| Case Study: Security Automation 
                 
                  | Challenge: |  | This Global Media and Entertainment Company had a user base 
                    of 27,000 core users. Because of the enterprise’s sheer 
                    size and diversity of its lines of business, the customer 
                    expected an extremely high volume of security transactions 
                    – user to role assignments (new hires, employee moves, 
                    and changes in employee responsibility) and on-going changes 
                    to users’ data-level access as the business’ organizational 
                    structure evolved. The organization required a security model 
                    which would meet these requirements, yet called for minimal 
                    resources to support, ensured accuracy of security transactions 
                    processed, involved the business in approving user governance 
                    requests, and remained tightly controlled adhering to a “least 
                    privilege” design methodology. |   
                  |  |  |  |   
                  | Solution: |  | Roles were designed by Job Function and standardized 
                      across all component systems (i.e., R/3, BW, BCS, CRM, EBP, 
                      SEM-BPS). Similarly, data-level access was standardized 
                      across all component systems to ensure that users would 
                      be limited to the same organizational levels, regardless 
                      of the system they were accessing. Workplace was used to 
                      organize menu paths and serve as the primary user interface 
                      for the various component systems. The HR Organizational 
                      Structure was leveraged to assign roles to users’ 
                      positions; meaning that as an employee changes positions 
                      or is hired into a position, they were automatically assigned 
                      to the roles associated with that position.  Workflow was implemented to allow any user of the system 
                      to submit a security governance request which is routed 
                      to appropriate approvers within the business. The workflow 
                      is designed to prohibit redundant functionality assignments 
                      and warn of Segregation of Duties (SOD) violations. The 
                      request is routed to appropriate business data owners for 
                      approval. Once fully approved, roles are assigned automatically 
                      to the user’s position with no manual intervention 
                      required by security. Similarly, requests for modifying 
                      a role’s data-level access are approved through workflow. 
                      Once the request is routed to and approved by the appropriate 
                      business data owners, a build specification is created which 
                      identifies by component system all of the roles to be modified; 
                      the build specification is reviewed by security for final 
                      approval and then automatically updates the roles within 
                      the appropriate development systems. |   
                  |  |  |  |   
                  | Result: |  | The enterprise was able to minimize resource requirements 
                    for security staff, more accurately process security requests 
                    by removing manual processing, realize ownership of security 
                    by the business, and still retain a highly controlled environment. |   
                  |  |  |  |  |