Best Practices for Protecting Sensitive Data in an Oracle Applications Environment. Presented by: Jeffrey T. Hare, CPA CISA CIA

Similar documents
Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications

Building an Audit Trail in an Oracle EBS Environment. Presented by: Jeffrey T. Hare, CPA CISA CIA

Change Management Best Practices for ERP Applications, An Internal Auditor's Perspective. Jeffrey T. Hare, CPA CISA CIA ERP Risk Advisors

Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications

Oracle E-Business Suite: SQL Forms Risks and. Presented by: Jeffrey T. Hare, CPA CISA CIA

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Decryption of Credit Card Data and Bank Account Data; Risks and Controls

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Wellesley College Written Information Security Program

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

How to Audit the Top Ten E-Business Suite Security Risks

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

IDENTITY THEFT: DATA SECURITY FOR EMPLOYERS. Boston, MA Richmond, Virginia Tel. (617) Tel. (804)

Massachusetts Identity Theft/ Data Security Regulations

Top Ten Fraud Risks in the Oracle E Business Suite

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Third Party Risk Management 12 April 2012

MFA Perspective. 201 CMR 17.00: The Massachusetts Privacy Law. Compliance is Mandatory... Be Thorough but Be Practical

Privacy Law Basics and Best Practices

H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.

How To Ensure Financial Compliance

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

INFORMATION SECURITY FOR YOUR AGENCY

A Practical Guide to Understanding and Complying with Massachusetts Data Security Regulations. February 2010

Automation Suite for. 201 CMR Compliance

Missouri Student Information System Data Governance

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General

HIPAA Information Security Overview

Your Agency Just Had a Privacy Breach Now What?

DEPARTMENT OF TAXATION AND FINANCE SECURITY OVER PERSONAL INFORMATION. Report 2007-S-77 OFFICE OF THE NEW YORK STATE COMPTROLLER

PCI Compliance for Cloud Applications

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

SCDA and SCDA Member Benefits Group

UTAH STATE UNIVERSITY POLICIES AND PROCEDURES MANUAL

CSR Breach Reporting Service Frequently Asked Questions

PCI General Policy. Effective Date: August Approval: December 17, Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Data Processing Agreement for Oracle Cloud Services

PII Compliance Guidelines

FINAL May Guideline on Security Systems for Safeguarding Customer Information

SECTION-BY-SECTION ANALYSIS

STANDARD ADMINISTRATIVE PROCEDURE

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Iowa Student Loan Online Privacy Statement

Complete Database Security. Thomas Kyte

Identity Theft Prevention and Security Breach Notification Policy. Purpose:

A CPA recounts exponential growth in Compliance. Mary Ellen McLaughlin

Achieving Compliance with the PCI Data Security Standard

Compliance and Industry Regulations

CONSULTING AGREEMENT. This Consulting Agreement ( Agreement ) is entered into as of, 20

BBVA Wallet Application Privacy Policy

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

ADMINISTRATIVE POLICY # (2014) Information Security Roles and Responsibilities

Authorized. User Agreement

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

How To Write A Health Care Security Rule For A University

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Design of Database Security Policy In Enterprise Systems

The supplier shall have appropriate policies and procedures in place to ensure compliance with

BUSINESS ASSOCIATE AGREEMENT TERMS

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

CITY UNIVERSITY OF HONG KONG

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

Auditor s Checklist. A XYPRO Solution Paper. MAY, 2009 XYPRO Technology Corporation

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Transcription:

Best Practices for Protecting Sensitive Data in an Oracle Applications Environment Presented by: Jeffrey T. Hare, CPA CISA CIA

Webinar Logistics Hide and unhide the Webinar control panel by clicking on the arrow icon on the top right of your screen The small window icon toggles between a windowed and full screen mode Ask questions throughout the presentation using the chat dialog Questions will be reviewed and answered at the end of the presentation; I ll open the lines for interactive Q&A During the presentation, we will be conducting a number of polls, please take the time to respond to all those that are applicable CPE will only be give to those that answer at least 3 of the 4 polls

Presentation Agenda Overview: Introduction Sensitive Data Legislative Requirements Massachusetts Privacy Law example Typical Sensitive Data Identifying and Classifying Sensitive Data Impact on Application Security Impact on Database Security Ways to Secure Data Application and Database Technologies Impact on Change Management Process and SDLC Other Topics Wrap Up / Q&A

Introduction Jeffrey T. Hare, CPA CISA CIA Founder of ERP Risk Advisors / ERP Seminars and Oracle User Best Practices Board Written various white papers on Internal Controls and Security Best Practices in an Oracle Applications environment Frequent contributor to OAUG s Insight magazine Experience includes Big 4 audit, 6 years in CFO/Controller roles both as auditor and auditee In Oracle applications space since 1998 both as client and consultant Founder of Internal Controls Repository public domain repository Author Oracle E-Business Suite Controls: Application Security Best Practices Contributing author Best Practices in Financial Risk Management Published in ISACA s Control Journal (twice) and ACFE s Fraud Magazine

Poll 1: How confident are you that your organization s sensitive data is well protected?

Sensitive Data Legislative Requirements

Legislative Requirements Consider the Impact of the following legislatives requirements: Sarbanes-Oxley PCI HIPAA GLBA State breech notification laws (45 states have some form of legislation: http://www.ncsl.org/issuesresearch/telecommunicationsinformationtechnolo gy/securitybreachnotificationlaws/tabid/13489/default.aspx) EU Data Protection Directive Other countries? Industry-specific compliance requirements

Legislative Requirements Recommendation: Work with your legal department, auditors, management, corporate governance group, etc to understand all the legislative requirements to which your organization is subject

Massachusetts Privacy Law example

Massachusetts Privacy Law Language: Let s look at some legislative language in recent Massachusetts legislation 201 CMR 17.00: STANDARDS FOR THE PROTECTION OF PERSONAL INFORMATION OF RESIDENTS OF THE COMMONWEALTH (http://www.mass.gov/eoca/docs/idtheft/201cmr170 0reg.pdf)

Massachusetts Privacy Law Language: Breach of security, the unauthorized acquisition or unauthorized use of unencrypted data or, encrypted electronic data and the confidential process or key that is capable of compromising the security, confidentiality, or integrity of personal information, maintained by a person or agency that creates a substantial risk of identity theft or fraud against a resident of the commonwealth. A good faith but unauthorized acquisition of personal information by a person or agency, or employee or agent thereof, for the lawful purposes of such person or agency, is not a breach of security unless the personal information is used in an unauthorized manner or subject to further unauthorized disclosure.

Massachusetts Privacy Law Language: Unauthorized acquisition management needs to define who is authorized to access such data Unauthorized use management needs to define what is authorized use Creates a substantial risk of identity theft or fraud subject to interpretation

Massachusetts Privacy Law Language: What is personal information? Personal information, a Massachusetts resident's first name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number,

Massachusetts Privacy Law Language: Who is responsible for compliance? Every person that owns or licenses personal information about a resident of the Commonwealth

Massachusetts Privacy Law Language: What is a responsible entity required to do? shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope and type of business of the person obligated to safeguard the personal information under such comprehensive information security program; (b) the amount of resources available to such person; (c) the amount of stored data; and (d) the need for security and confidentiality of both consumer and employee information. The safeguards contained in such program must be consistent with the safeguards for protection of personal information and information of a similar character set forth in any state or federal regulations by which the person who owns or licenses such information may be regulated.

Massachusetts Privacy Law Language: Security plan shall include: (2) Without limiting the generality of the foregoing, every comprehensive information security program shall include, but shall not be limited to: (a) Designating one or more employees to maintain the comprehensive information security program; (b) Identifying and assessing reasonably foreseeable internal and external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing personal information, and evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks, including but not limited to: 1. ongoing employee (including temporary and contract employee) training; 2. employee compliance with policies and procedures; and 3. means for detecting and preventing security system failures.

Massachusetts Privacy Law Language: Security plan shall include (continued): (c) Developing security policies for employees relating to the storage, access and transportation of records containing personal information outside of business premises. (d) Imposing disciplinary measures for violations of the comprehensive information security program rules. (e) Preventing terminated employees from accessing records containing personal information.

Massachusetts Privacy Law Language: Security plan shall include (continued): (f) Oversee service providers, by: 1. Taking reasonable steps to select and retain third-party service providers that are capable of maintaining appropriate security measures to protect such personal information consistent with these regulations and any applicable federal regulations; and 2. Requiring such third-party service providers by contract to implement and maintain such appropriate security measures for personal information; provided, however, that until March 1, 2012, a contract a person has entered into with a third party service provider to perform services for said person or functions on said person s behalf satisfies the provisions of 17.03(2)(f)(2) even if the contract does not include a requirement that the third party service provider maintain such appropriate safeguards, as long as said person entered into the contract no later than March 1, 2010.

Massachusetts Privacy Law Language: Security plan shall include (continued): (g) Reasonable restrictions upon physical access to records containing personal information, and storage of such records and data in locked facilities, storage areas or containers. (h) Regular monitoring to ensure that the comprehensive information security program is operating in a manner reasonably calculated to prevent unauthorized access to or unauthorized use of personal information; and upgrading information safeguards as necessary to limit risks. (i) Reviewing the scope of the security measures at least annually or whenever there is a material change in business practices that may reasonably implicate the security or integrity of records containing personal information. (j) Documenting responsive actions taken in connection with any incident involving a breach of security, and mandatory post-incident review of events and actions taken, if any, to make changes in business practices relating to protection of personal information

Massachusetts Privacy Law Recap of requirements: Written Information Security program Designate responsible employees Identify internal & external risks and evaluate effectiveness of current safeguards PII related employee policies Disciplinary measures Prevent unauthorized access Verify third-party compliance, include specifics in contract Limit collection, retention and use of PII Identify locations of PII Restrict access to those authorized to use the data Conduct regular monitoring & annual reviews Document corrective actions

Typical Sensitive Data

Typical Sensitive Data IT Security: Personally Identifiable Information such as Name, Address, Marital Status, Salary, Review Information, Children s Names and Related Information, Phone Number, National Identifier / Social Security Number, Payroll Deductions, Direct Deposit Bank Account Information, Password Reset Questions, Mother s Maiden Name, Credit Card, Account Number Credit Card for Customers, Employees, Suppliers Bank Account for Customers, Employees, Suppliers

Poll 2: Which statement best represents my organization s maturity related to sensitive data:

Identifying and Classifying Sensitive Data

Identifying and Classifying Sensitive Data Questions to ask: Where is it stored? Who can access it? What objects can access it? Concurrent programs, forms, packages, stored procedures? Who is the data owner that approves access to such data?

Poll 3: How confident are you that your organization knows all the places where sensitive data is stored?

Sensitive Data and Application Security

Sensitive Data and Application Security Questions to ask: Access through functions? Access through concurrent programs? Reports? Through generic / seeded logins? SQL forms risks monitored?

Sensitive Data and Database Security

Sensitive Data and Database Security Questions to ask: Through stored procedures Through triggers Through database logins / schema logins How is each custom database login protected / used? Who owns active generic database logins? Password encryption risk in 11i handled? Are database logins hardened and re-hardened on a regular basis (i.e. after patches are applied)? 2009 ERPS

Securing Data

Securing Data Consider: Intra forms issues that need to be handled via Forms Personalization / custom.pll for E-Business Suite? Use of *Public in JDE to lock down back door access? Third party tools that handle security at both apps and database levels? 2008 ERPS

Securing Data in Non-Production Environments Considered: Define security by instance Scramble scripts Risk: Integrity of the data Risk: May not identify all places data is stored Risk: Compromise testing process Third party tools that handle security at both apps and database levels? 2008 ERPS

Impact on Change Management and SDLC

Impact on Change Management and SDLC Considered: Application and Database Security changes need to take into account where this data is stored and how it can be accessed Object changes need close peer review process Peer reviewer must understand what is sensitive data and where it is stored Third party tools can review this as well 2008 ERPS

Other Topics

Other Topics Considered: Access to data through modplsql in 11i? Adequate server security? All steps following in Best Practice documents (189367.1 and 403537.1)? 2008 ERPS

Wrap Up

Wrap Up Recap Recorded webinars: http://www.erpseminars.com/webinaraccessform.html Building an Audit Trail SQL Forms Upcoming webinars / seminars: http://www.erpseminars.com/seminars.html

ERP Risk Advisory Services Free one-hour consultation On-site seminars (1-2 days) custom tailored to your company s needs as well as various web-based seminars RFP / RFI management for Oracle-related GRC software SOD / UAC Third Party software projects / remediation GRC Software implementation Security and internal controls design and implementation for pre- and post-implementation Pre-defined level I and level II assessment services see: http://www.erpseminars.com/services.html

Q & A

Poll 4: I d like the following follow up from this webinar:

Contact Information Jeffrey T. Hare, CPA CISA CIA Cell: 970-324-1450 Office: 970-785-6455 E-mail: jhare@erpseminars.com Websites: www.erpseminars.com, www.oubpb.com Oracle Internal Controls and Security listserver (public domain listsever) at http://groups.yahoo.com/group/oraclesox Internal Controls Repository (end users only) http://tech.groups.yahoo.com/group/oracleappsinternalcontrols/ Oracle GRC LinkedIn Group: www.linkedin.com/groups?gid=2017790 Oracle ERP Auditors LinkedIn Group: www.linkedin.com/groups?gid=2354934

Best Practices Caveat Best Practices Caveat The Best Practices cited in this presentation have not been validated with your external auditors nor has there been any systematic study of industry practices to determine they are in fact Best Practices for a representative sample of companies attempting to comply with the Sarbanes-Oxley Act of 2002 or other corporate governance initiatives mentioned. The Best Practice examples given here should not substitute for accounting or legal advice for your organization and provide no indemnification from fraud, material misstatements in your financial statements, or control deficiencies.