Best Practices for Implementing Third Party Software to Monitor SOD and User Access Controls Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.

Slides:



Advertisements
Similar presentations
Travel and Expense Management Scenario Overview
Advertisements

Improving SOX Remediation Through Automated Testing of Internal Controls November 4, 2005.
GP2013 (R2) New features in GP2013 (R2). New Ribbon for windows Edit List is the Print button on the right without the paper background Action pane can.
© 2004 ERPS Sarbanes-Oxley Best Practices in an Oracle Applications Environment Jeffrey T. Hare, CPA ERP Seminars.
Travel and Expense Management Scenario Overview
Sarbanes-Oxley Compliance Process Automation
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
The TRUTH About SOX, Auditors & Oracle Applimation is the leading provider of Application Lifecycle Management solutions.
…optimise your IT investments Spreadsheet Management Maturity Model Philip Howard Research Director – Bloor Research.
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.
April 28, 2015 Virginia Tech. Data Analytics “Analytics is the combustion engine of business, and it will be necessary for organizations that want to.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Copyright © 2009 Rolta International, Inc., All Rights Reserved a c c e l R12™ Upgrade Approach.
SilentWhistle Overview June 22, Allegiance at a Glance Headquarters: Salt Lake City, Utah 700+ companies; 3 million+ employees & students Global.
Chapter 7 Database Auditing Models
[ Solution Overview ] 1 of 11 7/13/2015 Lead Delivery System White Paper Directory Sales Lead & Marketing Tool Olympic Technology Consulting Services,
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Oracle Security and GRC Professional Development Program.
Common Change Management Challenges for Companies Running Oracle Applications Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
Best Practices for User Access Controls and Segregation of Duties Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
End User Computer Controls Marc Engel, CPA, CISA, CFE Risk Management Advisory Services LLC
Best in Class Controls for AP The Institute of Financial Operations Indiana – Southern Illinois Chapter June 15, 2011 Sherry DePew.
Internal Auditing and Outsourcing
Extranet Collaboration Manager Professionally manage your SharePoint Extranet and Users Peter Roth (408)
Integrated Security Solutions © 2006 TK Consulting, LP realtime Confidential March 11, 2007 APM Demo.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Primavera Highlights During COLLABORATE  Primavera Key Note: Making the Most of Your Oracle Primavera Investment Dick Faris, Primavera Co-Founder & Oracle.
Oracle GRC Live Kick Off
- 1 - Roadmap to Re-aligning the Customer Master with Oracle's TCA Northern California OAUG March 7, 2005.
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
Chapter 5 Internal Control over Financial Reporting
Page 1 Internal Audit Outsourcing The Moss Adams Approach to Internal Audit Outsourcing Proposed SOX 404 Changes.
QuickStart Toolkit & Template Extension Module Webinar 10 th of December 2009.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
L/O/G/O คลินิก ไอเอ ครั้งที่ 6/2011 The New Auditor Toolkit ตลาดหลักทรัพย์แห่งประเทศไทย ห้องประชุม 1101 ชั้น มิถุนายน 2554.
IT Service Delivery And Support Week Eleven – Auditing Application Control IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA.
Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation.
Enterprise Security for Microsoft Dynamics GP Jeff Soelberg
Auditing Information Systems (AIS)
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
presented by Oliver Lamaca Customer Account Manager.
Everyone’s Been Hacked Now What?. OakRidge What happened?
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Reactive Companies Meet Sarbanes-Oxley Standards, Proactive Organizations Exceed Them! Therron Hofsetz Logical Apps, Inc.
Business-samadhan Software Solution
CHAPTER 5 INTERNAL CONTROL OVER FINANCIAL REPORTING.
PARTNER CAMPAIGN PACK  2015 ObserveIT Campaign Roadmap  Introducing ObserveIT Partner Campaign Packs  Overview of Application User Campaign Pack.
Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals.
ONLINE KNOWLEDGE PRODUCT OF SAP GRC Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING INDIA
Oracle APPS Technical Course Online Training CONTACT US: USA: , INDIA: ,
Security. Audit. Compliance.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
Liz Piteo Native Controls in a Microsoft Dynamics Environment.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Oracle Apps Technical Online Training Introduction to ERP  Definition of ERP, Overview of popular ERP’S Comparison of Oracle Apps with other ERP’S Types.
Andy Snook Fastpath gives you insights on your CRM data that would make the NSA jealous Andy.
Security. Audit. Compliance.
Automating Vendor Management
Security. Audit. Compliance
From Design to Cross Application Reporting
Data Privacy: Essentials for Payroll
QAD Enterprise Edition Segregation of Duties
Bill.com Overview for [CLIENT NAME]
Security. Audit. Compliance.
Federal Reserve Retail Payments Risk Forum
SAP GRC EOH GRC Solutions Divisional divider Option 1.
Design Secure & Compliant Roles for Oracle ERP & HCM Cloud
Presentation transcript:

Best Practices for Implementing Third Party Software to Monitor SOD and User Access Controls Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars

© 2008 ERPS Overview: Introductions Success Factors Identifying Requirements RFP Process Likely Requirements Preventive Control Technologies Audit Trail Technologies Q&A Public Domain Collaboration Oracle Apps Internal Controls Repository Other Resources Contact Information Presentation Agenda

© 2008 ERPS Introductions Jeffrey T. Hare, CPA CISA CIA Founder of ERP Seminars and Oracle User Best Practices Board Written various white papers on SOX Best Practices in an Oracle Applications environment Frequent contributor to OAUG’s Insight magazine Experience includes Big 4 audit, 6 years in CFO/Controller roles – both auditor and audited perspectives In Oracle applications space since 1998– both client and consultant perspectives Founder of Internal Controls Repository - public domain internal controls repository for end users

© 2008 ERPS Success Factors Here are a few success factors for the acquisition and implementation of third party software: Management support – financially and physically Define requirements using a risk-based assessment process Choose an experienced partner to help you through the RFP process understands the requirements and can help add to requirements can help you differentiate the requirements in the RFP process will help you determine which technologies will best meet your requirements Choose an experienced partner to help implement the software

© 2008 ERPS Identifying Requirements Use a risk-based approach to identify the requirements that: Identifies risks with a user having access to a function or two functions – segregation of duties, access to a sensitive function or sensitive data Takes into account risks in the system as well as considers the process holistically – from manual process outside the system through process in the system; for example, supplier entry process Takes into account current controls in making an assessment of the residual risks Identifies risks that need monitoring, auditing, prevention for the software (may also identify other requirements such as additional manual controls, forms personalization, documentation or testing of non-key controls)

© 2008 ERPS RFP Process Here are some success factors for the RFP Process: Use proven RFP template or partner with firm with experience in the space Make sure the demo scripts help delineate the technology differences between the various vendors Make sure that all interested parties are present at the demos Insist on preventive controls to reduce internal and external audit costs

© 2008 ERPS Likely Requirements Here are some likely requirements that will come from a proper risk assessment process: Robust monitoring and reporting for initial remediation process to identify current conflicts Preventive controls – user provisioning, menus, responsibilities and related function and menu exclusions, functions, forms, and request groups Auditing of activity to track activity such as SQL forms, remit-to addresses, banks, suppliers, and profile options

© 2008 ERPS Pros and Cons of Various Preventive Control Technologies: Forms Personalization Custom.pll Triggers Preventive Control Technologies

© 2008 ERPS Audit Trail Technologies Pros and Cons of Various Audit Trail Technologies: Standard database fields – created by, creation date, last updated by, last updated date Log files – network and database Triggers

Q & A

© 2008 ERPS Public Domain Collaboration What is needed are standards for collection of: Tables to audit as data is migrated (for example banks) Additional functions and functionality is added Internal Controls Repository: Publishing list of critical forms, tables, columns to audit prioritized by risk Promoting use of our risk assessment process as the standard in the industry with agreement on language and mapped to the function level Public domain collaboration will insure consistency and quality

© 2008 ERPS Oracle Apps Internal Controls Repository Internal Controls Repository Content: White Papers such as Accessing the database without having a database login, Best Practices for Bank Account Entry and Assignment, Using a Risk Based Assessment for User Access Controls, Internal Controls Best Practices for Oracle’s Journal Approval Process Oracle apps internal controls deficiencies and common solutions Mapping of sensitive data to the table and columns Identification of reports with access to sensitive data

Other Resources © 2008 ERPS Oracle Users Best Practices Board: Cam’s white paper on Auditing the DBA at: Integrigy white papers at: resourceshttp:// resources Solution Beacon: Oracle internal controls and security public listserver:

© 2008 ERPS Best Practices Caveat The Best Practices cited in this presentation have not been validated with your external auditors nor has there been any systematic study of industry practices to determine they are ‘in fact’ Best Practices for a representative sample of companies attempting to comply with the Sarbanes-Oxley Act of 2002 or other corporate governance initiatives mentioned. The Best Practice examples given here should not substitute for accounting or legal advice for your organization and provide no indemnification from fraud or material misstatements in your financial statements or control deficiencies.

© 2008 ERPS Contact Information Jeffrey T. Hare, CPA CISA CIA Phone: Websites: Oracle SOX eGroup at Internal Controls Repository ols/ ols/ Cam Larner Phone: Website: