Analyzing Risks When Submitting Access Requests

Use

On the Access Request screen, you can perform risk analyses and impact analyses on the following tab pages:

  • Risk Violations

    If you want to save the results of the analysis, use the analysis function on this tab.

  • User Access

    Simulation allows you to perform the analysis first and then choose whether or not to save the results.

Procedure

This procedure is the same regardless of which tab page you choose to initiate it. The only difference is that the simulation feature allows you to choose whether or not to save the results.

  1. On the Access Request screen, do one of the following:
    • Select the Risk Violations tab.

    • On the User Access tab, choose Simulation.

  2. In the Analysis Type dropdown list, select the relevant analysis type:
    • Use Risk Analysis to determine violations pertaining to the authorizations assigned to the role. An example is when the authorizations result in segregation of duties violations.

    • Use Impact Analysis to determine authorization violations pertaining to other roles. That is, the authorizations for the selected role, in combination with authorizations for another role, results in violations.

  3. Select the System and Rule Set from the respective fields.
  4. In the Result Options area, select the format, type, and additional criteria for the analysis results.
  5. Choose the Run Risk Analysis pushbutton.
  6. In the Result area, choose different ways to view the analysis results.
  7. If you are running a simulation, you can:
    • Choose Cancel if you do not want to save the results of the analysis.

    • Choose Apply if you want to save the results. The information is saved to the Risk Violations tab and you can view it whenever you open the request. The results are also available to the approver of the request.