Unit 3 - Robotic Process Automation
Unit 3 - Robotic Process Automation
Automation (RPA)
Unit III
• Roles in RPA implementation
• Testing
• Governance and risks - Compliance with regulations
• Human-based vs. bot decisions - Internal vs. external processes
• Data security and controls
Role of RPA Implementation
• Ensuring the long term
success
Here’s something else from a
• Bot deployment – average
Deloitte survey: Among 424
time for start, frequent companies, about 53% had
breakdowns begun an RPA journey but a
• Maintenance – additional mere 3% had actually scaled
the implementation to more
investment, added than 50 bots!
infrastructure
requirement, autopiloting
issues
Testing
pr i son
ed i ts • Black Box Testing: This is where the internal
c h ang good are structure and design of the bot is not known
at e r ft w
g to n St edits fo nto a so to the tester. This involves setting up certain
as hin fo r cr nted i date.
0 2 ,W l l o w l em e as e e . B ut inputs and test cases – and then seeing if the
0 a e u
In 2 ncing to was imp the rel his is tr results are correct.
e s d T
sent ior. Thi termine , right? ge, it e a rl i er! • White Box Testing: This involves testing the
v e a a
beha m that d ood ide On aver 49 days internal structure and design of the bot. In
e g . s
syst ds like a ad a bug risoner ays. a l i zed other words, the tester will analyze the
h p d e
Soun ftware lease of er 600 erson r source code and try to detect any issues, say,
o e v p
the s ed the r it was o at an IT et more arlier security exposures, poor processes, or
s, h Y e
allow e case l 2015 t rected. eleased convoluted paths.
m ti r r
In so not un t was co d been • Grey Box Testing: Here you have a blend of
s i a
It wa ror and soners h w. the black and white box testing approaches.
r i la
the e 3,200 pr ired by
u
than was req
than
Testing
“Those deploying the solution will
• When it comes to testing bots, there is usually both
define the roles of the bots in the
manual and automated techniques.
process.
• With the former, you will have a tester try many different They also should keep the affected
options and record them (this often requires looking at team members in confidence, iterate
the log files, database entries, etc.). This can be time-
consuming but it is still useful. There is the benefit of the process to check the
creativity and imagination. infrastructure and software, and
develop a fallback plan.”
• As for automated testing , you will set up scripts that
- Ashish Mehra,
have different values and then run them on the software.
This is certainly faster and can test for many possibilities. Co-Founder & CEO,
But automated testing is certainly constrained. Antworks
• Review the documentation like the Process Definition
Document (PDD) or the Solution design document (SDD).
• There should be analysis of the data for the test scripts
(the information is usually in an Excel worksheet).
Monitoring
• Know whether your deployment met those criteria or fell short. It’s also important to configure the bots
to handle changes and monitor the impact of that.
• Considering broader efficiencies and compliance requirements should also be part of your monitoring
effort. Ideally, measure to see whether employee efficiency has increased, and you’ll definitely need to
analyse the compliance requirements of the bot.
• Business Continuity Plan: document that sets forth the types of monitoring, the goals to achieve, and
the actions to take when something goes wrong; the CoE can draft and enforce.
• Periodic meetings: to evaluate the performance of the bots – are things tracked? Changes required? Bot
to be terminated?
• Parsing the log files – Visualize
Cybersecurity
• RPAs are vulnerable to cyberattacks
• Protection of Credentials: Make sure you securely store and manage them.
• Application Access: Be mindful of what the bot is doing. What would happen if it were in
the control of a bad actor?
• Governance: Sketch out a framework for security, which should cover the design of the
bots and the use of data. There should also be a clear definition of roles and
responsibilities.
• Audit Trail: RPA platform that provides the creation of logs - conduct investigations and
assessments.
• RPA Security: high levels of security. Furthermore, it is not a good idea to use a free
version of an RPA system in production. In most cases, the security will not be strong.
• Rotation: A way to help protect credentials is to change the access privileges continuously.
Thus, if a hacker gains access, the usefulness will not last long.
Scaling
• Planning: This is absolutely required for scaling RPA. You need to have detailed objectives
and documentation (actually, it is important to emphasize this at every step in the
process). If not, there will usually be chaos and confusion when there are many bots
within an organization. A common way to deal with this is to retain consultants and even
use process mining software
• ROI: If there is too much focus on this, then it can be difficult to scale RPA. The reason for
this? Let’s take an example: Suppose that a company only takes on automation of those
processes where the ROI is 100% over a two-year period. This may intuitively sound like
a good approach. But there is a nagging issue: What if there are only a few processes that
meet this criteria and they impact a small part of the organization? In this case, when
looking at a holistic view of things, there will really be little impact from the RPA effort.
Rather, if the average ROI is, say, 20%, but it encompasses many parts of a company, then
there could be a major impact on productivity and efficiency. This is known as the
“portfolio effect.” But for it to work, there needs to be a strong emphasis on change
management.
Scaling
• CoE: This is absolutely essential for scaling. There needs to be some
discipline, governance, and centralization of the RPA implementation and
monitoring. The CoE should also draft the SOP (standard operating
procedures) and collect any of the learnings and best practices. There also
needs to be ongoing training and education.
• IT: It’s common not to involve IT in the early phases. And this is
understandable as RPA technology is relatively easy to use. What’s more, IT
can bring friction to the process. But if you want to scale the system, then you
need to have this group involved. They can be instrumental in helping with
building the right technology foundation – such as with the cloud or
sophisticated approaches like Kubernetes – as well as assist development
techniques, dealing with updates and patches (which, by the way, is quite
common with RPA), integration, and credentials management.
Compliance with regulations
• The Chief Compliance Officer needs to perform independent testing
on compliance to key regulations to be able to certify business units
• The checks are performed by testing compliance through a manual
process using compliance checklists
• In an RPA enabled compliance check, the compliance checklists form
the base for data preparation, which is fed to the bots for compliance
testing
• The benefit of such RPA compliance testing is to ensure the
achievement of compliance with regulatory requirements and internal
policies of the organization
Human and Bot Decisions
Human and Bot decisions – Data
Management
• https://youtu.be/UXHoWNfjJYM
Data Security and controls
Sensitive Security
Access Service
data Vulnerabili
abuse Denial
disclosure ties
A corrupt
bot can
A security A rogue Denial of
access
breach can robot can service
sensitive
result to create scheduled in
data and
disclosure of security the rapid
moves
sensitive vulnerabilitie sequence in
laterally in
information s for data at case of any
the network
to external rest or in security
or destroy
parties motion breach
high value
information
Data Security and Controls – the pillars of security
•Ensure that its console access is protected Each Robotic process automation robot and
using cyber-security best practices to technique has its own identity, ensuring
protect RPA administrators' credentials and dedicated authentication credentials and
immediately suspend or terminate identity naming criteria. All the credentials
suspicious sessions. should be stored in a secure location. And all
•Create a risk assessment system that the privileges should be revoked, which are not
considers the overall its implementation and required, and all the credentials must be
individual scripts. removed from the scripts or other unsecured
•Monitor and validate its scripts regularly, locations. Two-factor authentications can also
be used with login authentication.