Segregation of Duties



Similar documents
Risk Management in Role-based Applications Segregation of Duties in Oracle

Internal Controls, Fraud Detection and ERP

Risk and Controls 101

MD AOC Project Introduction to PeopleSoft

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications

Armanino LLP Welcomes You To Today s Webinar: GP Tips and Tricks: Using Credit Cards in GP

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant

Welcome to Metafile. Solving document issues for over 30 years. Matt Akin x 301

Internal Controls. A short presentation from Your Internal Audit Department

Internal Controls Best Practices

Sarbanes-Oxley Compliance A Checklist for Evaluating Internal Controls

How To Prevent Fraud On A Credit Card

204 Reports Included with Version 7.0!

Leveraging Your ERP System to Enhance Internal Controls

A/R Journal Entries GAAP. Add Invoice Line. Cancel Line from Invoice Maintenance. Cancel Balance via Write-Off Invoice Balances Routine

Information Technology Internal Controls Part 2

Product Brief. Intacct Financials & Accounting. Intacct General Ledger

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner

December Camino Ramon, Suite 210 San Ramon, CA Voice: Fax: Website:

Procure-to-Pay Best Practices

SAP Business One. General Ledger Transactions Generated from Order to Invoice. ESAP SAP Business One Online University

The Information Systems Audit

Office of the Auditor General. Audit of Accounts Payable. Tabled at Audit Committee November 26, 2015

Accounting Best Practices. Maximizing Effectiveness and Efficiency in your Accounting Operations June 10, 2014

B Resource Guide: Implementing Financial Controls

Southern California AFP Luncheon

Abila MIP Fund Accounting

KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER

BDO Consulting. Segregation of Duties Checklist

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009

RISK ASSESSMENT TOOL: Business Processes

The New AP Strategy: Leveraging Automation and Working Capital Optimization to Generate Revenue

Internal Control Guide & Resources

Accounts Payable E-Payments Creating Value and Efficiency in the Payment Disbursement Process

Advanced Data Analytics, the Fraudsters Worst Enemy

Microsoft Dynamics GP Performance and Profit

Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications

MAS90, 3.7, Best Software, Inc.

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Connecting the dots: IT to Business

SUA - Payroll and Inventory Payroll System

Dynamics GP 50 Tips in 50 Minutes

MEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS

Process ERP Software Selection RFP Template

Accounts Payable User Guide

Fraud and internal controls, Part 3: Internal fraud schemes

Reference Document Month-End Closing

THE ABC S OF DATA ANALYTICS

4 th Quarter Accounting Engine A Next-Generation Tool

A/P Payment Selection Based on A/R Cash Receipts AP-1108

Accounts Payable Automation

Copyright 2011 Business Management Systems. Web Based ERP/CRM Software

Utilizing Technology in School Business

Internal Control Guidelines

MICROSOFT DYNAMICS GP. Product Capabilities and Business Ready Licensing Module Guide. Solutions

<Insert Picture Here> Looking to Reduce Operating Costs? Automate Your Expense Processing with PeopleSoft Travel and Expenses 9.1

How To Be Successful In A Business

Financial Services Group

General Accounting Applications (As featured in this pdf document) Licensing Applications. Additional Applications

Fraud Awareness Training

SAP SCM SUMMIT Best Practices for Supply Chain Optimization in SAP for Vendor Managed Services

Accounting ERP Software

Internal Control Deliverables. For. System Development Projects

Governance, Risk & Compliance for Public Sector

Norming Asset Management. To make asset management easy and automatic with Sage Accpac ERP

Chapter 15 Auditing the Expenditure Cycle

How To Ensure Financial Compliance

ACCOUNTS PAYABLE CLERK Training Needs Assessment Evaluation Form. Personal/Position Information

Leverage T echnology: Move Your Business Forward

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:

for Sage 100 ERP Bank Reconciliation Overview Document

An Overview. August 2007 Internal Control - An Overview 1

Fraud: Real Stories, Real People, Real Impact

How To Use The New Version Of The Powerpoint V

The following options under the Financial area will be available on the Web as of the February 2016 Release.

The State of Vendor Management

The following figures summarize ways in which dut:es could be segregated with two, three and four people.


INFORMATION TECHNOLOGY CONTROLS

GENERAL PAYROLL CONTROLS Dates in scope:

INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS

HOWARD UNIVERSITY POLICY

Fraud Detection & Data Analytics

Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015

Application Control Effectiveness for SAP. December 2007

Information Technology General Controls (ITGCs) 101

Integrating Payables and Receivables to Unlock Working Capital

Microsoft Dynamics GP Packaging of Functionality & Product Capabilities in Microsoft Dynamics GP 2013

Executive - Salary Guide

The Basics of Internal Controls

Cabinet Secretary of Human Resources and Administration. Agency Management PeopleSoft Implementation Briefing

Transcription:

Segregation of Duties Scott Mitchell, Senior Manager (503) 478-2193 John Earl, Manager (503) 478-2188 January 5, 2010

Our Objectives Clarify the role of Segregation of Duties (SOD) Identify alternatives when SOD is not possible Demonstrate how to implement effective SOD Clarify the evaluation process of current user access Demonstrate that management is always surprised after evaluating their SOD 2

Agenda Discuss fraud and risks of fraud Examples of SOD violations Demonstrate a method for evaluating SOD Considerations for maintaining proper SOD Questions and Answers 3

The Fraud Triangle Opportunity Pressure/Incentive Rationalization 4

Fraud examples in the news NEC Contractor Kickbacks ($4.1M) NBC Universal, Inc. Wire fraud ($813K) Madoff Ponzi scheme ($50B) 5

Management is Surprised All 51 users in a Lawson implementation could enter and approve journal entries 21 users could enter/approve cash receipts, enter/approve journal entries and perform bank reconciliations 6

Management is Surprised 105 users in a revenue related system could modify user security 223 users in a revenue system could modify the cash drawer beginning balance 316 users had access to virtually all sensitive transactions in a hospital revenue application 7

Management is Surprised 3,100 KRONOS users could authorize their own payroll 1,100 were hourly employees who could approve their own overtime All 3,100 could change their vacation accruals and approve payment in-lieu of vacation 8

What is Segregation of Duties? How do you define it? What is the goal of segregation of duties? Are all SOD conflicts equal in importance? 9

What is Segregation of Duties (cont.)? COSO: Dividing or allocating tasks among various individuals making it possible to reduce the risks of error and fraud. Contains four components Custody Authorization Record Keeping Reconciliation Ideally, a single individual would have responsibility for only a single component 10

What is Segregation of Duties (cont.)? Benefits of implementing and maintaining SOD include: Safeguarding of assets Accurate financial reporting Reduced risk of non-compliance Reduced cost of compliance for automated SOD (e.g., SOX and external audit) 11

What is Segregation of Duties (cont.)? SOD conflicts are not equally important to every company: Safeguarding of assets vs. financial reporting risks Relative importance of information confidentiality Nature of company assets Reduced risk when the chain of access is broken 12

Evaluating Your SOD Create a policy Include a statement that management is responsible for enforcing the policy and maintaining proper SOD Ultimately includes a list of incompatible duties Identify the core tasks performed at your company 13

Evaluating Your SOD Identify incompatibilities Risk based for your business Consider sensitive duties such as posting of journal entries, performing reconciliations and Vendor Master 14

Example SOD Matrix Customer Master Sales Order Entry/Edit Sales Order Approval Ship Confirm Vendor Master Requisition Entry/Edit Requisition Approval Purchase Order Entry/Edit Purchase Order Approval Receiving Inventory Adjustment Entry Sensitive Activities Customer Master 1 0 Sales Order Entry/Edit 0 1 0 0 Sales Order Approval 0 1 Ship Confirm 0 1 0 0 Vendor Master 0 1 0 Requisition Entry/Edit 1 0 0 Requisition Approval 0 1 Purchase Order Entry/Edit 0 1 0 0 Purchase Order Approval 0 1 Receiving 0 0 1 0 Inventory Adjustment Entry 0 0 1 15

Evaluating Your SOD (cont.) Translate requirements into applications Define menus or objects granting user access Identify the sensitive objects associated with conflicting duties 16

Evaluating Your SOD (cont.) Roles for key responsibilities with well defined rights Shipping/Receiving Purchasing Accounts Payable Accounts Receivable Vendor Master 17

Evaluating Your SOD (cont.) Object Description Area P0012 Automatic Accounting Instructions AAI P0022 Tax Rules Tax P0030G G/L Bank Accounts Accounting P03013 Customer Master Customer Master P03B0001 Speed Receipts Entry Receiving P03B0002 Invoice Revisions Vendor Invoices Entry/Edit P03B102 P03B11 P03B11SI P03B11Z1 P03B121 P03B123 P03B305 Standard Receipt Entry Standard Invoice Entry Speed Invoice Entry Batch Invoice Revisions Work With Electronic Receipts Input Electronic Receipt Entry Credit Granting / Management Receiving Vendor Invoices Entry/Edit Vendor Invoices Entry/Edit Vendor Invoices Entry/Edit Receiving Receiving Customer Master Receiving Role P03B42 A/R Deduction Activity Master Maintenance Customer Master 18

Evaluating Your SOD (cont.) Determine the existing role access rights Identify built-in conflicts provided by each role Document desired changes to roles Determine the users assigned to roles Provides a complete list of user conflicts allowed 19

Evaluating Your SOD (cont.) User User1 User2 User3 User4 User5 User6 User7 Role Receiving Receiving AP AP AR AR GL Role Object Description GL P0012 Automatic Accounting Instructions GL P0030G G/L Bank Accounts AR P03013 Customer Master AR P03B305 Credit Granting/Management AR P03B42 A/R Deduction Activity Master Maintenance Receiving P03B0001 Speed Receipts Entry Receiving P03B102 Standard Receipt Entry Receiving P03B121 Work With Electronic Receipts Input Receiving P03B123 Electronic Receipt Entry Tax P0022 Tax Rules AP P03B0002 Invoice Revisions AP P03B11 Standard Invoice Entry AP P03B11SI Speed Invoice Entry AP P03B11Z1 Batch Invoice Revisions Tables such as the above will provide information of user access to sensitive transactions 20

Evaluating Your SOD (cont.) User Role Trans Type Conflict Trans Type Role User Role Object Trans Type Trans Type Object Role The above graphic depicts how user conflicts can be identified using lists of: Users/roles Roles/objects/transaction types Conflicting pairs of transaction types 21

Evaluating Your SOD (cont.) Added Requirements Roles should not contain built-in conflicts Additional issues and complexity Users assigned to multiple roles Users assigned access rights by User ID Users accessing multiple systems 22

Evaluating Your SOD (cont.) Does this solve all issues? Not likely. Small groups of users System constraints Manual activities outside the system Detective controls have a role Audit trails Exception reports 23

Evaluating Your SOD (cont.) Other sources of SOD concern: Application administrator access Security administrator and user setup Programmer access to production Powerful utilities Strength of passwords Shared passwords Access to edit / change audit tables 24

Maintaining SOD Prevention Tools for granting user access rights IT becomes a gatekeeper Conflicts raised for added approval or mitigation Role and user change controls Maintain strong userid and password requirements 25

Maintaining SOD (cont.) Detection Internal audit Periodic evaluation and monitoring Exception reporting Automated Methods Automated monitoring ERP system tools and workflow 26

Key Points Segregation of Duties helps prevent fraud and errors Companies should identify their SOD risks and controls Detective controls can be effective A process is needed to correct ineffective SOD Maintaining effective SOD requires processes and tools Management is always surprised about current access Without performing an analysis, SOD issues are apparent after something bad occurs 27

Questions and Answers 28

Thank You For Attending Further questions may be directed to: Scott.Mitchell@mossadams.com / (503) 478-2193 John.Earl@mossadams.com / (503) 478-2188 The material appearing in this presentation is for informational purposes only and is not legal or accounting advice. Communication of this information is not intended to create, and receipt does not constitute, a legal relationship, including, but not limited to, an accountant-client relationship. Although these materials may have been prepared by professionals, they should not be used as a substitute for professional services. If legal, accounting, or other professional advice is required, the services of a professional should be sought.