
Security and controls for your Workday journey
PwC’s security and control solutions for Workday help protect your business and activate your transformation with reduced costs and better risk management.
Business requirements evolve and so should your Workday security model. Security drift, the divergence of security model design and business needs, tends to increase security model complexity over time. Eventually, overly complex Workday security models can increase costs in the form of administration effort, security risk exposure, adverse disclosures, and higher audit fees.
Simplifying Workday security with disciplined use of Workday’s configurable security architecture can help companies correct security drift and streamline Workday security administration. In fact, many companies can reduce Workday security administration costs by 25% with a simplified security model.
To help companies recognize symptoms of security drift (and how to correct them), we summarized the following six signs that your Workday security model might be costing you.
Help desk tickets provide a convincing body of evidence that your current security model may not meet evolving business needs. After filtering out normal provisioning and deprovisioning requests, the volume of requests for additional access, custom entitlements, and access restrictions is often a good gauge on possible security model pain points. By streamlining and simplifying the security model, security administrators can quickly solve security tickets while still maintaining the integrity of the security environment.
In addition to helpdesk tickets, you can also objectively gauge volume of security model changes by leveraging native Workday change logs. Look for changes to security groups, security policy changes and activations, new role assignments, and modification to security segments. Building simple custom reports and dashboards to monitor security model change volume can help you pinpoint possible inefficiencies often associated with Workday security drift.
Workday customers use custom security groups when delivered security groups do not address business requirements. Customers like custom security groups because they are typically powerful and flexible, but they can be overused. Consider evaluating the number of custom security groups and look for potential signs of short-cuts that might increase risk and complexity. Look out for:
Rationalize the usage of custom security groups by assessing whether they address a valid business need. And consider defining configuration change processes over custom security groups to help prevent risk of future security drift.
A common provisioning short-cut is to modify an existing security group with one or two tweaks specific to a small population of workers. The practice might address inbound access requests, but it may also cause security group proliferation and unnecessary security model complexity. Other consequences may include higher administrative costs, higher audit fees, and diminished security posture.
Identify similar security groups by comparing domain security policies and business process security policies across your population of security groups using standard reports like Compare Security Permissions of Two Security Groups and View Security Groups. You can even spot them by manually inspecting specific security policies configurations or even similarities in security group name.
User-based security groups are often referred to as “administrative” security groups in Workday. Workday-delivered groups automatically divide administrative capabilities by functional area, allowing for a separation of responsibilities for the Workday administration team. No matter the size of your team, keep in mind that users with administrative access should not have transactional access.
User-based security groups also extend unconstrained access in Workday. Verify users require unconstrained access and, if not, use constrained security groups where possible and restrict them to organizations, departments, or other relevant criteria.
Carefully review workers granted user-based security groups. Confirm the administrative access reflects role and business need. And make sure user-based security groups have at least two users assigned, in case back-up is needed.
When security models get complex, a common response is to over-extend access to cut through perceived security administration challenges. Here are a few common ways that over-extended access might show up:
If your Workday security model is custom or overly complex, your user access review (a common control performed quarterly at many companies) may be taking longer than expected and/or may not be effectively assessing security risk. Symptoms of complex security models that might show up during the user access review include:
Streamlining the security model and clarifying the purpose of security groups can improve efficiency of Workday security administration, including efforts related to internal controls and compliance. These benefits can even translate to lower audit fees.
These are just a few of the signs that your business may have outgrown your original Workday security design. To help our customers identify and remedy symptoms of security drift, we have our Workday security diagnostics capabilities to help automate the analysis and diagnosis of complex Workday security models using dozens of metrics focused on streamlined Workday security.
Simplifying your Workday security model can help reduce administrative costs and security risks while meeting evolving business needs. So, look out for common signs that your Workday security model might be overly complex - and seek opportunities to simplify your Workday security model.
Contact us or learn more about how PwC can support your Workday journey with effective and sustainable Workday security.
Don’t underestimate the complexity and effort required to design configuration change controls in Workday. Avoid audit surprises and streamline your audit process.
PwC’s security and control solutions for Workday help protect your business and activate your transformation with reduced costs and better risk management.
Learn seven secrets for effective Workday configuration change management to improve audit outcomes and meet regulatory requirements.
Elevate your internal controls and unlock the potential of your Workday transformation.