Archer Request and Response Tracker

With the Archer Request and Response Tracker, users can import and track information requests, assign owners to provide responses and supporting evidence, and leverage a library of preapproved responses to reduce cycle time. Completed responses can be easily reviewed, approved, and exported using mail merge templates, allowing teams to deliver accurate, consistent, and timely responses back to requestors while maintaining a complete audit trail.

Archer Exchange: With the Archer Exchange, the Archer team has created a broad selection of supplemental, value-added offerings to help you get your unique risk management program on the right path, right from the start. You can leverage the Archer Exchange offerings to expand the use of Archer solutions into new business processes and address specific industry, geographic, regulatory, or technical requirements.

Release notes

Release Date

Release Version

Notes

May 2023

6.12

Recertification

August 2020

6.8

Initial Release

Overview

Organizations often face a high volume of information requests from internal teams, clients, vendors, and third parties. Managing these requests manually can lead to long response times, inconsistent or outdated information, duplicated effort, and limited visibility into ownership and status. When multiple departments are involved, information silos and tracking challenges become even more pronounced.The Archer Request and Response Tracker centralizes and automates the request and response lifecycle. It enables organizations to document requests, assign response ownership, manage approvals, and reuse preapproved content—all from a single, streamlined hub. By standardizing how requests are handled, organizations can respond faster, maintain consistency, and improve collaboration across teams.

  Key features and benefits

Archer Request and Response Tracker enables organizations to:

  • Document and track requests for information, proposals, and so on.

  • Import requests and assign ownership for response.

  • Document and manage responses and supporting evidence. 

  • Create and maintain a library for preapproved responses.

  • Export responses using mail merge template.

Benefits include:

  • Consistent and repeatable process for managing and tracking requests for information.

  • Ensure accountability and timeliness for responses through workflow automation.

  • Minimize information silos within the organization.

  • Reduce cycle time for responding to requests.

User guide

Administrator guide

Prerequisites (ODA & system requirements)

Components

Prerequisites

Archer Solution Area (s) Audit Management
Archer Use Case(s) This offering does not require any prerequisite use cases.
Archer Applications This offering does not require any prerequisite applications.
Uses Custom Objects No
Requires Archer On-Demand Application (ODA) Licenses Two (2) Archer On-Demand Application licenses required
Archer licensing N/A

Archer requirements

Archer Platform Release 6.12 and later

Supported Archer Environments
  • On-Premises

  • SaaS

   
   

Compatible use cases & applications - Related applications

Application

Use xase

Primary purpose of the relationship

Business Unit

 

Archer Issues Management, Archer Business Impact Analysis, Archer Third Party Catalog, Archer Policy Program Management, Archer Cyber Incident & Breach Response, Archer Key Indicator Management, Archer IT Asset Catalog, Archer Business Asset Catalog, Archer Federal Assessments & Authorizations, Archer Federal Continuous Monitoring

  • To relate Business Units that are impacted by the Request

Business Processes

Archer Audit Engagements & Workpapers, Archer Business Impact Analysis, Archer IT Risk Management, Archer Controls Assurance Program Management, Archer Data Governance, Archer Top-Down Assessment, Archer Policy Program Management, Archer IT Controls Assurance, Archer Business Asset Catalog, Archer Bottom-Up Risk Assessment, Archer Federal Assessments & Authorizations, Archer Federal Continuous Monitoring.

  • To relate Business Processes that are impacted by the Request

Applications

Archer Audit Engagements and Workpapers, Archer Business Continuity and IT Disaster Recovery Planning, Archer Third Party Governance, Archer IT Asset Catalog, Archer IT Controls Assurance, Archer IT Security Vulnerabilities Program, Archer IT Risk Management, Archer Cyber Incident & Breach Response, Archer Data Governance, Archer PCI Management, Archer Information Security Management System, Archer Operational Risk Management, Archer Federal Continuous Monitoring

  • To relate Applications that are impacted by the Request

Devices

Archer Audit Engagements and Workpapers, Archer Business Continuity and IT Disaster Recovery Planning, Archer Third Party Governance, Archer IT Asset Catalog, Archer IT Controls Assurance, Archer IT Security Vulnerabilities Program, Archer IT Risk Management, Archer Cyber Incident & Breach Response, Archer PCI Management, Archer Information Security Management System, Archer Data Governance, Archer Federal Continuous Monitoring

  • To relate Devices that are impacted by the Request

Products and Services

Archer Business Continuity and IT Disaster Recovery Planning, Archer Third Party Risk Management, Archer Cyber Incident and Breach Response, Archer Controls Monitoring Program Management, Archer Business Asset Catalog, Archer Controls Monitoring Program Management, Archer Bottom-Up Risk Assessment

  • To relate Products and Services that are impacted by the Request

Third Party Engagements

Archer Third Party Catalog, Archer Third Party Risk Management, Archer Third Party Engagement

  • To relate Engagements to the Response

Contracts

Archer Third Party Catalog

  • To relate Contracts to the Response

Control Procedures

Archer IT Controls Assurance, Archer Information Security Management System, Archer PCI Management, Archer IT Risk Management, Archer Controls Assurance Program Management, Archer Data Governance, Archer Top-Down Assessment, Archer Federal Assessments & Authorization

  • To relate impacted/in place Control Procedures to Response

Policies

Archer Policy Program Management

  • To relate Policies to the Response

Document Repository

Archer Documentation Request Tracking

  • To relate Document Repository to the Response

Evidence Repository

Archer IT Controls Assurance, Archer Controls Assurance Program Management

  • To relate Evidence Repository to the Response

Findings

Archer Issues Management

  • To relate Findings to the Response

Remediation Plans

Archer Issues Management

  • To relate Remediation Plans to the Response

Exceptions Requests

Archer Issues Management

  • To relate Exceptions Requests to the Response

Components

Architecture diagram

Process diagram

Applications

Application

Description

Request Management

The Request Management application captures the request, stakeholders, and status of the request and responses.

Requirements Management

The Requirements Management application captures the requirements, ownership and responses. It also contains the list of approved standard responses and their approval for use.

Personas & access roles

Function

Description

How many (per Information System)?

Optional / Required

 

Request Manager

Responsible for managing the request and assigning ownership to requests for information, gathering responses in a timely manner, and submitting requests back to the Requestor. They can also approve requests for standard responses.  Could be someone from Legal, Procurement, or a Business Manager.

One

 

Required

Response Owner

Responsible for providing responses to the request and submitting requests to standardize responses. This can be anyone from the organization that can provide the responses for requests.

Many

Required

Response Approver

Responsible for approval of standard responses and/or responses. This can be the Request Manager or someone with similar authority over the response.

One

Optional

Applications

Request Manager

Response Owner

Response Approver

Request Management

CRU*

R

RU*

Requirements Management

CRU*

CRU*

RU*

Business Units

R

R

R

Business Processes

R

R

R

Applications 

R

R

R

Devices

R

R

R

Products and Services

R

R

R

Engagements

R

R

R

Contracts

R

R

R

Control Procedures

R

R

R

Policies

R

R

R

Evidence Repository

R

R

R

Document Repository

R

R

R

Findings

R

R

R

Remediation Plans

R

R

R

Exceptions Requests

R

R

R

C = Create, R = Read, U = Update, D = Delete, * Indicates Record Permissions

Note: Assign members of the Request Manager, Response Owner, and Response Approver groups to the EM: Read Only and TM: Read Only groups under Enterprise Management and Third Party Risk Management to allow selection of Business Unit, Business Processes, Applications, Devices, Third Party Engagements, Products and Services, and so on.

Install Archer Request and Response Tracker

  1. Prepare for the installation.

    1. Obtain the installation package.

    2. Read and understand the "Packaging Data" topic in the Archer Platform Help.

    3. Apply the latest license file in the Archer Control Panel.

  2. Install the package.

  3. Test the installation. Test the application according to your company standards and procedures, to ensure that the use case works with your existing processes.

Install the package

Installing a package requires that you import the package file, map the objects in the package to objects in the target instance, and then install the package.

Task 6: Activate advanced workflow

  1. Go to the Applications page.

    1. From the menu bar, click Admin menu.

    2. Under Application Builder, click Applications.

  2. In the Applications section, select the Requirements Management Application.

  3. On the Advanced Workflow Tab, click ‘Activate’ in the top right corner of the page.

  4. Then click ‘Save Workflow’ in the top left corner of the page.

Certification environment

Date tested: May 2023

Product Name

Version Information

Operating System

Archer

6.12

Windows Server 2012