THE PLAYBOOK · CHAPTER 1
BIS Configuration Guide
Rules, thresholds, and detection logic for deploying Business Integrity Screening in an electrical distribution environment -- written for the audit-to-IT handoff.
Key takeaways -- read this first
- BIS is frequently licensed and dormant. Activation is a configuration task, not a development project. The first conversation is about whether it is licensed -- not whether it can be built.
- Starting with three to five rules in the highest-risk area is the right deployment posture. Volume before discipline produces exception queues no one reviews.
- Every rule in this guide has three components that must be defined before configuration begins: the detection condition, the threshold that makes an exception actionable, and the owner who resolves it.
- The pricing leakage detection rule -- identifying transactions where a generic material number was used when a catalog item was available -- is one of the highest-return rules in an electrical distribution environment. It requires cross-referencing material master data with billing records, which BIS can do natively once the rule logic is configured.
Before IT Can Configure -- What Audit Must Define
BIS configuration starts with audit, not IT. IT can activate the module, set up the system connection, and deploy pre-built rules. But the threshold values, the scope parameters, and the exception workflow all require audit input before configuration begins. A BIS deployment that starts with IT and asks audit for requirements later produces rules that generate noise rather than findings.
The Rule Library -- Nine Detection Rules
Each rule is written in the format required for the audit-to-IT handoff: detection condition, data sources, threshold guidance, false positive filters, and the expected exception output.
The nine rules below cover the highest-risk areas for an electrical distribution environment.
Deployment Phasing
BIS deployment is most effective when sequenced rather than launched at full scale.
- IT activates BIS module and configures the system connection and data scope (company codes, document types)
- Deploy R-06 (Manual JE Without Reference) and R-09 (Inventory Adjustment Without Reason Code) as the first two rules -- high confidence, well-understood failure modes, and manageable exception volume. Both rules operate on SAP data natively with no cross-system dependencies.
- Establish the exception review workflow: assign reviewer, define disposition categories, set review cycle length
- Run for 60 days and measure false positive rate before adding rules
- Add R-03 (Retroactive PO), R-05 (Off-Hours GL Posting), and R-09 (Inventory Adjustment Without Reason Code)
- Calibrate thresholds based on Phase 1 learning -- adjust dollar thresholds if exception volume is too high or too low
- Begin documenting findings generated by BIS output for inclusion in the risk assessment
- Activate the BIS machine learning layer to begin establishing baseline transaction patterns
- Add R-10 (Pricing Leakage) -- requires the most configuration effort due to material master cross-referencing; sequence it after the team has BIS operational experience
- Add R-02 (Vendor-Employee Match), R-04 (Split PO), R-07 (Inactive Vendor Payment), R-08 (SoD Conflict) as volume and review capacity allow. Note that R-02 requires a cross-system data join if HR is managed in Workday -- confirm the data availability before scheduling this rule for deployment.
- Enable ML-enhanced predictive scoring on high-volume rules to reduce false positives
- Connect BIS alert data to SAP Analytics Cloud dashboard for leadership visibility
The IT Handoff Package
The rules and thresholds in this guide are written to be handed to an IT GRC configuration team directly. Each rule contains the SAP table references, field names, and logic required for BIS rule configuration. What the IT team will need in addition: the specific company codes and document type scope to apply, the threshold values confirmed by audit, the exception owner names and routing logic for the alert queue, and the testing plan for validating each rule against historical data before going live.
What audit must provide before IT can configure each rule:
- Confirmed company code scope
- Document type inclusions and exclusions
- Dollar or quantity threshold value with documented rationale
- Exception owner name and role
- False positive filter list (any known legitimate patterns specific to your organization)
- Acceptance testing criteria (what constitutes a successful rule test)
The end-to-end monitoring workflow -- from data access configuration through exception closure