Sunteți pe pagina 1din 4

Feature

An Approach Toward Sarbanes-Oxley


ITGC Risk Assessment
Arvind Mehta, CISA, C-EH, The US Sarbanes-Oxley Act is an old bandwagon risk-based approach, risk assessments, etc., but
ISO 27001 LA, manages a for most of the publicly listed companies, as they few understand that for a risk assessment exercise
global IT Sarbanes-Oxley have been riding on it since its inception in 2002. to be successful, it is extremely important to
program for the Technology But, most companies face newer challenges every identify whether the focus of risk assessment is
Risk Services practice at EXL day with the birth of newer technology, rapidly confidentiality, integrity and/or availability, and
Risk & Financial Management, changing business conditions, and/or mergers then to define the risk criteria/parameters.
a Fortune 1000 company. and acquisitions. For example, a risk assessment exercise for
His responsibilities include Even after eight years of Sarbanes-Oxley, Payment Card Industry (PCI) Data Security
managing IT risk advisory companies are still struggling to identify the Standard (DSS) compliance focuses on what
projects with a focus on right scope and the appropriate approach toward should and should not be stored to ensure that
enterprise risk management, Sarbanes-Oxley IT general controls (ITGC). Lack credit card information is not compromised
IT security, Sarbanes-Oxley of knowledge to identify the right scope can lead and, thus, to ensure data privacy. However, for
section 404, Payment Card to an increase in the overall cost of compliance Sarbanes-Oxley, the same approach cannot be
Industry (PCI) reviews, IT since organizations may test applications that applied because Sarbanes-Oxley focuses on data
infrastructure reviews, would otherwise be deemed out of scope if an integrity and misstatements to financial reporting.
vulnerability assessments, appropriate risk assessment had been performed. Therefore, the risk assessment criterion shifts
application security The question that should be asked is, what from data privacy to data integrity.
assessments, enterprise should companies do to identify the exact scope The right approach to identify the exact scope
resource planning (ERP) for ITGC? Not only is it important to identify and extent of testing for Sarbanes-Oxley ITGC is to
security and separation of the systems that would fall into the scope of perform a detailed risk assessment that is focused


duties (SoD) reviews for Sarbanes-Oxley, it on the risks that are associated with each general
PeopleSoft. Mehta has in-depth is also important control process area, such as change management,
knowledge and understanding What should to identify the logical access, computer operations, job scheduling,
of enterprise risk management; companies do to extent to which and third parties/service organizations that manage
IT security; and governance, a specific system applications or data centers.
identify the exact


risk and compliance (GRC) should be tested.
domains. With more than eight scope for ITGC? For example, an IDENTIFY RISK CRITERIA/PARAMETERS
years of experience, he has auditor would The organizations approach to Sarbanes-
worked with industry leaders in definitely perform Oxley risk assessment should identify the key
the food and beverage, staffing, detailed testing for the financial system of records risk parameters that would help to quantify
insurance and banking, and (SAP or PeopleSoft), but would not spend too the risks for ITGC. An application might be
health care industries. much time or cost on performing the same level considered high risk when viewed from a
of testing for a system that falls into the scope change management perspective because it might
Do you have
but has only a handful of system administrators undergo hundreds of changes every month, but it
something
to say about managing it. might be low risk when viewed from a logical
this article? The most appropriate and effective way to access perspective because it has only four to
define the right scope and the extent of testing five administrators and no end users accessing
Visit the Journal
pages of the ISACA for each Sarbanes-Oxley in-scope system is to the application.
web site (www.isaca. perform a risk assessment focusing on the risks To identify the appropriate risk parameters
org/journal), find the associated with Sarbanes-Oxley requirements and to perform a risk assessment for Sarbanes-Oxley
article, and choose specific to ITGC. Risk assessment is not a new ITGC, the focus should be on integrity and
the Comments tab to buzzwordeveryone in todays world talks about access risks.
share your thoughts.

ISACA JOURNAL VOLUME 5, 2010 1


Integrity Risk with 30,000 users will have a higher level of risk because
Integrity risk encompasses all of the risks associated with there will be more chances of human error while granting
the authorization, completeness and accuracy of transactions access, of granting conflicting access or of inappropriate
as they are entered into, processed by, summarized by and access monitoring.
reported on by the various application systems deployed by 2. Number of administratorsSimilar to the number of users,
the organization. These risks pervasively apply to every aspect the number of administrators managing the application has
of an application system that is used to support the core a direct, proportionate impact on risk levels.
financial system. 3. Direct access to the underlying databaseThis is a critical
The following are the critical parameters that could impact parameter, as it can leave backdoor entries for users with
the integrity of a financial application: direct access to the underlying database. Few applications
1. Number of changesThe number of changes made to a store user information within the application, and direct
financial application is directly proportional to the risk access to the database is not allowed; whereas, some
the more changes, the higher the risk. applications allow users to directly access the database
2, Number of application controlsIf an application is without going through the application. Again, the risk will
completely automated and the output produced is relied be high in the latter case.
upon for financial reporting without manual intervention, 4. Integrated/independent authenticationIt is very
it becomes critical to ensure that all automated application important to evaluate the authentication mechanisms in
controls are effective. Again, the more automated the place for a financial application to determine the list of
application controls, the more reliance on the application people who have access to the application. If an application
and the higher the risk. uses integrated authentication with the operating system,
3. Developed in-houseThis parameter is critical to identify the risk is high because users who are approved to manage
appropriate risk levels. If an application is homegrown and the operating system would also be granted access to
an internal team of developers has access to modify and the application; whereas, if the application has its own
maintain the application, the associated risk should be high; authentication mechanisms, the risk will be low because
whereas, if an application is commercial, any changes to even though a person might be an administrator of the
the source code will need vendor intervention and operating system, he/she would require an application ID
appropriate methods. to access the financial application.
4. Number of developersThe number of developers is The above identified risk parameters can help determine/
again directly proportionate to the risk associated with quantify the actual risk levels for each financial application
inappropriate application configuration and is a critical from an ITGC perspective. A risk scale of low, medium or
parameter in evaluating risk levels. high is used in the following example, as a demonstration, to
calculate the risk ratings for the applications. The risk scale
Access Risk for Sarbanes-Oxley can be defined as shown in figure 1.
Access risk focuses on the risk associated with inappropriate
access to financial systems, data or information. It IMPLEMENTATION OF RISK ASSESSMENT
encompasses the risks associated with improper segregation The following example demonstrates the implementation of
of duties, the integrity of financial data and databases, and the risk assessment approach.
information confidentiality. Company ABC Inc. has two financially critical applications
The following are the critical parameters that could impact used for financial reporting purposes (see figure 2). App 1
access to a financial application: is the financial system of records and is a commercial
1. Number of usersThe number of users accessing the application that can be customized, but no development is
application has a direct impact on the risk of unauthorized possible. Any development effort requires contacting the
access and unapproved transactionsthe more users, the vendor. App 1 has about 150 end users from the accounts
more risk. An application with three users would probably payable (AP), accounts receivable (AR), general ledger (GL)
be considered to have low risk; however, an application and payroll departments, who enter financial data. The
2 ISACA JOURNAL VOLUME 5, 2010
Figure 1Risk Definitions for Sarbanes-Oxley
High Risk Medium Risk Low Risk
1. Potential significant impact to revenue or 1. Potential moderate impact to revenue or 1. Slight to no impact to revenue or earnings
earnings earnings 2. Not material to the financial statements
2. Material to the financial statements 2. Potentially material to the financial statements 3. No major external audit findings or issues
3. Could result in external audit qualification 3. Could result in management letter from 4. Failure to comply with legal or regulatory
4. Could result in significant fines or legal external audit firm (significant issues) requirements in nonserious and isolated
actionserious failure to comply 4. Failure to comply with legal or regulatory cases
5. Potential significant business interruption requirements in some instances 5. Minimal business interruption
6. Should be communicated to the board of 5. Potential business interruption 6. May need to be communicated to functional
directors if it occurs 6. Should be communicated to executive leader if it occurs
management if it occurs

application has a Structured Query Language (SQL) database by authorized individuals, and postimplementation control
that is maintained by two administrators, and no end users to ensure that the change is working as expected and that
have direct access to the database due to security designed nothing broke. Similarly, for logical access, both prevent
within the application. App 1 has its own authentication and detect controls (such as user provisioning/deprovisioning,
mechanism. Since App 1 is a commercial application, not monitoring of security logs, user access reviews and
many changes are performed, but historical data show appropriate password controls) should be established.
that about two changes are performed annually. Since this App 1 is rated as low risk due to the lower number of
is a commercial application, the vendor has built several changes made to the application and lack of development
application controls (approximately 25) that control the effort being done internally. For a low-risk application, the
environment to produce accurate financial reports and results. organization can consider testing only critical preventive
App 2 is a homegrown application and is maintained by controls, instead of doing a full-blown ITGC testing. For
20 developers, and about 100 end users access it. It has a example, for change management, only a preproduction
database that is maintained by 10 system administrators. The approval should be sufficient, since all development and
database can be directly accessed by the users if they open an testing is performed by the external vendor, and all other
Open Database Connectivity (ODBC) connection outside of change management controls can be referred to a Statement
the application. The application has integrated authentication on Auditing Standards No. 70 (SAS 70) report or an
with the underlying Windows operating systems. Since it equivalent. Similarly, for logical access, controls such as
was developed in house, the number of changes is on the system administrator reviews can be eliminated because
higher sideclose to 300 annually, according to historical there are only two administrators and direct access to the
data. No application controls are built into this homegrown database is not allowed. For low-risk applications, preventive
application. controls such as appropriate password configurations and
The results of risk assessment for these two applications provisioning/deprovisioning provide enough assurance that
show that App 2 is rated a high risk from a Sarbanes-Oxley the applications are secure and the necessity of detect controls
ITGC perspective and needs controls to be established to gain can be eliminated using this approach, which will result in
reasonable assurance about the integrity of financial data. fewer controls and reduction in overall cost of compliance.
Since the number of changes made to the application is high, Once an organization has identified the high-risk and low-
an auditor should test all aspects of change management, risk applications and the controls are established and tested
including predevelopment approvals, testing (unit, stress and for appropriateness, the internal audit department should
integration, as applicable), verification of test plans and test analyze the trend for failures and effective controls to evaluate
results, quality assurance testing, separation of environments whether more controls should be implemented for certain
(development, test, quality assurance, training, production), applications and whether some controls can be eliminated
segregation of duties (no developer access to production), for others. For example, if changes to password configuration
premigration approval, verification that migration is done controls are very rare and have been effective for a period of

ISACA JOURNAL VOLUME 5, 2010 3


Figure 2Risk Assessment of Financially Critical Applications at Company ABC
Integrity Risk
Number of Annual Number of In-house Number of
Application Name Changes Application Controls Development Developers Risk Level
App 1 2 25 No 0 Low
App 2 300 0 Yes 20 High
Access Risk
Number of Direct Access to
Application Name Number of End Users Administrators Database Authentication Risk Level
App 1 150 2 No Independent Low
App 2 100 10 Yes Integrated High

time, the control can be put on rotation, where it is tested Conclusion


every two years to reduce the overall effort of testing and cost Using this approach, focusing on the parameters that are
as well to reduce the load on the IT department. Similarly, if critical from the Sarbanes-Oxley ITGC perspective, internal
changes are rare for an application (as was the case with App audit departments across the organizations can save a lot of


1 in the previous example), those controls can be performed time, effort and money and also reduce the load on the IT
by inquiry, instead of a full-blown test, to confirm if any department. Performing
changes were made to the application, and further testing risk assessments Focusing on the parameters
can be done only if changes were made. If the trend analysis periodically with the right
that are critical from the
shows that the controls are effective year on year and, most parameters in place can be
important, if there is no feedback or issues raised by the used by audit management Sarbanes-Oxley ITGC
external auditor, existing controls are clear enough to ensure as a basis to gain comfort perspectivecan save a lot
that all financial transactions are secure and reliable. that all systems are being of time, effort and money
validated and tested as
and also reduce the load on


required by the Sarbanes-
Oxley ITGC requirements. the IT department.
Virtual Seminar and Tradeshow This will reduce the
probability of any significant deficiencies and increase
external auditors confidence in managements testing. If the
scope of the ITGC audit is appropriate, the extent of manual
procedures that an external auditor will typically perform will
be reduced, which will further reduce the overall cost
of compliance.

Editors Note
Collaborate with ISACA members and access additional
resources on this topic in the ISACA Knowledge Center
located at www.isaca.org/knowledgecenter.
Managing IT Enterprise Risk
19 October 2010

4 ISACA JOURNAL VOLUME 5, 2010

S-ar putea să vă placă și