You are on page 1of 13

Automate ERP Cloud Security

and Internal Controls

Key Use Cases for Risk Management Cloud


Why use Oracle’s built-in
risk solution?

Finance leaders use Oracle ERP Cloud’s built-in Risk Management


solution to automate many routine, labor-intensive tasks that
support assurance, compliance, security and fraud prevention.
It reduces audit expenses, improves financial controls, and stops
cash leakage. There are many more tasks to automate, including
publishing SOX certifications, preventing duplicate payments,
and approving user access to sensitive data …to name just a few.

Ready to take a closer look?

2 Key Use Cases for Risk Management Cloud


Key use cases

Optimize security design to minimize separation of duties (SOD) risk 1

Automate SOD controls for compliance reporting 2

Digitize user access certification workflows 3

Automate monitoring of user security 4

Automate monitoring of changes to critical configurations 5

Automate monitoring of financial transactions 6

Digitize audit and SOX compliance workflows 7

Digitize risk (ERM) and continuity (BCM) workflows 8

3 Key Use Cases for Risk Management Cloud


Optimize security design
to minimize SOD risk

Accelerate ERP security Design roles without Leverage library of


configuration inherent risks pre-built security rules

Automate analysis of user Utilize visualizations and Use best-practice sensitive


access to identify and simulations to make the best access and SOD rules to
eliminate SOD conflicts. design decisions. Eliminate ensure your roles are
Ensure that roles are poorly designed roles, which complaint prior to go-live.
compliant and audit ready. are the leading cause of audit View SOD results in minutes
Start analyzing security findings after go-live. Building using a pre-built library of
configurations in hours, to job roles without inherent risk 100+ best-practice rules.
avoid last-moment user saves thousands1 in
acceptance testing (UAT) unnecessary remediation.
issues, that will delay your
ERP project.

Source:

1 Typically 3-6 weeks of role remediation by ERP experts at $2,000 per day adding up to $30,000 to $60,000

4 Key Use Cases for Risk Management Cloud


Automate Separation of
Duties (SoD) controls for
compliance reporting

Report SOD results with Visualize SOD analysis in Protect security data from
confidence and ease minutes exposure

Rely on built-in, complete Leverage library of 100+ SOD Eliminate need to export,
analysis of fine grain rules with configurable copy or distribute sensitive
functional access with data reports & dashboards. ERP security data for third-
security context (BU, ledger, Configure or tailor prebuilt party services. Avoid
etc.). Generate compliance- rules with an easy-to-use uncontrolled access and
driven SOD reports with visual workbench. unnecessary exposure of
confidence each quarter. critical & sensitive data.
Reduce audit consulting fees
by over $100,0001 per year.

Source:

1 Audit firms commonly charge ~$50,000 to compile SoD reports, which typically must be done 1 to 4 times per year.

5 Key Use Cases for Risk Management Cloud


Digitize user access
certification workflows

Certify users’ access to Automate routing to Continuously certify new


sensitive functions direct manager users with high-risk access

Scope sensitive roles and Streamline workflow based on Minimize access risk by
ensure all users are manager hierarchy and/or ensuring any new user
authorized and approved. designated process owners. granted sensitive access is
Certify users’ access to Reduce compliance fatigue promptly reviewed and
sensitive data and functions, and save ~2501 hours of certified.
based on pre-determined manual effort with easy-to-
audit scope & schedules. review worksheets.

Source:

1 Compliance process – running reports, building spreadsheets, sending emails & reminders, answering questions and preparing audit
reports – usually takes ~2 minutes per employee per year (x 5,000 employees = 250 hours)

6 Key Use Cases for Risk Management Cloud


Automate monitoring of
user security

Proactively enforce security Modify pre-built rules, or Manage access exceptions


and privacy policies beyond create your own using easy with ease
compliance visual workbench
Monitor exceptions on a
Continuously analyze roles & Leverage pre-built library of dashboard, and resolve issues
user access as business 100+ best-practice security using a simple incident
functions or responsibilities rules, to accelerate workflow. Accelerate
evolve. Quickly identify SOD deployment. Author new resolution of conflicts with the
violations to refine roles and rules quickly, using a robust aid of visualizations and
security configurations, in library of objects and simulations.
response to ever-changing functions.
organizations.

7 Key Use Cases for Risk Management Cloud


Automate monitoring of
changes to critical
configurations

Automate risk-based Leverage library of best- Manage exceptions


analysis of setup and master practice configuration rules with ease
data changes
For example: Get alerts for Ensure all exceptions are
Detect breaches and evaluate frequent changes made to routed to process owners for
risks with automated analysis supplier bank accounts, timely reviews (replacing
of critical configuration payment methods, item emails and spreadsheets).
changes across key processes master, accounting period,
including GL, AP, AR, PPM, and more. Tailor pre-built or
expenses and procurement. author new rules using a
built-in visual workbench.

8 Key Use Cases for Risk Management Cloud


Automate monitoring of
financial transactions

Audit 100% of all payment Stop significant cash loss Eliminate exposure and loss
related transactions of sensitive data
Average loss per case is
Leverage built-in AI to analyze $1,509,0001 Protect your propriety data
all transactions (such as by eliminating the need to
payments, invoices, bulk extract of customer,
purchases from blacklisted Manage exceptions supplier and financial data
vendors, expenses, customer with ease for script-based analysis or
credit transactions, etc). 3rd party tools.
Eliminate error and added Ensure all exceptions are
cost, by replacing hand- routed to process owners for
crafted legacy audit scripts timely reviews (replacing
with a modern workbench for emails and spreadsheets)
authoring rules.

Source:

1 Association of Certified Fraud Examiners, 2020 Global Study on Occupational Fraud and Abuse.

9 Key Use Cases for Risk Management Cloud


Digitize SOX, audit &
certification workflows

Simplify audits & Report and track compliance Build trust and
assessments issues transparency with
embedded dashboards
Certify financial controls (e.g., Identify issues, assign owners
SOX 302 & 404), replacing and manage remediation Leverage rich
manual spreadsheets and plans. Report and track issues documentation,
email activity with a simple as part of an assessment and standardized test plans.,
digital workflow. Streamline certification workflows. etc. for improved
internal audit scoping , Automatically notify issue collaboration and
execution and presentation to owners and approvers. confidence. Share real-
Executives/Board. Engage time dashboards with all
business process owners with stakeholders and offer
streamlined documentation restricted access to
reviews, ad-hoc surveys, self- external auditors.
assessments.

10 Key Use Cases for Risk Management Cloud


Digitize risk (ERM) and
continuity (BCM)
workflows

Prepare for the unexpected Understand your risks Build a risk-intelligent


culture
Ensure business continuity Analyze inherent risk using
with up to date plans, likelihood, impact & analysis Collaborate with business
readiness surveys to identify models. Evaluate risks using owners to quickly
issues and propose context models to determine establish an enterprise-
resolutions.. Assess, update action: accept, monitor or wide risk register. Engage
and certify existing BCM treat. businesses using periodic
plans. surveys, to assess risks.

11 Key Use Cases for Risk Management Cloud



Oracle Risk Management Cloud “… standardizes a lot of my moderate to
lower risk areas so I can be more focused on the higher risk areas… I can
leverage my time and add value to the company rather than just ticking the
box for compliance
If we did not have the product, I’d be on plane 75% of the time. We now get
to spend our time addressing the more meaningful issues.”

Video: Internal Audit in the Age of Digital Transformation: A Look at Skechers

Ashwat Panchal
Vice President of Internal Audit
Sketchers


Going live with Risk Management Cloud has enabled advanced monitoring
of our procure to pay process. This has a direct impact on minimising
payment issues because it automates manual, time consuming audits and
compliance reviews.”
Hamant Bharadia
Assistant Director of Finance
London Borough of Lambeth


We were very impressed with how it [Risk Management Cloud] was able to
quickly identify potential access issues and we were able to look at them and
review them, assess them, and remediate as needed. That was done very
quickly, which saved us a lot of time.”
Stefanie Wong
Assistant Controller
Lending Club

12 Key Use Cases for Risk Management Cloud


Learn more
oracle.com/applications/erp/risk-management-cloud.html

Oracle Corporation
Worldwide Headquarters
500 Oracle Parkway, Redwood Shores, CA 94065, USA

Worldwide Inquiries
Tele + 1.650.506.7000 + 1.800.ORACLE1
Fax + 1.650.506.7200

Oracle.com

Connect with us
Call +1.800.ORACLE1 or visit oracle.com. Outside North America,
find your local office at oracle.com/contact.

facebook.com/oracle youtube.com/oracle linkedin.com/company/oracle twitter.com/oracle

Copyright © 2020, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only, and the contents hereof
are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether
expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically
disclaim any liability with respect to this document, and no contractual obligations are formed either directly or indirectly by this document. This
document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written
permission.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks
or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered
trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group 05.10.19.

You might also like