The objective of this procedure is to describe purpose and process related to the BFC internal controls (users accesses management, customizing activities, sensitive actions from BFC Administration team…).
Both maintenance and customizing activities must be performed in compliance with internal controls designed with Data Compliance and Audit team and audited twice a year by Syensqo external auditors.
Main risks to be covered are the following:
BFC Administration team is the control owner of the following internal controls - UAM (User Access Management) and CM (Change Management): Audit
Purpose: Check the compliance of BFC users passwords with Syensqo Security policy
This Control is restricted to “Internal Users” (authentication type "internal") as “External Users” (authentication type "external") are using the Single Sign On.
Description: The BFC Administration team reconciles an extract of password settings from the BFC_Production system and the password guidelines included in the security policy: all the directives must be respected.
Control type: (Completeness, Accuracy, Validation, and Restricted Access): Completeness, Accuracy and Restricted Access
Frequency: "on flow" when Syensqo’s password policy changes (before frequency was a yearly one)
Control evidence:
In “Action” menu / “Password Manager” option, the BFC Administration team defines length of Internal password as well as their validity duration.
From June 1st 2023 parameters adapted on password length (request from EY auditors after 2022 audit) :

Purpose: All the Functional Profiles creation/modification requests are formally validated by the Syensqo GAR Consolidation Manager (appointed as KUF = Key User Function).
Description: The BFC Administration team, before updating the role into the system, checks manually the presence of incompatibilities in the role design, according to the matrix of incompatible actions. In case of some incompatibilities are found he/she informs the Consolidation Manager (KUF) who validates them.
A functional profile defines the types of rights to perform specific tasks in the application. For example, whether or not a user is authorized to create, change or delete data in schedules.
The major risk to be managed is to avoid to introduce in Functional profiles (through creation / modification) incompatible rights without any authorization from KUF.
Control type: (Completeness, Accuracy, Validation, and Restricted Access): Validation, Accuracy
Frequency: On Flow, meaning each time there’s a need to change or create a functional profile
A) Functional Profiles created in BFC since its implementation in 2005

B) Functional Profiles currently used (23/05/2024)

C) Description of Functional Profiles currently used (23/05/2024)

Evidence stored in GDrive: UAM04 Functional profiles

Purpose: Matrix of incompatible transactions by critical level is maintained and updated in order to include each new critical transaction.
Description: The file “UAM07 Matrix of incompatible functional profiles YYYY” is a validation of the updated matrix of incompatibilities by the Key User Function (Consolidation manager):
- Functional profile ADMINISTRATION: "full power" users authorized to modify (creation and deletion) all of the objects and data in SAP Financial Consolidation.
- Functional profile ADMIN-GAR (new profile set up in April 2024): CONSOLIDEUR rights + publication of packages (attributed to 1 member of GAR Syensqo team to act as back up in case of absence of Acc or BFC Admin teams)
- Functional profile RTR BO-COR: the combination of rights to 1) unlock packages + 2) modify data inside + 3) publish packages modified should be considered conflicting duties.
- Functional profile REOPEN-DEROG (new profile set up in May 2024): the combination of rights to 1) unlock packages + 2) modify data inside + 3) publish packages (with standard mode or by derogation) modified should be considered conflicting duties.
The "Functional Profiles Definitions" tab is a detailed description of the Functional Profiles.
Control type (Completeness, Accuracy, Validation, and Restricted Access): Validation
Evidence stored in GDrive: UAM07 Matrix of incompatible functional profiles

Frequency: "On Flow", each time we change or create a functional profile (consistent with UAM04)
Purpose: Access rights given to users are formally validated by the BFC Administration team.
Description: Access requests are sent by e-mail or via Service One ticket (transferred by IS BFC Admin) to the BFC-Admin mailbox, normally the request is performed by the user with his/her manager in copy (manager as defined in Syensqo One Organizational chart).
Important Notes:
Control type: (Completeness, Accuracy, Validation, and Restricted Access): Validation and Restricted Access
Frequency: On demand @ each user access request
Evidence stored in GDrive: UAM05 Access Requests

Purpose: Users list with sensitive accesses is reviewed by Consolidation manager (KUF) before each quarterly closing
Description:
Control type: (Completeness, Accuracy, Validation, and Restricted Access): Validation and Restricted Access
Frequency: Quarterly in March - June - September - December, before quarterly closing process
Validation process:
Evidence stored in GDrive: UAM14 Review of Sensitive Accesses

Purpose 1: Deactivation or rights adaptations done on a regular basis for movers.
Description: The Syensqo Group members who have access to BFC should be compliant with their status and their position on HR tools. The objective of this Internal Control is to reconcile the users status on BFC according to their HR status and identify the users that should be deactivated from BFC or whose rights have to be adapted to new job position.
Changes of HR attributes which can trigger a change in BFC access rights:
In other words, other HR attributes such as Supervisor, Cost Center, Company code have not to be considered as they have no correspondence in BFC rights management.
Among those 4 attributes, Business Unit is the upper one and Position being the lowest one in Organizational chart.
From May 23rd 2024, new process of notifications using MyID application.
Analysis and changes of access rights, when applicable, are done based on the "New Mover Report" sent from MyID:
Frequency: On Flow (each time MyID detects a Mover having an access into BFC Syensqo) - MyID program executed 6 times per day
Control type: (Completeness, Accuracy, Validation, and Restricted Access): Validation and Restricted Access
Email / notification sent from MyID:


Process BFC Admin:

In BFC “Security/Users” module, deactivation will be proceeded the following in the user profile:

and the user must be blocked in order to be prevented from accessing BFC.

Purpose 1: Deactivation done on a regular basis for leavers
Description: The Syensqo Group members who have access to BFC should be compliant with their status and their position on HR tools. The objective of this Internal Control is to reconcile the users status on BFC according to their HR status and identify the users that should be deactivated from BFC.
From March 11th 2024, new process of notifications using MyID application.
Deactivation is done based on the "New Leaver Report" sent from MyID:
Frequency: On Flow (each time MyID detects a leaver having an access into BFC Syensqo) - notifications sent at 1am
Control type: (Completeness, Accuracy, Validation, and Restricted Access): Validation and Restricted Access
Process:
Email sent from MyID:

BFC Admin proceeds the deactivation in BFC Syensqo:

Purpose: Temporarily deactivation on BFC when the user has not connected during the last 6 months
How to build the file of inactive users:
Step 1 - calculate the date corresponding to 6 months ago
Step 2 - In BFC, sort ascending the users by last connection date and export the list of users without any connection and users without connection since 6 months

Step 3 - Save the export under this gdrive folder UAM12 Review of inactive users

Step 4 - Using filters on columns, identify users which should be excluded from the deactivation
Step 5 - Proceed the deactivation of remaining users (not excluded by the analysis above) in BFC:


Step 6 - Timestamp of the deactivations made in BFC to be posted in the google file

Evidence stored in GDrive: UAM12 Periodic Review of Inactive Users

Purpose: Audit trails on critical activities (deletion of objects) on a regular basis to ensure that all the actions made are justified.
Description: This control traces the sensitives actions in the PRODUCTION environment performed by:
As several controls are already in place to control users accesses (UAM05 Access requests / UAM14 Review of sensitive accesses / UAM06 UAM11 UAM12 Users deactivation) and already covering the control of sensitive actions (unlocking, publication by special permission...), critical actions to be monitored through UAM14 Audit trails are restricted to the deletion of objects.
Note that IT/TEST/TINSTALL profiles don’t have a significant impact in terms of modifications in BFC:
Control Report Process
1) On WD2 of each month, DT BFC Admin extract the audit trail file from Log module and send it to BFC Admin team;
Below is the email received from DT colleagues:
2) This list contains all deletion actions performed (who and when);
Evidence stored in GDrive: UAM14 Audit Trail on Critical Activities


3) BFC Admin creates tab BFC Admin review (copy from Actions by User profile tab)

Arrange the layout as below in order to be more legible:

4) Finally it should be analyzed for possible anomalies – BFC Administration team Comments - and the file should be sent/shared for BFC Admin manager review;


Control type: (Completeness, Accuracy, Validation, and Restricted Access): Completeness, Accuracy and Validation
Frequency: monthly and focused on deletion of objects
Purpose:
The BFC Administration team is responsible to manage the maintenance of BFC.
The following risks will be covered by the Internal Control framework:
Types of modifications:
The maintenance categories can be grouped in 4 types :
"Recurring maintenances" – Customizing (creation of new objects) with no impact in the data already in the Production environment:
“Critical / sensitive maintenances ” – Customizing (modification of existing objects) with impact in the data already in the Production environment:
A BFC project can be defined as:
List of Authorized requestors (BFC Key Users):
Operating mode for each maintenance category of the BFC Administration team
[A] Reporting set-up Monthly / Quarterly / Yearly
[B] Correction of errors / [C] Improvements (with no impact in the Reporting Content)
[D] Structure Update and Customizing
Internal Controls :
In order to simplify the process, several types of tasks have been created in BFC according to the related process and to the requester:
The BFC Administration team uses always these tasks and their content is transferred to Production. Any piloting from BFC Customizing database (BFC_TOPSCO) to BFC production database (BFC_PRODSCO) is logged/archived and can be extracted.
Specific Internal controls for tasks type SCO-CONSO / SCO-CTRLFIN / SCO-GESTION / SCO-TAXES (note: does not apply to SCO-ADMIN tasks):

Internal Control applicable to ALL tasks type (SCO-ADMIN / SCO-CONSO / SCO-CTRLFIN / SCO-GESTION / SCO-TAXES):
Every month , BFC Admin team will:

Assessment of completeness and accuracy of customizing changes:
Every change (creation / update) in BFC customizing is driven by Corporate Consolidation and Controlling needs to perform monthly / quarterly / year end Consolidation and Reporting cycles.
As explained above, piloting of changes to BFC Production can be done using different types of tasks:
At each Consolidation & Reporting cycle, completeness and accuracy of customizing changes can be considered as achieved once the Consolidation and Reporting process of the period is finalized: meaning that consolidation work is finalized as well as analytical reviews and checks from the different stakeholders (Corporate, Accounting, Businesses) before disclosure.
It means as well as that every change on BFC customizing piloted before the beginning of the process has contributed to reach the Consolidation and Reporting needs without any deficiency.
From 2024, this final - either monthly or quarterly or year end -"Consolidation End state" milestone is formalized directly by Corporate GAR team creating itself a back up with locking of the last run IFRS Consolidation (special variant BKUP used) in BFC.
END OF THIS PROCEDURE