IT Auditor (Job Role)

Individual responsible for analyzing and assessing for an organization its information technology infrastructure, policies, and operations.

Role Hierarchy

The IT Auditor job role directly and indirectly inherits these roles.

  • IT Auditor
    • Security Reporting
      • Separation of Duties Role Analysis

Duties

This table lists the duties assigned directly and indirectly to the IT Auditor job role.

Duty Role Description

Security Reporting

Reviews and reports security information, including user access and role design.

Separation of Duties Role Analysis

Allows user to analyze separation of duty violations on a new or existing role in security.

Privileges

This table lists privileges granted to duties of the IT Auditor job role.

Granted Role Granted Role Description Privilege Privilege Description

IT Auditor

Individual responsible for analyzing and assessing for an organization its information technology infrastructure, policies, and operations.

View Sensitive Data Access Audit

Allows viewing of HCM sensitive data access audit information.

Security Reporting

Reviews and reports security information, including user access and role design.

Analyze Security

Analyze security including roles by category, and user role memberships.

Security Reporting

Reviews and reports security information, including user access and role design.

Import User Login History

Imports last login timestamp for users.

Security Reporting

Reviews and reports security information, including user access and role design.

Manage All Application Profile Values

Allows management of all application profile option settings and values at various levels to control application behavior.

Security Reporting

Reviews and reports security information, including user access and role design.

Manage Reports and Analytics

Allows access to the Reports and Analytics from Navigator Menu.

Security Reporting

Reviews and reports security information, including user access and role design.

Manage Scheduled Processes

Allows managment of Scheduled Processes

Security Reporting

Reviews and reports security information, including user access and role design.

Run Inactive Users Report

Submit inactive users report.

Security Reporting

Reviews and reports security information, including user access and role design.

Run Privilege Discoverer Report

Submit Privilege Discoverer report.

Security Reporting

Reviews and reports security information, including user access and role design.

Run Role Hierarchy Optimization Report

Submit role hierarchy optimization report.

Security Reporting

Reviews and reports security information, including user access and role design.

Run User Access Audit Report

Submit user and role access audit report.

Security Reporting

Reviews and reports security information, including user access and role design.

Run User Password Changes Audit Report

Submit User Password Changes Audit Report

Security Reporting

Reviews and reports security information, including user access and role design.

Run User Role Membership Report

Submit User Role Membership report.

Security Reporting

Reviews and reports security information, including user access and role design.

View Role

Search and view an existing role and its relationships.

Security Reporting

Reviews and reports security information, including user access and role design.

View User Account

Search and view an existing user account.

Separation of Duties Role Analysis

Allows user to analyze separation of duty violations on a new or existing role in security.

Use REST Service for Advanced Access Control Role Analysis

Allows users to call all methods associated with the advanced access control role analysis REST resource

Separation of Duties Role Analysis

Allows user to analyze separation of duty violations on a new or existing role in security.

Use REST Service for GRC Server Status

Allows users to call the GRC server status REST service

Separation of Duties Role Analysis

Allows user to analyze separation of duty violations on a new or existing role in security.

View Access Provisioning Rules

Allows user to view provisioning rules.