www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015



Similar documents
Risk Management in Role-based Applications Segregation of Duties in Oracle

Solihull Metropolitan Borough Council. IT Audit Findings Report September 2015

PwC The Path Forward for Data Analysis and Continuous Auditing May 2011

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Moving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director

ORACLE APPLICATION ACCESS CONTROLS GOVERNOR FOR PEOPLESOFT

Oracle Role Manager. An Oracle White Paper Updated June 2009

Minimize Access Risk and Prevent Fraud With SAP Access Control

Risk and Controls 101

Oracle E-Business Suite Controls: Application Security Best Practices

Automating the Audit July 2010

Oracle E-Business Suite: SQL Forms Risks and. Presented by: Jeffrey T. Hare, CPA CISA CIA

Continuous Controls Monitoring ISACA, Houston Chapter. August 17, 2006

Shared Service Center Mehr als eine Standortbestimmung Tag der Beratung 7. Juni 2011

Leverage T echnology: Move Your Business Forward

Advisory Services Oracle Alliance Case Study

Leveraging advanced controls with E-Business suite implementation and upgrade projects

To Cross-Validate or Not? Best Practices to Enforce Valid GL Combinations. Helene Abrams CEO eprentise

Using Role-Based Access Control (RBAC) to Replace Traditional Oracle E-Business Suite Responsibility-Based Security

IDS for SAP. Application Based IDS Reporting in the ERP system SAP R/3

19/10/2012. How do you monitor. (...And why should you?) CAS Annual Meeting - Henry Jupe

Dell One Identity Manager Scalability and Performance

Oracle Fusion Applications Security Guide. 11g Release 5 (11.1.5) Part Number E

Chapter 6: Developing a Proper Audit Trail for your EBS Environment

Best Practices Report

Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014

Building an Audit Trail in an Oracle EBS Environment. Presented by: Jeffrey T. Hare, CPA CISA CIA

Software Arrangements Revenue Recognition Best Practice Business Process

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

Reduce Audit Time Using Automation, By Example. Jay Gohil Senior Manager

Integrating Oracle ECM with ERP Systems: JDE, EBS and PeopleSoft JERRY ABER FISHBOWL SOLUTIONS, INC.

Implementation of Big Data and Analytics Projects with Big Data Discovery and BICS March 2015

Auditing Standard 5- Effective and Efficient SOX Compliance

Compliance & Internal Audit Collaboration

SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned

4th Annual ISACA Kettle Moraine Spring Symposium

Leveraging Continuous Auditing / Continuous Monitoring in internal audit April 10, 2012

appmdmtm MASTER DATA MANAGEMENT

Continuous Monitoring: Match Your Business Needs with the Right Technique

ORACLE FUSION PERFORMANCE MANAGEMENT

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

Internal Audit Testing and Sampling Techniques. Chartered Institute of Internal Auditors May 2014

Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications

Security Trends and Client Approaches

Case Study: Leveraging TPM for Authentication and Key Security

IT Service Continuity Management PinkVERIFY

Optimize procure-to-pay processes for profitability, efficiency, and compliance

Integrigy Corporate Overview

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

AC 10.0 Centralized Emergency Access

RFP# CONSULTING SERVICES FOR ORACLE E-BUSINESS SUITE R12 UPGRADE QUESTION AND ANSWER RFP Reference Question GSFA Response

NEW HAMPSHIRE RETIREMENT SYSTEM

Attestation of Identity Information. An Oracle White Paper May 2006

Enterprise Financial Management: ERP for Small and Mid-market Companies

Governance, Risk & Compliance for Public Sector

Easy Flow-Based Reporting Procure to Pay, Order to Cash etc.

How To Optimize The Procure To Pay Process In An Orgosade

ORACLE CASH MANAGEMENT. Release 12 Features

FDQM Financial Data Quality Management Fundamentals - Tips & Tricks Gary Womack, May 8th, 2013

Application controls testing in an integrated audit

User Guide QAD Security and Controls

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Inventory Management: Genesis Inventory Plus +

Business-driven governance: Managing policies for data retention

Addressing common challenges in the record-to-report process. kpmg.com

Microsoft Dynamics GP 2010

Segregation of Duties

Budgeting in Municipal Governments with Oracle Hyperion Public Sector Planning & Budgeting

Epicor ERP Epicor ERP Accounts Payable Transaction Hierarchy

Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications

AIA Integration CRM On Demand to Quoting. NorCal OAUG Presentation January 21, 2009

IFRS 15: Implementation challenges

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data

Administering Active Directory. Administering Active Directory. Reading. Review: Organizational Units. Review: Domains. Review: Domain Trees

Armanino LLP Welcomes You To Today s Webinar: GP Tips and Tricks: Using Credit Cards in GP

Navigating to tomorrow: Serving clients and creating value PwC, Global Private Banking and Wealth Management Report 2013 PMAC Canada 26 November 2013

ERM006 ERM and Business Continuity Management: Together at Last RIMS Annual Conference April 13, 2016

PCI Compliance in Oracle E-Business Suite

Business Intelligence in the real-world

ORACLE DRIVER MANAGEMENT INTEGRATION PACK FOR ORACLE TRANSPORTATION MANAGEMENT AND ORACLE E-BUSINESS SUITE

Microsoft Dynamics GP Release. Workflow Administrator s Guide

Application Monitoring for SAP

Harnessing Oracle Governance, Risk, and Compliance Applications to Improve Your PeopleSoft 9 Upgrade

End-To-End Invoice Processing Automation at Land O Lakes. Session #705. Natalie Hawley, Applications Developer

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Banner Workflow. Creating FOAPAL Requests

RSA enables rapid transformation of Identity and Access Governance processes

Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010

Leading investor communications firm serving brokerdealers, and investment banks protects sensitive data

PMS 288 Blue or CMYK = C100-M85-Y0-C43 PMS 1255 Ochre / Yellow or CMYK = C0-M35-Y85-C30. Tax Technology

Course Duration: 3.5 Days. CPE Hours Available: 32 CPE. Knowledge Level: Intermediate. Field of Study: Auditing. Prerequisites: None

RSA Identity Management & Governance (Aveksa)

ORACLE FUSION HUMAN CAPITAL MANAGEMENT

How to Audit the Top Ten E-Business Suite Security Risks

The Information Systems Audit

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Lessons from McKesson s Approach to Maintaining a Mature, Cost-Effective Sarbanes-Oxley Program

Identity & Access Management Case Study & Lessons Learned. Prepared by Tariq Jan

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Transcription:

www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle Partner

Agenda 1. Introduction 2. Overview of ERP security architecture 3. Key ERP security models 4. Building and executing ERP security audit plan 5. ERP security audit example Oracle e-business suite R12 6. Summary 7. Questions 2

Introduction 3

Overview of ERP Security Architecture 4

ERP Security Architecture Overview Each layer has separate security Some layers can pass through security to other layers ERP Database Operating System Network 5

ERP Security ERP security depends on the application for specifics, but overall each share the major traits in common: User accounts superuser, admin Roles / responsibilities functions, forms, data, reports Permissions allowable functions within or outside roles 6

ERP Security Example 7

Other ERP Security Principles Responsibilities usually cannot cross modules Multiple paths to same function Customizations typically effective security Verify how third-party modules/applications interact with ERP 8

Key ERP Security models 9

Security Model PeopleSoft 10

Security Model Oracle EBS User Organization Ledger 1 Ledger 2 Responsibility GL Controller AR Inquiry AP Payment Supervisor Menu Sub-Menu Forms and Functions 11

Security Model SAP User master record SAP Authorization Structure Profiles (simple vs composite) User Authorizations (with field value) Authorization objects (with fields) Profile Authorization class Authorization 12

Build and Execute an ERP security Audit Plan 13

Why Do Issues Exist with ERP Security? Many ERP implementers focus on the following: Operational Efficiency Long-term Sustainability Flexibility to Support Change Missing is Internal Control Compliance 14

Key ERP Security Documents Menu/responsibility design matrices Role and responsibility design matrices Responsibility-to-Role mapping User-to-Role mapping Documented User Acceptance Test (UAT) scenarios and scripts Documentation of procedures for maintaining roles/responsibilities Configured segregation of duties (SOD) compliant roles/responsibilities 15

Example Design Document 16

ERP Security Architecture Closer to data represents more risk ERP and database Understand if pass through security is enabled Example: OS controls security for database Does network security directly interact with ERP? Example: Internet sales ERP Database Operating System Network 17

ERP Security Audit Considerations Type of ERP is important ensure you understand how security is designed Workflow in ERPs can override or modify standard security very few tools evaluate it Consider all access assigned to user accounts, not just individual responsibilities Consider tools that automate security analysis difficult to effectively evaluate security manually 18

Building the ERP Security Audit Plan Leverage technical resources and security design documents Consider all access points and infrastructure For complex ERPs (i.e. Oracle, PeopleSoft, SAP) consider use of tools or ACL Understand all modules implemented and in-scope for review 19

Executing the ERP Security Audit Plan Start with a listing of user accounts Determine what responsibilities each user account is assigned Assess the access for each individual responsibility and across responsibilities Review any additional access outside of responsibilities (permissions) 20

Executing the ERP Security Audit Plan Continued Obtain user accounts owners job descriptions to determine appropriate access Identify excessive access and/or segregation of duties points Discuss with system administrators, process owners, data owners, etc. if access is appropriate Consider other controls impact (manual controls, review controls) 21

ERP Security Audit Lessons Learned Remember analysis is point-in-time understand processes for continuous security False positives typically are not false Consider determining if excessive access was used powerful analysis Collaboration with security administrators is critical 22

ERP Security Audit Example Oracle e-business Suite R12 23

Oracle EBS R12 Security Architecture Key Concepts Users: Each application user has an unique user ID and password. Responsibilities: Link a user ID to a main menu and control how a user gains access to menus, forms, functions, sub-functions, and data. Menus: Hierarchical arrangements of application forms and subfunctions. Functions: Part of an application s functionality. Form functions are commonly known as forms Non-form functions are commonly known as sub-functions 24

Oracle EBS R12 Security Architecture Continued Key Concepts Menu/Function Exclusions: Restrict application functionality accessible to a responsibility. A function exclusion excludes all occurrences of that function from the responsibility s menu A menu exclusion excludes all occurrences of that menu s entries (i.e. all functions, and menus of functions that it selects) from the responsibility Profile Options: Affect the operation of the applications and set according to the needs of the user community. 25

Oracle EBS R12 Security Architecture Continued Key Concepts Flexfield Security Rules: Restrict the accounts users may post transactions to and run reports against. Request Security Groups: Define programs and reports (or request sets) that may be run by a responsibility. Permissions and Permission Sets: Smallest unit of securable action (maps to a menu item/function) Role Based Access Control (RBAC): Users are assigned multiple responsibilities through a single role. 26

Security Overview Oracle EBS R12 Organization Ledger 1 Ledger 2 Responsibility GL Controller AR Inquiry AP Payment Supervisor Menu Sub-Menu Forms and Functions 27

Oracle R12 Security Audit Company Background US-based company technology company with limited international transactions Approximately $1B in annual revenue 2,500 employees Oracle R12 modules installed were: System Administration, GL, Purchasing, AP, AR, Projects, Assets Third party application used for revenue recognition directly interfaces to Oracle R12 28

Oracle R12 Security Audit Obtained listing of data from Key Concepts slides and put into Access database Joined the various fields to perform analysis over user account security 82 user accounts with approximately 350 responsibilities took 350 hours to analyze Tool did analysis in approximately 10 hours Identified multiple issues 29

Oracle R12 Security Audit Issues 37 user accounts had excessive access Multiple segregation of duties issues identified False positives became reality due to backdoor access Following slides list more interesting issues 30

Issues Encountered Delegated Administration Privilege model that: Enables assigning of required access right to manage a specific subset of the organization's users and roles Enables delegation to local administrator at division or department level or even to administrators of external organization(s) Following administrative privilege categories can be delegated: User Administration Privileges Role Administration Privileges Organization Privileges 31

How Identified Delegated Administration Risk: Admin privileges may be granted inappropriately or excessively to Oracle users = risk of data security and violation of segregation of duties rules. Control: Delegated administrative access is assigned to only authorized employees based on company policy and such scope of such access is based on their job responsibilities. Testing procedures: Determine if 1. Delegated administration roles are defined according to company policy. 2. Users are assigned to delegated administration roles according to company policy and their job responsibilities. 32

Issues Encountered Proxy User Delegation Oracle EBS users can nominate another user (proxy user) to act on their behalf users no longer need to share passwords This gives all-or-nothing delegation capability Start and end dates can be defined to limit the duration of proxy access Users with Manage Proxy access can have following functions: Setting up Proxy Users Delegating Proxy User Privileges Acting as a Proxy User Running the Proxy User Report 33

How Identified Proxy User Delegation Risk: Proxy users access may be granted inappropriately or excessively to Oracle users resulting in risk of data security issue and/or violation of segregation of duties. Control: Proxy user related privileges are granted only on an exceptional basis based on proper approval and there is a procedure to monitor the proxy user activity. Such access delegation should also end-dated by the delegating user. Testing procedures: Determine if 1. The ability to delegate proxy privileges to other users is restricted and monitored following company policy. 2. The procedure is in place to review the proxy user activity by the delegating user. 34

Remediation Efforts Company accepted all findings after discussion Access issues were remediated in approximately two months Decided to implement Oracle GRC going forward to actively monitor security 35

Summary 36

Remember These Items Technical knowledge is critical to a successful ERP audit Ensure a holistic understanding of security layers and other applications interfacing ERP Tools may be more efficient and effective consider them for larger reviews 37

Questions? This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers LLP, its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. 2015 PricewaterhouseCoopers LLP. All rights reserved. In this document, refers to PricewaterhouseCoopers LLP which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.