Lack of Software to Test Access Controls is Systemic and Why It Matters [Part 2]
ERP Risk Advisors
Risk content to help you identify, manage, and mitigate ERP risk.
In part 1 of this article series, I postulated that there is a systemic issue related to management
Our risk content, ERP Armor, is the exception to this second comment.?We would be happy to talk about how we can help your organization increase its effectiveness in testing access controls and significantly lower the long-term cost of ownership of access control software it you would be interested.
There are a series of controls management must have in place for their control environment
Look back through the listing above.?Which ones of these do not seem essential to have a comprehensive / complete control environment??I can honestly say since the implementation of Sarbanes-Oxley, the number of companies that possess appropriate control design for all ‘in-scope’ systems, implemented and operating effectively is close to 0%, if not 0%.
To prevent fraud, some controls MUST be perfect.??For some controls, reasonable assurance means 100% sample sizes by management.??Management, external auditors, and internal auditors need to stop hiding behind the concept of “reasonable assurance” as being “good enough.”??One wrong access control by a bad actor like Sam Bank-Friedman can cause a multi-billion-dollar fraud.?
Why is the ownership of Access Control software essential???Because access controls form the foundation of your control environment and controls cannot be complete or mature without the use of Access Control software.
However, it is not JUST that access control software is needed.??Another essential element that is needed is the proper content being used by this software to test the controls. This proper content we refer to as “risk content”.
Access control software is like having a car.??Effectively designed “risk content” is the gas that fuels the car.??Access control software and risk content go hand in hand.??You cannot have one without the other. Neither will work without the other.?
Management needs to adopt access control software and risk content for their controls to be effective.??The software needs to be complete and accurate, and the risk content needs to be complete and accurate.?Both the software and risk content need to be up-to-date. ?
Let’s next look at the various sub-controls related to access controls.??We will provide a high-level analysis of each control and the residual risks management is taking without the use of Access Control software and effective risk content.?
These processes that require access control software are:
We will delve into each of these processes and discuss how access control software is needed.
Role Design
When a new custom role is built or a new vendor-provided (seeded) role is going to be assigned for the first time, the role should be reviewed to make sure it is designed appropriately.?A sensitive access analysis should be run to evaluate if any of the security objects assigned to it are not appropriate for the intended purpose of the role.?Once the inappropriate activities are removed from the role, then a segregation of duties
Provisioning
Whenever a user is being assigned a new role a sensitive access analysis and a segregation of duties conflict analysis needs to be performed.?The risks identified should be presented to the process / risk owner(s) before the provisioning is done to make sure the assignments do not introduce unwanted risks (sensitive access risks or segregation of duties conflicts).
User Access Reviews / Re-Certifications
When UARs / Re-certifications are done the process / risk owner(s) should be re-presented to the process / risk owner(s) to make sure each user does not have unwanted risks (sensitive access risks or segregation of duties conflicts).
领英推荐
Role Change Management
When a role is being changed, the role should be reviewed to make sure its assignments do not have unwanted risks (sensitive access risks or segregation of duties conflicts).?Further, if the change to the role ADDS a security object, a full analysis should be done for all users having access to that role to make sure the additional access does not cause a new segregation of duty conflict.
Patch Change Management
When a patch is applied to the system, a couple of risks need to be considered.?First, consider that new security objects may be introduced as part of the patch.?The first step is for management to make sure these risks are reflected in their risk content.?New sensitive access risks and updates to current sensitive access risks may be needed.?New Segregation of duties conflicts may be needed or updates to current segregation of duties conflicts may be needed.?This is what is provided in our risk content called ERP Armor.?Contact us here for more information about our affordable ERP Armor: Rules annual subscriptions.
A second risk when a patch is applied is that a role could be changed to add one or more security object(s).?Further, it could also make a change to a role that isn’t currently assigned but may be assigned in the future such as a firefighter or change management role that is only temporarily assigned when justified via a change ticket.?A full scan of the Sensitive Access risks and Segregation of Duties conflicts should be done before and after the patch and a comparison made of new risks that need to be considered.?Often this will lead to role remediation and perhaps user provisioning changes that will need to be applied once the patch is applied to Production.
Development Change Management
When new development objects are built or changes to current objects are made, management needs to take these into account in their risk content.?We recommend that a new sensitive access rule needs to be developed.?Even where management may deem the new development as low risk, we still recommend that a sensitive access rule be built in their risk content library.?This eliminates possible questions from auditors as to whether all custom objects have been evaluated by management in their access controls design.
Once the new sensitive access rule is developed an assessment is done to evaluate that the new object(s) were only assigned to the appropriate roles.?Results should be presented to the control / risk owner before the development is migrated to production.
Cyber Incident Risk Analysis
When a breach occurs that identified the compromised credentials of one or more users, it is necessary to identify the potential impact of that breach.?This is done by identifying the significant activities that the user(s) can perform.?Access control software is needed to evaluate the sensitive access risks and segregation of duties conflicts associated with the compromised accounts.
Testing the Independence of Controls Performers
As we identified in part 1 of this article, the independence of the control performer must be tested.?This is done through these five steps:
Lookback Procedures?
There are several instances where lookback procedures should be performed where access control software is necessary.?They are in circumstances such as:
License Exposure
Most ERP software providers clearly identify what abilities are tied to licenses.?In these cases, access control software can be used to identify what is the current license usage.?Access control software is particularly useful given it denormalizes the roles assigned to users to provide a clear understanding of what roles and security objects a user has access.?This ‘denormalized’ data is also the same data needed to understand what security objects a user has that drives the demand for a software license.
In part one of this article, I articulated the lack of control performer independence testing is a systemic issue in the audit community.?In this article I articulated that access control software is necessary to test up to 10 different scenarios and that the low adoption of access control software is a systemic issue.
We can uniquely help the C-suite increase its effectiveness and efficiency in testing access controls through our ERP Armor content.?We can also help internal auditors and external auditors in their efforts to test access controls.?Feel free to contact us here for more information.