π‘ Tip: Important business services also known as critical operations, impact tolerance also known as tolerance levels, scenario testing also knowns as scenario analysis.
Given the sensitivity and confidentiality of the information within the Operational Resilience module, access to the action menu for entities within the module is currently restricted. Only users who are module Administrators or Owners of the entities will have comprehensive access. This ensures the security and integrity of critical data.
Set up Operational Resilience Administrator role
π‘Tip: Only personnel with full system Administrator rights can view or access the Maintenance menu and the Security Centre.
To assign a user as Operational Resilience Administrator, please set up the role in Ansarada GRC system following the steps below:
β
Navigate to the Maintenance area along the top ribbon menu.
βSelect the Security Centre option in the Maintenance menu.
βSelect the Positions tab and search for the position or name of the user you want to grant Administrator permission to.
βSelect the first icon (show Security Group membership) in the action menu on the left of that position column to see the list of Security Group that person currently has.
βSelect the checkbox next to Administrators - OpRes security group and click on the Save button on the left.
β
Security permissions for different roles in the module
Please refer to the following table on what action an Administrator and a Non-admin user can perform in the module:
Important Business Service (IBS), Critical Process (CP) and Resources
Permission | Administrator | Non-admin user | Note |
Create IBS | β | β |
|
Delete IBS | β | β | Members of IBS Security Group with Edit rights also have the permission |
Edit IBS | β | β | Members of IBS Security Group with Edit rights also have the permission |
View IBS | β | β |
|
Create CP | β | β | Members of IBS Security Group with Edit rights also have the permission |
Delete CP | β | β | Members of IBS Security Group with Edit rights also have the permission |
Edit CP | β | β | Members of IBS Security Group with Edit rights also have the permission |
View CP | β | β |
|
Create Resource | β | β |
|
Delete Resource | β | β |
|
Edit Resource | β | β |
|
View Resource | β | β |
|
Scenario Testing
Permission | Administrator | Non-admin user | Note |
Create Test Plan | β | β |
|
Delete Test Plan | β | β | Test Plan Owner also has permission for their specific Test Plan |
Edit Test Plan | β | β | Test Plan Owner also has permission for their specific Test Plan |
View Test Plan | β | β | Test Plan Owner also has permission for their specific Test Plan |
Run Test (Creating a test) | β | β |
|
Edit Test | β | β | Test Plan/Test Owner also has the permission for their Tests/ Tests belong to their specific Test Plan |
Delete Test | β | β | Test Plan/Test Owner also has the permission for their Tests/ Tests belong to their specific Test Plan |
View Test | β | β |
|
Create Task in a Test Plan | β | β | Test Plan Owner also has permission for their specific Test Plan |
Delete Task in a Test Plan | β | β | Test Plan Owner also has permission for their specific Test Plan |
Edit Task in a Test Plan | β | β | Test Plan Owner also has permission for their specific Test Plan |
Create Task in a Test | β | β | Test Owner also has the permission for their specific Test |
Delete Task in a Test | β | β | Test Plan Owner, Test Owner and Task Assignee also have permission |
Edit Task in a Test | β | β | Test Plan Owner, Test Owner and Task Assignee also have permission |
View Task (both in Test Plans and Tests) | β | β |
|