SOX Compliance: A Practical Look at Application Auditor Presented By Sunita Sarathy Product Manager Absolute Technologies, Inc.

Slides:



Advertisements
Similar presentations
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Advertisements

Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 8 Application Data Auditing.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 8 Application Data Auditing.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Copyright © 2004 Absolute Technologies, Inc. Satisfying SOX Separation of Duties Compliance Requirements Presented by Kenny Gilbert – Director of IS, Silicon.
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
Auditing Computer-Based Information Systems
SOFTWARE PRESENTATION ODMS (OPEN SOURCE DOCUMENT MANAGEMENT SYSTEM)
The Islamic University of Gaza
Sarbanes-Oxley Compliance Process Automation
The TRUTH About SOX, Auditors & Oracle Applimation is the leading provider of Application Lifecycle Management solutions.
ProCognis SOX 404 & COSO Implementation Presentation
Chapter 9 Auditing Database Activities
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
1 Classification: Genpact Internal.  Tool From Oracle  Works with Oracle Database  PL/SQL Based  Widely Used with Oracle Applications  Can be Used.
Chapter 7 Database Auditing Models
SOX Compliance with Application Auditor
Configuration Management
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
DB Audit Expert v1.1 for Oracle Copyright © SoftTree Technologies, Inc. This presentation is for DB Audit Expert for Oracle version 1.1 which.
Chapter 7 Database Auditing Models
Adapted from Afyouni, Database Security and Auditing DB Auditing Examples (Ch. 9) Dr. Mario Guimaraes.
Adapted from Afyouni, Database Security and Auditing Database Application Auditing – Ch. 8.
Presented By: Product Activation Group Syndication.
Chapter 15 Database Administration and Security
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 1. Chapter 2: Relational Databases and Multi-Table Queries Exploring Microsoft Office.
Copyright 2003 Accenture. All rights reserved. Accenture, its logo, and Accenture Innovation Delivered are trademarks of Accenture. Data Migration in Oracle.
Increasing Internal Controls with Applimation Integra.
The Islamic University of Gaza
Segregation of Duties for Infor-Lawson Software 1.
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
1 Oracle Database 11g – Flashback Data Archive. 2 Data History and Retention Data retention and change control requirements are growing Regulatory oversight.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Internal Control in a Financial Statement Audit
Module 9 Configuring Messaging Policy and Compliance.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Informix IDS Administration with the New Server Studio 4.0 By Lester Knutsen My experience with the beta of Server Studio and the new Informix database.
ABC Insurance Co. Paul Barry Steve Randolph Jing Zhou CSC8490 Database Systems & File Management Dr. Goelman Villanova University August 2, 2004.
Best Practices for Implementing Third Party Software to Monitor SOD and User Access Controls Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
Additional Security Tools Lesson 15. Skills Matrix.
Auditing Information Systems (AIS)
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Triggers A Quick Reference and Summary BIT 275. Triggers SQL code permits you to access only one table for an INSERT, UPDATE, or DELETE statement. The.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 9 Auditing Database Activities.
Reactive Companies Meet Sarbanes-Oxley Standards, Proactive Organizations Exceed Them! Therron Hofsetz Logical Apps, Inc.
37 Copyright © 2007, Oracle. All rights reserved. Module 37: Executing Workflow Processes Siebel 8.0 Essentials.
Fall 2001Database Systems1 Triggers Assertions –Assertions describe rules that should hold for a given database. –An assertion is checked anytime a table.
What is a Package? A package is an Oracle object, which holds other objects within it. Objects commonly held within a package are procedures, functions,
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Collaborative Planning Training. Agenda  Collaboration Overview  Setting up Collaborative Planning  User Setups  Collaborative Planning and Forecasting.
1 Intro stored procedures Declaring parameters Using in a sproc Intro to transactions Concurrency control & recovery States of transactions Desirable.
The world leader in serving science OMNIC DS & Thermo Security Administration 21 CFR Part 11 Tools for FT-IR and Raman Spectroscopy.
SQL SERVER AUDITING. Jean Joseph DBA/Consultant Contact Info: Blog:
Chapter 3-Auditing Computer-based Information Systems.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
3 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. PeopleSoft General Ledger 9.2 New Features 9.2 Release New Features.
SQL Database Management
Active Database Concepts
Michael Mast Senior Architect
Managing the IT Function
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Presentation transcript:

SOX Compliance: A Practical Look at Application Auditor Presented By Sunita Sarathy Product Manager Absolute Technologies, Inc

Sarbanes Oxley Act SOX – Signed into law on July 30, 2002 as a result of various accounting scandals SOX – Signed into law on July 30, 2002 as a result of various accounting scandals Section 404 requires public companies to attest to the effectiveness of their internal controls over financial reporting Section 404 requires public companies to attest to the effectiveness of their internal controls over financial reporting Section 302 requires that CEO’s and CFO’s vouch for the integrity of their financial statements Section 302 requires that CEO’s and CFO’s vouch for the integrity of their financial statements

Section 404 Compliance Compliance with SOX 404 has 4 steps Compliance with SOX 404 has 4 steps 1. Identify Key Internal Controls 2. Document the identified Internal Controls 3. Management Test of Internal Controls 4. Auditor Test of Internal Controls

Internal Controls What is an Internal Control? What is an Internal Control? Objectives of Internal Controls Objectives of Internal Controls –Ensure integrity and reliability of information –Compliance with policies, laws and regulations –Safeguarding of assets –Economical and efficient use of resources –Accomplishment of established objectives and goals

When Internal Controls aren’t met… 1. Deficiency (No requirement to report it) 2. Significant Deficiency (Must be reported to the audit committee, but not to the public) 3. Material Weakness (Needs to be disclosed publicly, in company financial statements)

Internal Controls in IT SOX Section “Management has to ensure appropriate internal controls of financial reporting” SOX Section “Management has to ensure appropriate internal controls of financial reporting” Most companies have software applications that impact Financial Reporting, like Oracle, SAP etc Most companies have software applications that impact Financial Reporting, like Oracle, SAP etc Therefore, most IT Applications would need to be regulated as per SOX requirements! Therefore, most IT Applications would need to be regulated as per SOX requirements!

IT Internal Controls Most companies adopt some or all of these Best Practices: Most companies adopt some or all of these Best Practices: –Documentation –Approvals –Separation of Duties –Testing –AUDITING

Why Audit? When critical or financial impacting data isn’t audited properly… …financial statements may be incorrect due to mistakes, or fraud Auditors may identify inconsistencies as significant deficiency or material weakness Auditors may identify inconsistencies as significant deficiency or material weakness

Auditing Oracle There are several auditing options in Oracle: Oracle Database – Audit Feature Oracle Database – Audit Feature eBusiness Suite – Row Who Columns eBusiness Suite – Row Who Columns eBusiness Suite – End User Access eBusiness Suite – End User Access eBusiness Suite – Oracle Alerts eBusiness Suite – Oracle Alerts eBusiness Suite – Audit Trail eBusiness Suite – Audit Trail Absolute Technologies Application Auditor Absolute Technologies Application Auditor

1. Database Audit Feature Set audit_trail parameter = TRUE in init.ora file and restart the database Set audit_trail parameter = TRUE in init.ora file and restart the database Execute SQL audit commands from SYSTEM user in SQL*Plus Execute SQL audit commands from SYSTEM user in SQL*Plus Audit various database transactions Audit various database transactions Transactions are captured in the SYS.AUD$ table Transactions are captured in the SYS.AUD$ table

Limitations Does not provide before and after values for column changes Does not provide before and after values for column changes No standard reporting, or form level access to data No standard reporting, or form level access to data No way to provide user notification, as the audit table is owned by SYS (cannot define triggers on SYS tables) No way to provide user notification, as the audit table is owned by SYS (cannot define triggers on SYS tables)

2. EBS – Row Who CREATION_DATE Date and Time row was created CREATED_BY Oracle Applications user ID from FND_USER LAST_UPDATE_LOGIN Login ID from FND_LOGINS LAST_UPDATE_DATE Date and Time row as last updated LAST_UPDATED_BY Oracle Applications user ID from FND_USERS Can be accessed by selecting Help > Record History, in the Oracle Applications Menu Can be accessed by selecting Help > Record History, in the Oracle Applications Menu Columns can also be selected from within SQL Columns can also be selected from within SQL

Limitations Only stores the identities of the user that created the record, and the user that made the latest change Only stores the identities of the user that created the record, and the user that made the latest change Does not store old and new values of the changed columns Does not store old and new values of the changed columns Cannot handle changes made by processes external to the security of Oracle Applications Cannot handle changes made by processes external to the security of Oracle Applications Information is stored within the subject table, making it less convenient for centralized audit reporting Information is stored within the subject table, making it less convenient for centralized audit reporting

3. EBS – End User Access The system profile option “Sign-On: Audit Level” controls the level of end user access auditing The valid settings are None, User, Responsibility, and Form. ‘Form’ represents maximum auditing The standard reports for end-user auditing are: – –SignOn Audit Users – –SignOn Audit Responsibilities – –SignOn Audit Forms – –SignOn Audit Concurrent Requests – –SignOn Audit Unsuccessful Logins

Limitations Only audits end user usage of specified forms Does not audit changes at the database level Does not audit any form activity or database transaction that may be of interest to ensure compliance. Only audits user access

4. EBS – Oracle Alerts Oracle’s Exception Reporting Tool Oracle’s Exception Reporting Tool Uses SQL statements to define exception conditions Uses SQL statements to define exception conditions Can be Periodic (schedule based) or Event (creates a database trigger) Can be Periodic (schedule based) or Event (creates a database trigger)

Limitations Cannot provide before and after values for changed columns Cannot provide before and after values for changed columns Event Alerts fire on any change to a record within a defined table, generating unwanted transactions Event Alerts fire on any change to a record within a defined table, generating unwanted transactions May cause Concurrent Request bottlenecks May cause Concurrent Request bottlenecks

5. EBS – Audit Trail Set the System Profile Option AuditTrail: Activate to Yes As System Administrator, select Security -> AuditTrail -> Install Define applications, groups, tables and columns to audit Run Audit Trail Update Tables program to activate auditing

Limitations No single audit table for ease of reporting Can’t apply a condition to the trigger Can’t toggle an audit on/off for a single table Can’t capture data outside the scope of the audited table, like foreign table column values for ease of reporting No single record holds the before and after detail of changed column values

Key to SOX Compliance The greater the degree of automation in the development process, the better. The greater the degree of automation in the development process, the better. Automate audit triggering, and the capturing of audit data. Automate audit triggering, and the capturing of audit data. Ease of audit reporting Ease of audit reporting

Enter Application Auditor Application Auditor is a comprehensive auditing solution that can be installed and configured within minutes Application Auditor is a comprehensive auditing solution that can be installed and configured within minutes Standard, user-friendly interface based on Oracle Developer tools Standard, user-friendly interface based on Oracle Developer tools Simplifies audit reporting, as all audit records go to one table Simplifies audit reporting, as all audit records go to one table

Application Auditor Source Table (FND_USER) Source Table (AP_CHECKS) Source Table (ORDER_HOLDS) App Auditor Transaction Details (Destination) Table

Audit Design Audit dynamically creates trigger-procedure combination Audit dynamically creates trigger-procedure combination Database Objects are created in the AA schema Database Objects are created in the AA schema Trigger is defined on Source Table, to be fired upon change to Source Columns Trigger is defined on Source Table, to be fired upon change to Source Columns Procedure collects… Procedure collects… –Before and After Values of Source Columns –Reference Columns and other identifying Elements … and inserts them into the Transactions table

Source Table is Changed Audit Flow Table based Trigger fires, calls Procedure Procedure collects Old and New Values of Changed Column, and other Reference Columns Inserts audit data into Destination Table

Create an Audit Select a Source Table - the table to be audited Select a Source Table - the table to be auditedSource Table Source Table Register the standard AA Destination table, which will store all audited data Register the standard AA Destination table, which will store all audited dataDestination tableDestination table Identify Source Columns - the Columns that we want tracked in the Source Table Identify Source Columns - the Columns that we want tracked in the Source TableSource Columns Source Columns AA automatically collects standard reference information for each record AA automatically collects standard reference information for each recordreference information reference information AA maps the Source and Reference Column values to columns in the standard Destination Audit Table. AA maps the Source and Reference Column values to columns in the standard Destination Audit Table.maps Compile the configuration - It is now ready to audit! Compile the configuration - It is now ready to audit!

Audit Mapping (Source Columns)(Mapped Columns) START_DATE*OLD_COLUMN_VALUE START_DATE*NEW_COLUMN_VALUE LAST_UPDATED_BYLAST_UPDATED_BY TRANSACTED_DATETRANSACTED_DATE D_FND_USER_NAMEFND_USER_NAME D_TERMINALTERMINAL Source Table (FND_USER) Destination Table (ai_ce_change_trx)

Audit Features Single audit table stores – Single audit table stores – Before and After values of column Before and After values of column Table and Column name Table and Column name Trigger Action (Insert, Update or Delete) Trigger Action (Insert, Update or Delete) Primary Key of Table Primary Key of Table When and Who changed the column value When and Who changed the column value Reference additional column values within the same table at time of change Reference additional column values within the same table at time of change Embedded SQL can select additional values from other tables upon change Embedded SQL can select additional values from other tables upon change

Revision Architecture Uses Revisions to create separate audit bins Uses Revisions to create separate audit bins Audits may be migrated across revisions, or even across database instances. Audits may be migrated across revisions, or even across database instances. –Migrate Audit from Revision 1 to Revision 2 –Migrate entire Revision from Dev to Prod instance Only one compiled revision can exist at a point in time Only one compiled revision can exist at a point in time

Revision Architecture Allows the separation of audits based on user criteria Allows the separation of audits based on user criteria Allows one-step compilation of all audits in a revision Allows one-step compilation of all audits in a revision Compiled Audits Revision (example) Development Revision (example)

Audit Reporting Audit Transactions Report Audit Transactions Report Audit Transactions Audit Transactions –Displays the old and new values of the column, the database user who updated the record, and the identity of the terminal used to make the change Audit Configurations Report Audit Configurations Report Audit Configurations Audit Configurations –Displays the various audit configurations defined through Application Auditor

SOX Compliant Audit Package Pre-defined set of 65 audits, based on significant Setup and Financial Impacting tables in Oracle eBusiness Suite Pre-defined set of 65 audits, based on significant Setup and Financial Impacting tables in Oracle eBusiness Suite Package can be loaded and compiled within minutes Package can be loaded and compiled within minutes

AA Administrator Audit the Auditor! Audit the Auditor! Track users created in AA schema Track users created in AA schema Track changes to database objects in AA schema Track changes to database objects in AA schema Administrator account holds a copy of all notifications sent from AA Administrator account holds a copy of all notifications sent from AA

Audit the Auditor

Planned Enhancements Increased audit flexibility – allow a Destination Object Type ‘Procedure’ Increased audit flexibility – allow a Destination Object Type ‘Procedure’ Allow users to audit and prevent unauthorized transactions Allow users to audit and prevent unauthorized transactions Audit DDL for ANY schema Audit DDL for ANY schema Audit all transactions for a User Audit all transactions for a User

AA Customers (SIMG) Requirement – Distinguish between updates made from SQL*Plus, and updates within Oracle Apps Solution – AA’s Check Terminal feature allows the user to identify how the transaction was performed.

AA Customers (Harmonic) Requirement – Transaction Monitoring Solution – AA provides notification when unauthorized transactions occur

AA Customers (Tektronix) Requirement – Track Sales Order Changes Solution – AA’s custom table option allows for audit records to be mapped to custom tables

Finally Application Auditor is highly performance optimized…no performance issues Application Auditor is highly performance optimized…no performance issues User friendly Forms Interface for Audit Configurations and Audit Transactions User friendly Forms Interface for Audit Configurations and Audit Transactions Two step audit process (Auditor and Audit Administrator) Two step audit process (Auditor and Audit Administrator)

Thank You!

Source – Destination Tables

Source Columns

Reference Elements

Column Mapping

Audit Transactions Report

Audit Configuration Report