An Introduction to Continuous Controls Monitoring



Similar documents
Process Control Optimisation with SAP

Application Control Effectiveness for SAP. December 2007

The Power of Risk, Compliance & Security Management in SAP S/4HANA

Continuous Monitoring: Match Your Business Needs with the Right Technique

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

Accounts Payable Automation: Top 9 Reasons to Automate: The Essential Guide to Why Your Business Needs to Automate its Invoice Processing.

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

Minimize Access Risk and Prevent Fraud With SAP Access Control

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

A Control Framework for e-invoicing

Advisory Services Oracle Alliance Case Study

Solihull Metropolitan Borough Council. IT Audit Findings Report September 2015

Access Governance. Delivering value. What you gain. Putting a project back on track for success

Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:

SAP Overview Brochure. Confidence Powers Success. SAP Solutions for Governance, Risk, and Compliance.

PROCESSING & MANAGEMENT OF INBOUND TRANSACTIONAL CONTENT

Auditing Standard 5- Effective and Efficient SOX Compliance

Thought Leadership White Paper

Information Security Policies. Version 6.1

Sarbanes-Oxley Compliance for Cloud Applications

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Final. Internal Audit Report. Creditors System

Service Catalogue. Inside

HEALTH SERVICE EXECUTIVE NATIONAL FINANCIAL REGULATION INTRODUCTION TO NATIONAL FINANCIAL REGULATIONS NFR - 00

Capital Projects. Providing assurance over effective delivery of projects

Interim Audit Report. Borough of Broxbourne Audit 2010/11

RSA ARCHER OPERATIONAL RISK MANAGEMENT

Informing the audit risk assessment Enquiries to those charged with governance Calderdale Council. Year ended 31 March 2013

Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Aberdeen City Council

Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com

APPENDIX A Clackmannanshire Council. Audit of housing and council tax benefit. Risk assessment report

Model risk mitigation and cost reduction through effective design*

Business Process Management & Workflow Solutions

CONTINUOUS CONTROLS MONITORING

Policy Management Compliance 360 GRC Software Suite

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

ENTERPRISE RISK MANAGEMENT FRAMEWORK

The Value of Vulnerability Management*

White Paper. The Implications of E-invoicing for Purchasing and Accounts Payable Automation Projects.

Audit Quality Thematic Review

A strategic approach to fraud

Case Study: ICICI BANK INTERNAL AUDIT DEPARTMENT PENTANA AUDIT WORK SYSTEM IMPLEMENTATION

How to build a great compliance program for your U.S. imports

WHITE PAPER. How to simplify and control the cardholder security environment

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

Using Assurance Models in IT Audit Engagements

Enterprise Risk Management in Compliance 360

EFFECTIVE VENDOR MANAGEMENT: REAPING LONG-TERM BENEFITS FROM YOUR VENDOR RELATIONSHIPS

Risk Management in Role-based Applications Segregation of Duties in Oracle

How To Ensure Financial Compliance

ACCOUNTING POLICIES AND PROCEDURES

Knowledge Management Series. Internal Audit in ERP Environment

Manage and Control Access Risk and Assess Its Financial Impact

Feature. A Higher Level of Governance Monitoring IT Internal Controls. Controls tend to degrade over time and between audits.

Internal Control Systems

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES

Newcastle University Information Security Procedures Version 3

Achieving the Goals of Accounts Payable Automation. White Paper

Business Intelligence for Banking

SAP Solution Brief SAP ERP SAP Invoice Management by OpenText. Take Control with Invoice Management Software

Masterminding Data Governance

Leveraging a Maturity Model to Achieve Proactive Compliance

Best Practice exensys Asset Purchases

SUGGESTED CONTROLS TO MITIGATE THE POTENTIAL RISK (Internal Audit)

Service Integration &

Feature. Multiagent Model for System User Access Rights Audit

Fraud Prevention and Detection in a Manufacturing Environment

Risk & Assurance. Tailored to your needs. Internal audit solutions

How To Write A Pca Dss Compliance Solution For Gameplan Group Ltd

Customer requirements. Asset management planning Inspection and assessment Route asset planning Annual work plans Contracting strategy

5 best practices for cost capture & WIP

Real life experiences with Continuous Controls Monitoring (CCM) on Master Data. Pat Culpan Jeet Kadam

BPM IN F&A THE DIGITAL CFO PARTNERING THE BUSINESS IN GROWTH. xchanging.com BUSINESS PROCESS MANAGEMENT 1

Corporate Security in 2016.

DATA QUALITY STRATEGY

Dumfries & Galloway Council

Payment Card Industry Data Security Standard

BT Managed Mobility Expenses. Complete visibility and control to reduce your mobile communication costs

Transcription:

An Introduction to Continuous Controls Monitoring Reduce compliance costs, strengthen the control environment and lessen the risk of unintentional errors and fraud Richard Hunt, Managing Director Marc Jackson, Consultant Turnkey Consulting Overview Asking five different organisations in the Governance, Risk and Compliance (GRC) market to define Continuous Controls Monitoring (CCM) will provoke five difference responses. There is no singularly accepted definition and consequently it can cause confusion amongst organisations seeking further information when considering a CCM solution. However, despite this lack of uniformity, there are general concepts that remain constant and help to provide clarity regarding the practical application of CCM and its undoubted benefits. CCM has its roots in the various internal controls that organisations are required by corporate regulations to run regularly. Although some of these will be automated, many are still manual and so need to be proactively operated. A CCM solution can help to reduce compliance costs (through decreased manual controls and manual testing of those controls), strengthen the control environment and reduce the risk of unintentional errors and fraud. It can also improve business process operations. In the current regulatory environment, where management and stakeholders demand complete accuracy and integrity in financial reporting, non-compliance is not a feasible option. This white paper explains how CCM provides an efficient, cost-effective method of attaining this objective, at the same time as delivering return on investment. Introduction Today s current economic climate has presented many major headaches for employers. One that is discussed less often than reduced sales and higher operating costs is the increased risk of employee fraud. The elevated threat of being made redundant, or the frustration of having salaries frozen (or even reduced) for the foreseeable future, can make previously loyal staff search for control gaps in a business process that can be exploited for their financial gain. In addition, poor security and inappropriate levels of system access can lead to increased opportunities for users to perform fraudulent activities which can ultimately result in inaccurate financial reporting, or even material mis-statements. Achieving and maintaining compliance In striving for compliance with regulatory requirements such as Sarbanes-Oxley, many enterprises have already made significant strides in mapping their financial processes. These include identifying risks to the accuracy of financial reporting, documenting the internal controls (both business process and IT) necessary to mitigate these risks, and operating these controls as required to ensure compliance. However, the path towards compliance has not been without cost. The extensive resources needed to design, develop, operate, test and assess compliance control points have resulted in significant financial burdens for most organisations. Page 1

The initial achievement of compliance is just the beginning. Compliance is a continuous journey and, having attained an acceptable level through the implementation of a compliance and control framework, significant ongoing resource costs are often required to maintain this and ensure that internal controls are operating effectively. Because they often lack the internal resources or skill set to undertake this, many companies must continue to rely on external facilities to support on-going compliance activities, further increasing cost. However, it remains a necessary evil in order to meet regulatory requirements and prevent fraudulent activities from affecting the financial statements. The answer lies in finding a way to streamline this process. Operating and monitoring controls a manual burden Organisations with a robust compliance and control framework will have a number of internal controls that they need to operate on a regular basis. For example, detective reports run at the end of each monthly payroll will ensure there has been no duplication of payments. Although companies have automated some of their controls, the majority of them remain manual and so need to be proactively operated by the control owners themselves. For example, controls that act as check points within a process (such as approval required for a user provisioning request) tend to be manual in nature and need to be performed on an as required basis. In contrast, controls that are based on system parameter settings (eg configuring a three-way match requirement between invoice, purchase order and goods receipt to prevent payment of potentially invalid invoices) are likely to be automated and so, once set up, will operate automatically. Despite this, the subsequent periodic review of reports highlighting unmatched invoices will need to be performed as a manual control in order to resolve and clear these items. On top of manually operating these controls as required, manual checks also need to be performed in order to verify that they are working (rather than this being a non-tested assumption). This is the controls monitoring element and helps to measure the potential gap between theory and reality. Without such monitoring activities, controls could be changed without the owner s knowledge and compliance would no longer be achieved. Despite their investment and dedication towards compliance initiatives, many organisations don t have the necessary resources to evaluate the operational effectiveness of their internal controls on a frequent basis and therefore lack confidence in their ability to pass controls testing. It also means they rely on feedback from their external auditors to flag up any issues, which is clearly not a desired route. In addition, required corrective actions will not be timely enough to prevent issues being raised in the auditor s internal control report. Introducing automation with CCM CCM is essentially a technology solution for continuous monitoring which provides users with real-time status assurances for all of their compliance control points. For example, a rule may be configured that triggers an automatic review of the payment run output and sends results to the manager responsible for monitoring duplicate payments. Any exceptions will be flagged in the control output and then reviewed by the control owner for relevant action. The automation of the control now means that the manager does not have to actively perform the review and is only alerted when required, with subsequent reviews based on exceptions only. This reduces the burden on the control owner and allows them to perform more value-add activities, and so can also help to deliver significant business process improvements. Page 2

In order for controls to be included in a CCM solution they need to be automated. Taking the example above, the formerly manual operation of running a report every month in the business application and reviewing it to identify duplicate payments, even if none actually exist, is converted to a purely automated control. This is achieved by the use of a rule linked to an executable program that says go and test this, and is scheduled to be run periodically (or as required). Therefore, manual process driven controls are assigned to a program within the business application system with relevant rules applied, and the control is scheduled as appropriate from within the CCM system, where the results and alerts are also recorded. Controls based on system parameter settings are already automated and configured in the application. In this case, the related control to be implemented for a CCM solution would be to develop a program in the business application system that notifies the control owner in the CCM system if any of the parameter settings have been changed. This will enable them to ensure that the control is still operating as designed and hasn t been changed unknowingly. This control would be event-driven and so the control owner would be alerted by exception only. The business case for implementing CCM It is evident that CCM can have a significant return on investment (ROI) and so it should be straightforward to create a business case for its implementation. There are two main types of ROI for a CCM solution. The first is the significant saving in time and labour costs due to the automation of either the operation of controls and/or the testing of controls. By automating, people can be re-assigned to more productive operational tasks. Secondly, there are potentially huge returns by enabling the recovery of money, or preventing money being lost in the first place due to human error or fraudulent activities. For example, a company may have a supplier who is billing two different divisions for the same goods or services. This may be due to a simple mistake by the supplier, or it could be intentional and therefore classified as fraud. Whatever the reason, if it happens where there is no CCM solution in place the organisation may have to rely on manual controls to detect these duplicate invoices which can lead to undetected exceptions and result in a control failure. A CCM solution could detect this exception immediately and almost pay for itself in the process. Figure 1 Integration between CCM and business application Page 3

CCM: beyond transactions In the past CCM has tended to be associated with a focus on transactions, and there are several software vendors that supply products to monitor all financial (and non-financial) transactions for compliance with internal controls. However, master data and application configuration (sometimes referred to as application controls) is also an integral part of CCM as control weaknesses in these areas can lead to incorrect transactional data. For example, transactions related to the payment of invoices are generated by a program within the business application. However, this program relies on input from both application configuration (e.g. invoice tolerance thresholds) and master data (e.g. vendor bank account details in the vendor master record), as they determine whether the invoice should be paid in the first place and the relevant account that should receive it. Both application configuration and master data can be changed, but the objective is to ensure that they are being changed in an authorised manner using the appropriate procedures and control points, and not due to human error or fraudulent intent. For a business process to operate effectively, the process or data owner needs to validate that changes to their system parameter settings (many of which will be documented as controls) or master data are correct. As well as CCM for transactions, manual process driven controls, application configuration and master data, it can be used to support Segregation of Duties (SoD) processes. Organisations can harness SoD analysis technology such as SAP GRC Access Controls to automate the process of analysing and monitoring SoD and sensitive access exceptions, remediating exceptions, and analysing ongoing user access changes to prevent new risks. CCM tools such as the SAP GRC Process Controls tool can then be integrated to automate the documentation and review of mitigating controls where removal of access is not possible. The net result is reduced risk, fewer cases of human error, and less internal fraud. Enabling continuous auditing and control self-assessments with CCM As well as the benefit of having controls that operate with minimal human effort required, apart from the review and remediation of exceptions, this automated control framework also facilitates a more effective and efficient way of testing the operating effectiveness of these controls. It is critical to the effective operation of a control, and the ongoing prevention and detection of fraudulent activities in the system that the control owner periodically validates that the control is still operating as designed. This is known as control self-assessments. Because this task has previously been labour intensive, time consuming and costly, the tests of operating effectiveness end up being performed solely by the internal and external auditors, rather than the control owners themselves. Such audit reviews can also be time consuming for the control owners as they have to extract reports and evidence requested by the auditors as they select samples and test them for compliance and accuracy. In addition, sampling risk the possibility that exceptions may exist in the untested part of the total population is still an issue, and will continue to be if manual testing methods are used, as it is not possible to try all occurrences of a control over a given period. However, all of this can be done with relative ease by utilising the CCM functionality. For example, whilst a manual control such as the approval of user provisioning requests would previously require an audit of 30 historical transactions, automated controls can be Page 4

tested using a black box positive-negative test approach with just two theoretical transactions to prove that the continuous monitoring control is working as it should. In addition, if the auditor wants to dig deeper then they can also review the audit trail retained in the CCM system, which lists all occurrences of that control, all exceptions encountered, and whether the control owner dealt with those exceptions in the appropriate manner (which is another typical audit concern). Figure 2 Black box testing In summary A CCM solution can help to reduce compliance costs (through decreased manual controls and manual testing of those controls), strengthen the control environment and reduce the risk of unintentional errors and fraud. It can also improve business process operations. In the current regulatory environment, where management and stakeholders demand complete accuracy and integrity in financial reporting, non-compliance is not a feasible option. Continuous monitoring provides an efficient, cost-effective method of attaining this objective. Automated continuous monitoring can provide a wealth of benefits to a control and compliance framework including: automating previously manual controls; eliminating excessive control testing; enabling organisations to make control self-assessments more accessible; sustaining compliance with one or more regulations; enabling test results to be reusable across multiple compliance frameworks; minimising the risk of business losses via unintentional errors or malicious fraudulent activities by reporting control breakdowns as they happen; and delivering a return on investment by improving business process operations. Other less obvious benefits include using the CCM system as a central repository for documenting, scheduling, executing and recording results of controls operation and testing. Automating the internal control environment and moving towards a continuous control monitoring system enables an organisation to break free of the burdens traditionally associated with control compliance. This represents a significant milestone in the risk, security and compliance landscape, offering businesses the opportunity to achieve a new level of internal control. -ends- About Turnkey Consulting and the authors: Turnkey Consulting Turnkey Consulting is a specialist IT security company focused on combining business Page 5

consulting with technical implementation to deliver information security solutions for SAP systems. Founded in 2004 it now has offices in the UK, Australia, Germany and the United States, servicing clients in Europe, the US and Asia. Richard Hunt Richard Hunt is managing director of Turnkey Consulting, which he founded in 2004. He has worked in the IT security industry for more than a decade. His career began as a security consultant at PricewaterhouseCoopers (PwC), where he specialised in SAP security implementations and IT security reviews. Throughout his career, he has been involved in more than 20 IT security projects working across a range of business processes and industry sectors in the UK, Asia and Australasia. Marc Jackson Marc Jackson is a consultant at Turnkey Consulting. He has worked in the IT security and audit industry for the past decade. His career began as a security consultant at PricewaterhouseCoopers (PwC), where he specialised in SAP security implementations before moving into systems assurance work. He provided audit support services for statutory financial audits as well as Sarbanes Oxley compliance engagements, focussing both on SAP and non-sap systems. Throughout his career, Marc has been involved in a number of security implementations and audit engagements working across a range of business processes and industry sectors in Europe and Asia. Published in Computer Fraud & Security, July 2010 and Computer Weekly, October 2010 Page 6