Monitoring)
Coordination and Participation of Risk Assessment
Ensure aggregation of results as well as risk validation
The Risk Validator is in charge of reviewing and approving the identified risks, the analysis, and the risk
response plans as well as deciding whether the assessment should be approved, rejected, or re-worked. The
Risk Validator should be at least one level higher in the management level than the Assessment Owner.
Responsibility for validation cannot be delegated.
Main Tasks:
Sign-Off and approval of single risks or risk assessment results
Rejection of risks (e.g. demand for better description, quality …)
Determination of confidentiality level for risks
Proposes risks for “area risk reporting” as well as “board risk reporting”
A person identified during a risk assessment or in follow up of a risk assessment. The risk owner can be
different from the project lead that has the original responsibility for all project related risks (applies equally to
other tasks and entities). The role of the risk owner is to analyze risks, to initiate risk response action, and to
follow-up on risk response actions. He should always be able to provide the most up to date status of the risk.
Main Tasks:
Description and analysis of risks
Proposal of response strategies for mitigation
Initiation of response actions
Follow-Up of results
Set or verification of "Risk and Response" status.
A person identified during a risk assessment or in follow up of a risk assessment. The response owner’s
responsibility is to execute planned responses. He/she may report to the risk owner or others in that matter.
Main Tasks:
Execution of defined response measure
Reporting of response
Set of response status
This role will be assigned to Persons needing read-only access to a complete unit. This may be the Unit
Manager (if no data maintenance needed), GIAS or an external auditor.
8 Authorization Concept
The Risk Management application is based on the SAP NetWeaver authorization model and assigns
authorizations to users based on roles. SAP Standard roles (PFCG basic roles) provide the technical
standard authorizations to the ABAP server. Portal roles provide application content, like order and number of
visible work centers, via the SAP NetWeaver Portal. The following table lists the application elements and
responsible roles for authorization:
As an additional aspect the Risk Management web-frontend (NW Portal) is used to assign end-users to
2
business user roles and to entities such as risks, opportunities and organizations based on so called
application roles. These application entities are structured in a hierarchy, providing top-down authorizations.
Roles and entities at a higher entity–level have greater authorizations to perform tasks and greater access to
the application than roles at a lower entity–level. The hierarchy also affects task assignments, work flows, and
business event processing.
Furthermore a usage of the so called Second-Level Authorization allows a restriction of the user selection for
entity-level role assignments. So only those users, who have been assigned the corresponding PFCG role in
their user profile, are available for an assignment. Consequently the Second-Level Authorization provides an
additional level of control. However in the PoC it was decided to de-activate this possibility and rely on the
entity authorization via the web-frontend, only.
SAP_GRC_FN_BASE This is the basis backend role and is required by every user of Risk
Management.
SAP_GRC_FN_ALL This role acts as a Power User role and provides full access to all
entities.
2
Table GRFNENTITY contains all available entities
SAP_GRC_FN_DISPLAY This role provides display access to all entities and can be used for
auditors.
SAP_GRC_FN_BUSINESS_USER This is the standard end-user role. The access to the different entities
is maintained via the web-frontend application.
The GRC Risk Management role provides access to the Navigation Menu for Risk Management in the SAP
NetWeaver Portal as well as the following relevant Work Sets:
My Home
Risk Structure
Risk Assessment
Risk Monitoring
User Access
Please note that the number and visibility of menu entries is derived from the business user role that was
assigned over the frontend.
Application roles (PFCG model roles) grant detailed authorization to the Risk Management application and
refine the standard role authorizations. The following table maps the original SAP Roles to the customer
specific roles in Risk Management.
3
Role in RM Example Role Name Original SAP Role
Users
3
The role name in the web-frontend will be derived from the description of the ABAP role.
The assignment of the responsible persons to the different Org.-Units can be maintained in tab Risk
Management -> Work Set: Risk Structure -> Menu Item: Organizations
9 IMG Settings
9.1 Maintain Entity Role Assignment (IMG: General Settings)
Use this customizing activity to specify which roles are relevant for a particular entity to be used in Risk
Management reporting.
Specify the agent determination rules to identify the right workflow recipient for all business events to be used
in Risk Management.
Business Event: Is the event name for which a recipient role will be assigned.
Maintain activity types for an activity hierarchy in your organization. This enables you to group similar activity
categories under one activity type in the application.
Maintain the impact levels used in risk analysis, as well as the benefit levels to be used in opportunity
analysis.
Configure and maintain risk probability levels for Process Control and Risk Management.
1 Remote
2 Unlikely
3 Likely
4 Highly Likely
5 Near Certainty
The speed of onset refers to the time horizon in which you expect the risk to occur. In this way, you can
specify values for the periods in which action is required to respond to a risk.
Speed of Description
Onset
9.5.4 Maintain Probability Level Matrix (IMG: Risk and Opportunity Analysis)
Configure and maintain risk probability levels for Process Control and Risk Management.
1 1
30 2
50 3
70 4
90 5
9.5.5 Maintain Risk and Opportunity Level Colour (IMG: Risk and Opportunity Analysis)
Maintain risk and opportunity levels, together with the colors for the various risk or opportunity levels. These
are used in the front-end application when working with risk scenarios or carrying out a risk analysis.
9.5.6 Maintain Risk and Opportunity Level Matrix (IMG: Risk and Opportunity Analysis)
A risk level refers to the level of severity for a risk and corresponds to a defined risk level value. The
combination of impact level x probability level should correspond to the defined risk level.
9.5.7 Maintain Risk and Opportunity Priorities (IMG: Risk and Opportunity Analysis)
9.5.8 Maintain Risk and Opportunity Priority Matrix (IMG: Risk and Opportunity Analysis)
Specify the values for the speed of onset, the calculated risk level and the risk priorities.
The "three points" to be defined and then analyzed are the minimum loss, the average loss, and the
maximum loss, which you define in percentage format. Usage: (Minimum + Maximum + 4(Average))/6
The following analysis profile options are available in this Customizing activity:
Impact Reduction: This refers to the reduction in the impact of a risk after risk response. If you do not set the
indicator, the impact reduction section does not appear on the Response tab of the RM UI.
Probability: Quantitative: In this option, the probability appears as in input field on the UI and you can enter
the probability percentage value.
Speed of Onset: Switch on the timeframe as the period of time that is available to decide on the risk
responses.
Impact Value: Mixed: In this option, both qualitative and quantitative options appear on the UI.
The system converts the probability percentage value into a probability level. In addition, the system
calculates the impact level on the basis of minimum, average, and maximum impact amounts, after which the
system calculates the risk level.
9.5.11 Allow free text for Benefit, Impact and Driver Categories (IMG: Risk and Opportunity
Attributes)
After a certain category was activated the field for entering the corresponding text is enabled and you can enter text
describing the object.
Maintain activity types for an activity hierarchy in this organization. This enables you to group similar activity
categories under one activity type in the application.
9.6.1 Maintain Response and Enhancement purpose (Response and Enhancement Plan)
Maintain the specific purposes of responses to risks or enhancement plans for opportunities.
Define levels for the effectiveness of responses to risks, as well as the effectiveness of the enhancement plan
for an opportunity.
0 50 Ineffective
1 75 Partly Effective
2 100 Effective
Configure and maintain specific response types for the risks defined.
Type Description
10 Appendix
10.1 Definitions and Abbreviations
Term Description
10.2 References
<CUSTOMER> Organization Structure
…
11 Risk Categories
Financial Risks
Financial Reporting
Treasury
Currency Financial
Liquidity Financial
Controlling
Budgeting Financial
Operational Risks
Procurement
Infrastructure Operations
Information and IT
… … …
12 Index of Tables
Table 1: Use Cases: General .............................................................................................................................6
Table 2: Use Cases: Risk Data Model ...............................................................................................................6
Table 3: Use Cases: Risk Input ...........................................................................................................................7
Table 4: Use Cases: Risk Calculation .................................................................................................................7
Table 5: Use Cases: Risk Reporting ...................................................................................................................7
Table 6: Risk Management Process RACI ..........................................................................................................8
Table 7: Risk Input Form ...................................................................................................................................11
Table 8: Probability and Impact Level ...............................................................................................................12
Table 9: Risk Calculation Term .........................................................................................................................12
Table 10: Risk Level Matrix ...............................................................................................................................12
Table 11: Risk Priority Matrix.............................................................................................................................13