Best Practices for User Access Controls and Segregation of Duties Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.

Slides:



Advertisements
Similar presentations
Travel and Expense Management Scenario Overview
Advertisements

Improving SOX Remediation Through Automated Testing of Internal Controls November 4, 2005.
Introduction to Enterprise Risk Management (ERM)
1 FACTA ID Theft Programs Auditing for Compliance Steven Nyren, CRCM Sheshunoff Consulting & Solutions BCAC Program – September 2008.
© 2004 ERPS Sarbanes-Oxley Best Practices in an Oracle Applications Environment Jeffrey T. Hare, CPA ERP Seminars.
Travel and Expense Management Scenario Overview
SAP Travel OnDemand Travel and Expense Management
Sarbanes-Oxley Compliance Process Automation
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
The TRUTH About SOX, Auditors & Oracle Applimation is the leading provider of Application Lifecycle Management solutions.
OAUG SOX Panel Krista Ladd Oracle Applications Manager Silicon Image, Inc.
…optimise your IT investments Spreadsheet Management Maturity Model Philip Howard Research Director – Bloor Research.
ProCognis SOX 404 & COSO Implementation Presentation
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Sales & Cash Receipts Transactions By David N. Ricchiute
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
Common Change Management Challenges for Companies Running Oracle Applications Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
SAS 112: The New Auditing Standard Jim Corkill Controller Accounting Services & Controls.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Best in Class Controls for AP The Institute of Financial Operations Indiana – Southern Illinois Chapter June 15, 2011 Sherry DePew.
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
Data Governance Data & Metadata Standards Antonio Amorin © 2011.
Practical Implementation of Automated Assessment Tools for the IT Auditor John A. Otte, CISSP, CISA, CFE, EnCE, MSIA Director, Strategic Services FishNet.
Segregation of Duties for Infor-Lawson Software 1.
Presentation to Senior Management MiFID for Senior Managers Introduction These slides introduce the big changes for senior management from MiFID.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Chapter 5 Internal Control over Financial Reporting
Page 1 Internal Audit Outsourcing The Moss Adams Approach to Internal Audit Outsourcing Proposed SOX 404 Changes.
L/O/G/O คลินิก ไอเอ ครั้งที่ 6/2011 The New Auditor Toolkit ตลาดหลักทรัพย์แห่งประเทศไทย ห้องประชุม 1101 ชั้น มิถุนายน 2554.
IT Service Delivery And Support Week Eleven – Auditing Application Control IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA.
Best Practices for Implementing Third Party Software to Monitor SOD and User Access Controls Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
Auditing Information Systems (AIS)
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Executive Invitation – Oracle Data Finder Service Oracle Corporation.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Everyone’s Been Hacked Now What?. OakRidge What happened?
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
Reactive Companies Meet Sarbanes-Oxley Standards, Proactive Organizations Exceed Them! Therron Hofsetz Logical Apps, Inc.
CHAPTER 5 INTERNAL CONTROL OVER FINANCIAL REPORTING.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Internal Control Systems
Screening activities Mike E. Farrell James E. Bartlett and Ghislaine C.Y. Gillessen Munich, January 2014.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals.
Security. Audit. Compliance.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
Liz Piteo Native Controls in a Microsoft Dynamics Environment.
What Can We Learn From IT Control Weaknesses Reported under SOX 404? Efrim Boritz Louise Hayes Jee-Hae Lim University of Waterloo UWCISA 6th Bi-Annual.
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Andy Snook Fastpath gives you insights on your CRM data that would make the NSA jealous Andy.
Internal and external control in an automated environment
Security. Audit. Compliance.
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
Automating Vendor Management
From Design to Cross Application Reporting
QAD Enterprise Edition Segregation of Duties
Defining Internal Control
Fraud & Internal Control
OAUG SOX Panel Scott Tang, Project Manager
Security. Audit. Compliance.
Security. Audit. Compliance.
Simplifying and Securing Vendor Information
Fraud & Internal Control
Federal Reserve Retail Payments Risk Forum
Unit 11 October 22, 2017.
SAP GRC EOH GRC Solutions Divisional divider Option 1.
Presentation transcript:

Best Practices for User Access Controls and Segregation of Duties Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars

© 2008 ERPS Overview: Introductions Deficiencies in Current Approaches to SOD Taking a Risk-Based Approach to User Access Controls Q&A Public Domain Collaboration Oracle Apps Internal Controls Repository OUBPB / ERP Seminars Initiatives Other Resources Contact Information Presentation Agenda

© 2008 ERPS Introductions Jeffrey T. Hare, CPA CISA CIA Founder of ERP Seminars and Oracle User Best Practices Board Written various white papers on SOX Best Practices in an Oracle Applications environment Frequent contributor to OAUG’s Insight magazine Experience includes Big 4 audit, 6 years in CFO/Controller roles – both auditor and audited perspectives In Oracle applications space since 1998– both client and consultant perspectives Founder of Internal Controls Repository - public domain internal controls repository for end users

© 2008 ERPS Deficiencies in Current Approaches to SOD Projects Here are some common deficiencies in how companies are approaching SOD projects: Relying on seeded content of software providers Not taking a risk-based approach, considering current controls, in defining what risks there are for their company Not considering all user access control risks – access to sensitive functions and access to sensitive data Not looking at business process risk holistically – from outside the system through access and processes inside the system. Examples, suppliers, AR write offs, access to cash Not having a good grasp on requirements for the RFP

© 2008 ERPS Taking a Risk-Based Approach to User Access Controls Types of Risks: Segregation of duties - a user having two or more business processes that could result in compromise of the integrity of the process or allow that person to commit fraud Access to sensitive functions – a user having access to a high risk function that, in and of itself, has risk Access to sensitive data – a user having access to sensitive data such as employee identification number (US= SSN), home addresses, credit card, and/or bank account information.

© 2008 ERPS Taking a Risk-Based Approach to User Access Controls Approach to Risk Assessment Project: 1.Identify access control conflicts 2.Identify risks associated with each conflict 3.Identify, analyze, and document mitigating controls related to each risk 4.Assess what is the residual risk after taking into account the mitigating controls 5.Discuss residual risks with management and assess their willingness to assume the risk 6.Document remediation steps for unmitigated risks 7.Document whether the conflict (single of combination of access) should be monitored in third party software and use as basis for RFP

© 2008 ERPS Taking a Risk-Based Approach to User Access Controls In our experience, a completed risk assessment process exposes the following needs: An SOD monitoring tool (or one with a preventive workflow) A tool to develop a detailed audit trail Various monitoring reports or processes not provided by Oracle The need to personalize forms to support defined controls. Custom workflows to automate controls where Oracle’s functionality is deficient Process and/or controls changes Documentation and testing of non-key controls Access control changes Additional projects and research that need to be done

Q & A

© 2008 ERPS Public Domain Collaboration What is needed are standards for collection of: Tables to audit as data is migrated (for example banks) Additional functions and functionality is added Internal Controls Repository: Publishing list of critical forms, tables, columns to audit prioritized by risk Promoting use of our risk assessment process as the standard in the industry with agreement on language and mapped to the function level Public domain collaboration will insure consistency and quality

© 2008 ERPS Oracle Apps Internal Controls Repository Internal Controls Repository Content: White Papers such as Accessing the database without having a database login, Best Practices for Bank Account Entry and Assignment, Using a Risk Based Assessment for User Access Controls, Internal Controls Best Practices for Oracle’s Journal Approval Process Oracle apps internal controls deficiencies and common solutions Mapping of sensitive data to the table and columns Identification of reports with access to sensitive data

Other Resources © 2008 ERPS Oracle Users Best Practices Board: Cam’s white paper on Auditing the DBA at: Integrigy white papers at: resourceshttp:// resources Solution Beacon: Oracle internal controls and security public listserver:

© 2008 ERPS Best Practices Caveat The Best Practices cited in this presentation have not been validated with your external auditors nor has there been any systematic study of industry practices to determine they are ‘in fact’ Best Practices for a representative sample of companies attempting to comply with the Sarbanes-Oxley Act of 2002 or other corporate governance initiatives mentioned. The Best Practice examples given here should not substitute for accounting or legal advice for your organization and provide no indemnification from fraud or material misstatements in your financial statements or control deficiencies.

© 2008 ERPS Contact Information Jeffrey T. Hare, CPA CISA CIA Phone: Websites: Oracle SOX eGroup at Internal Controls Repository ontrols/ ontrols/