RSA Archer 6.2 Operational Risk MGT Guide
RSA Archer 6.2 Operational Risk MGT Guide
Contents
3
RSA Archer Operational Risk Management Use Case Guide
4
RSA Archer Operational Risk Management Use Case Guide
Enhancement Description
l Updated the Action Required Risk and Insurance Claim Status DDE in many
of the Loss Event layouts.
Enhancement Description
l Metric Owner
l Metric Tracking
l Risk Manager
Risk Catalog The following applications were added to the Risk Catalog sub-solution:
Sub-solution
l Risk Register
l Risk Hierarchy
Data feeds Two new data feeds were created to support creating metrics from the Metrics
Library to associate to a Business Unit. The new data feeds are:
l Create Metrics from Metric Library for BU, which creates the records
l Clear Metrics Library Linkage from Business Unit, which clears the cross-
reference to the Metrics Library
Enhancement Description
l Risk Catalog
Report The report DFM_Create Metrics For BU From Metric Library was added to the
Business Unit application in order to support the two new data feeds (Create
Metrics From Metric Library For BU and Clear Metric Library Linkage From
Business Unit)
Report iViews Report iViews were added for Risk Catalog and Risk Taxonomy to the
Executive Management and Business Unit Manager dashboards.
Key Features
l Consolidated view into business processes, risks, controls, loss events, key indicators, and
outstanding issues and how they are all related
l Support for first line of defense self-assessments and top down and bottom up risk assessments
l Capture and perform root cause analysis on internal losses and near misses, and relevant external
loss events
l Understand inherent and residual risk and observe changes in calculated residual risk while
rolling up risks by business unit and enterprise risk statement
l Robust key risk and control indicator program management to provide early warning and
remediation
l Consolidated issues management with a clear understanding at all times of the status of all open
remediation plans and exceptions
l Visibility into operational risk via predefined reports, risk dashboards, workflow, and notifications
Key Benefits
Operational Risk Management provides:
l Better understanding of risks throughout the organization
l Improved risk management and risk management culture by engaging the first line of defense
(business users) to take ownership of their risks and controls
l More efficient administration of the operational risk management program, allowing second line
of defense teams to spend more time on analysis and less time on administration and reporting
l Less time required to identify and resolve operational risk related problems
Get started
l Learn more about the use case design
Architecture Diagram
The following diagram shows the relationships between the applications in the Operational Risk
Management use case.
Note:
1. Feeds that create Metrics from a metric library (either the Business Process or Risk Register) do
not also create Risk Register records from the associated Risk Library records.
2. Business Asset Catalog objects and their associated assessments are not automatically scoped
into Risk Project and must each be scoped in manually.
Ap p lic a tio n s
Applications
Application Description
Risk Assessment The Risk Assessment Data application houses the various records relating to
Data the self-assessments that your company can undertake.
Business Processes The Business Processes Assessment Data application houses the self-
Assessment Data assessment data related to business processes.
Control Assessment The Control Assessment Data application houses the self-assessment data
Data related to control procedures.
Applications The Applications application stores all software applications used by the
organization to perform business operations. You can view how an
application is used, the people that use it, and the devices on which the
application is installed. You can also track the business impact, customer
impact, and licensing details, and associate it with other aspects of the
enterprise infrastructure.
Application Description
l Identify gaps associated with uninsured risks and analyzing over and
under insured risks by mapping insurance policies to risk register items.
Ac c e s s r o le s
Access Roles
The use case provides the following access roles.
RM: Admin This role serves as the administrator for the use case. (Risk Manager, Risk
Manager Specialist)
RM: Executives This role provides the appropriate access levels within the use case to the
executives team (CFO, CEO, Controller).
RM: Manager This role provides create, read, and update access to management stakeholders
within the use case.
RM: Owner This role provides create, read, and update access to business process owners
within the use case.
RM: Read Only This role provides read-only access for the use case.
Note: For detailed, page-level access rights, see the Data Dictionary.
For a complete list of application record permission fields, including which user/groups fields
populate the fields and where the fields inherit permissions from, see the Data Dictionary.
Groups
The use case provides the following groups.
Groups Description
Risk Individuals associated to this group are responsible for monitoring the effectiveness
Manager of the risk management process, and implementing necessary changes. They
2nd line of identify, assess, prioritize, and monitor risk trends within the broader business
defense infrastructure. Chief Risk Officers and Risk Managers are persona's that align with
the 2nd line of defense, and are ultimately responsible for the oversight of the 1st
line's risk management.
Enterprise Individuals associated to this Group are responsible for identifying and managing
1st line of risks in processes under their business line. Organizational positions that might be
defense included in the category of the 1st line of defense include the Business Line
Manager and the Business Line Coordinator. The Business Line Managers are
accountable for managing the business line's operational risks, while the Business
Line Coordinators typically contribute efforts toward completing business line self-
assessment activities as defined by the organization's risk self-assessment program.
Compliance Individuals associated to this group are responsible for monitoring the effectiveness
2nd line of of the compliance management process, and implementing necessary changes.
defense
Da s h b o a r d s
Dashboards
The use case provides the following dashboards.
Dashboard Description
Business This persona-based dashboard returns the entire Business Process Hierarchy,
Process including Risks tied directly to any level of the process hierarchy. The report
Hierarchy shows any mitigating Control Procedures for those Risks as well as any Findings
filed against a Control Procedure.
Business Unit This persona-based dashboard is used by Business Unit Managers and Business
Manager Unit Coordinators to create new loss events and to view active assessments,
unapproved loss events, and loss events requiring executive review or sign-off.
Executive This persona-based dashboard is used by Controllers, CFOs, and CEOs to view
Management business unit/company risks, track risk exposure, and review loss events that
require executive sign-off.
Risk Manager This persona-based dashboard is used by Risk Managers and Risk Specialists to
view active assessments, loss events awaiting review, and open risk projects.
Data Quality This persona-based dashboard contains several iViews which report on potential
Administration data quality or integrity issues, such as Business Processes, Risks, or Controls
with multiple owners/managers, Risks not tied to Business Processes, Risks
without mitigating controls, etc.
Self- This persona-based dashboard returns the entire Business Process Hierarchy
Assessment being assessed in a pRCSA. It will also show Risks tied directly to any level of
Data with the process hierarchy that are included in the assessment. Finally, the report will
Business show any mitigating Control Procedures for those Risks.
Process
Hierarchy
Da ta fe e d s
Data Feeds
The use case provides the following Business Unit data feeds.
Create Risks and Targets the Risk Register and allows users to create unique copies
Associated Metrics from of Risk Register and Metrics records from specific selections of the
Library Individual (BU) Risk Library, and associates them back to the Business Unit.
Clear Metric Risk Library Targets the Business Unit application, and clears Risk Library
Individual Settings From selections from the Business Unit application.
Business Process
Create Risks and Targets the Risk Register and allows users to create unique copies
Associated Metrics From of Risk Register and Metrics records by matching the selected
Library Grouping (BU) Business Theme and/or Risk Event Category in the Risk library,
and associating them back to the Business Process.
Clear Metric Risk Library This data feed targets the Business Unit application and is intended
Grouping Settings From to clear the Risk Library matching selections from the Business
Business Unit (BU) Unit.
Create Metrics From Metric This feed is intended to copy metric records from the Metric
Library For BU Library and associates them to the Business Unit application.
Clear Metric Library This data feed is intended to clear Metrics Library selections that
Linkage From Business Unit link to the Business Unit application.
This use case provides the following Business Process data feeds.
Create Risks and Targets the Risk Register and allows users to create unique copies
Associated Metrics from of Risk Register and Metrics records from specific selections of the
Library Individual (BP) Risk Library, and associates them back to the Business Process.
Clear Metric Risk Library Targets the Business Unit application, and clears Risk Library
Individual Settings From selections from the Business Process application.
Business Process
Create Risks and Targets Risk Register and allows users to create unique copies of
Associated Metrics From Risk Register and Metrics records by matching the selected
Library Grouping (BP) Business Theme and/or Risk Event Category in the Risk library,
and associating them them back to the Business Process.
Clear Metric Risk Library This data feed targets the Business Process application and is
Grouping Settings From intended to clear the Risk Library matching selections from the
Business Unit (BP) Business Unit.
Ad v a n c e d Wo r k flo w
Advanced Workflow
The following workflow is applied to all self-assessments in the Self-Assessments application.
The Risk Manager begins the workflow process by evaluating what entities he wants assessed:
Business Units, Business Processes, and Products and Services. The Risk Manager creates a
campaign to scope the desired entities. He can create a pRCSA, RCSA, or CSA self-assessment.
Next, the Risk Manager auto-generates the self-assessments from the campaign. Once the Risk
Manager has chosen the Business Unit, Business Process, or Products and Services to assess, the
Assessment Campaign application generates self-assessments, places them into the Self-
Assessments application, and the Assess Stage begins.
Immediately before the Assess Stage, notifications are sent to the Business Unit Manager and the
Business Unit Coordinator in charge of the self-assessment. The self-assessment is immediately
assigned to the Business Unit Manager. The reassign path is available if the self-assessment needs
to be assigned to another Business Unit Manager.
The Business Unit Manager or Business Unit Coordinator then evaluates the risks. They can choose
to override the previous Inherent and Residual ratings for individual risk or they can simply mark the
risk as evaluated to keep the previous ratings. They can also rate the controls associated to each risk
and/or add new Findings to risks or controls. Once all of the risks are marked as Evaluated, the
Business Risk Manager submits the self-assessment to the Risk Manager, who receives a
notification, and the Review Stage begins.
The Risk Manager then reviews the risk records to see if he agrees with the assessments made by
the Business Unit Manager or Business Unit Coordinator. If the Risk Manager agrees with all of the
assessments made by the Business Unit Manager or Business Unit Coordinator, the Risk Manger
can approve the entire assessment. If the Risk Manager disagrees with any of the assessments made
by the Business Unit Manager or Business Unit Coordinator, he can mark each risk he disagrees
with individually and add comments to the risk to clarify his reasoning. He then rejects the entire
assessment and it is sent back to the Business Unit Manager and/or the Business Unit Coordinator.
The Business Unit Manager or Business Unit Coordinator then reviews the records that the Risk
Manager rejected. Once the changes are made, the Business Unit Manager or Business Unit
Coordinator re-submits the assessment to the Risk Manager. The Risk Manager can then re-review
the assessment, and either accept the evaluation, or reject it again. If the Risk Manager accepts the
updates, the changes and ratings made during the assessment are published to the Risk Register and
Control Procedures evaluated during the assessment. If the Risk Manager rejects the updates, step 3:
Step 4: Publish
In the Evaluate Stage, RSA Archer goes through the accepted assessment and attempts to publish
the Business Processes, Risk Register, and Control Procedures records with the assessment data. If
the publish is successful, the changes are made, and the assessment is complete and is marked as
Validated. If the publish was unsuccessful, the Risk Manager can attempt to fix whatever issue
prevented the publish from successfully occurring. Once the fixes are made, the Risk Manager can
then attempt to re-publish the records.
Note: If any of the assessment content fails to publish, the entire assessment is marked as Failed.
Publish nodes do not revert all of the data that was successfully pushed to the registers. The Failed
status means that not all of the self-assessment was published to the registers. Once the self-
assessment is marked as Validated, all updates have been successfully posted to the register.
l You have already installed the following use case(s): Issues Management, Risk Catalog,
Bottom-Up Risk Assessment, Key Risk Indicator, Loss Event Management, Risk Inventory
and Top-Down Risk Assessment.
l A user account on the Platform with access rights to the Data Feed Manager.
2. Download the use case file(s) from the Archer Customer/Partner Community on RSA Link on
the RSA Archer Solutions and Use Cases page
(https://community.rsa.com/community/products/archer-grc/archer-customer-partner-
community/solutions).
The following files are included in the RSA_Archer_Operational_Risk_Management_6.2.zip
file:
l Use case install package
3. Obtain the Data Dictionary for the use case by contacting your RSA Archer Account
Representative or calling 1-888-539-EGRC. The Data Dictionary contains the configuration
information for the use case.
4. Read and understand the "Packaging Data" section of the RSA Archer Online Documentation.
5. Review the Release Notes to understand any known issues before installing and configuring the
use case.
Ste p 2 :Up d a te th e lic e n s e k e y
Note: All customers who are upgrading from version 6.0 or earlier are required to get a new license
key for 6.1 or later. Ensure that you are using a valid 6.1 or later license key prior to installing
packages.
The administrator (a web or database administrator) on the server on which the Archer Control
Panel resides must update the license key in the Archer Control Panel before the application
package is imported in order for the new items to be available for use.
1. Open the RSA Archer Control Panel.
2. From the Instance Management list, click to expand the Instances list.
3. Right-click the instance that you want to update, and click Update License Key.
4. Update the applicable information: Serial Number, Contact Info, and Activation Method.
5. Click Activate.
Important: If you do not update your license key to 6.1 or later prior to installing the package, you
will not be able to access workspaces, dashboards and applications.
2. Install the Top-Down Risk Assessment package file. See the RSA Archer Top-Down Risk
Assessment Use Case Guide.
3. Install the Loss Event Management package file. See the RSA Archer Loss Event Management
Use Case Guide.
4. Install the Key Indicator Management package file. See the RSA Archer Key Indicator
Management Use Case Guide.
5. Install the Bottom-Up Risk Assessment package file. See the RSA Archer Bottom-Up
Risk Assessment Use Case Guide.
6. Install the Issues Management package file. See the RSA Archer Issues Management Use Case
Guide.
Ste p 2 :Imp o r th e p a c k a g e
3. Click Add New, then locate and select the package file that you want to import.
4. Click OK.
The package file is displayed in the Available Packages section and is ready for installation.
Ste p 3 :Ma p o b je c ts in th e p a c k a g e
1. In the Available Packages section, select the package you want to map.
Note: This process can take several minutes or more, especially if the package is large, and may
time out after 60 minutes. This time-out setting temporarily overrides any IIS time-out settings
set to less than 60 minutes.
When the analyzer is complete, the Advanced Package Mapping page lists the objects in the
package file and corresponding objects in the target instance. The objects are divided into tabs,
depending on whether they are found within Applications, Solutions, Access Roles, Groups, Sub-
forms, or Questionnaires.
3. On each tab of the Advanced Mapping Page, review the icons that are displayed next to each
object name to determine which objects require you to map them manually.
Awaiting Indicates that the system could not automatically match the object or
Mapping children of the object to a corresponding object in the target instance.
Review Objects marked with this symbol must be mapped manually through the
mapping process.
Important: New objects should not be mapped. This icon should remain
visible. The mapping process can proceed without mapping all the objects.
Note: You can execute the mapping process without mapping all the
Mapping Indicates that the object and all child objects are mapped to an object in
Completed the target instance. Nothing more needs to be done with these objects in
Advanced Package Mapping.
Do Not Indicates that the object does not exist in the target instance or the object
Map was not mapped through the Do Not Map option. These objects will not be
mapped through Advanced Package Mapping, and must be remedied
manually.
Undo Indicates that a mapped object can be unmapped. This icon is displayed in
the Actions column of a mapped object or object flagged as Do Not Map.
l To map each item individually, on the Target column, select the object in the target instance
to which you want to map the source object. If an object is new or if you do not want to map
an object, select Do Not Map from the drop-down list.
Important: Ensure that you map all objects to their lowest level. When objects have child or
related objects, a drill-down link is provided on the parent object. Child objects must be
mapped before parent objects are mapped. For more details, see "Mapping Parent/Child
Objects" in the RSA Archer Online Documentation.
l To map all objects in a tab automatically that have different system IDs but the same object
name as an object in the target instance, do the following:
Option Description
Ignore Select this option to match objects with similar names regardless of the case
case of the characters in the object names.
Ignore Select this option to match objects with similar names regardless of whether
spaces spaces exist in the object names.
c. Click OK.
The Confirmation dialog box opens with the total number of mappings performed. These
mappings have not been committed to the database yet and can be modified in the
Advanced Package Mapping page.
d. Click OK.
l To set all objects in the tab to Do Not Map, in the toolbar, click Do Not Map.
Note: To undo the mapping settings for any individual object, click in the Actions column.
When all objects are mapped, the icon is displayed in the tab title. The icon is displayed
next to the object to indicate that the object will not be mapped.
6. (Optional) To save your mapping settings so that you can resume working later, see "Exporting
and Importing Mapping Settings" in the RSA Archer Online Documentation.
8. Select I understand the implications of performing this operation, and then click OK.
The Advanced Package Mapping process updates the system IDs of the objects in the target
instance as defined on the Advanced Package Mapping page. When the mapping is complete, the
Import and Install Packages page is displayed.
Important: Advanced Package Mapping modifies the system IDs in the target instance. Any
Data Feeds and Web Service APIs that use these objects will need to be updated with the new
system IDs.
2. In the Available Packages section, locate the package file that you want to install, and click
Install.
3. In the Configuration section, select the components of the package that you want to install.
l To install only specific global reports in an already installed application, select the checkbox
associated with each report that you want to install.
Note: Items in the package that do not match an existing item in the target instance are selected
by default.
4. In the Configuration section, under Install Method, select an option for each selected component.
To use the same Install Method for all selected components, select a method from the top-level
drop-down list.
Note: If you have any existing components that you do not want to modify, select Create New
Only. You may have to modify those components after installing the package to use the changes
made by the package.
5. In the Configuration section, under Install Option, select an option for each selected component.
To use the same Install Option for all selected components, select an option from the top-level
drop-down list.
Note: If you have any custom fields or formatting in a component that you do not want to lose,
select Do not Override Layout. You may have to modify the layout after installing the package to
use the changes made by the package.
6. To deactivate target fields and data-driven events that are not in the package, in the Post-
Install Actions section, select the Deactivate target fields and data-driven events that are not in
the package checkbox. To rename the deactivated target fields and data-driven events with a
user-defined prefix, select the Apply a prefix to all deactivated objects checkbox, and enter a
prefix. This can help you identify any fields or data-driven events that you may want to review
for cleanup post-install.
7. Click Install.
8. Click OK.
Ste p 5 :Re v ie wth e p a c k a g e in s ta la tio n lo g
3. In the Package Installation Log page, in the Object Details section, click View All Warnings.
For a list of packaging installation log messages and remediation information for common
messages, see Package Installation Log Messages.
dependencies apply to your installation and you may want to resolve them.
Note: Resolving these dependencies is not required. You may opt to skip this step, but leaving these
fields as they are may cause confusion or generate calculation errors.
Review the following sections and resolve any dependencies that apply to your installation. You only
need to resolve any dependencies that apply to use cases you have not licensed.
Note: In the calculation dependency scenarios, some of the formulas do not validate because of
unlicensed fields. Some validate, but not function because they are dependent on other fields that are
not valid.
Risk Register
Security Incident Management The following reference fields are not No action
available: needed.
l Incident Investigations
l Security Incident
Audit Engagements and The following reference fields are not No action
Workpapers available: needed.
l Audit Engagements
l Audit Entity
Control Assurance Program The following calculations do not validate: Drag off layout or
Management delete.
l Count of Non-Compliant Controls
l Warning Indicator
Control Assurance Program The following calculations do not Drag off layout or
Management validate: delete.
l Calculated Risk Value
l Risk Scorecard
l Warning Indicator
Control Assurance Program The following calculations do not validate: Drag off layout or
Management delete.
l Calculated Risk Value
Third Party Management The Averaged % of Failed KRIs calculation Drag off layout or
does not validate. delete.
Business Processes
Business Impact Analysis The Business Impact Analysis reference field is No action
not available. needed.
Third Party Catalog The Engagements reference field is not available. No action
needed.
Any use case that contains the The Information Assets reference field is not No action
Information Assets available. needed.
application.
Any use case that contains the The Storage Devices reference field is not No action
Devices application. available. needed.
Controls Monitoring Program The G/L Accounts reference field is not available. No action
Management needed.
Audit Engagements and The following reference fields are not available: No action
Workpapers needed.
l Audit Engagements
l Audit Entity
Business Impact Analysis The following fields calculations do not validate: Drag off
layout or
l Criticality Rating
delete.
l Financially Significant
l Compliance Rating
l Risk Rating
l % of Non-Compliant Controls
l Compliance Rating
Business Unit
Security Operations & Breach The Data Breach reference field is not No action
Management available. needed.
Any use case that contains the The Information Assets reference field is not No action
Information Assets application. available. needed.
Any use case that contains the The Storage Devices reference field is not No action
Devices application. available. needed.
Audit Engagements and The following reference fields are not No action
Workpapers available: needed.
l Audit Engagements
l Audit Entity
Loss Event Management The Loss Events reference field is not No action
available. needed.
Controls Monitoring Program The following reference fields are not No action
Management available: needed.
l Quarterly Financial Certifications - BU
Not all Enterprise Apps Licensed The following calculations do not validate: Drag off
layout or
l Total Devices
delete.
l Total Information Assets
Controls Assurance Program The following calculations do not validate: Drag off
Management layout or
l Operational Risk Value
delete.
l Calculated Risk
l Risk Scorecard
l Warning Indicator
Division
Controls Monitoring The following calculations do not validate: Drag off layout
Program Management or delete.
l Last Quarterly Certification Date
Not all Enterprise Apps The following calculations do not validate: Drag off layout
Licensed or delete.
l Dependent on Total Devices from Business
Unit
Controls Assurance The following calculations do not validate: Drag off layout
Program Management or delete.
l Count of Non-Compliant Controls
l % of Non-Compliant Controls
l Compliance Rating
l Calculated Risk
Company
Controls Monitoring The following calculations do not validate: Drag off layout
Program Management or delete.
l Last Quarterly Certification Date
l % of Certified Divisions
Not all Enterprise Apps The following calculations do not validate: Drag off layout
Licensed or delete.
l Total Devices
Controls Assurance The following calculations do not validate: Drag off layout
Program Management or delete.
l Count of Non-Compliant Controls
l % of Non-Compliant Controls
l Compliance Rating
Control Procedures
Audit Engagements and The following reference fields are not No action needed.
Workpapers available:
l Audit Engagements (Control
Procedures)
l Audi Entity
Audit Engagements and The following calculations do not validate: Drag off layout or
Workpapers delete.
l Audit Design Effectiveness Rating
Any use case that contains the The Storage Devices reference field is not No action needed.
Storage Devices application. available.
Policy Program Management The following reference fields are not No action needed.
available:
l Control Standards
l Authoritative Sources
IT Controls Assurance The following reference fields are not No action needed.
available:
l Control Self Assessments
l Configuration Checks
Control Monitoring Program The following reference fields are not No action needed.
Management available:
l Control Standards
l Authoritative Source
Controls Assurance Program The Historical Compliance Data reference No action needed.
Management field is not available.
Controls Assurance Program The following calculations do not validate: Drag off layout or
Management delete.
l Total Sample Tested
l Total Exceptions
l Tested %
l Sample Progress
l Exception %
l Sox Scoping
l Compliance
l ELC Reliance
l SOX Compliance
Business Impact Analysis The following calculations do not validate: Drag off layout or
delete.
l Material Business Process
Not all Enterprise Apps The following calculations do not validate: Not all Enterprise
Licensed Apps Licensed.
l Device Risk Value
l ITGC Evaluation
l Sox Evaluation
Applications
Any use case that contains the The Storage Devices reference field is not No action
Storage Devices application. available. needed.
Any use case that contains the The Information Assets reference field is No action
Information Assets application not available. needed.
l Requirements (Applications)
Controls Monitoring Program The following calculations do not validate: Drag off
Management layout or
l Criticality Rating
delete.
l Recovery Time Objective (RTO)
Business Impact Analysis The following calculations do not validate: Drag off
layout or
l Next Assessment Date
delete.
l Average Inherent Risk Score
l Number of Assessments
Not all Enterprise Apps Licensed The following calculations do not validate: Drag off
layout or
l High Risk Vulnerabilities
delete.
l High Risk Vulnerabilities
l Avg % of Non-Compliance
l Compliance Rating
Contacts
Third Party Catalog The Third Party Profile reference field is not No action
available. needed.
Any use case that contains the The Devices (Alternate Administrator) No action
Devices application reference field is not available. needed.
Any use case that contains the The Storage Devices reference field is not No action
Storage Devices application. available. needed.
Security Operations & Breach The following reference fields are not No action
Management available: needed.
l Emergency Notifications (Call Initiator)
l Training Courses.
Business Impact Analysis The following reference fields are not No action
available: needed.
l BIA (Audit Participant)
Audit Engagements & Workpapers The following reference fields are not No action
available: needed.
l Expense Reports
l Base Availability
Security Operations & Breach The Degrees and Certifications reference No action
Management field is not available. needed.
Corporate Objectives
Audit Engagements and Workpapers The following reference fields are No action
not available: needed.
l Audit Engagements (Corporate
Objectives)
l Audit Entity
Security Operations & Breach Management The Related Policies reference No action
and Policy Program Management field is not available. needed.
Facilities
Audit Engagements and The following reference fields are not No action
Workpapers available: needed.
l Audit Engagements
l Audit Entity
Any use case that contains the The Devices reference field is not No action
Devices application available. needed.
l Requirements (Facility)
Third Party Catalog The Vendor Related Helper calculation Drag off
does not validate. layout or
delete.
Security Operations & Breach The Security Controls (Affected Facility) No action
Management reference field is not available. needed.
Not all Enterprise Apps Licensed The following calculations do not validate: Drag off
layout or
l Criticality Rating
delete.
l Next Assessment Date
Any use case that contains the The Information Assets reference field is No action
Information Assets application not available. needed.
Loss Events
Policy Program The Violated Policies reference field is not available. No action
Management needed.
Third Party Catalog The Associated Engagements reference fields are not No action
available. needed.
Crisis Management The Related Crisis Events reference field is not No action
available. needed.
Audit Engagements and The following reference fields are not available: No action
Workpapers needed.
l Audit Engagements
l Audit Entity
BC/DR Planning The BCM Risk Register (Products and Services) No action
reference field is not available. needed.
Control Assurance The following calculations do not validate: Drag off layout
Program Management or delete.
l Compliance Rating
l Risk Rating
Risk Project
Any use case that contains the Information The Information Assets reference No action
Assets application. field is not available. needed.
Any use case that contains the Devices The Devices reference field is not No action
application available. needed.
l Device Assessments
Ste p 2 :De le te o b s o le te o b je c ts
l If you select Override Layout when you install the package, the package installation process
removes old fields from the layout, if those fields do not also exist on the Source Package layout.
All fields removed from the layout are in the Available Fields list.
l Evaluate your need for certain data driven events (DDE), pre-existing rules, and actions that were
not updated through Packaging. Delete any obsolete rules and actions.
l Evaluate pre-existing notifications and reports that Packaging did not update. Delete obsolete
notifications and reports.
To ensure that all obsolete objects are deleted, compare the Data Dictionary to your environment.
For more information about objects, see "Packaging" in the RSA Archer Online Documentation.
Ste p 3 :V a lid a te fo r mu la s a n d c a lc u la tio n o r d e r s
l Verify the order of calculations for each application and sub-form in the use case. See the Data
Dictionary for calculation orders for each individual application or sub-form.
l Update the order of calculations as needed for each application and subform in the use case.
For more information about deleting objects, see "Deleting Fields" in the RSA Archer Online
Documentation.
4. Clear Metric Risk Library Grouping Settings From Business Unit (BU)
3. Locate and select the .dfx5 file for the data feed.
4. From the General tab in the General Information section, in the Status field, select Active.
5. Click the Transport tab. Complete the fields in the Transport Configuration section as follows:
b. In the User Name and Password fields, type the username and password of a Platform user
that has API access and access to all of the records on the Platform instance (from which the
data feed is coming).
c. In the Instance field, type the name of the Platform instance from which the data feed is
coming (this is the instance name as you enter it on the Login window).
6. Verify that key field values are not missing from the data feed setup window.
7. Click Save.
Ste p 2 :S c h e d u le a d a ta fe e d
As you schedule your data feed, the Data Feed Manager validates the information. If any
information is invalid, an error message is displayed. You can save the data feed and correct the
errors later; but the data feed does not process until you make corrections.
1. Go to the Schedule tab of the data feed that you want to modify.
2. Go to the Recurrences section and complete frequency, start and stop times, and time zone.
Field Description
Frequency Specifies the interval in which the data feed runs, for example, Minutely, Hourly,
Daily, Weekly, Monthly, or Reference.
Hourly Runs the data feed by the interval set, for example, every hour (1),
every other hour (2) and so forth.
Daily Runs the data feed by the interval set, for example, every day (1),
every other day (2) and, so forth.
Weekly Runs the data feed based on a specified day of the week, for
example, every Monday of the first week (1), every other Monday
(2), and so forth.
Monthly Runs the data feed based on a specified week of the month, for
example, 1st, 2nd, 3rd, 4th, or Last.
Reference Runs a specified data feed as runs before the current one. This
option indicates to the Data Feed Service that this data feed starts
as soon as the referenced data feed completes successfully.
For example, you can select to have a Threats data feed run
immediately after your Assets data feed finishes. From the
Reference Feed list, select after which existing data feed the
current data feed starts.
A reference data feed will not run when immediately running a data
feed. The Run Data Feed Now option only runs the current data
feed.
Every Specifies the interval of the frequency in which the data feed runs.
Start Date Specifies the date on which the data feed schedule begins.
Time Specifies the time zone in of the server that runs the data feed.
Zone
3. (Optional) To override the data feed schedule and immediately run your data feed, in the Run
Data Feed Now section, click Start.
4. Click Save.
Create a pRCSA
User: Risk Manager
The pRCSA originates in the Assessment Campaign application. A Risk Manager can create a new
Campaign that, in turn, creates self-assessments to be filled.
1. From the Assessment Campaign Record Browser, click New Record.
3. In the Scoping Self-Assessment section, for the Assessment Type field, select pRCSA.
4. In the Scoping Method field, select a scoping method for the assessment:
l By Business Unit. RSA Archer creates a self-assessment for each selected Business Unit,
with all the risks, controls, and Business Processes tied to it.
l By Business Processes. RSA Archer creates a self-assessment for each Business Unit tied to
a selected Business Process, with all of the risks and controls tied to it.
l By Products and Services. RSA Archer creates a self-assessment for each Business Unit tied
to a selected Business Process, with all of the risks and controls tied to it.
5. In the Business Unit, Business Process, or Products & Service field, select the Business Units,
Business Processes, or Products & Services that you want to the scope of the campaign to
include.
Note: Based on the selected scope and scoping method, RSA Archer creates the corresponding
self-assessments for all Business Processes, Risks, and Controls in the Process.
Create an RCSA
User: Risk Manager
The RCSA originates in the Assessment Campaign application. A Risk Manager can create a new
Campaign that creates self-assessments to be filled.
3. In the Scoping Self-Assessment section, for the Assessment Type field, select RCSA.
4. In the Scoping Method field, select a scoping method for the assessment:
l By Business Unit. RSA Archer creates a self-assessment for each selected Business Unit,
with all the risks, controls, and Business Processes tied to it.
l By Business Processes. If the Business Processes scoping method is selected, RSA Archer
creates a self-assessment for each Business Unit tied to a selected Business Process, with all
of the risks and controls tied to it.
l By Products and Services. RSA Archer creates a self-assessment for each Business Unit tied
to a selected Business Process, with all of the risks and controls tied to it.
5. In the Business Unit, Business Process, or Products & Service field, select the Business Units,
Business Processes, or Products & Services that you want to the scope of the campaign to
include.
Based on the selected scope and scoping method, RSA Archer creates the corresponding self-
assessments for all Risks and Controls in the Process.
Create a CSA
User: Risk Manager
The CSA originates in the Assessment Campaign application. A Risk Manager can create a new
Campaign that will, in turn, create self-assessments to be filled.
1. From the Assessment Campaign Record Browser, click New Record.
3. In the Scoping Self-Assessment section, for the Assessment Type field, select CSA.
4. In the Scoping Method field, select a scoping method for the assessment:
l By Business Unit. RSA Archer creates a self-assessment for each selected Business Unit,
with all the risks, controls, and Business Processes tied to it.
l By Business Processes. RSA Archer creates a self-assessment for each Business Unit tied to
a selected Business Process, with all of the risks and controls tied to it.
l By Products and Services. RSA Archer creates a self-assessment for each Business Unit tied
to a selected Business Process, with all of the risks and controls tied to it.
5. In the Business Unit, Business Process, or Products & Service field, select the Business Units,
Business Processes, or Products & Services that you want to the scope of the campaign to
include.
Based on the selected scope and scoping method, RSA Archer creates the corresponding self-
assessments for all Controls in the Process.
Note: Once you install the Operational Risk Management license key, you still need to apply the
Monte Carlo package. The Monte Carlo package provides the extra fields and reports needed to
execute the following steps for either Expert Elicitation or Historical Loss methods.
1. In RSA Archer GRC, in the Risk Register application, create a new record for each risk you
want to run with Monte Carlo simulation.
3. In the Monte Carlo Simulation section, in the Select calculation method for the Residual Risk
reporting field, select Expert Elicitation.
4. In the Monte Carlo Simulation section, in the Monte Carlo: Expert Elicitation Inputs fields, do
the following:
l Log Normal
l Normal
l Uniform
c. Based on the values you selected for the distribution and occurrence, enter data for the other
required fields.
5. After filling out the records, in the Is this record ready for simulation? field, select Yes.
6. From the Risk Register application navigation menu, open the Expert Elicitation report.
Note: Only records with the Status field set to Active are included in the report.
9. When the export is complete, access the file and save it as expert_elicitation.csv.
5. When prompted to save @Risk Simulation Results and Graphs, click No.
1. Open the provided import template file, expert_elicitation_import_template.csv, and paste in the
contents of expert_elicitation_output.csv.
2. Ensure that the values in the Date of Last Execution column are in a Date format.
a. In RSA Archer GRC, click Administration > Integration > Manage Data Imports.
d. Click Add New, select your .csv file, click Open, and then click OK.
e. Click Next.
h. In the Import Field Mapping section, ensure that all the values in the Application Fields row
match the column headers.
i. Click Next.
j. Ensure that the summary information from the Data Import Wizard is correct. Click Import.
l The Monte Carlo Risk Scores Normalization section displays an overall risk rating for inherent
and residual risk, based on the Palisade @Risk results. For Expert Elicitation, the Inherent Risk
score is based on the Inherent VaR (95%) value and the Residual Risk score is based on the
Residual VaR (95%) value.
Note: The Data Used for Last Execution section displays the data that the simulation results are
based on, in the case that the input values have been changed
The Monte Carlo risk scores also factor into the following risk ratings:
l The Calculated Risk tab displays an Adjusted Monte Carlo Residual Risk rating, which estimates
the overall risk to the organization using the Residual Risk - Monte Carlo value.
l In the Overall Risk section, the Inherent Risk and Residual Risk ratings are based on the Inherent
Risk - Monte Carlo value and the Calculated Residual Risk rating is based on the Adjusted
Monte-Carlo Residual Risk value.
1. For each record in the Risk Register application you want to run with Historical Loss simulation,
in the Monte Carlo Simulation section, select Historical Loss as the calculation method for the
Residual Risk reporting field.
2. After filling out the record, in the Is this record ready for simulation? field, select Yes.
3. From the Risk Register application navigation menu, open the Frequency of Loss Events Per
Month report.
6. When the export is complete, access and save the file as Frequency per Month by Risk.csv.
7. Repeat steps 5 to 8 for the Loss Events for Last 3 Years report, and save the file as Loss Events
by Risk.csv.
8. Combine the two .csv files into a single workbook, with Frequency per Month by Risk as the first
worksheet and Loss Events by Risk as the second worksheet. Save the workbook as Historical
Loss.xlsx.
1. In Excel, in your Historical Loss workbook, from the Frequency per Month by Risk data, create
a new Frequency worksheet:
b. Click Insert > PivotTable, ensure that the selected Table/Range values are the entire table
and that New Worksheet is selected, and click OK.
c. In the PivotTable Field List section, drag the fields to the following areas:
d. Paste the pivot table data into a new worksheet in your Historical Loss workbook, and name
the worksheet Frequency.
Note: Ensure that you have three worksheets in your workbook: Frequency by Month per
Risk, Loss Events per Risk, and Frequency.
2. From the Loss Events by Risk data, create a new Loss worksheet:
a. Insert a new column A, titled Row ID, and copy the following formula to each row.
=IF(B2=B1, A1 + 1,1)
The Row ID value should increment by one for each Risk ID and should reset when the Risk
ID changes.
c. Click Insert > PivotTable, ensure that the selected Table/Range values are the entire table
and that New Worksheet is selected, and click OK.
d. In the PivotTable Field List section, drag the fields to the following areas:
e. Paste the pivot table data into a new worksheet in your Historical Loss workbook, and name
the worksheet Loss.
Note: Ensure that you have four worksheets in your workbook: Frequency by Month per
Risk, Loss Events per Risk, Frequency, and Loss.
3. Run Batch Fit on the Frequency worksheet data to create a Frequency Fit Results worksheet:
d. In the Range field, ensure that the range covers just the table data, not the header row or first
column.
f. Click the Report tab, and in the Options section, deselect Include Detailed Report Worksheet
for Each Fit and Include Correlations.
g. Click Fit.
h. Copy the results into a new Frequency Fit Results worksheet in your workbook.
Note: Ensure that you have five worksheets in your workbook: Frequency by Month per Risk,
Loss Events per Risk, Frequency, Loss, and Frequency Fit Results.
4. Run Batch Fit on the Loss worksheet data to create a Loss Fit Results worksheet:
c. In the Range field, ensure that the range covers just the table data, not the header row or first
column.
e. Click the Report tab, and in the Options section, deselect Include Detailed Report Worksheet
for Each Fit and Include Correlations.
f. Click Fit.
g. Copy the results into a new Loss Fit Results worksheet in your workbook.
Note: Ensure that you have six worksheets in your workbook: Frequency by Month per Risk,
Loss Events per Risk, Frequency, Loss, Frequency Fit Results, and Loss Fit Results.
l Risk ID
l Frequency
l Severity
l Impact
b. In the Risk ID column, copy the column headers from the Frequency worksheet (Risk IDs)
and click Paste > Transpose.
c. In the Frequency column, for each row, reference the Function result cell on the Frequency
Fit worksheet for the matching Risk ID.
Important: The simulation does not work correctly if you either paste the value from the
referenced cell or paste the formula from the cell. You must reference the cell for the
simulation to work correctly. For example, if the referenced cell is B9 on the Frequency Fit
worksheet, you should enter ='FrequencyFit'!B9, not =RiskPoisson(8.6) (the actual formula)
or 9 (the actual value).
d. In the Severity column, for each row, reference the Function result cell on the Loss Fit
worksheet for the matching Risk ID.
e. In the Impact column, for each row, create a RiskCompound formula against the Frequency
and Severity cells. For example, =RiskCompound(B2,C2)
f. In Historical Residual Expected Loss column, for each row, create a RiskMean formula
against the Impact cell in that row. For example, =RiskMean(D2)
g. In the Historical Residual VaR (95%) column, for each row, create a RiskPercentile formula
against the Impact cell in that row. For example, =RiskPercentile(D2,.95)
h. In the Historical Residual VaR (99%) column, for each row, create a RiskPercentile formula
against the Impact cell in that row. For example, =RiskPercentile(D2,.99)
1. In RSA Archer GRC, click Administration > Integration > Manage Data Imports.
4. Click Add New, select historical_loss_output.csv, click Open, and then click OK.
5. Click Next.
8. In the Import Field Mapping section, ensure that the Row ID, Historical Residual Expected Loss,
Historical Residual VaR (95%), and Historical Residual VaR (99%) fields are correctly mapped.
9. Click Next.
10. Ensure that the summary information from the Data Import Wizard is correct, and click Import.
l The Monte Carlo Risk Scores Normalization section displays an overall risk rating for inherent
and residual risk, based on the Palisade @Risk results. For Historical Loss Data, the Inherent
Risk score is still based on the Inherent VaR (95%) value calculated from Expert Elicitation
while the Residual Risk score is based on the Historical Residual VaR (95%) value.
Note: The Data Used for Last Execution section displays the data that the simulation results are
based on, in the case that the input values have been changed
The Monte Carlo risk scores also factor into the following risk ratings:
l The Calculated Risk tab displays an Adjusted Monte Carlo Residual Risk rating, which estimates
the overall risk to the organization using the Residual Risk - Monte Carlo value.
l In the Overall Risk section, the Inherent Risk and Residual Risk ratings are based on the Inherent
Risk - Monte Carlo value and Calculated Residual Risk rating is based on the Adjusted Monte-
Carlo Residual Risk value.
Object
Message Explanation Remediation
Type
Alias Object Name This message is an informational warning This message is only
Alias was indicating that the Alias was updated on the potentially an issue if
changed from object. There are two reasons for an alias in the change occurs on
Original Alias the Target Instance to have been updated: a field that is utilized
to New Alias. in a Mail Merge
l Update was in the Source Package.
Template or Data
l Alias has to be unique in the Target Publication Service.
Instance. If the alias already exists in In that scenario,
update the DPS or the
Target, packaging adds a unique
mail merge template
identifier to the end. with the new alias.
Field Field Name in This message is an informational warning Change the field to
the notifying you that packaging does not public manually
application change a private field in the target instance (optional).
Application to a public field.
Name cannot
be changed
from a private
field to a
public field.
Object
Message Explanation Remediation
Type
Field Field Field This message is seen when a cross- If the use case is not
Name could reference or related record field could not licensed, no action is
not be saved be created because the related application necessary.
due to does not exist in the target instance. This
inability to message usually occurs because the field is Note: If you later
identify the part of a related use case that is not license a use case
related licensed or has not been updated in the that contains that
module. target instance. application, you may
re-install the Use
Case Name package
in order to resolve this
warning.
2. Reapply the
original package
to resolve the
warning.
See the Data
Dictionary.
Object
Message Explanation Remediation
Type
Object
Message Explanation Remediation
Type
Field Field Field This warning may be seen on Inherited 1. Install the
Name was not Record Permission fields, cross- package for the
found and reference/related record fields (record
use case
removed from lookup and grid display), or as a display
a collection. field in a report. The warning means that containing the
the field could not be found in the target related application
instance and was not included in the (to obtain the
package. This is usually because the field is missing field).
part of an application in a related core
You must have a
solution that has not been updated in the
target instance or is not licensed. license for the
related
application.
2. Reapply the
original package
to resolve the
warning.
See the Data
Dictionary.
If you do not have a
license for the related
application, you may
ignore this message,
and the field remains
omitted from the
object.
Advanced The advanced All advanced workflows are installed as Go to the Advanced
Workflow workflow was inactive. You must review and activate the Workflow tab in the
installed, but workflow. application or
is inactive. questionnaire, review
Please review the workflow, then
and activate. click Activate.
Object
Message Explanation Remediation
Type
Advanced Minor failure: This failure message may appear if certain 1. Verify that the
Workflow Advanced services were not running when you Advanced
workflow installed the package.
Workflow Service
HTTP request
error: 404 not and the Job
found. Service are
running.
2. Reapply the
package.
Object
Message Explanation Remediation
Type
Event Module Name This warning usually occurs when a cross- Review the DDE and
Action DDE Name reference or related record field is on the the layout and
was updated layout in the package but is not licensed or determine if any
but has page does not exist in the target instance. Occurs modifications should
layout on Apply Conditional Layout actions. be made to the layout.
discrepancies. If you later license a
use case that contains
that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Object
Message Explanation Remediation
Type
Field History Log This message usually occurs when a history None.
Field log field includes a cross-reference or If you later license a
Selection related record as a tracked field, but that use case that contains
field : Field cross-reference or related record could not that application, you
Name was not be created because the related application may re-install the Use
found in the either does not exist in the target or is not Case Name package
target licensed. in order to resolve this
instance and warning.
was removed
from history
log field :
History Log.
Object
Message Explanation Remediation
Type
iView The following Page Name belongs to an application in a Modify the iView to
page use case that does not exist in the target or remove the
referenced in is not licensed. unresolved link or
a link cannot delete the iView
be resolved: If you later license a
Page Name. use case that contains
that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Object
Message Explanation Remediation
Type
Report Display field : Field Name belongs to an application in a If the report functions
Field Name use case that does not exist or that is not without that field,
was not found licensed. then no action is
in the target needed. Otherwise,
instance and modify the report or
was removed remove it.
from report: If you later license a
Report Name. use case that contains
that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Report Field : Field Field Name belongs to an application in a If the report functions
Name use case that does not exist or is not without that field,
referenced by licensed. then no action is
a statistic step needed. Otherwise,
was not found modify the report or
in the target remove it.
instance and If you later license a
was removed use case that contains
from report : that application, you
Report Name. may re-install the Use
Case Name package
in order to resolve this
warning.
Object
Message Explanation Remediation
Type
Report Field : Field Field Name belongs to an application in a If the report functions
Name used use case that does not exist or is not without that field,
for charting licensed. then no action is
was not found needed. Otherwise,
in the target modify the report or
instance and remove it.
was removed If you later license a
from report : use case that contains
Report Name. that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Report Field : Field Occurs when a filter condition in a report is If the report functions
Name was not referencing an application that does not without that field,
found in the exist or is not licensed. then no action is
target needed. Otherwise,
instance and modify the report or
the condition remove it.
was removed If you later license a
from the use case that contains
filter. that application, you
may re-install the Use
Case Name package
in order to resolve this
warning.
Object
Message Explanation Remediation
Type
Report Module Occurs with n-tier reports when the report If the report functions
Module Name includes display fields from a related without that field,
was not application that does not exist or is not then no action is
found. The licensed. needed. Otherwise,
relationship modify the report or
and remove it.
associated If you later license a
display fields use case that contains
were removed that application, you
from a search may re-install the Use
report. Case Name package
in order to resolve this
warning.