RSA Archer Strategic Risk Management - Implementation Guide
RSA Archer Strategic Risk Management - Implementation Guide
RSA Archer Strategic Risk Management - Implementation Guide
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and Dell are either registered trademarks or trademarks of Dell
Corporation ("Dell") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go towww.emc.com/legal/emc-corporation-trademarks.htm.
License agreement
This software and the associated documentation are proprietary and confidential to Dell, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below.
This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other
person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by Dell.
Third-party licenses
This product may include software developed by parties other than RSA. The text of the license agreements applicable to third-
party software in this product may be viewed on RSA.com. By using this product, a user of this product agrees to be fully
bound by terms of the license agreements.
Distribution
Use, copying, and distribution of any Dell software described in this publication requires an applicable software license.
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice. Use of the software described herein does not ensure compliance with any laws, rules, or regulations, including
privacy laws that apply to RSA’s customer’s businesses. Use of this software should not be a substitute for consultation with
professional advisors, including legal advisors. No contractual obligations are formed by publication of these documents.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." DELL INC. MAKES NO REPRESENTATIONS
OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND
SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE.
Copyright 2010-2019 Dell, Inc. or its subsidiaries. All Rights Reserved. May 2019
RSA Archer Strategic Risk Management
Table of Contents
Chapter 1: Overview of RSA Archer Strategic Risk Management ................................................................. 5
About RSA Archer Strategic Risk Management ........................................................................................ 5
Key Features and Benefits ........................................................................................................................ 5
Key Terminology ....................................................................................................................................... 6
Prerequisites (ODA and system requirements) ........................................................................................ 7
Compatible Use Cases and Applications ................................................................................................... 7
Related Applications ............................................................................................................................. 7
Chapter 2: RSA Archer Strategic Risk Management Components ................................................................ 9
Architecture Diagram ................................................................................................................................ 9
Swim Lane Diagram................................................................................................................................. 10
Applications............................................................................................................................................. 10
Personas and Access Roles ..................................................................................................................... 11
Permissions Chart ................................................................................................................................... 11
Chapter 3: Installing RSA Archer Strategic Risk Management .................................................................... 12
Task 1: Prepare for the Installation ...................................................................................................... 12
Task 2: Install the Package ................................................................................................................... 12
Task 3: Test the Installation ................................................................................................................. 12
Installing the RSA Archer Strategic Risk Management Package ............................................................. 12
Task 1: Back Up Your Database ........................................................................................................... 12
Task 2: Import the Package ................................................................................................................. 12
Task 3: Map Objects in the Package .................................................................................................... 13
Task 4: Install the Package.................................................................................................................... 15
Task 5: Review the Package Installation Log ....................................................................................... 16
Chapter 4: Using RSA Archer Strategic Risk Management ......................................................................... 17
Task A: Create Strategic Risk Record ...................................................................................................... 17
Task B: Generate Strategic Risk Assessment .......................................................................................... 17
Task C: Complete Risk Rating .................................................................................................................. 17
Task D: Assess Level of Preparedness ..................................................................................................... 18
Task E: Monitor Remediation Execution ................................................................................................. 19
Task F: Overall Recommendation ........................................................................................................... 19
3
RSA Archer Strategic Risk Management
4
RSA Archer Strategic Risk Management
Management struggles throughout all levels within an organization to proactively identify when risks
impact the execution of an organization's strategy. Management must relate strategic risks to their
strategies and know when to implement action plans that minimize risks and monitor the performance
of those action plans. Strategic Risk Management is a business discipline that involves identifying,
assessing, and managing risks and uncertainties, affected by internal and external events or scenarios,
that could inhibit an organization's ability to achieve its strategy, strategic objectives, and execution.
Strategic Risk Management can potentially identify situations in which risk can be a competitive
advantage instead of a threat to the strategic plan. Strategic Risk Management encompasses the
interdisciplinary intersection of strategic planning, risk management, and strategy execution in
managing risks and seizing opportunities, which protects against losses, reducing uncertainties and
seizing opportunities, to enable better performance in achieving the organization’s objectives and
greater resilience in an uncertain environment.
By monitoring strategic risks within an organization, management can be prepared and proactively
define plans to minimize the impacts to the organization, should the risks exceed the organization's
tolerance.
• Consistent and repeatable process for identifying and mitigating strategic risk
• Strategic risk alignment with the organization's risk tolerance
• Understanding of the level of preparedness against risks that impact the organization
• A minimized strategic risk for successful strategy execution
5
RSA Archer Strategic Risk Management
Key Terminology
Application. Database that stores a specific type of data record, for example, policies, assessments,
assets, threats, vulnerabilities, and controls.
Authorized User. A user who has logged into the system and has a right to perform some operation. The
system knows the identity and permissions granted to this individual.
Cross-Reference. A field type that allows users to create associations between records in the same
application (internal references) or records in two separate applications (external references). By adding
a cross-reference to an application, the system automatically adds a Related Record field.
Dashboard. With reports defined and saved in the inventory of system reports, those identified as
Global Reports can be added to dashboards. Each dashboard can include one of many reports in the
format they were saved.
Notifications. Emails sent from RSA Archer to Users or Groups, based on a schedule or a change in the
record status.
Report. Saved search criteria that can be run again later. In RSA Archer, the construct for reports is a
combination of a query and its related output presentation options. The data returned is filtered by a
user permission, allowing users to see only the data for which they have been granted access.
Sub-Form. For one application, administrators can develop multiple sub-forms to hold all related data.
Sub-forms can be shared across applications; however, changing a sub-form affects all applications using
that sub-form.
Task. Action items that have been assigned to a user in relation to the Support Request.
User. Any person who uses and is registered within the system. In this guide, the user is assumed to be
an employee using RSA Archer Support Requests.
User Profile. Preferences of the registered user that are saved within the system.
Workspace. Display mechanism that provides the user with a way to access their data.
6
RSA Archer Strategic Risk Management
Pre-Requisite Requirements for the installation and operation of RSA Archer Strategic Risk
Applications Management includes the following use cases:
• Findings – (RSA Archer Issues Management)
• Exception Requests – (RSA Archer Issues Management)
• Remediation Plans – (RSA Archer Issues Management)
Related Applications
Application Use Case Primary Purpose(s) of the Relationship
Strategies RSA Archer Strategic Planning App- • To relate strategic risks to organization
Pack strategies and know when to implement
action plans that can minimize the risks
related to strategies.
Control RSA Archer IT Controls Assurance, • To relate controls that will be applied to
Procedures RSA Archer Information Security reduce the strategic risk.
Management System, RSA Archer
PCI Management, RSA Archer IT Risk
Management, RSA Archer Controls
Assurance Program Management,
RSA Archer Data Governance, RSA
Archer Top-Down Assessment, RSA
7
RSA Archer Strategic Risk Management
8
RSA Archer Strategic Risk Management
The following diagram shows the relationship between the applications in RSA Archer Strategic Risk
Management.
Strategic Risk
Findings
9
RSA Archer Strategic Risk Management
Re-assess
Approve
No
Strategic Risk Manager
Reject
Create Remediation Plan Submit Remediation Plan
Applications
The following table describes the applications in RSA Archer Strategic Risk Management.
Application Description
Strategic Risk The Strategic Risk application documents all the information when a strategic risk
is identified, captures an overview of the strategic risk assessment, and findings
and remediation plans resulting from the assessment.
Strategic Risk The Strategic Risk Assessment is a questionnaire used to determine the likelihood
Assessment and impact of the risk and the level of preparedness. Controls can be referenced, if
available, to minimize the risk.
10
RSA Archer Strategic Risk Management
The following table describes the functions that make up the application’s organization roles. Depending
on the organization of your company, these functions and responsibilities may vary.
Strategic Responsible for identifying the strategic risk, Can be more than Required
Risk conducting risk assessment, evaluating the one
Manager organization’s level or preparedness, approving
action plans, and monitoring and communicating
results. This could be someone mandated from the
Board, Risk Management, or another division.
Strategies Responsible for working with the appropriate Can be more than Optional
Manager teams to develop and implement action plans. This one
could be someone who owns or executes a
strategy.
Permissions Chart
Applications SRM: Risk Manager SRM: Strategies Manager SRM: Read Only
Strategic Risk CRU R R
Strategic Risk Assessment CRU R R
Findings CRU RU R
Remediation Plans CRU CRU R
Exception Requests CRU CRU R
Strategies R R R
Control Procedures R R R
Risk Register R R R
Corporate Objectives R R R
Business Unit R R R
Business Process R R R
C = Create, R = Read, U = Update, D = Delete
Users should at least have read access at record level for the applications related to Strategic Risk.
11
RSA Archer Strategic Risk Management
An alternate method for undoing a package installation is to create a package of the affected objects
in the target instance before installing the new package. This package provides a snapshot of the
instance before the new package is installed, which can be used to help undo the changes made by
the package installation. New objects created by the package installation must be manually deleted.
12
RSA Archer Strategic Risk Management
4. Click OK.
The package file is displayed in the Available Packages section and is ready for installation.
Note: This process can take several minutes or more, especially if the package is large, and can
time out after 60 minutes. This time-out setting temporarily overrides any IIS time-out settings
set to less than 60 minutes.
When the analyzer is complete, the Advanced Package Mapping page lists the objects in the
package file and corresponding objects in the target instance. The objects are divided into tabs,
depending on whether they are found within Applications, Solutions, Access Roles, Groups, Sub-
forms, or Questionnaires.
3. On each tab of the Advanced Mapping Page, review the icons that are displayed next to each
object name to determine which objects require you to map them manually.
Awaiting Indicates that the system could not automatically match the object or
Mapping children of the object to a corresponding object in the target instance.
Review Objects marked with this symbol must be mapped manually through the
mapping process.
Note: New objects should not be mapped. This icon should remain
visible. The mapping process can proceed without mapping all the
objects.
Note: You can execute the mapping process without mapping all the
13
RSA Archer Strategic Risk Management
Do Not Indicates that the object does not exist in the target instance, or the
Map object was not mapped through the Do Not Map option. These objects
do not map through Advanced Package Mapping and must be remedied
manually.
Undo Indicates that a mapped object can be unmapped. This icon is displayed
in the Actions column of a mapped object or object flagged as Do Not
Map.
Option Description
When all objects are mapped, the icon displays in the tab title. The icon displays next
to the object to indicate that the object is not mapped.
14
RSA Archer Strategic Risk Management
The Advanced Package Mapping process updates the system IDs of the objects in the target
instance as defined on the Advanced Package Mapping page. When the mapping is complete,
the Import and Install Packages page is displayed.
Important: Advanced Package Mapping modifies the system IDs in the target instance. Any
Data Feeds and Web Service APIs that use these objects must be updated with the new system
IDs.
Procedure
1. Go to the Install Packages page.
15
RSA Archer Strategic Risk Management
5. To deactivate target fields and data-driven events that are not in the package, in the Post-
Install Actions section, select the Deactivate target fields and data-driven events that are not
in the package checkbox. To rename the deactivated target fields and data-driven events with
a user-defined prefix, select the Apply a prefix to all deactivated objects checkbox, and enter
a prefix. This can help you identify any fields or data-driven events that you may want to
review for cleanup post-install.
6. Click Install.
7. Click OK.
16
RSA Archer Strategic Risk Management
Procedure:
1. Enter Strategic Risk, Description, Strategic Risk Categories, Priority, Review Frequency in the
General Information section.
2. Enter Stakeholders and Strategies Manager, if available, in the Stakeholders section.
3. Provide any other necessary details.
4. To save the strategic risk profile, click the Save button in the top left of the screen. At this stage
profile is created and strategic risk manager will have to perform risk assessment.
Procedure:
1. To generate Strategic Risk assessment, click on Generate Risk Assessment button at the top left
of the screen.
2. Once the Strategic Risk assessment is generated, it can be accessed through the Strategic Risk
Assessment section of the Risk Assessment tab. At this point, the Assessment Status is Not
Started.
Procedure:
17
RSA Archer Strategic Risk Management
Procedure:
18
RSA Archer Strategic Risk Management
6. Level of Preparedness from the latest assessment will be populated in Level of Preparedness
section.
7. If Risk Ratings, SR: Analysis, SR: Board Briefed, SR: Responsibilities Defined and Remediation Plan
Created are complete then Assessment status will change to Complete.
Note: Findings and Remediation Plans utilize the out-of-the-box workflow. In addition, to relate Findings
to Strategies through the RSA Archer Strategic Planning App-Pack, create a cross-reference to the
Strategies application and add it to the Findings layout.
Procedure:
1. Provide status for Remediation Plan In Execution in Strategic Risk Assessment section under Risk
Assessment tab.
a. Select status N/A, if a remediation plan was not required.
b. Select status In Progress, if remediation plan is in execution.
c. Select status Complete, if remediation plan has been executed.
2. Click on Save Changes button at the top of the page or Save button at the end of the row in
Strategic Risk Assessment section.
Procedure:
Procedure:
1. Click on Generate Strategic Risk Assessment button at the top right corner of the page.
19
RSA Archer Strategic Risk Management
2. Once the strategic risk assessment is generated, it can be accessed through the Strategic Risk
Assessment section of the Risk Assessment tab. The Assessment Status is Not Started.
20
RSA Archer Strategic Risk Management
Troubleshooting Guidelines:
If users do not have any of the optional applications, they would receive warnings related to those
modules. Users can ignore those warnings or take action if required. The App-Pack’s operation will not
be affected due to these warnings/errors.
For example, below are few warnings/failures which might be observed if users do not have the
Strategies Application (RSA Archer Strategic Planning App-Pack):
1. Warning for Access Roles “SRM: Risk Manager”, “SRM: Strategies Manager”, “SRM: Read Only”:
Access rights to the following page could not be configured due to missing module: Strategies.
2. Minor failure for report Strategic Risks by Strategies:
Strategic Risks by Strategies report could not be created. There are no display fields for this
report.
3. Minor failure for Impacted Strategies:
Field Impacted Strategies could not be saved due to inability to identify the related module.
4. Warnings for reports:
Warnings regarding missing Impacted Strategies field or fields from Strategies application
(Category, Priority, Strategy, Status and Strategy owner fields) from RSA Archer Strategic
Planning App-Pack.
5. Warning for Inherited User/Group field Strategy Owners:
Strategy Owner was not found in the target instance and was removed from field: Strategy
Owners.
If users do not have any of the optional applications following changes can be made post-installation
to keep the layout neat:
21