Saviynt unveils its cutting-edge Intelligence Suite products to revolutionize Identity Security!
Click HERE to see how Saviynt Intelligence is transforming the industry.
Saviynt Copilot Icon

SOD Business Process

Nathan
New Contributor III
New Contributor III

I understand that SOD functions contain a list of entitlements. And a risk is when a person has entitlements from conflicting function.

But what is a business process, and how does it interact with the other components of SOD?

13 REPLIES 13

rushikeshvartak
All-Star
All-Star

A business process refers to a series of structured, interconnected activities or tasks that are carried out within an organization to achieve a specific business objective or outcome. In the context of Segregation of Duties (SOD), business processes typically represent operational workflows that involve multiple roles, responsibilities, and entitlements.

Here’s how the business process interacts with the other components of SOD:

  1. Roles and Responsibilities:

    • Each business process has designated roles that are responsible for different tasks within that process. For example, in an order-to-cash process, you might have roles like Sales Order Entry, Credit Approval, Shipping, and Billing.
    • In an SOD context, these roles need to be carefully defined to ensure that duties are appropriately segregated, and no single person has access to conflicting functions that could lead to fraud or errors.
  2. Entitlements:

    • Entitlements are the access rights granted to roles within the business process. These entitlements could include system access (e.g., ERP systems, financial applications) or the ability to approve or process certain transactions.
    • An SOD analysis will ensure that individuals are not assigned conflicting entitlements within the same business process. For example, someone with access to both create and approve purchase orders would create a conflict, as it could lead to unauthorized transactions.
  3. Conflicting Functions (SOD Risks):

    • A conflict arises when a person has access to roles or entitlements that allow them to complete multiple critical steps within a business process independently. For example, if someone can both create and approve vendor payments, it creates a potential for fraud or error.
    • SOD controls are implemented to prevent these kinds of conflicts, ensuring that individuals cannot perform functions that would allow them to bypass necessary checks and balances.

How Business Processes and SOD Work Together:

  • Segregation of Duties is designed to ensure that within each business process, there is an appropriate distribution of responsibilities. For example, in a Procure-to-Pay process, SOD would enforce that:

    • One person can request purchases (but not approve payments),
    • A different person approves the purchase order,
    • Another person processes the payment.
  • SOD Policies and Controls will be applied to the business process to ensure that employees are only granted access to the roles they need for their work, and conflicts are actively managed. If an employee’s entitlements overlap across conflicting functions in a business process, it may trigger an SOD violation, which would need to be addressed through policy changes, role reassignments, or additional controls (like approval workflows or monitoring).

Example:

In the order-to-cash process:

  • One role might be "Sales Order Entry," responsible for entering orders into the system.
  • A separate role could be "Credit Approval," which ensures that only orders from customers with sufficient credit are processed.
  • Another role might be "Shipping," which manages the delivery of products.
  • "Billing" would handle the invoicing after goods are shipped.

In SOD, the goal is to ensure that no individual can perform conflicting tasks. For example, a person who enters sales orders should not also have the ability to approve credit, as this could lead to fraudulent activity (creating an order and then bypassing credit checks).

In summary, business processes are the organizational workflows that define how tasks are completed to achieve a business outcome, and SOD works within these processes to ensure that roles are appropriately separated and that access rights do not allow a person to circumvent controls or create conflicts of interest.


Regards,
Rushikesh Vartak
If this helped you move forward, click 'Kudos'. If it solved your query, select 'Accept As Solution'.

Im looking more for how to use the business process construct in saviynt. I see it as on object relating to functions and risks, buts its not clear functionally what im supposed to do with it.

https://docs.saviyntcloud.com/bundle/EIC-Admin-v24x/page/Content/Chapter16-Segregation-of-Duties/Cre...


Regards,
Rushikesh Vartak
If this helped you move forward, click 'Kudos'. If it solved your query, select 'Accept As Solution'.

The documentation isn't too helpful in understanding its purpose. Its more of just a manual on filling out forms and submitting.

Can you help me understand the "why" of business processes. I get that functions are a collection of entitlements, and a risk is listing which combinations of functions that a user should not have. 

But i dont understand how business processes play a role in that risk evaluation process.

 

  • Business processes define the steps, tasks, and entitlements that are needed to achieve a business goal.
  • Risk evaluation in identity governance assesses whether users have access to conflicting entitlements (SoD violations) within a business process.
  • By mapping functions to business processes, you can detect where access risks exist and apply controls to prevent unauthorized actions or fraud.

 


Regards,
Rushikesh Vartak
If this helped you move forward, click 'Kudos'. If it solved your query, select 'Accept As Solution'.

When creating a risk, you can select 5 functions, and 1 business process. 

When you do this, how does the risk use the selected business process to calculate risk?

Can you provide an example to illustrate how the feature works?

Example to Illustrate the Feature:

Scenario: Let's assume you are working in an organization that has a Procurement business process, and you are setting up a risk related to Segregation of Duties (SoD) for employees who have access to both Procurement and Finance systems.

  1. Risk Creation:

    • You create a SoD risk that evaluates the conflict between having access to both procurement and finance systems (e.g., a user who can both approve purchases and process invoices, which is a conflict of interest and violates SoD principles).
    • You select 5 functions that are tied to access to Procurement and Finance systems, such as “Procurement Request,” “Procurement Approval,” “Finance Invoice Processing,” “Finance Approval,” and “Vendor Management.”
  2. Business Process Selection:

    • You then select Procurement as the business process for this risk.
  3. Risk Calculation:

    • Saviynt will use the context of the Procurement business process to evaluate the potential risk exposure. Specifically, it will check:
      • Which users or roles have access to Procurement and Finance applications.
      • Whether those users could potentially violate Segregation of Duties by having conflicting roles or excessive access (e.g., a user who can approve procurement orders and also approve finance payments).
    • Saviynt calculates the risk by cross-referencing the access rights and the SoD rules associated with both functions (Procurement and Finance) within the context of the selected Procurement business process.
  4. Outcome:

    • Based on the result, Saviynt flags any users who have conflicting access and calculates the severity of the risk based on how critical the Procurement business process is within your organization (e.g., financial impact, operational disruption).

    If the risk is high, it could trigger a review or remediation step for those users to resolve the SoD violation.


Regards,
Rushikesh Vartak
If this helped you move forward, click 'Kudos'. If it solved your query, select 'Accept As Solution'.

can you relate this scenario to steps you would take in the saviynt EIC application?

Follow saviynt docs link provided previosuly integrate sap based application to get practical use case view in saviynt


Regards,
Rushikesh Vartak
If this helped you move forward, click 'Kudos'. If it solved your query, select 'Accept As Solution'.

A Ruleset is a collection of risks

A risk consists of up to 5 functions and 1 business process.

A function is a collection of entitlements

A business process is a collection of functions and roles

If a user has access from more than one of the functions in a single risk, an SOD violation is detected.

What is the purpose of adding a business process to a risk? Why only 1?

(Please, no responses from ChatGPT)

Business process can be more than 1 - Refer predefined rulesets https://docs.saviyntcloud.com/bundle/AAG-Rulesets/page/Content/Predefined-AAG-Rulesets.htm

rushikeshvartak_0-1730836079941.png

 


Regards,
Rushikesh Vartak
If this helped you move forward, click 'Kudos'. If it solved your query, select 'Accept As Solution'.

I'm trying to understand the relationship between business process and risk, not business process and ruleset.

It makes sense that a ruleset can have an indirect relationship to many business processes, since it can be related to many risks.

Nathan
New Contributor III
New Contributor III

Also, please no AI generated responses 😉