Enhanced Security Management, Separation of Duties and Audit Support for XA Belinda Daub, Senior Consultant Technical Services

Slides:



Advertisements
Similar presentations
Highlights: Simplify or expand data required to track time and attendance Configure timesheet formats by individual or group Maintain consistency with.
Advertisements

Supplier Contract Management © 2006 Oracle Corporation – Proprietary and Confidential 2. Author & Negotiate 5. Amend4. Monitor and Track 6. Renew & Closeout.
“The Honeywell Web-based Corrective Action Solution”
Take the ‘dread’ out of your XA Security Audit Belinda Daub, Senior Consultant Technical Services
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Using XA Browser/Power-Link Preferences to Improve Efficiency
Group 3 Maria Fernandez de Castro Sonia Canessa-Gonzalez Andres Suarez
Choose and Book Archive New functionality from November 2012.
Program Management Portal: Overview for the Client
GP2013 (R2) New features in GP2013 (R2). New Ribbon for windows Edit List is the Print button on the right without the paper background Action pane can.
PantherSoft Financials Smart Internal Billing. Agenda  Benefits  Security and User Roles  Definitions  Workflow  Defining/Modifying Items  Creating.
Paperless Online Payroll, Integrated HR & Report Generating System.
QUT Payroll Services Sessional eForm Presented by Christine Delaney, QUT Payroll Manager with Technical Support from Edward Eacock, QUT Financial Systems.
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
Page 1 of 16 The Work in Progress screen is accessed from the ETS main menu. The screen will be displayed when a user clicks on the ‘Work in Progress’
Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney.
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Chapter 4-1 The Islamic University of Gaza Accounting Information System The Expenditure Cycle : Purchases and Cash Disbursements Procedures Dr. Hisham.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Planview for Resource Managers: Create Your Project
SAP An Introduction October 2012.
Train The Trainer Employee Central Administration
Complete Weekly Timesheets Select work. Add hours and comments Tell Mgr if ETC=0 and need more time. Tell Mgr if using someone else’s ETC. End week, change.
An Overview of IFM R9 “Who moved my Stuff……..” IFM at R9 CISTECH Tuesday Education Session Series Jim Boyer CISTECH – Sr. XA Consultant.
Chapter 7 Database Auditing Models
Integrate your people maximize your knowledge Tel SalesBase Customer.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
Classroom User Training June 29, 2005 Presented by:
The Islamic University of Gaza
Denise Luther Senior IT Consultant Practical Technology Enablement with Enterprise Integrator.
Employee Central Administration
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
T. Rowe Price, Invest With Confidence and the Bighorn Sheep logo is a registered trademark of T. Rowe Price Group, Inc. Please dial from.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
ROUND 3 User Security Set Up Presented by: Shirley Criscillis, Frank Green and Mollie Alberts.
Roles and Responsibilities
Summary Data Modeling SDLC What is Data Modeling Application Audience and Services Entities Attributes Relationships Entity Relationship Diagrams Conceptual,Logical.
Module 9 Configuring Messaging Policy and Compliance.
TxEIS Security A role-based solution October 2010.
Module 3: Administrator Set-Up Intuit Financial Services University Internet Banking Certification Training.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
1. To start the process, Warehouse Stationery (WSL) will invite you to use The Warehouse Group Supplier Electronic Portal and will send you the link to.
Module 9 Configuring Messaging Policy and Compliance.
0 eCPIC Admin Training: Automating User Account Management These training materials are owned by the Federal Government. They can be used or modified only.
1 Authority on Demand Provide high authority “as-needed” with full Audit Trail.
Managing a MAPICS R7/R9 PowerLink Environment (704)
Enterprise Integrator CISTECH R7.8 SERIES Denise Luther Senior Consultant, Technical Services
R7 Integrator and Enterprise Integrator: You won’t believe this is XA… Deborah Vermillion, VP Consulting Services, CPIM, CIRM Belinda Daub, Senior Consultant.
XA BROWSER WORKBENCHES ARE COOL! (Broadcast/Receive for Regular Tasks) Brenda Butler, Senior Consultant
Canadian Payroll and HR Presented By: Diane Lee Sousa.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
SAP Account Administration Account Administration.
AR350: Maintaining Customers Welcome to AR350: Maintaining Customers.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
PaymentNet: Approvers Procurement Services Laurie Krauel.
Medical Eligibility Verifications 1. Medical Eligibility: Verifications Introduction After completing this course, you will be able to: Recognize shared.
ANUA 2011, Ft. Lauderdale INTRO Finance 2.0 Highlights ANUA 2011, Ft. Lauderdale education solutions development inc.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED CREATING A SIMPLE PROCESS.
CommonFloor Groups : Apartment Communities Admin User Guide.
Tips and Tricks: Stress Free Security in Dynamics AX Chris Haley, Microsoft.
Comp Tax Presenter : Kara Moore.
How to Setup and Utilize Functionality
Welcome! To the ETS – Create Client Account & Maintenance
Managing the IT Function
QAD Enterprise Edition Segregation of Duties
Ohio Web Portal Ohio Edison, Illuminating Company, Toledo Edison
Microsoft Office Access 2003
Presentation transcript:

Enhanced Security Management, Separation of Duties and Audit Support for XA Belinda Daub, Senior Consultant Technical Services

Concepts, best practices, and tools to meet requirements for internal controls: Separation of Duties Routine User Access Review Security Change Management Role-based security management Agenda

Meeting Audit Requirements How do XA customers handle this today? –Write queries against the eight XA files Output to work files Download to Excel Cut and paste –Must account for Unlocked tasks Private authorities Group access Environment Access Custom Applications Manual tasks (not tracked by application security) –IFM Security Different files Translate authority levels to tasks

Meeting Audit Requirements Challenges –Very time-consuming and costly to the organization Security Manager coordinating reviews and managing identified risks IT personnel assembling information and resolving risks Area Owners reviewing and approving user access –Must have a thorough understanding of CAS and IFM security logic and data base relationships –Data owners must understand what the application tasks do –Data owners rarely know all the users and what they do –Security request forms are difficult to create –Often ineffective - ‘just going through the motions’

Meeting Audit Requirements Even if legislation were not enforcing these controls, we should implement them ourselves. By protecting our company, we also protect ourselves, our families and all those who have a vested interest in the company’s future. However, implementing such controls should not consume the resources of the organization.

Separation of Duties

SOD Concepts Separation of duties concepts –No single person has sole control over the lifespan of a transaction. One person should not be able to initiate, record, authorize and reconcile a transaction. –Assures that mistakes, intentional or unintentional, cannot be made without being discovered by another person.

Best Practices –The level of risk associated with a transaction should come into play when determining the best method for separating duties. –Duties may be separated by department or by individuals within a department. –Separation of duties should be clearly defined, assigned and documented. –Separation of duties should be able to be demonstrated to an outside party. –Increase the review and oversight function when it is difficult to sufficiently separate duties (compensating controls). SOD Concepts

Meeting Audit Requirements What conflicts should be configured? –Purchase to Pay –Order to Cash –Personnel/Labor to Payroll –Administer security and maintain application data How do you define a conflict? –A function may be multiple XA Tasks Create Purchase Orders POR COPYProcurement PO Copy POR CREATEProcurement PO Create AM6M1001 Purchasing Enter/Edit Pos AM6M1013 Purchasing Create POs from Offline files –Any PO Create task can conflict with any AP Invoicing task thousands of conflict variations Doing this manually would consume your IT resources for an extended period (for every audit)

SOD Violations Management with Enhanced Security

–Configure rules by area, task or combination –Run the violations build program –Review and address violations –Finalize the SOD Analysis for Auditors ES Security Audit Tools Manage SOD Rules and Violations ES includes a Model for SOD Rules –Common SOD Conflicts –Tailor to your needs –IFM and CAS security

SOD Rules – two conflicting tasks or areas (group of tasks) Configure SOD Rules

Generate the SOD Violations file to review all violations ES Security Audit Tools

SOD Violations Review – Resolution View Manage resolutions within the application Fields provided for tracking activities Assigned security administrators subset to their action list Compliance manager subset by resolved/unresolved violations ES Security Audit Tools

Action to take: –Revoke authority to task –Verify Compensating control –Remove Conflict SOD Violations Management ES Security Audit Tools Resolution tracking: –Resolved by –Date and Time Reference Information: –Control Document Number –Reference for documentation specific to this violation –Notes with information pertaining to the resolution or reason the conflict can be removed from the rules

SOD Violations Management View transaction history and current user rights (will discuss later) to show that user access has been revoked in accordance with SOD review Export to PDF using Power Link Perform this review process as often as necessary Use a test environment to determine if changes in security will create SOD violations before you make them ES Security Audit Tools User Info

User Access Review

Access Review Concepts Basic Concepts –Ensure that users can only perform those activities necessary to do their assigned jobs –Ensure that users who own the data are controlling who has access to view and change it –All security changes have been made in accordance with internal controls

Access Review Concepts Best Practices –Formal request and approval for new users and requested changes –Users assigned to own responsibility for the integrity of the data (not IT) –Review and approval processes should be clearly defined, assigned and documented. –Review activities should be able to be demonstrated to an outside party.

Meeting Audit Requirements Extract User Access information –Manually extract applications tasks as well as user authority to them Extract to Excel via Query Unlocked tasks, private authorities, and group authority CAS and IFM task security Present in a format that is manageable –Identify owners for application tasks Many owners for the same area (different companies, divisions, locations) Owner may not know the users or what their jobs require –Manage approval process Provide user authority to each owner for review and approval Consolidate results and verify changes are completed

User Access Review with Enhanced Security

ES User Access Review Regular User Access Review –Configure Areas in CAS to be included in the review –Assign Business Owners for areas –Owners perform review for assigned areas –Security Manager finalizes the review

Configure Review Areas by Owner –Specify the Owner of each area –Specify Owner approver –Omit unlocked tasks –Approval at the area or task level –By company and/or location/department –Configure company and/or department for each user ES User Access Review

Generate and Review User Access to Areas/Tasks –Subset by owner –Approve or reject each user’s access to area or task ES User Access Review

Finalize Review Results –Verify all approvals received –Verify all rejections have resulted in changes to user access –Export to Excel or PDF for auditors ES User Access Review

Security Management with Enhanced Security

ES Monitor Security Changes Manage Security Changes (transaction history) –Review changes to security Security file changes journaled Extracted nightly Translated to actual user rights to tasks Includes when the change was made and by whom You decide how long to keep this history

Determine how a user has gained access to a task View who made the change and when Verify if changes were made that were not requested/approved Quickly identify corrective action Audit for temporary access (granted and revoked) Detailed Transaction History Includes User fields and customize to meet your needs

Visibility to XA Security CAS Security IFM Security iSeries Profiles User Info Dept Job Role and USER RIGHTS!!!

View current user rights in the environment A. User being reviewed B. Tasks the user is granted C. How access was granted Private (user id) Group (group id) Not locked (blank) A B C Security Management IFM Tasks are included so you can see everything the user can do

Visibility to XA Security Navigate from Users to other CAS files Groups the user is in Members of the group User Rights to tasks others

What do users actually use? View actual user activity Green Screen Menu options taken Changes to client objects IFM maintenance Useful for cleaning up user authority to tasks they do not use

Security Management iSeries User Profiles – view and print Power Users Special Authorities Logon Statistics Password Info Groups and group membership Startup information iSeries Object Authorities Object Owner Public authority User Authority

Security Management iSeries User Profiles – Power Users

Security Management Object Authorities – view and print All objects – all libraries User rights – display/maintain XA objects not owned by AMAPICS

Role-Based Security Management with Enhanced Security

Security Management CAS Security Users Groups Areas Tasks Private authorities

Security Management Role-Based Security Users Groups Areas Tasks Roles Enhanced SecurityCAS Security

Security Management NEW LAYER OF SECURITY – JOB ROLE Users assigned to one or more roles Roles attached to one or more CAS groups Groups authorized to ES Areas ES Areas control authority to tasks Routine Maintenance Add new user to appropriate role(s) Transition a user from one role to another Remove a user from assigned role(s) Add a role temporarily for backup of personnel Application attaches the user to the CAS groups defined for the role(s)

Security Management View role information

Security Management Auditing Role-Based Security Area owners review and approve role access to functions that update the data Role owners approve the users in roles SOD validation as users are added to roles Warning message when violation will result Much simpler than reviewing every user and every task

Thank you! Questions?