Risks in ERP implementation



Similar documents
Chapter: 1. Enterprise Resource Planning

Manual of Information Technology Audit

Enterprise Financial Management: ERP for Small and Mid-market Companies

Domain 1 The Process of Auditing Information Systems

Knowledge Management Series. Internal Audit in ERP Environment

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

IT Service Continuity Management PinkVERIFY

White Paper. Regulatory Compliance and Database Management

ITSM Reporting Services. Enterprise Service Management. Monthly Metric Report

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

BSM for IT Governance, Risk and Compliance: NERC CIP

Practical Guidance for Auditing IT General Controls. September 2, 2009

Information Security and Governance in ERP Implementation (JD Edwards)

WHITE PAPER. Sarbanes - Oxley Section 404: How BMC Software Solutions Address General IT Control Requirements

Implementation of PeopleSoft 8.9

Blend Approach of IT Service Management and PMBOK for Application Support Project

Department of Public Utilities Customer Information System (BANNER)

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

Functional and technical specifications. Background

Project Risk and Pre/Post Implementation Reviews

Service Definition Document

Using QUalysgUard to Meet sox CoMplianCe & it Control objectives

OFFICE OF AUDITS & ADVISORY SERVICES IT DISASTER RECOVERY AUDIT FINAL REPORT

CMDB Essential to Service Management Strategy. All rights reserved 2007

CLASSIFICATION SPECIFICATION FORM

CHAPTER 2: IT ENABLED SERVICES AND EMERGING TECHNOLOGIES... 2 PART 1: IT ASSURANCE SERVICES AND ROLE OF CAs IN BPO-KPO... 2 Learning Objectives...

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

hi Information Technologies Change Management Standard

Recent Advances in Automatic Control, Information and Communications

Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy

Maximizing Configuration Management IT Security Benefits with Puppet

Transaction Processing and Enterprise Resource Planning Systems. Goal of Transaction Processing. Characteristics of Transaction Processing

IT Governance and Control: An Analysis of CobIT 4.1. Prepared by: Mark Longo

IS AUDITING GUIDELINE ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS REVIEW DOCUMENT G21

Cloud Computing An Auditor s Perspective

Wilhelmenia Ravenell IT Manager Eli Lilly and Company

The PNC Financial Services Group, Inc. Business Continuity Program

Integrating CMMI with COBIT and ITIL

Top 10 System Implementation Audit Considerations

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

The Information Systems Audit

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010

ICTEC. IT Services Issues HELSINKI UNIVERSITY OF TECHNOLOGY 2007 Kari Hiekkanen

E Distribution: GENERAL RESOURCE, FINANCIAL AND BUDGETARY MATTERS. Agenda item 6 FINAL UPDATE ON THE WINGS II PROJECT.

BUSINESS PROCESS MANAGEMENT and IT. Helping Align IT with Business

MINISTRY OF FINANCE, PLANNING AND ECONOMIC DEVELOPMENT THE THIRD FINANCIAL MANAGEMENT AND ACCOUNTABILITY PROGRAMME (FINMAPIII) TERMS OF REFERENCE

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division

Development, Acquisition, Implementation, and Maintenance of Application Systems

ERP Implementation Risk: Identifying, Monitoring and Remediating Issues Throughout the Project to Ensure Success

Combine ITIL and COBIT to Meet Business Challenges

Growth Through Excellence

Configuring and Deploying a Private Cloud

ERP Systems: Audit and Control Risks

A FRAMEWORK FOR INTEGRATING SARBANES-OXLEY COMPLIANCE INTO THE SOFTWARE DEVELOPMENT PROCESS

Certified Information Systems Auditor (CISA)

CHAPTER 1: INTRODUCTION TO ENTERPRISE SYSTEMS FOR MANAGEMENT

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

FD-101. Electronic Commodity Ordering System (ECOS) & Web Based Supply Chain Management (WBSCM) Todd Griffith FDD Systems Branch May 2008

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH

Validating Enterprise Systems: A Practical Guide

Governance and Management of Information Security

Information Technology Master Plan Update: IMTech February 28, 2011

How To Implement An Enterprise Resource Planning Program

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

A Systems Implementation Project Planning Guide. Solutions & Project Management Services for Systems & Operations Projects

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

Security Controls What Works. Southside Virginia Community College: Security Awareness

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Project Management and ITIL Transitions

ERP Briefing. Cook County Government. Bureau of Finance Enterprise Resource Planning Center of Excellence. August 19, 2014

Microsoft s Compliance Framework for Online Services

Enterprise Data Management. Data Factory as a Service (DFaS)

5 Steps To Successful ERP Implementation

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

ATTACHMENT II - WRITTEN PROPOSAL RESPONSE AND GUIDELINES

Cloud Computing An Internal Audit Perspective Institute of Internal Auditors Topeka Chapter

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

ROUTES TO VALUE. Business Service Management: How fast can you get there?

Self-Service SOX Auditing With S3 Control

Course: Enterprise Applications and Open Source Systems for e-governance implementation. Day 3. Session 3: Introduction to ERP Applications

Terms of Reference for an IT Audit of

Enterprise-Wide Information Systems in the Modern Organization

Audit report. Information Technology Governance at UNOPS

INFORMATION TECHNOLOGY CONTROLS

SCOPE OF WORK. The scope of work of Implementation Partner (IP) shall include the following:

ENTERPRISE RESOURCE PLANNING SYSTEMS

At the Heart of Connected Manufacturing

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Transcription:

Risks in ERP implementation

ERP A high-end solution featuring integration of information technology and business application. Seeks to streamline and integrate operational processes and information flows in the organization to integrate the resources. The whole is greater than the sum of its parts. Each implementation is unique and is designed to correspond to the implementer's various business processes.

Major functionalities of ERP Bridges the information gap across the organisation. Facilitates enterprise-wide Integrated Information System covering all functional areas like Manufacturing, Sales and distribution, Payables, Receivables, Inventory, Accounts, Human resources, Purchases etc. Helps in eliminating most of the business problems like Material shortages, Productivity enhancements, Customer service, Cash Management, Inventory problems, Quality problems, Prompt delivery etc. Provides avenues of continuous improvement and refinement of business processes. Helps in laying down Decision Support Systems (DSS), Management Information System (MIS), Reporting, Data Mining and Early Warning Systems to the organization.

ERP and BPR Implementation goes closely with business process reengineering and organizational remodelling Understanding the full import of going for ERP; whether enough organizational resilience and flexibility to undertake the project. Mismatch between the management aspirations and organizational compliance.

Characteristics The database is usually centralized and as the applications reside on multiple users the system allows flexibility in customization and configuration. The processing is real time online whereby the databases are updated simultaneously by minimal data entry operations. The input controls are dependent on pre data acceptance validation and rely on transaction balancing; time tested controls such are batch totals etc are often no longer relevant. Since the transactions are stored in a common database the different modules update entries into the database. Thus database is accessible from different modules.

Characteristics The authorization controls ere enforced at the level of application and not the database; the security control evaluation is of paramount importance. Auditors have to spend considerable time understanding the data flow and transaction processing. System heavily dependent on networking on a large scale. Vulnerability by increased access is a price that is paid for higher integration and faster processing of data in an integrated manner. The risk of single point failures is higher in ERP solutions; Business Continuity and Disaster Recovery should be examined closely.

Broad areas to look Process integrity, Application security, Infrastructure integrity and Implementation integrity.

Implementation Integrity Project Planning, Business & Operational analysis including Gap analysis, Business Process Reengineering, Installation and configuration, Project team training, Business Requirement mapping, Module configuration, System interfaces, Data conversion, Custom Documentation, End-user training, Acceptance testing and Post implementation/audit support.

Case Study GSM in WHO To improve operational efficiency, streamline processes and effectively decentralize authority and responsibility - replace the fragmented computerized information systems with an integrated system for global management and administration GSM- both a major business change and a major technological change for WHO.

Reference Frame Oracle E-BIZSuiteE Use of PRINCE2, Oracle AIM, PJM and ITIL by Management Audit : CoBIT/SDLC

COBIT Framework M1 Monitor the process M2 Assess internal control adequacy M3 Obtain independent assurance M4 Provide for independent audit DS1 Define service levels DS2 Manage third-party services DS3 Manage peformance and capacity DS4 Ensure continuous service DS5 Ensure systems security DS6 Identify and attribute costs DS7 Educate and train users DS8 Assist and advise IT customers DS9 Manage the configuration DS10 Manage problems and incidents DS11 Manage data DS12 Manage facilities DS13 Manage operations Business Objectives Criteria Effectiveness Efficiency Confidenciality Integrity Availability Compliance Reliability MONITOR AND EVALUATE IT RESOURCES Data Application systems Technology Facilities People DELIVER AND SUPPORT PO1 Define a strategic IT plan PO2 Define the information architecture PO3 Determine the technological direction PO4 Define the IT organisation and relationships PO5 Manage the IT investment PO6 Communicate management aims and direction PO7 Manage human resources PO8 Ensure compliance with external requirements PO9 Assess risks PO10 Manage projects PO11 Manage quality ACQUIRE AND IMPLEMENT PLAN AND ORGANISE AI1 Identify automated solutions AI2 Acquire and mantain application software AI3 Acquire and maintain technology infrastructure AI4 Develop and maintain IT procedures AI5 Install and accredit systems AI6 Manage changes

CoBIT HLCOs for ERP Audit

The objectives of the review Whether the GSM application development and implementation processes have adhered to the best practices and procedures including governance, risk management and controls. Determine the effectiveness of preparedness for the implementation of GSM application. The scope was restricted to focus on risks associated with the project processes and preparedness for implementation of GSM project. Other risks associated with IT controls over individual modules or the functionality aspects of GSM were not included.

Audit methodology The focus of audit was on risks associated with project processes and preparedness for implementation of GSM project. The audit was conducted in accordance with the CoBIT framework. The key areas of risk identified, analyse these risks and plans for their mitigation.

Areas covered Project management Contract management GSM Budget and staff Solution readiness and User Acceptance Organizational readiness and training IT readiness Data conversion, cutover and transition System security issues Post implementation review

Project management Multiple slippages in go-live deadlines GSM planning vis-a-vis GSC planning Involvement of ITT Project Management Methodology User Requirements Manpower resource Total cost of GSM

Project management Tolerance Involvement of Health Technical Units (HTUs( HTUs) Adoption of International Public Sector Accounting Standards (IPSAS) Regression testing Parallel testing

Contract management Budget and staff System Integrator Costs Staff Costs

Solution readiness and User Acceptance Users Acceptance Testing Solution readiness for UAT Data sufficiency and Quality in UAT SIT and UAT Test Director Methodology E2E scenarios for UAT Remediation of Health Technical Units

Organizational readiness and training Global Service Centre (GSC) Disaster Recovery and Business Continuity Planning for the GSC Insurance arrangement for Global Service Centre Global Service Desk (GSD) Maintaining existing services Training

IT readiness Knowledge management Global Private Network (GPN)

Data conversion, cutover and transition Data availability from Businesses Loss of Audit Trail Quality assurance of the converted data Cutover procedures Legacy system decommissioning and database archiving

System security issues Information Security Management System (ISMS) Data classification and patch management System security testing

Post Implementation Post-implementation review of GSM

Questions? Dr. Ashutosh Sharma CISA, CIA AshutoshSharma@cag.gov.in