Access Control
Access Control
Access Control
• Adverse Opinion
An adverse opinion is expressed when the effect of a disagreement is
so material and pervasive to the financial statements that the auditor
concludes that a qualification of the report is not adequate to disclose
the misleading or incomplete nature of the financial statements.
Information Systems (IS) Audit
• Audits of Information Systems look at the overall infrastructure and
network of the organization and the controls that relate to the
security of the network and the systems that are maintained in
support of the goals of the University.
• They also include technical operations, data center operations,
project management procedures, and application controls.
• There are three basic kinds of IS Audits that may be performed:
General Controls Review
Application Controls Review
System Development Review
General Control review
• A review of the controls which govern the development, operation,
maintenance, and security of application systems in a particular
environment. This type of audit might involve reviewing a data center,
an operating system, a security software tool, or processes and
procedures (such as the procedure for controlling production program
changes), etc.
Application Control Review
• A review of controls for a specific application system. This would
involve an examination of the controls over the input, processing, and
output of system data. Data communications issues, program and
data security, system change control, and data quality issues are also
considered.
System Development Review
• A review of the development of a new application system. This
involves an evaluation of the development process as well as the
product. Consideration is also given to the general controls over a
new application, particularly if a new operating environment or
technical platform will be used.
Sufficient Appropriate Audit
Evidence
• Appropriateness is the measure of the quality of audit
evidence, i.e., its relevance and reliability.
• To be appropriate, audit evidence must be both relevant and
reliable in providing support for the conclusions on which the
auditor's opinion is based
• Application Controls Optimizes Cost of Testing
What are Application Controls?
• Application controls are those controls that pertain to the scope of
• individual processes or application systems.
• They include data edits, separation of business functions, balancing of processing
totals, transaction logging, and error reporting.
Compare GL Account to
Accounting Standards
Compliance
Compare GL Account to
Accounting Standards Compliance
TSG EMEA
400
TSG APJ
350
TSG AMS
300
No changes
250
LH1
200
Fusion EMEA
150
Fusion APJ
100
Fusion AMS
50
0
Nov 2015 Dec 2015 Jan 2016 Feb 2016 Mar 2016 Apr 2016 May Jun 2016 Jul 2016 Aug 2016 Sep 2016 Oct
2016
2016
Automating appropriateness
testing
Illustrate Compliance with AFM
Compare GL Account to
Accounting Standards Compliance
Compare GL Account to
Accounting Standards Compliance
As required by the annual statutory audit by our auditors, EY, and for SOX, Internal Audit (IA) conducts appropriateness testing for SAP
applications. For this testing IA reviews all of the additions and/or changes to key tables, programs and configurations, via an internal application
called KPI.
In reviewing the table change activity for the month of July 2016, for T030, a change was noted and you were the transport creator.
4. The original documentation from the business that drove the request for
the direct change or the business contact who can provide the
information
Please not that obtaining this information is time-sensitive so the request will be escalated
after 3 days.
If you have any questions, please send an email to the SOX SAP Table Monitoring mailbox and someone will get back in touch.
15
Automating appropriateness
testing
Illustrate Materiality of the New GL Account data flow
Compare GL Account to
Accounting Standards Compliance
Manual Controls
Application Controls
Note:
ITGC are pervasive IT controls around the environment supporting the
application.
Types of Application Controls
Output Controls Control around output of data from the application. • Financial reports are
Check to ensure output data is consistent with the data consistent with input data
entered. (e.g. GL, Sub-ledger).
Validations Application performs validation checks based on a test • Tolerance limits (Sales Order
against some rule that is defined in the system. customer credit limits)
• Two or Three-way match
Authorizations / Application could perform checks on access rights to • Approval to post journal
Approvals ensure segregation of incompatible duties. It could also entries or for Purchase Order
check authorization levels to perform approval functions • Two approvals for check
etc. printing or wire transfers
Types of Application Controls?
Processing Provides automated means to help ensure processing • Job processing log reviews
Controls is complete and accurate.
Audit Trail of Data Provides audit trail of transaction to help management • Transaction log reviews
Transactions monitor and identify errors.
Application Controls vs. ITGC
ITGC IT Application Controls (ITAC)
Application controls relate to transactions and
ITGC apply to all the system components, processes, and data pertaining to each computer based
data present in an organization. application system and they are specific to each
individual application
Example Controls:
Example Control :
Logical Access controls over infrastructure, applications,
and data Edit checks
Program Change Management Validations
System development life cycle controls Calculations
Computer Operations Interfaces
Physical security controls over data centers Authorizations
Backup and recovery controls
Benchmarking
If general controls that are used to monitor program changes, access to programs, and computer
operations are effective and continue to be tested on a regular basis, the auditor can conclude that
the application control is effective without having to repeat the previous year’s control test.
Auditor should evaluate the appropriate use of benchmarking or an automated control by considering
how frequently the application changes. (If application changes frequently, auditor should not rely on
benchmarking)
Subsystem factoring to Application
Control
• Boundary Control
• Input Control
• Processing Control
• DBMS
• Output Control
• Overall Control
• Data Entry Screen •Channel access Control
• Access Control
Communic
Boundary InputDesign • Topological Control
ation
• Cryptographic Control
Control • Batch Control •
Control
• Input validation ControlCommunication
Architecture Control
• Database access
Control • Report Design
Processing
Control to protect • Concurrency
Database OutputControl
Control integrity of OS Control
Control Control
•
• File Handling Audit Trail Control
control
Boundary Subsystem and Controls
• Objective
• The system has an authentic user
• The user gets authentic resources
• Users are allowed to employ resources only in restricted ways
Access Control
– Systems reviewed: Velocity, US1, LH1, FI1, Fusion EMEA, Fusion Americas
– Transaction keys in scope include GBB, BSX, WRX, PRD, UMB, KON, FRL, SKE and UMB .
– Frequency of review:
– All changes reviewed monthly. SAP KPI Reports pulled monthly and analyzed; produces quarterly report to EY.