Building an Audit Trail in an Oracle EBS Environment. Presented by: Jeffrey T. Hare, CPA CISA CIA



Similar documents
Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications

Oracle E-Business Suite: SQL Forms Risks and. Presented by: Jeffrey T. Hare, CPA CISA CIA

Best Practices for Protecting Sensitive Data in an Oracle Applications Environment. Presented by: Jeffrey T. Hare, CPA CISA CIA

Change Management Best Practices for ERP Applications, An Internal Auditor's Perspective. Jeffrey T. Hare, CPA CISA CIA ERP Risk Advisors

Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications

Chapter 6: Developing a Proper Audit Trail for your EBS Environment

How to Audit the Top Ten E-Business Suite Security Risks

Decryption of Credit Card Data and Bank Account Data; Risks and Controls

Top Ten Fraud Risks in the Oracle E Business Suite

Guide to Auditing and Logging in the Oracle E-Business Suite

Oracle E-Business Suite Controls: Application Security Best Practices

Leverage T echnology: Move Your Business Forward

Solihull Metropolitan Borough Council. IT Audit Findings Report September 2015

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Feature. Multiagent Model for System User Access Rights Audit

Minimize Access Risk and Prevent Fraud With SAP Access Control

Governance, Risk & Compliance for Public Sector

Advisory Services Oracle Alliance Case Study

Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015

How To Ensure Financial Compliance

Continuous Controls Monitoring ISACA, Houston Chapter. August 17, 2006

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Risk Management in Role-based Applications Segregation of Duties in Oracle

Application Testing: Not Just for IT Auditors. Insert Logo Here

Security Compliance and Data Governance: Dual problems, single solution CON8015

To Cross-Validate or Not? Best Practices to Enforce Valid GL Combinations. Helene Abrams CEO eprentise

Complete Database Security. Thomas Kyte

Making Database Security an IT Security Priority

Auditing Data Access Without Bringing Your Database To Its Knees

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

Reduce Audit Time Using Automation, By Example. Jay Gohil Senior Manager

Moving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

Leveraging Continuous Auditing / Continuous Monitoring in internal audit April 10, 2012

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Best Practices Report

Oracle Database Security Myths

The Information Systems Audit

ORACLE APPLICATION ACCESS CONTROLS GOVERNOR FOR PEOPLESOFT

Oracle Business Intelligence Applications

Information Security and Governance in ERP Implementation (JD Edwards)

<Insert Picture Here> Oracle Database Security Overview

Hosting Users Guide 2011

Oracle Fusion Applications Security Guide. 11g Release 5 (11.1.5) Part Number E

Leveraging advanced controls with E-Business suite implementation and upgrade projects

Security and Control Issues within Relational Databases

Application Monitoring for SAP

OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT

Knowledge Coach. User Guide

Third Party Risk Management 12 April 2012

WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite

Segregation of Duties

Securing SharePoint 101. Rob Rachwald Imperva

Secret Server Qualys Integration Guide

FileMaker Security Guide The Key to Securing Your Apps

Application Control Effectiveness for SAP. December 2007

Approvals Management Engine R12 (AME) Demystified

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data

Sarbanes-Oxley Control Transformation Through Automation

Best Approaches to Database Auditing: Strengths and Weaknesses.

KBACE Applied Service Oriented Architecture (SOA)

SEGPAY SUITE MERCHANT SETUP CONFIGURATION REPORTS

Install and Configure Fusion Applications - DBA perspective. Masthan Babu Phani Kottapalli AST Corporation August 14, 2014

WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite

Oracle Audit Vault Administrator s Guide Oracle Audit Vault Auditor s Guide Oracle Enterprise Manager Cloud Control Administrator s Guide

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH

Table of Contents. Copyright Symphonic Source, Inc. All rights reserved. Salesforce is a registered trademark of salesforce.

Connecting the dots: IT to Business

BENEFITS OF IMAGE ENABLING ORACLE E-BUSINESS SUITE:

JD Edwards EnterpriseOne: Governance, Risk, and Compliance

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

Application Security Review

Oracle EBS Interface Connector User Guide V1.4

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

Continuous Controls Monitoring. Virginia ISACA January Meeting 19 January 2010

Identity & Access Management new complex so don t start?

Application controls testing in an integrated audit

ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION

Iowa Student Loan Online Privacy Statement

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

OAUG Webinar Series Seminar #4

Managing Open Source Code Best Practices

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

Online Transaction Processing in SQL Server 2008

Content Management System

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Risk and Controls 101

mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer

Transcription:

Building an Audit Trail in an Oracle EBS Environment Presented by: Jeffrey T. Hare, CPA CISA CIA

Webinar Logistics Hide and unhide the Webinar control panel by clicking on the arrow icon on the top right of your screen The small window icon toggles between a windowed and full screen mode Ask questions throughout the presentation using the chat dialog Questions will be reviewed and answered at the end of the presentation; I ll open the lines for interactive Q&A During the presentation, we will be conducting a number of polls, please take the time to respond to all those that are applicable CPE will only be give to those that answer at least 3 of the 4 polls

Presentation Agenda Overview: Introduction Audit Trail Overview Audit Trail Example Audit Trail Technologies What to Audit Upcoming Webinars Other Comments Wrap Up

Introductions Jeffrey T. Hare, CPA CISA CIA Founder of ERP Seminars and Oracle User Best Practices Board Written various white papers on Internal Controls and Security Best Practices in an Oracle Applications environment Frequent contributor to OAUG s Insight magazine Experience includes Big 4 audit, 6 years in CFO/Controller roles both as auditor and auditee In Oracle applications space since 1998 both as client and consultant Founder of Internal Controls Repository public domain repository Author Oracle E-Business Suite Controls: Application Security Best Practices Contributing author Best Practices in Financial Risk Management Published in ISACA s Control Journal (twice) and ACFE s Fraud Magazine

Poll question: How are you identifying changes to application controls, security settings, and activity through SQL forms

Audit Trail Overview

Audit Trail Overview Disconnect between application and database layers Need to be concerned about application access as well as database access Audit trail only kept where application is built to do so Lack of audit all functionality to monitor privileged users Lack of detailed audit trail throughout the application In some cases as is the case with HR, update versus correct Example: change(s) to columns in a table can cause confusion related to changes made - Journal Sources example

Audit Trail Example

Audit Trail Example Audit Trail deficiencies Journal Sources Example:

Audit Trail Example Audit Trail deficiencies Journal Sources Example: After first change:

Audit Trail Example Audit Trail deficiencies Journal Sources Example: After second change:

Audit Trail Example Journal Sources example data: Initial Value After First Change After Second Change Value Checked Unchecked Checked Updated by AUTOINSTALL JTH9891 JTH9891 Update date 03-Jan-2007 21:52:09 25-Aug-2008 16:43:58 25-Aug-2008 16:45:31 The only thing we can tell from this is that JTH9891 made a change, but we have no idea WHAT changed. The values as of the second change are the same as the initial values!

Audit Trail Technologies

Audit Trail Technologies Overview: Row Who / Alerts Sign On Audit Snapshot Log Triggers

Audit Trail Technologies Row Who / Alerts What is it: Created by, creation date, last updated by, last updated date When it is useful Monitoring things you don t expect to change (however, when it does ) Within an audit period, creation date and last updated date Transaction monitoring (high volume) some continuous controls monitoring (CCM) requirements

Audit Trail Technologies Row Who / Alerts Pros: Standard, embedded, no performance impact, no configuration Alerts can be proactive Cons Only contains values as of that point in time Alerts don t store values, therefore, cannot be audited

Audit Trail Technologies Sign On Audit What is it: Profile option SignOn:Audit Level set to Form When is it useful: Tracking user logins and use of professional forms Tracking login of generic users such as SYSADMIN, job scheduling users where activity should be limited by policy and procedure

Audit Trail Technologies Sign On Audit Pros: Relatively little performance impact Useful for comparing login activity to activity logged by users to hold them accountable versus the policies / standards Cons Only tracks activity via professional forms (not OA framework html pages), doesn t tell you WHAT the user did, just that they accessed the form

Audit Trail Technologies Snapshot What is it: Comparison of row who information between instances or between two points in time (prod versus 12/31 version) When is it useful: Identifying when something is changed that you wouldn t expect When comparisons are pre-mapped such as tools that compare objects between instances or versions Application support to identify when there is a configuration change (i.e. what broke the process)

Audit Trail Technologies Snapshot Pros: Insignificant performance impact Useful for comparing significant volumes of data Useful for support purposes comparing data across instances or points in time when processes are broken Cons: Only tells you delta as of two points in time, can miss incremental changes between periods

Audit Trail Technologies Logs What are they: Various types of incremental data Could be traffic flowing across the network or technology inherent to the database (redo or for mirroring) When are they useful: High volume transaction tables

Audit Trail Technologies Logs Pros: Insignificant performance impact Cons: Typically unable to map metadata to capture important cross reference information about the change

Audit Trail Technologies Triggers What are they: Core database technology Use by System Administrator audit trail Advanced software packages: May allow metadata to be mapped Usually have a central repository for easier reporting and data management May allow for alerting of information When are they useful: Setups (key control configurations), Master Data, Security, Development; SQL Forms

Audit Trail Technologies Triggers Pros: Allow for mapping of metadata Inherent technology within the application Captures detail changes and related metadata (most solutions) to provide an auditable system Cons: Can have a performance impact if deployed on high volume transaction tables. Therefore, performance impact needs to be evaluated and considered when using

Audit Trail Technologies Metadata Mapping Example: fnd_responsibility table:

Audit Trail Technologies Metadata Mapping Example: fnd_menus table:

Audit Trail Technologies Metadata Mapping Example: fnd_menus_tl table:

Poll 2: How are you baselining configurations and tracking changes related to automated controls?

Audit Trail: What to Audit

Audit Trail: What to Audit What to audit: Category Application Controls Affect Business Process Development Security Fraud Related Form / Function Journal Sources (GL), Journal Authorization Limits (GL), Approval Groups (PO), Adjustment Approval Limits (AR), Receivables Activities (AR), OM Holds (OM), Line Types (PO), Document Types (PO), Approval Groups (PO), Approval Group Assignments (PO), Approval Group Hierarchies (PO), Tolerances, Item Master Setups, Item Categories Profile Options, DFFs, KFFs, Value Set Changes Concurrent Programs, Executables, Functions, SQL forms, Objects Menus, Roles, Responsibilities, Request Groups, Security Profiles, SQL forms such as Dynamic Trigger Maintenance, Define Profile Options, Alerts, Collection Plans, etc (see Metalink Note 189367.1 for more information on SQL forms) Suppliers, Remit-To Addresses, Locations, Bank Accounts Poll 2: How are you baselining configurations and tracking changes related to automated controls?

Audit Trail Technologies Software providers: Trigger-based: Absolute Technologies: Application Auditor CaoSys: CS*Audit (part of CS*Compliance) Greenlight Technologies: RESQ Oracle: Configuration Controls Governor; Audit Vault Log-based: Guardium, Lumigent Snapshot: Approva

Upcoming Webinars ERP Seminars TBD Absolute Technologies: 7 Oct, 2 p.m. EDT - Application Auditor http://www.absolutetech.com/services/webinar_signup_request_aa.phtml CaoSys: 6 Oct, 2 p.m. EDT CS*Compliance http://www.caosys.com/events.php

Other Comments

Poll 3: Will you require a CPE certificate for a professional designation such as CPA, CISA, CISM, or CIA?

Sample Risk Assessment Application Controls / SOD Conflict Risk Description Typical Mitigating Controls Enter Journals vs Maintain Journal Sources Enter Journals vs. Journal Sources: User could override controls by changing configuration "Require Journal Approval" which is set in the Journal Sources form and determines which sources are required to go through the journal approval process. This could also lead to changing "Freeze Journals" as Journal Sources which could allow a user to delete or change a JE from a subledger. Either change could lead to compromise in controls related to the journal entry approval process. This could lead to a compromise in the integrity of the financial statements and control violations under SOX. Do not allow those involved in JE process to maintain Journal Sources. No user should have access to both of these functions, including support users. Changes to Journal Sources should go through change management and approved by appropriate personnel that has reviewed and understands the impact of this change on the process and controls related to journal entries.. Changes to Journal Sources should be audited at the system level via a logbased or trigger-based mechanism. A change management audit should be performed with a 100% sample size done by comparing actual changes pull from a system level audit trail to approvals in the change management documentation by an independent auditor.

Sample Risk Assessment Application Control Configs Conflict Risk Description Typical Mitigating Controls Maintain Journal Authorization Limits Maintain Journal Authorization Limits: Access allows a user to define journal approval limits. Risk is unapproved changes to journal approval limits resulting in posted journal entries not properly approved by management and overriding defined controls. This could lead to a compromise in the integrity of the financial statements and control violations under SOX. Changes to Journal Authorization Limits should go through change management and approved by appropriate personnel that has reviewed and understands the impact of this change on the process and controls related to journal entries. Changes to Journal Authorization Limits should be audited at the system level via a log-based or trigger-based mechanism. A change management audit should be performed with a 100% sample size done by comparing actual changes pull from a system level audit trail to approvals in the change management documentation by an independent auditor.

Wrap Up

Oracle Apps Internal Controls Repository Internal Controls Repository Content: White Papers such as Accessing the Database without having a Database Login, Best Practices for Bank Account Entry and Assignment, Using a Risk Based Assessment for User Access Controls, Internal Controls Best Practices for Oracle s Journal Approval Process Oracle apps internal controls deficiencies and common solutions Mapping of sensitive data to the tables and columns Identification of reports with access to sensitive data Recommended minimum tables to audit http://tech.groups.yahoo.com/group/oracleappsinternalcontrols/ Not affiliated with Oracle Corporation

ERP Seminars Services Free one-hour consultation On-site seminars (1-2 days) custom tailored to your company s needs as well as various web-based seminars RFP / RFI management for Oracle-related GRC software SOD / UAC Third Party software projects / remediation Audit trail software projects Controls review related to Oracle-related controls implementations and post-implementation Level I and Level II assessment services see: http://www.erpseminars.com/services.html

Seminars Offered Seminars offered: Internal Controls and Application Security Best Practices in an Oracle e-business Suite Environment Application Security Design: Fundamentals Application Security Design: Advanced Concepts Implementing Oracle e-business Suite: Internal Controls Challenges Introduction to Oracle s User Management Module and Related Risks Auditing Oracle E-Business Suite: Application Security Monitoring Privileged Users in an Oracle E-Business Suite Environment Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle E-Business Suite

About ERP Seminars Thought Leadership, Best Practices Aggregator of public domain content and best practices A hands-on, Oracle Applications focused analyst firm - but not an analyst firm that only covers those pay for coverage NOT a consulting firm, although I do some limited consulting Independent of any 3 rd party software attempt to cover all relevant solutions in the Oracle Apps Controls Automation space

Q & A

Poll 4: I'd like to follow up this webinar with:

Contact Information Jeffrey T. Hare, CPA CISA CIA Cell: 970-324-1450 Office: 970-785-6455 E-mail: jhare@erpseminars.com Websites: www.erpseminars.com, www.oubpb.com Oracle Internal Controls and Security listserver (public domain listsever) at http://groups.yahoo.com/group/oraclesox Internal Controls Repository (end users only) http://tech.groups.yahoo.com/group/oracleappsinternalcontrols/

Best Practices Caveat Best Practices Caveat The Best Practices cited in this presentation have not been validated with your external auditors nor has there been any systematic study of industry practices to determine they are in fact Best Practices for a representative sample of companies attempting to comply with the Sarbanes-Oxley Act of 2002 or other corporate governance initiatives mentioned. The Best Practice examples given here should not substitute for accounting or legal advice for your organization and provide no indemnification from fraud, material misstatements in your financial statements, or control deficiencies.