Chapter 6: Developing a Proper Audit Trail for your EBS Environment
|
|
|
- Elizabeth Miles
- 10 years ago
- Views:
Transcription
1 Chapter 6: Developing a Proper Audit Trail for your EBS Environment In Chapter 2, we looked at the inherent architecture of EBS and some implications regarding the lack of a detailed audit trail. Three implications we looked at relate to application controls, change management, and privileged user access and monitoring. The lack of a sufficient audit trail can also have an impact on Sarbanes-Oxley audits, the ability to prevent fraud, and the ability to diagnose application problems. To develop a proper audit trail, we need to look at the technologies available and their pros and cons. The four categories of audit trails we will review are: 1. Standard application audit information (aka row who, created by/last updated by information) 2. Sign-on audit 3. Snapshot-based technologies 4. Advanced application audit trail methodologies Standard Application Audit Information As discussed in Chapter 2, the standard audit information depends on the level of detail created by the application logic. Most of the transactions, master data maintenance, and configurations contain only the most basic level of information. This information is sometimes referred to as the Row Who information because it identifies who entered and/or last maintained information related to a particular row in the database. The information stored is as follows: Created by which application user created the record Creation date the time date stamp the record was created Last updated by which application user last updated the record Last update data the time date stamp the record was last updated As was illustrated in in Chapter 2, the above information is NOT sufficient for most auditing purposes. The data only reflects the state of the record as of the last time it was updated and provides no history of detailed changes between the time the record was created and the last time it was updated. Having said that, in cases where the created by and last updated by values are the same, it appears that the record has NOT been updated and would likely represent the only activity related to that record. Once a record has an update to it, you would need an advanced auditing technique in order to create a detailed, sufficient audit trail of all changes made to the record, not just the last change. Page 1 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
2 Sign-on Audit Information Many organizations enable the profile option Sign-On:Audit Level to give them some additional auditing. This profile option can be set as: None (default), User, Responsibility or Form; with Form being the lowest level (i.e. most audit information created). I recommend, as does Oracle in its Metalink Note , to set this profile option to Form. By setting it to Form the application tracks every login to the application, every responsibility used by the users, and every form opened by the users. However, this functionality only exists to track user activity in professional forms, not OA framework forms. Professional forms are those that are accessible via the Navigator. An example is Enter Journals in Figure 1. Figure 1 OA framework forms are HTML web pages and are not tracked through the SignOn Audit process. An example is Account Analysis and Drilldown page in Figure 2. Page 2 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
3 Figure 2 Since the Signon Audit report information only relates to professional forms, it is not at all complete. However, it provides some very basic information (i.e. what forms are accessed) which is of use in auditing professional forms. As more new forms are developed in OA framework pages and existing forms are redeveloped in the OA framework, this information becomes less and less valuable since it will represent an increasingly smaller portion of the activity. For example, in release 12, two critical forms related to fraud (Suppliers and Bank Accounts) have been re-developed us OA framework technology. If you set this profile option at the Form level, as recommended, this setting will track the users logins, which responsibilities are used, and which forms they access. However, the reporting gives you no indication of WHAT was done when the user accessed the forms. Some organizations require their privileged users to log which responsibilities and forms are used when addressing help desk tickets in order to provide some level of accountability for their activities. Those organizations may use the SignOn Audit information to verify which forms were accessed by a privileged user and compare the information to what was logged by the user. While this provides some accountability, it does not provide absolute assurance. For example, if a user noted in a help desk ticket that they were required to look up some information in the Suppliers form, the person reviewing the activity of the user would only see the privileged user accessed the Suppliers form. The reviewer would have no way of knowing whether the privileged user merely viewed a record or set up a new fictitious supplier. As noted, sign-on audit information may provide some basic information to hold users accountable, but it doesn t answer the question of WHAT the user did while accessing the forms. Therefore, the information cannot be considered a complete audit trail and does not provide you with any information as to whether or Page 3 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
4 not the user(s) accessing the form(s) are following procedures or give you any assurance that the user(s) is not committing fraud while accessing the form(s). Snapshot-based Technologies Another common auditing technology is the use of snapshots. Snapshot technologies take an image or snapshot of the data as of a point in time. Snapshots can be taken at whatever intervals an organization requests every 10 minutes, hourly, daily, weekly, etc. Organizations can take a snapshot of an instance to create an initial version generally referred to as a baseline version. Another snapshot is then taken at a later point in time and compared to the baseline version to identify differences. Organizations may use this to review for changes to application controls or object changes. They may also use the technology to compare two different instances to identify where configuration differences may exist. The primary benefit of this type of technology is the ability to view certain changes made to tables with very little performance impact, especially when compared to the impact of triggers. The primary drawback is that the data cannot be relied upon to create a detailed audit trail due to the fact that all changes are not captured. Snapshot-based technologies are best used for operational purposes to identify differences between two instances or points in time to address configuration differences. This may help identify differences between instances to help an analyst determine why some functionality may not be working in a production environment. However, snapshot technologies are not effective to build a sufficient audit trail from a compliance and fraud perspective. Snapshot technologies provide you with information about what happens when comparing values between two different points in time, but not the details of all changes made. Let s look at an example and examine the usefulness of snapshot technologies when applied to the baselining of automated or application controls. Look back at the illustration made in Chapter 2 regarding the GL_JE_SOURCES table. Refer to page 18. Remember, we were looking at how a change to the Freeze Journals configuration is stored at the database level. Table 1 shows the change history we noted: Page 4 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
5 Source Name Freeze Journals Require Journal Approval Last Updated By Last Updated Date Receivables Yes Yes DOEJ 01-Jan-06 Receivables No Yes HAREJ 01-Dec-07 Receivables Yes Yes HAREJ 02-Dec-07 Table 1 If a snapshot was taken before the first change (Freeze Journals value was Yes ) and another snapshot was take after the second change (where Freeze Journals value was set back to Yes ) and the two versions were compared, the value in the Freeze Journals column would have been the same. However, the value for the Last Updated By and Last Updated Date columns would indicate that there was a change made to this record (stored as a row) in the database. A reasonable auditor would like to know WHAT the change was and based on the snapshots stored, there would be no record that the Freeze Journals value was changed from Yes to No and then back to Yes. The predicament you d find yourself in under this scenario is trying to convince an auditor of the nature of the change. There is no independent evidence available in order to prove the nature of the change. If your organization is using the Journal Approval Workflow as an application control, this scenario could prove to be problematic. From reviewing this data, the auditor has no basis for understanding whether the change was related to the Require Journal Approval flag or another column for this record. In these circumstances, the auditor could question the integrity of the application control and downgrade the control. This would likely mean the process related to this application control (i.e. controls related to approval of journals) would be tested manually rather than relying on the defined application control. Given the significance of this process, this could lead to a material deficiency in your SOX 404 audit. It would likely also result in increased audit fees. Some have suggested that increasing the frequency of the snapshots could overcome this issue. However, when you think about some changes that could be made intraday (say within an hour), snapshots would have to be made very frequently in order to overcome these issues. What would happen if changes were made within the hour or within the minute? If the schedule of snapshots weren t frequent enough, the changes wouldn t be captured. Page 5 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
6 Impact of Snapshot Technologies on Application Controls Automation controls or application controls are controls that are embedded in an application such as EBS. Some of these application controls are dependent on application setups. One example is the journal approval workflow in the General Ledger which is dependent on Profile Option and Journal Source configurations. Some application controls are embedded in the application and cannot be overridden such as the requirement of a journal entry to be balanced (i.e. debits must equal credits) before it can be posted (i.e. acknowledging that a suspense account can be defined to plug the difference, in some cases, where a journal entry s debits and credits aren t equal). From an audit perspective, it is important to distinguish between those that can and cannot be controlled by application configurations. Examples of application controls include: All journal entries must have the sum of debits and credits equal before they can be posted. All external requisitions must be approved by someone with appropriate $ limit authority before they can be converted into a purchase order. All orders are subject to a credit review before they are released to be shipped. Currency exchange rate must be set up in order for a foreign currency invoice to be entered in Payables. Some application controls are dependent upon the configuration of the application. In the above examples, both the requisition approval requirement and credit review requirement are processes that can be automated only when properly configured to do so. Application controls are more reliable because they are automated and cannot be overridden by an end user. Those that rely on certain configurations in order for them to be automated need to have a baseline of their configuration settings. The initial values of these configurations are documented in their initial year of reliance. To the extent that these configurations haven t been changed in subsequent years, an auditor would not have to re-test the process (PCAOB guidance suggests the control should be re-tested every three years). To the extent that an organization wants to rely on the application controls dependent on certain configurations, they must prove that the configurations related to that application control have not changed. If the configurations have changed, they would need to provide detailed documentation of such changes and show where the changes had been requested and approved by someone authorized by management to make such changes. An auditor would need to determine whether or not they want to re-test the process by developing new baseline values or rely on the testing and approval of changes documented by the organization. An organization needs to be able to capture any and all changes to the configurations for each application control and provide an effective audit trail for each change. Page 6 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
7 Organizations looking to baseline their configurations as of a financial statement date, such as December 31, 2007, would take a snapshot as of that date. Then, when an auditor came in the subsequent year, they would compare the current values to the baseline values as of 12/31/07. If the values were the same, the auditor may assume that the values haven t changed. However, the comparison of the two values doesn t prove they didn t change, only that they were the same values at those two points in time. They could have been changed and then changed back to the same value. You may want to revisit the example scenario related to application controls in the earlier chapter. Snapshot technologies have some value but are NOT fully reliable to build a complete detailed audit trail. Advanced Application Audit Trail Methodologies To have a detailed audit trail, you need to employ an advanced audit trail methodology. Advanced audit trail technologies can be employed using logs or triggers. We will discuss several different types of logs as well as different types of trigger technologies. Log-based Technologies Logs can be either network logs or database logs. Network logs are details of activity that flow across the network. As a user interacts with the application, the activity before the presentation layer (i.e. their desktop) and the application and database layers (which are likely to be in a data center) flows across the network. Network logs track such activity and would provide the new values entered by the user to the extent that it can be understood. Some applications encrypt data between the presentation layer and the database so that no one can steal the data as it passes across the network. Database logs are intrinsic to the database and are built into the core of the database activities. They are integral to the proper functioning of the database. The database logs are useful for functions such as rollback of transactions and mirroring of instances. Network logs and database logs have similar pros and cons. The most significant pro is that they are less likely to cause performance impact, when compared to triggers. The most significant con is that it can be difficult to determine what was changed because of the way the data is stored. Let me illustrate with an example. Figure 3 shows a table that stores certain information related to responsibilities in EBS. Page 7 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
8 Figure 3 In Figure 3 we see the columns in the FND_RESPONSIBILITY table. This table stores the data related to the definition of a responsibility definition. In my illustration, let s consider that a menu is being changed. Perhaps the organization has agreed that all menus associated with a responsibility should be custom menus rather than seeded menus. So, they have built a new custom menu and, in the Responsibilities form, have updated the responsibility definition with the new menu. In the table above, the data stored that is related to the menu is the MENU_ID. A change log visible through either network logs or database logs would show that the new value entered was the new MENU_ID. To an auditor or someone reviewing the logs, the information they would receive in an audit report is that a new value was entered in the table FND_RESPONSIBILITY for the column MENU_ID. For an auditor to know whether this change was the approved change or was another menu that was not approved, they would have to know more about the MENU_ID. Details on the MENU_ID are stored in another table, FND_MENUS. The columns in the FND_MENUS table can be seen in Figure 4. Figure 4 You can see the amount of information related to a menu is limited in this table. Perhaps other tables have additional information about the menus as well. Let s take a look at FND_MENUS_TL in Figure 5. Page 8 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
9 Figure 5 For an auditor to make an assessment of whether or not the change to the responsibility s menu is reasonable, they would need to know more information about the new menu and ideally this information would be pulled into the audit records at the time of the change in the main table rather than crossreferencing this information at the time the audit information is being reviewed. The most valuable information would likely be the Menu Name (stored in the FND_MENUS table) and the User Menu Name and Description columns (which are stored in the FND_MENUS_TL table). Although the information stored in logs is accurate, it is less than perfect when trying to understand whether or not the change was appropriate. Audit trails built via Logs are useful but are perhaps not ideal. Trigger-based Technologies Triggers are another type of technology we ll look at and, admittedly, are my favorite technology to use. Triggers have received a bad rap over the years because of their perceived performance impact on the system. The performance impact does need to be taken into consideration, but the major use of triggers to create an audit trail would be on low-volume tables. Triggers only create overhead (i.e. use system resources) when they fire. Triggers only fire when transactions are written to tables that contain the triggers. Therefore, as long as triggers are used on low volume tables, the performance impact should be negligible. With any use of triggers, an evaluation of the code (i.e. a peer review) should be done by a qualified expert, and a performance evaluation should be part of the testing process. What are the benefits of triggers and why should they be preferred over other technologies? The benefits are: Before and after values are written to the audit record Triggers can have conditions placed on them (i.e. a where clause added to minimize the scope and, therefore, performance impact and the amount of data being stored) Additional data (i.e. metadata) can be captured at the time the audit trail record is written Page 9 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
10 Before and after values The ability to capture the before and after values of a change to the record greatly enhances the ability to understand and evaluate the appropriateness of the change. This allows a reviewer of the change to understand the nature of the data before the change as well as the new value. It should also allow them easier comparison to the documentation in your change management process. Conditions for triggers Triggers can be used to monitor activity of certain users or activity with certain conditions. This is done by narrowing the scope of the trigger by adding a WHEN clause to the trigger. For example, if you are monitoring activity of certain users (such as privileged users) or transactions above certain levels (for adherence to policy), a WHEN clause would be important. A trigger has two components to it a header and a body. The header is where the WHEN condition is written and determines whether or not the body should fire. The body contains that what to do portion of the trigger which in this case is to write an audit record to a certain table. The expensive portion of this transaction from a system perspective is the firing of the trigger body. Therefore, reducing the conditions that cause a trigger body to fire by placing limiting clauses in the header (via the WHEN clause) will minimize the performance impact (unless, of course, the WHEN clause is poorly written). Reducing the scope of the trigger via the WHEN clause also could significantly reduce the amount of data stored, a key concern for the DBAs. Additional data can be captured when writing the audit trail record When an audit trail record is written, additional data related to the change can be captured. In the example above, we looked at a change to the menu in the definition of a responsibility. A trigger can SELECT additional data related to the before and after values in order to provide the auditor of the data more information. This means that an audit record can store the Menu Name, User Menu Name and Description fields from other tables in addition to the MENU_ID changed in the FND_RESPONSIBILITY table. EBS System Administrator Advanced Auditing; Trigger-Based Oracle EBS has a trigger-based mechanism available to build an advanced audit trail. It is enabled through the System Administrator menu by defining Audit Groups where you choose the tables and columns that you d like to audit. This process enables triggers on these tables and writes audit records to shadow tables (suffixed with _s) for each table you are auditing. This feature is a standard function built into the EBS system. However, the limitations and drawbacks of this process are significant. First, the triggers cannot be customized to incorporate necessary meta-data. This means that the cross reference data stored in other Page 10 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
11 tables such as Menu Name, User Menu Name, and Description will not be written to the audit trail so the information provided in the audit trail will be just the basic data changed (i.e. the MENU_ID). You will also not be able to add a WHEN clause to the data to reduce the scope and potential performance and data storage impact. Finally, and perhaps most significantly, the audit trail data is stored decentralized. That is, each table s audit trail data is stored in its own table (a shadow table). This means that for every table you audit, a separate query would need to be written to extract the data for reporting purposes. In the case in which you would be auditing a significant number of tables (well over a hundred and perhaps significantly more), the development of reporting of such data would be a substantial project in and of itself. Data growth and management of data in these decentralized tables is another concern. Some of Oracle s other solutions as well as other available third-party software (from companies such as Absolute Technologies and CaoSys) have a standard reporting schema such that audit trail is stored in a central location to allow for ease of reporting and data management. Some of these tools also have built-in processes to manage the data retention, based on a pre-defined number of days, to help manage the data growth. While the mechanism that is available as part of the standard EBS features is free, the drawbacks, in my opinion, drive me towards looking at other solutions available from Oracle and from third-party vendors. Evaluating Advanced Application Auditing Technologies The challenge for organizations in evaluating various technologies such as trigger and log-based solutions is to get beyond the marketing hype and to gain a thorough understanding of what features each organization has to offer. This is an area I do my best to cover as an analyst and would be happy to discuss pros/cons of various company s solutions and technologies. Because of the evolving nature of each company s offerings, I have decided not to provide detailed analysis of offerings in this space in this book. However, feel free to contact me at [email protected] if you d like to set up a call to discuss your options further. What to Audit Once you have resolved which types of technology to evaluate, the natural next question to answer is; What types of information do you need to audit? I have mentioned the types of information that should go through your organization s change management process in the chapter on change management and included it again in Table 2. Page 11 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
12 Category Application Controls Affect Business Process Development Security Table 2 Form / Function Journal Sources (GL), Journal Authorization Limits (GL), Approval Groups (PO), Adjustment Approval Limits (AR), Receivables Activities (AR), OM Holds (OM), Line Types (PO), Document Types (PO), Approval Groups (PO), Approval Group Assignments (PO), Approval Group Hierarchies (PO) Profile Options, DFFs, KFFs, Value Set Changes Concurrent Programs, Executables, Functions, SQL forms Menus, Roles, Responsibilities, Request Groups, Security Profiles, SQL forms such as Dynamic Trigger Maintenance, Define Profile Options, Alerts, Collection Plans, etc (see Metalink Note for more information on SQL forms) In addition to these types of records that should be audited to support an audit of your change management process, other records need to be audited as well. Examples include Suppliers, Bank Accounts, Remit To Addresses, and Locations. Detailed audit records and related monitoring on these types of records are needed to support a review of fraud and operational considerations as well as to monitor the activity of privileged users. Audit Trail Conclusions Many organizations still have significant risk due to a lack of detailed audit trail records to support internal and external audit requirements of application changes. In many cases, organizations have chosen to put off addressing these risks because external auditors haven t pointed out such risks. However, time may be running out for organizations to address these significant issues. Not addressing the risks may result in audit findings, errors or actual fraud taking place within the organization. Page 12 Oracle E-Business Suite Controls: Application Security Best Practices ERP Seminars 2009
Building an Audit Trail in an Oracle EBS Environment. Presented by: Jeffrey T. Hare, CPA CISA CIA
Building an Audit Trail in an Oracle EBS Environment Presented by: Jeffrey T. Hare, CPA CISA CIA Webinar Logistics Hide and unhide the Webinar control panel by clicking on the arrow icon on the top right
Oracle E-Business Suite Controls: Application Security Best Practices
Table of Contents Table of Contents vi Acknowledgements 1 Foreword 2 What Makes This Book Different 3 Who Should Read this Book 3 Organization of this Book 4 Chapter 1: Introduction 5 Chapter 2: Introduction
Guide to Auditing and Logging in the Oracle E-Business Suite
Guide to Auditing and Logging in the Oracle E-Business Suite February 13, 2014 Stephen Kost Chief Technology Officer Integrigy Corporation Mike Miller Chief Security Officer Integrigy Corporation Phil
Oracle E-Business Suite: SQL Forms Risks and. Presented by: Jeffrey T. Hare, CPA CISA CIA
Oracle E-Business Suite: SQL Forms Risks and Controls Presented by: Jeffrey T. Hare, CPA CISA CIA Presentation Agenda Overview: Introductions Overall system risks Audit Trails Change Management Implementation
Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications
Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications Presented by: Jeffrey T. Hare, CPA CISA CIA Webinar Logistics Hide and unhide the Webinar
Leverage T echnology: Move Your Business Forward
Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Is Oracle ERP in Scope for 2014 Audit Plan? Learn,
Top Ten Fraud Risks in the Oracle E Business Suite
Top Ten Fraud Risks in the Oracle E Business Suite Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost Chief Technology Officer Integrigy Corporation February
Solihull Metropolitan Borough Council. IT Audit Findings Report September 2015
Solihull Metropolitan Borough Council IT Audit Findings Report September 2015 Version: Responses v6.0 SMBC Management Response July 2015 Financial Year: 2014/2015 Key to assessment of internal control
How to Use Oracle Account Generator for Project-Related Transactions
How to Use Oracle Account Generator for Project-Related Transactions Marian Crkon 3Gs Consulting OAUG Forum at COLLABORATE 07 Copyright 2007 3Gs Consulting Page 1 of 40 Introduction Account Generators
Decryption of Credit Card Data and Bank Account Data; Risks and Controls
Overview: Oracle provides its customers the ability to decrypt certain encrypted credit card and bank account data that is likely subject to PCI-DSS compliance and other compliance requirements. The following
Manish Patel. Maximizing SAP. ERP Financials Accounts Receivable. Bonn Boston
Manish Patel Maximizing SAP ERP Financials Accounts Receivable Bonn Boston Contents at a Glance 1 Customer Master Data... 25 2 Accounts Receivable Transactions... 75 3 Customer Billing... 115 4 Additional
Welcome to the topic on Master Data and Documents.
Welcome to the topic on Master Data and Documents. In this topic, we will look at master data in SAP Business One. After this session you will be able to view a customer record to explain the concept of
How to Audit the Top Ten E-Business Suite Security Risks
In-Source Your IT Audit Series How to Audit the Top Ten E-Business Suite Security Risks February 28, 2012 Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost
Risk Management in Role-based Applications Segregation of Duties in Oracle
Risk Management in Role-based Applications Segregation of Duties in Oracle Sundar Venkat, Senior Manager, Protiviti Tai Tam, Accounting Manager, Electronic Arts Core Competencies C23 Page 0 of 29 Agenda
CHAPTER 5: BUSINESS ANALYTICS
Chapter 5: Business Analytics CHAPTER 5: BUSINESS ANALYTICS Objectives The objectives are: Describe Business Analytics. Explain the terminology associated with Business Analytics. Describe the data warehouse
Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications
Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications Presented by: Jeffrey T. Hare, CPA CISA CIA Webinar Logistics Hide and unhide the Webinar
Change Management Best Practices for ERP Applications, An Internal Auditor's Perspective. Jeffrey T. Hare, CPA CISA CIA ERP Risk Advisors
Change Management Best Practices for ERP Applications, An Internal Auditor's Perspective Jeffrey T. Hare, CPA CISA CIA ERP Risk Advisors Webinar Logistics Hide and unhide the Webinar control panel by clicking
Leverage Your Financial System to Enable Sarbanes-Oxley Compliance: An Evaluator s Guide
Leverage Your Financial System to Enable Sarbanes-Oxley Compliance: An Evaluator s Guide W H I T E P A P E R Summary This document provides an overview on how financial systems can provide companies with
Intelligence Reporting Frequently Asked Questions
1. What is Sage 100 ERP Intelligence Reporting? Sage 100 ERP (formerly Sage ERP MAS 90 and 200) Intelligence Reporting empowers managers to quickly and easily obtain operations and strategic planning information
R12 e-business Tax: A Procure-to-Pay Upgrade Perspective. www.tacticsco.com
R12 e-business Tax: A Procure-to-Pay Upgrade Perspective 1 Welcome and Introduction Your Speaker The Project GL, AP, Purchasing, iproc Upgrade to 12.1.3 from 11.5.10.2 No AR Tax Sorry! 2 Oracle and the
Sarbanes-Oxley Compliance A Checklist for Evaluating Internal Controls
Sarbanes-Oxley Compliance A Checklist for Evaluating Internal Controls Companies today are immersed in audits of their internal controls and financial processes in an effort to comply with Section 404
WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite
WHITE PAPER Guide to Auditing and Logging in the Oracle E-Business Suite FEBRUARY 2014 GUIDE TO AUDITING AND LOGGING IN THE ORACLE E-BUSINESS SUITE Version 1.0 March 2003 Version 1.1 February 2004 Version
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite
WHITE PAPER Guide to Auditing and Logging in the Oracle E-Business Suite APRIL 2016 GUIDE TO AUDITING AND LOGGING IN THE ORACLE E-BUSINESS SUITE Version 1.0 March 2003 Version 1.1 February 2004 Version
Sage ERP Accpac. Everything you Need to Know about Intelligence FAQ
Sage ERP Accpac Everything you Need to Know about Intelligence FAQ i WHAT IS SAGE ERP ACCPAC INTELLIGENCE? Sage ERP Accpac Intelligence is an exciting new product that empowers you to quickly and easily
Using MS Excel V Lookups
Using MS Excel V Lookups This article discusses MS Excel functionality called V-Lookups that could greatly improve your efficiency when reconciling and comparing records between two separate data columns
Easy Flow-Based Reporting Procure to Pay, Order to Cash etc.
Easy Flow-Based Reporting Procure to Pay, Order to Cash etc. Andy Donovan Noetix Corporation All Oracle Applications customers implement the Applications in a flow-based fashion such as Procure to Pay,
Self Service Banner (SSB) Finance
Self Service Banner (SSB) Finance I. Self Service Banner Finance Introduction Self Service Banner is a user friendly Banner interface used to research and extract information from the Banner Finance module.
Internal Controls, Fraud Detection and ERP
Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility
Oracle Daily Business Intelligence. PDF created with pdffactory trial version www.pdffactory.com
Oracle Daily Business Intelligence User Reporting Requirements and Daily Business Intelligence Historical Business Analysts (Warehouse,see trends, drill from detailed information to summaries and back
www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015
www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle Partner Agenda 1. Introduction 2. Overview of ERP security architecture 3. Key ERP security models 4. Building and executing
CHAPTER 4: BUSINESS ANALYTICS
Chapter 4: Business Analytics CHAPTER 4: BUSINESS ANALYTICS Objectives Introduction The objectives are: Describe Business Analytics Explain the terminology associated with Business Analytics Describe the
Expense Reports Training Document. Oracle iexpense
Expense Reports Training Document Oracle iexpense Prepared by FSCP Solutions Inc. Table of Contents Create (Enter) Expense Reports...1 Approved Expense Report... 18 Rejected Expense Report... 19 Entering
The Requirements Compliance Matrix columns are defined as follows:
1 DETAILED REQUIREMENTS AND REQUIREMENTS COMPLIANCE The following s Compliance Matrices present the detailed requirements for the P&I System. Completion of all matrices is required; proposals submitted
MicroStrategy Course Catalog
MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY
Rochester Institute of Technology. Oracle Training: Advanced Financial Application Training
Rochester Institute of Technology Oracle Training: Advanced Financial Application Training Table of Contents Introduction Lesson 1: Lesson 2: Lesson 3: Lesson 4: Creating Journal Entries using Excel Account
User PV Form? Risk Description / Comments Recommended Setting
ERP Advisors Rated Profile Options Profile Name Form? Description / Comments Recommended Setting Personalize Self-Service Defn ITGCs No Hide Diagnostics menu entry ITGCs No If this profile option is set
Benefits. Feature Overview. Architecture. 1 AP Invoice Wizard Fact Sheet
AP Invoice Wizard AP Invoice Wizard enables you to create your Oracle Payable invoices using Excel. Forget about manual data entry when you can now download or copy invoice information into Excel, make
Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine
Answering the Call Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine Written by Robert Andrews [email protected] End-user
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills
5 PLACES IN YOUR HOSPITAL WHERE ENTERPRISE CONTENT MANAGEMENT CAN HELP
5 PLACES IN YOUR HOSPITAL WHERE ENTERPRISE CONTENT MANAGEMENT CAN HELP WHAT IS ECM AND WHY MIGHT YOU NEED IT? Although technology continues to improve how healthcare organizations share information both
Accounts Payable. Reference Guide
Accounts Payable Reference Guide Last Updated: January 19, 2009 About this Guide This Guide is for use by SedonaOffice customers only. This guide is not meant to serve as an operating or training manual,
Distribution Training Guide. D110 Sales Order Management: Basic
Distribution Training Guide D110 Sales Order Management: Basic Certification Course Prerequisites The combined D110 Sales Order Management certification course consists of a hands- on guide that will walk
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
Best Practices Report
Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general
PULSE Dashboard Administrator Guide (Updated 2/19/15)
PULSE Dashboard Administrator Guide (Updated 2/19/15) All functions described in this document may be performed from a workstation on the network with the exception of Updating the Pulse Dashboard Software
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
Frequently Asked Questions OB10
Frequently Asked Questions OB10 What is einvoicing (electronic invoicing?) einvoicing is a process that allows you to submit invoices electronically without the need to print and mail invoice copies. With
Controlling Remote Access to IBM i
Controlling Remote Access to IBM i White Paper from Safestone Technologies Contents IBM i and Remote Access...2 An Historical Perspective...2 So, what is an Exit Point?...2 Hands on with Exit Points...3
Oracle E-Business Suite and Oracle Cloud: Practical Coexistence Scenarios
Oracle E-Business Suite and Oracle Cloud: Practical Coexistence Scenarios Nadia Bendjedou Senior Director, Product Strategy E-Business Suite Development Oracle Corporation Safe Harbor Statement The following
Approvals Management Engine R12 (AME) Demystified
Approvals Management Engine R12 (AME) Demystified By Sujay Kamath Prisio Technologies Introduction In today s world, many organizations are in need of implementing proper controls in place for faster transaction
Increasing the Productivity and Efficiency of Business Transactions with Microsoft Business Solutions Navision Intercompany Postings
Increasing the Productivity and Efficiency of Business Transactions with Microsoft Business Solutions Navision Intercompany Postings White Paper Published: May 2004 Contents Introduction...1 Streamlining
Sage ERP MAS. Everything you want to know about Sage ERP MAS Intelligence. What is Sage ERP MAS Intelligence? benefits
Sage ERP MAS Everything you want to know about Sage ERP MAS Intelligence What is Sage ERP MAS Intelligence? Sage ERP MAS Intelligence (or Intelligence) empowers managers to quickly and easily obtain operations
Accounts Payable 6.4 User Manual
Accounts Payable 6.4 User Manual Accounts Payable TABLE OF CONTENTS Accounts Payable User Manual Introduction... 3 Purpose... 3 Accounts Payable Overview... 3 Enter Payable... 4 General Info... 6 Remit
Accounts Payable Expense Distribution Tables
Accounts Payable Expense Distribution Tables Use Expense Distribution Table Maintenance to set up tables with general ledger accounts and distribution percentages. The tables can then be selected in Invoice
Addressing common challenges in the record-to-report process. kpmg.com
Addressing common challenges in the record-to-report process kpmg.com Addressing common challenges in the record-to-report process Laeeq Ahmed, managing director, KPMG Meilani Hendrawidjaja, director,
Integrity 10. Curriculum Guide
Integrity 10 Curriculum Guide Live Classroom Curriculum Guide Integrity 10 Workflows and Documents Administration Training Integrity 10 SCM Administration Training Integrity 10 SCM Basic User Training
OAUG Webinar Series Seminar #4
OAUG Webinar Series Seminar #4 Oracle R12 AP Invoice to Payment Process Paul Kirch Principal, Process & Domain, Infosys OAUG Accounts Payable SIG Chairman September 8, 2011 Agenda Introduction Procure
SharePoint Integration
IT Best Practices Series SharePoint Integration Companies are increasingly using Microsoft SharePoint as a powerful development platform for specific business functions and as a collaboration tool. For
Lawson Technology: Implementation Considerations
Lawson Technology: Implementation Considerations Table of Contents Introduction...3 Lawson Security Highlights...3 Role-Based Security...5 Lawson Single Sign-On...6 Security and Self-Service Applications...7
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
Governance, Risk, and Compliance Controls Suite. Preventive Controls Governor Audit Rules User s Guide. Software Version 7.2.2.3
Governance, Risk, and Compliance Controls Suite Preventive Controls Governor Audit Rules User s Guide Software Version 7.2.2.3 Preventive Conrols Governor: Audit Rules User s Guide Part No. AR002-7223A
8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
FSD Finance One User Manual Accounts Payable Last update: October 2013
i FSD Finance One User Manual Accounts Payable Last update: October 2013 Accounts Payable Table of Contents AP1.0 Invoice Entry (APINV)... 1 AP2.0 Accounts Payable Ledger Enquiries... 8 AP3.0 Additional
Important: Please follow regional 3M invoicing guidelines for one PO per invoice.
Job Aid Create and Publish Invoice with SNC (Supplier) EN Use this Supplier portal activity to create and publish an invoice from an Advance Shipping Notification (ASN). Important: Please follow regional
System Administration Training Guide. S125 Document Management
System Administration Training Guide S125 Document Management Table of contents Certification Course Prerequisites... 4 Document Management... 6 Learning Objects:... 6 Wiki... 6 Wiki Article Approval...
How To Use Netsuite With Openair
NetSuite OpenAir/NetSuite Integration Guide October 17, 2015 2015 NetSuite, Inc. NetSuite OpenAir/NetSuite Integration Guide November 12, 2015 This document is the property of NetSuite Inc., and may not
EMC Smarts Network Configuration Manager
EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015
SIEM 2.0: AN IANS INTERACTIVE PHONE CONFERENCE INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS SUMMARY OF FINDINGS
SIEM 2.0: INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS AN IANS INTERACTIVE PHONE CONFERENCE SUMMARY OF FINDINGS OCTOBER 2009 Chris Peterson, LogRhythm CTO, Founder Chris brings a unique
Oracle Total Recall with Oracle Database 11g Release 2
An Oracle White Paper September 2009 Oracle Total Recall with Oracle Database 11g Release 2 Introduction: Total Recall = Total History... 1 Managing Historical Data: Current Approaches... 2 Application
Introducing the Acowin Accounts Payable Module!
Introducing the Acowin Accounts Payable Module! This quick reference sheet will help you get up and running with the new Acowin Accounts Payable system. For more detailed information about Accounts Payable,
Beyond Software: How to Estimate the Cost of ERP Implementation Services
Beyond Software: How to Estimate the Cost of ERP Implementation Services This white paper outlines: The 4 costs involved in ERP software projects A definition of what is included in implementation services
CHAPTER 6: SALES TAX SETUP
Chapter 6: Sales Tax Setup CHAPTER 6: SALES TAX SETUP Objectives Introduction The objectives are: Provide an overview on sales tax Create Ledger Posting Groups Create Sales Tax Authorities Create Sales
MAS 90 MAS 200 Tips, Tricks and Frequently Asked Questions (FAQ s) Prepared by: The Fitzgerald Group August 11, 2004
MAS 90 MAS 200 Tips, Tricks and Frequently Asked Questions (FAQ s) Prepared by: The Fitzgerald Group August 11, 2004 This is a compilation of ideas from The Fitzgerald Group staff, from clients and from
Computer Visions Course Outline
www.compvisions.com 16 Corporate Woods Blvd. Albany, NY 12211 Computer Visions Course Outline Get What You Want We offer highly customizable group training courses: desktop applications, web development,
New Features in Sage BusinessVision 2013 (version 7.6)
New Features in Sage BusinessVision 2013 (version 7.6) 2012 Sage Software, Inc. All rights reserved. Sage Software, Sage Software logos, and the Sage Software product and service names mentioned herein
NetSuite Essentials. Course Description. Key Objectives
NetSuite Essentials Key Objectives How do I: Configure NetSuite to meet business requirements? Determine user roles and permissions? Customize the user interface to align with business needs? Plan for
Oracle Sales Compensation
Oracle Sales Compensation Concepts and Procedures Release 11i June 2001 Part No. A86673-03 Oracle Sales Compensation Concepts and Procedures, Release 11i Part No. A86673-03 Copyright 1996, 2001, Oracle
R12 Oracle Purchasing Fundamentals
R12 Oracle Purchasing Fundamentals 5 Days What you will learn: In this course, participants learn how to set up and use R12 Oracle Purchasing to managing the purchasing process. They learn how to create
Business Intelligence Solutions: Data Warehouse versus Live Data Reporting
Business Intelligence Solutions: Data Warehouse versus Live Data Reporting If you are a JD Edwards customer and have tried to improve reporting for your organization, you have probably realized that JD
Microsoft Dynamics GP 2010
Microsoft Dynamics GP 2010 Workflow Administrator s Guide March 30, 2010 Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and
Implementing Sarbanes-Oxley Audit Requirements WHITE PAPER
The Sarbanes-Oxley Act (SOX) establishes requirements for the integrity of the source data used in financial transactions and reporting. In particular, auditors are looking at regulated data residing in
White Paper. Credit Checking. Prepared By: Mohit
White Paper on Credit Checking Prepared By: Mohit Document Amendment Record * A- Added, M- Modified, D-Deleted Version no. Date Section no. A/M/D* Description of Change Applicable Documents and References
Enable Tax to Calculate on Invoices Originating in Oracle R12 Projects
Specialized. Recognized. Preferred. The right partner makes all the difference. Enable Tax to Calculate on Invoices Originating in Oracle R12 Projects By: Jeanne Cooper Senior Oracle Financials Consultant
BI Publisher in Oracle EBS R12: What it is, its evolution, and how to use it. Presented by: Bob Bullman, BizTech
BI Publisher in Oracle EBS R12: What it is, its evolution, and how to use it Presented by: Bob Bullman, BizTech What is Bi Publisher? Historical perspective Seeded functionality Options for creating new
Integrating Procurement Cards with Oracle Internet Expenses: Lessons Learned. Session ID: 08141
Integrating Procurement Cards with Oracle Internet Expenses: Lessons Learned October 06, 2011 Presented By Ashish Nagarkar (AST Corporation) [email protected] Sari Fessenden (City of Modesto)
Multiperiod Accounting: A User s Guide
Multiperiod Accounting: A User s Guide Session ID #11349 Jeannine Suwalski Biztech About Jeannine Suwalski Functional business consultant 4 years experience using Oracle applications Developed Training
Oracle Sales Compensation
Oracle Sales Compensation Implementation Guide Release 11i August 2000 Part No. A86178-01 Oracle Sales Compensation Implementation Guide, Release 11i Part No. A86178-01 Copyright 2000, Oracle Corporation.
Oracle General Ledger Advanced Journal Entries Consolidations Process [ ] Describe, create and [ ] Explain Consolidations
ERP Solutions Oracle Applications Whether you are implementing Oracle Financials for the first time or you are a veteran user of the Oracle E-Business Suite, Coriolis Business Systems can help reduce the
RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT
Document K23 RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT THE BOTTOM LINE Managing privileged accounts requires balancing accessibility and control while ensuring audit capabilities. Cyber-Ark
Oracle E-Business Suite - Release 12 Oracle General Ledger Technology Course Material April-2009
Oracle E-Business Suite - Release 12 Oracle General Ledger Technology Course Material April-2009 1 Contents 1. Introduction 2. Accounting Manager Setup 3. General Ledger -Key Setups 4. Journal Entry 5.
Bank Reconciliation need not be back breaking anymore!!!
Bank Reconciliation need not be back breaking anymore!!! Bank Reconciliation BankReconciliation.com takes the pain out of preparing bank reconciliations, credit card reconciliations, CUSIP and other data
