And Audits What to Expect and What You Need to Know Frank Vukovits Vice President of Strategic Partnerships Fastpath Kelly Kane AXUG Kentucky Chapter Leader.

Slides:



Advertisements
Similar presentations
TC 4, 6, 10, 13 On-line Trading System 1, 2, 4
Advertisements

Security and Personnel
Appendix B: Designing Policies for Managing Networks.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
IS Careers, Jobs and Organizational Roles. Contemplative Questions  Would I enjoy a career in IS?  What type of positions are available in IT?  In.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Chapter 10 Managing the Delivery of Information Services.
Computer Security Fundamentals
Management Responsibility Procedure Tutorial. Introduction to Management Responsibility In this presentation we will discuss how to write a procedure.
Price Management Module
Network security policy: best practices
Chapter 7 Database Auditing Models
1 LOGICAL ACCESS FOR University Medical Group Saint Louis University Click the Speaker Icon for Audio.
Computers & Employment By Andrew Attard and Stephen Calleja.
Requirements Walk-through
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
H UMAN R ESOURCES M ANAGEMENT Beki Webster Director, HR, Intelligence Systems Division Northrop Grumman Information Systems July 31, 2009.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Learningcomputer.com SQL Server 2008 – Administration, Maintenance and Job Automation.
TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
Gaspar Modelo-Howard NEEScomm Cybersecurity Software Engineer Saurabh Bagchi NEEScomm Cybersecurity Officer.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
Chapter 15 Telecommunication Department Management.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Computer Technology: Your Need to Know Chapter 1 Slide 1.
HR SECURITY  EGBERT PESHA  ALLOCIOUS RUZIWA  AUTHER MAKUVAZA  SAKARIA IINOLOMBO
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Information Security and Privacy in HRIS
How to survive an audit. Gib – President MDLUG.org Audit tips. What to document. 1. Clarify goals 2. Review / Understand Policies 3. Write Documents Describing.
SQL Database Management
Review of IT General Controls
ONBOARDING INFORMATION THROUGH PEOPLE ADMIN/ APPLICANT TRACKING
Identity and Access Management
Information Technology (IT) Audits
Presented by: Michele Foster
Personnel actions in People Admin PD module
Hiring Manager onboarding
Multnomah Education Service District
Managing the Delivery of Information Services
How to Implement an IG Manufacturing Quality Procedure System
Multnomah Education Service District
What, When, Why, Where and How SCC maintains your Oracle database
Presented by: Sandi James - The Resource Group
ServiceNow Implementation Knowledge Management
MVP Insight: The Amazing World of Building Bills of Materials (BOMs)
(Hardware & Infrastructure)
Description of Revision
Management Responsibility
Unit 7 – Organisational Systems Security
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
Chapter 1 (pages 4-9); Overview of SDLC
Network Security Best Practices
Information Security Awareness
Employee Change Process
HR TOOLS Webinar Wednesdays Anna Elento-Sneed April 4, 2018
Introduction to ISO & The Quality Process.
ONBOARDING INFORMATION THROUGH PEOPLE ADMIN/ APPLICANT TRACKING
Drew Hunt Network Security Analyst Valley Medical Center
Apply for Security Roles Where to get more Info Summer/Winter Hires
6. Application Software Security
Property Control Asset Forms
HOW TO WRITE A JOB DESCRIPTION
Presentation transcript:

and Audits What to Expect and What You Need to Know Frank Vukovits Vice President of Strategic Partnerships Fastpath Kelly Kane AXUG Kentucky Chapter Leader Information Systems Specialist Algood Food Company

Objectives  Managing Your Auditor  Discuss what the auditor is looking for  Answer the question: “Why do they need that?”  AX requirements  IT requirements  Share experiences

So, you’re being audited and they’re asking about AX…

OOrg Chart EEmployee Handbook IIT Job Descriptions IIT policies IIT Strategic Plan IIncident Ticket PPatch/Release Sign-off MManagement Change Approval EEmployee Listing NNew Hire Listing TTermination Listing NNew User Form TTermination Form  AX User Listing  AX Administrators  AX Password Parameters  Network Password Parameters  AX Security Logs  AX User Access Level Review  OS Administrators  Database Logs  Remote Access Users  Backup Scheduler  Backup Testing  System Alerts  Error Notifications

Why all of the HR policies?  Org Chart President CIO Developer Support Engineer Business Analyst

Why all of the HR policies?  Employee Handbook  Any type of IT policies  Acknowledgement form signed by all employees  Updates and how communicated  IT Job Descriptions  Employee Listing  New Hire Listing  Termination Listing  AX User Listing  Auditor will compare Employee Listing vs. AX User Listing  Auditor will compare New Hires/Terms vs. AX User Listing

Why all of the HR policies?  New User Form  Auditor is looking for proof of approved AX access  Who the form goes to within your company Form should contain the following: Employee name Department Job Title Supervisor Network Username/ Address System Access (Different systems within your company: AX, MES, WMS, etc.) Any hardware needed (Not a requirement, but nice to have)

Why all of the HR policies?  New AX User Access Form/Change Form  Approved AX access  Signed off by management  For all new users and AX access changes Form should contain the following: Employee name Department Job Title/Responsibilities Supervisor Network Username/ Address System Access

Why all of the HR policies?  Termination Form/  Looking for proof that terminated employees no longer have access to your network/systems  Who gets this information within your company  The auditor WILL compare the termination listing against your active listing and AX active user list to ensure that access is cut off.

IT Policies  Incident Response Plan  Purchase Order Workflow Process  A document detailing the parameters of your purchasing workflow  Source Code Monitoring  Backup Procedures  Password Parameters

Change  Auditors are very focused on changes made to the system  Incident tickets  Patch/release sign offs  Management change approval (BRD)  Database change logs  Source code change logs

Access  Auditors want to know who has access and to what  Sys Admin security in AX  OS Admins  Domain Admins  Remote access users  AX user access  SQL Database Accounts

Backups  Backup scheduler  How often  Where stored  How accessed  Backup Testing  Regular restore tests  Proof of backup restore

Kelly’s Biggest Tip for Audits Don’t overshare!

Managing Your Auditors  No much information currently out there about ‘Auditing AX’  Most auditors tend to follow generic audit programs  Gather critical information for auditors ahead of time, and then ‘dazzle’ them with your controls knowledge  “These aren’t the reports you are looking for”  However, still be careful not to send them down any rabbit holes  There can be control gaps in your Dynamics AX environment, remember it’s okay to accept the risk sometimes