Top Banner
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations
13

1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

1

SAP Security and Controls

Use of Security Compliance Tools to Detect and Prevent Security and

Controls Violations

Page 2: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

2

Agenda

• Increased Focus on Security & Controls• SAP R/3 Security Risks & Controls• Security Management• Security Compliance Tools• Questions

Page 3: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

3

Increased Focus on Security and Controls

• Fraud (Barings Bank,WorldCom, Enron,...)• Security Breaches (UCs, BC, Stanford...)• Regulatory Compliance

• Sarbanes-Oxley (SOX)• Family Educational Rights and Privacy Act

(FERPA)• Gramm-Leach-Bliley Act (GLBA)• Health Insurance Portability and Accountability

Act (HIPAA)

Page 4: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

4

Security Risks• Access Control

• Do some users have too much access?• Sufficient access restrictions to private

information?

• Segregation of Duties (SoD)

Page 5: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

5

Security Compliance Tools – Internal Controls

• “Internal Controls are processes designed by management to provide reasonable assurance that the Institute will achieve its objectives” (From MIT’s Guidelines For Financial Review and Control)

• Cost of implementing control should not exceed the expected benefit of the control

• “Security is a process not a product”

Page 6: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

6

Security Compliance Tools

Who has access to sensitive transactions?

Are there any SoD violations?

• Real-Time Monitoring• Remove access or assign mitigating controls• Reduce time and effort when providing

information to auditors• Used during implementation of new modules

Page 7: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

7

SoD Rules Matrix• Predefined SoD Rule Set

• Can Add Custom Transactions to Rule Set

Page 8: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

8

Virsa-Compliance Calibrator

Page 9: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

9

Virsa-Compliance Calibrator

Page 10: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

10

Virsa-Compliance Calibrator

• Resolve SoD Issues

Page 11: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

11

Security Compliance Software Vendors

• Virsa• Approva• Oversight Systems• Big 4 (E&Y, PwC, KPMG, Deloitte)

Page 12: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

12

Benefits of Security Compliance Tools - Summary

• Run with SAP R/3• Automate SoD analysis• Automate monitoring of critical

transactions• Quick assessment of authorization

compliance for business users, auditors, and IT security staff

• Used during development/project efforts• Avoid manual analysis and false positives

Page 13: 1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.

13

Questions