Sarbanes Oxley and Enterprise Security: IT Governance What it Takes to Get the Job Done - PowerPoint PPT Presentation

1 / 80
About This Presentation
Title:

Sarbanes Oxley and Enterprise Security: IT Governance What it Takes to Get the Job Done

Description:

Consolidated 600 domains into a single environment with nine child domains. Software updates that formerly took months are now completed in less than a week. ... – PowerPoint PPT presentation

Number of Views:77
Avg rating:3.0/5.0
Slides: 81
Provided by: william880
Category:

less

Transcript and Presenter's Notes

Title: Sarbanes Oxley and Enterprise Security: IT Governance What it Takes to Get the Job Done


1
  • Sarbanes Oxley and Enterprise Security IT
    Governance What it Takes to Get the Job Done
  • Bill Brown
  • and
  • Frank Nasuti

2
Purpose of the Article
  • What are the requirements for SOX compliance for
    IT?
  • Effective governance what is it and what does
    it mean in the context of SOX?
  • A look at Motorola and security

3
IT is not always in the front of compliance
discussions
  • A Gartner survey of 75 senior compliance
    executives found that 37 of companies had no IT
    representation on SOX compliance teams (Leskeia
    Logan, 2003).

4
What IT Governance Model Really Works for SOX?
  • Seems intuitive that applying an effective
    governance structure would be the expeditious
    solutionbut

5
But what really works?
  • ISO 17799?
  • ITIL?
  • IT Governance Institute?
  • Then of course, what happens when the consultants
    walk away

6
But what really works?
  • Extensive research by Weill and Ross at MIT

IT Governance How Top Performers Manage IT
Decision Rights for Superior Results
7
10 Barriers to Security and Business Continuity
Planning
  • Working Council of Corporate Executive Board
    (2003a)
  • subjective risk prioritization,
  • poor risk communication,
  • security requirements mismatch,
  • siloed business protection,
  • unclear business continuity ownership,
  • insufficient user awareness,
  • inconsistent password policies,
  • incomplete business continuity preparedness,
  • poor crisis communication, and
  • external partner vulnerabilities.

8
Does Technology or the Governance Drive
Compliance?
  • Alberts, a senior member of the Networked Systems
    Survivability Program at the Software Engineering
    Institute at Carnegie Mellon, described the
    broader issue of security as being primarily
    perceived as a technology problem, when in fact
    it is an organizational problem with a technology
    component (Zorz, 2003).

9
Other Regulations and IT
  • Health Insurance Portability and Accountability
    Act of 1996 (HIPAA),
  • Gramm-Leach-Bliley Act of 1999 (GLBA),
  • Fair Credit Reporting Act (FCRA),
  • Notification of Risk to Personal Data Act
    (NORPDA),
  • Personal Information Protection and Electronic
    Documents Act (PIPEDA)

10
Only SEC Registrants? Not so.
  • Increasingly, SOXs provisions are becoming
    applicable to private companies as well (Heffes,
    2005).
  • In turn, lenders and states increasingly are
    asking private companies about the status of
    their internal control environments.

11
Scope of SOX
  • Eleven sections of SOX (2002) define auditor and
    corporate responsibilities, including
    expectations for financial disclosures, strong
    penalties for white-collar crimes, and protection
    for whistleblowers.

12
SOX and Personal Liability
  • SOX outlines the duties (and liabilities)
  • chief executive officer (CEO),
  • chief financial officer (CFO),
  • and the external auditor
  • Personal responsibility for ensuring the
    credibility of the financial reporting provided
    to stakeholders.

13
SOX and IT
  • Key sections of SOX compliance that directly
    involve IT include Sections 302, 404, 409, and
    802 (SOX, 2002).

14
  • Section 302
  • corporate officers to make representations
    related to the disclosure of internals controls,
    procedures, and assurance from fraud.
  • Section 404
  • requires an annual assessment of the
    effectiveness of internal controls.
  • Section 409
  • requires disclosures to the public on a rapid
    and current basis of material changes to the
    firms financial condition.
  • Section 802
  • requires authentic and immutable record
    retention.

15
  • In connection with SOX compliance, the SEC
    requires the implementation of Enterprise Risk
    Management Integrated Framework (ERM) authored
    by the Treadway Commissions Committee of
    Sponsoring Organizations (COSO)

16
  • The ERM framework divides IT controls into two
    types (Ramos, 2004)
  • general computer controls
  • application-specific controls

17
General Controls
  • General controls include the following
  • Data center operations (e.g., job scheduling,
    backup and recovery),
  • Systems software controls (e.g., acquisition and
    implementation of systems),
  • Access security, and
  • Application system development and maintenance
    controls.

18
Application Controls
  • Application controls are designed to perform the
    following
  • Control data processing
  • Ensure the integrity of transactions,
    authorization, and validity and
  • Encompass how different applications interface
    and exchange data.

19
COSO and Organization
  • COSO described internal control as a process that
    is affected by people (COSO, 2005 Damianides,
    2005).
  • Organizational design, behavior, and IT
    governance play very significant roles in whether
    the enterprise can successfully implement the ERM
    framework as defined by the Treadway Commission.

20
  • COSO ERM describes five interrelated components
    of internal control in Section 404.
  • Tone at the top
  • Identification of risks, objectives, and the
    methods to manage the risks
  • Activities and procedures that are established
    and executed to address risks
  • Systems to capture and exchange the information
    needed to conduct, manage, and control its
    operations and
  • The monitoring of and responses to changing
    conditions as warranted.

21
  • The SEC offers little specific guidance on IT
    security,
  • Door is open to interpretation as to the scope
    and nature of security initiatives for SOX
    compliance.

22
  • Although the SEC has not defined security
    requirements per se, the SEC is a very effective
    change agent and will assert itself if additional
    compliance measures are required (Mead McGraw,
    2004).

23
Section 302 Representations
  • Surveys of CIOs reported that 44 of the
    companies required the CIO to certify financial
    results under SOX compliance (CIO
    Insight/Gartner, 2004).

24
Section 302 Representations
  • This process is known as sub-certification, and
    it usually requires the individuals to provide a
    written affidavit to the CEO and CFO that will
    allow them to sign their certifications in good
    faith (Ramos, 2004).

25
Sub-certification
  • Items that may be the subject of
    sub-certification affidavits include
  • statement of accuracy of specific account
    balances,
  • compliance with company policies and procedures,
  • the companys code of conduct,
  • and the adequacy of the design and/or operating
    effectiveness of internal controls.

26
Section 302
  • SOX
  • IT administration,
  • Organization governance,
  • Responsibilities of CIOs,
  • Budgets,
  • Vendors,
  • Outsourcers, and
  • Business continuity plans.

27
Section 404
  • Section 404, in conjunction with the related SEC
    rules and Auditing Standard No. 2 established by
    the Public Company Accounting Oversight Board
    (PCAOB), is driving pervasive change in the
    internal controls of the enterprise.

28
Section 404 Continued
  • Two new reports at the end of every fiscal year
    (SOX, 2002).
  • Reports must be included in the companys annual
    report filed with the SEC.
  • Management also must disclose any material
    weaknesses in internal control.

29
Section 404 Continued
  • If a material weakness exists, management may not
    be able to conclude that the companys internal
    control over financial reporting is effective
    (SOX, 2002).
  • External auditor also must attest to the
    truthfulness of these management internal control
    assertions.

30
SOX How It Works
  • In compliance with the Management Assessment of
    Internal Controls (Section 404), which of the
    following is the correct sequence in identifying
    and assessing internal controls?
  • Document controls, document processes, identify
    risks, assess design
  • Document processes, identify risks, document
    controls, assess design
  • Identify risks, document controls, document
    processes, assess design
  • Assess design, identify risks, document controls,
    document processes

Source MicroMash
31
SOX How It Works
  • Regarding compliance with the Management
    Assessment of Internal Controls (Section 404),
    which of the following levels of the internal
    control reliability model is committed to
    continuous improvement?
  • Informal level
  • Systematic level
  • Optimized level
  • Integrated level

Source MicroMash
32
SOX How It Works
  • In compliance with the Management Assessment of
    Internal Controls (Section 404 of the
    Sarbanes-Oxley Act), the software tool that is
    selected to report on internal control should do
    all of the following except
  • link controls to processes.
  • Describe the work processes.
  • Link processes to objectives.
  • Link costs to risks.

Source MicroMash
33
SOX How It Works
  • The role of IT auditor in complying with the
    Management Assessment of Internal Controls
    (Section 404) is
  • planning internal controls
  • documenting internal controls
  • designing internal controls
  • implementing internal controls

Source MicroMash
34
Timely Compliance
  • ERM framework, a cornerstone of Section 404 and
    COSO, requires ongoing feedback from throughout
    the company. 
  • Current,
  • Accurate, and
  • Sufficiently robust to support the analysis of
    different risk responses (COSO, 2005).
  • Many firms are implementing risk management
    applications to assist with internal control and
    assessment processes (Decker Lepeak, 2003).

35
Section 409
  • Disclose to the public, on a rapid and current
    basis, material changes to a firms financial
    condition (SOX, 2002).

36
Example of 409
  • A computer virus knocked out the supply chain and
    materially affected the financial performance on
    a quarterly financial report (Proctor, 2004).
  • This would be a disclosable event for financial
    reporting purposes under SOX.

37
SOX How It Works
  • In compliance with the Real Time Issuer
    Disclosures (Section 409), real time compliance
    tools do not include which of the following?
  • Data warehousing
  • Spreadsheet software
  • Data mining
  • Data mart

Source MicroMash
38
SOX How It Works
  • Real time issuer disclosure requirement of the
    Section 409 does not include which of the
    following?
  • Trend analysis
  • Qualitative information
  • Chat room
  • Graphic presentations

Source MicroMash
39
Section 802
  • The IT organization must have policies in place
    to ensure appropriate record retention and
    security.
  • SOX (2002) has a direct impact on data
    management, data and system security, and
    business recovery practices.
  • The CIO must understand the requirements and
    ensure that the appropriate policies are in
    place, including ongoing compliance.

40
  • What Governance Models and Processes Work?

41
A Quick Review IT Governance
  • The IT Governance Institute (2005a, 2005b) issued
    a governance model that provides the structure
    and practices for four IT domains

42
IT Governance Institute
  • Plan and organize the strategic plan,
    architecture, IT organization, human resources,
    and compliance with external requirements
    (including SOX) assess risks manage projects
    and manage quality.

43
IT Governance Institute
  • Acquire and implement software, hardware,
    infrastructure, and procedures install and
    accredit systems and manage changes.
  • Deliver and support service, performance and
    capacity, systems security, and user training
    assist and advise customers and manage problems
    and incidents, data, facilities, and operations.

44
IT Governance Institute
  • Monitor processes, assess internal controls,
    obtain independent assurance, and provide for the
    independent audit.

45
ISO 17799
  • ISO 17799 is a detailed what to do security
    standard that is organized into 10 major
    sections, each covering a different topic or area
    (What is ISO 17799, 2001)

46
What can we learn from ISO 17799?
  • Business continuity planning,
  • System access control,
  • System development and maintenance,
  • Physical and environmental security,
  • Compliance,
  • Personnel security,
  • Security organization,
  • Computer and network management,
  • Asset classification and control, and
  • Security policy.

47
What can we learn from ISO 17799?
  • ISO 17799 has a narrow focus on security
    management and cannot stand alone as a security
    governance standard (Stolovitch, 2004 Symons,
    2005).

48
ITIL
  • ITIL, initially developed in the UK by the Office
    of Government Commerce, defines a broad range of
    processes that are considered best practices and
    are documented in a series of books.

49
What can we learn from ITIL?
  • incident management,
  • change management,
  • problem management,
  • service-level management,
  • continuity management (disaster recovery),
  • configuration management,
  • release management,
  • capacity management,
  • financial management,
  • availability management,
  • security management, and
  • help desk management.

50
What can we learn from ITIL?
  • Extremely useful for service management.
  • ITIL should be applied as a tool within the
    context of a broader organizational strategy but
    should not be considered a comprehensive solution
    (Meyer, 2005).

51
What other trends are in play? Centralized vs.
Decentralized
  • Central information security groups are assuming
    greater seniority, with 40 or more of the
    security groups reporting directly to the CIO
    (Corporate Executive Board, 2003b).
  • assuming responsibility for governing and
    coordinating policy and standards formulation,
    architecture,
  • vendor selection,
  • compliance auditing,
  • vulnerability assessment,
  • and intelligence gathering.

52
What other trends are in play? Centralized vs.
Decentralized
  • Emerging roles for the central information
    security organization
  • awareness campaigns,
  • central password management,
  • supply-chain security programs.

53
Centralized Security and SOX How does it fit?
  • SOX requires compliance with the Treadway
    Commissions COSO ERM framework and therefore
    requires security risk prioritization and
    communication to be consistent with those
    standards.
  • SOX (2002) Sections 302, 404, 409, and 802 are
    affected by all of these items, with the
    exception of subjective risk prioritization and
    poor risk communication.

54
Basis of Research Describe to me your
governance processes
  • In a survey of 256 IT organizations, the best
    predictor of effective IT governance performance
    was the of managers in leadership positions who
    could accurately describe their IT governance
    processes (Weill Ross, 2004).

55
Research by Weill and Ross (2004)
  • Consistent with the research by Weill and Ross
    (2004), a direct reporting relationship by a
    centralized security organization creates the
    opportunity for more effective security
    governance through more collaborative
    opportunities between the business professionals
    and IT security management and through defined
    decision rights that involve technical decisions.

56
Describe to me your governance processes
  • Above-average governance-performing enterprises,
    45 or more of managers could accurately describe
    their IT governance,
  • Below-average performing enterprises, only a few
    managers in leadership positions could describe
    their governance process.

57
Describe to me your governance processes
  • A higher of senior managers who engage more
    often and more effectively in IT governance
    (committees, announcements, etc.),
  • Direct involvement of the senior business leaders
    in IT governance,
  • Clearer business objectives for IT applications,
  • More differentiated business strategies,
  • Fewer approved exceptions, and
  • Fewer changes in governance from year to year
    (Weill Ross, 2004).

58
Most Effective Governance
59
Least Effective Governance
60
  • Weill and Ross (2004) reported that the most
    effective decision-making structures are
  • Executive management committees,
  • IT leadership committees, and
  • Business/IT relationship managers.

61
  • The least effective IT decision-making structures
    are
  • Capital approval committees and
  • Architectural committees.

62
Security and Motorola
  • Many enterprises are concerned with security, but
    Motorola has made it a strategic priority (Weill
    Ross, 2004).

63
Security and Motorola
  • Security governance secures the support of
    executive management through a Management Board
    for IT Principles and IT investment, but the
    security leaders maintain the final decision
    authority over the security architecture and
    infrastructure.

64
Decision Making at Motorola
  • The decision-making process at Motorola security
    includes the following
  • IT principles Management Board and security
    leaders
  • IT architecture security leaders
  • IT infrastructure security leaders
  • Business application need business leaders
  • IT investment Management Board and security
    leaders

65
Decision Making at Motorola
  • Motorolas Information Security Officer at
    Management Board meetings
  • Identifies Motorolas security risks and the
    alternatives for addressing them,
  • Educates about alternative various security
    breaches and the potential impacts of each
    threat,
  • Recommended security principles and priorities in
    certain areas of the business,
  • A budget that is approved separately from the
    rest of the IT budget.

66
Decision Making at Motorola
  • Using a monarchy decision-making style,
    Motorolas Corporate Information Security Officer
  • Implements security plans at both a corporate and
    business unit level,
  • Designs and builds appropriate technology with
    his support staff, and
  • Works with IT architects at both the corporate
    and the sector levels to ensure that security
    measures are built seamlessly into the IT
    infrastructure and applications.

67
Decision Making at Motorola
  • As an example of how Motorola security integrates
    itself into the IT architecture and
    infrastructure, Motorola created
  • A single, global department
  • Centrally rolls out standard configurations
    across the enterprise (Microsoft Executive
    Circle, 2004).

68
Decision Making at Motorola
  • Motorolas security organization is ultimately
    responsible for 65,000 desktop and portable
    computers plus embedded devices and other
    computers spread across the Americas, Europe,
    Africa, and Asia.

69
Decision Making at Motorola
  • Before centralizing the upgrades, updates using
    third-party software programs or complete
    security updates to protect Motorola's enterprise
    from viruses, hackers, and other security threats
    would take weeks.
  • Consolidated 600 domains into a single
    environment with nine child domains
  • Software updates that formerly took months are
    now completed in less than a week.

70
Decision Making at Motorola
  • In the development of centralized security
    protection for 65,000 desktop and portable
    computers and supply chain security programs,
  • Identified and prioritized risks,
  • Communicated the risks to the business units and
    external partners,
  • Matched the security requirements to the needs,
    avoided siloed business protection,
  • Managed external partner vulnerabilities.

71
Security Governance at Motorola
  • Motorola completed the business protection
    lifecycle through three major security processes
  • risk assessment,
  • policy setting and oversight, and
  • effective execution.

72
Security Governance at Motorola
  • Transformed the IT security function from a set
    of ad hoc activities with an emphasis on
    technology to a coordinated approach of
    principles, behaviors, and adaptive solutions
    that map to business requirements (Proctor,
    2004).

73
Security Governance at Motorola
  • Centralized security works closely with the
    Management Board to define policies and
    priorities, to educate stakeholders, and to set
    budgets apart from IT operations.
  • Motorola security leaders take sole possession
    and leadership of the IT security architecture
    and infrastructure.

74
Security Governance at Motorola
  • Motorola security has transformed itself from a
    loosely distributed set of domains across the
    world into a centrally coordinated approach to
    secure 65,000 computers and to administer a
    supply-chain security program.
  • Effective decision-making structures, alignment
    processes, and methods of engagement are integral
    to effective security governance and ultimately
    to SOX compliance.

75
Security Governance at Motorola
  • Senior security leadership in governance
    structures such as Motorola likely can fully
    explain their governance process.
  • Motorolas SOX compliance program that can change
    and evolve as the security environment changes
    and evolves.

76
Security Governance at Motorola
  • The security governance framework at Motorola has
    created an enabling organization rather than a
    support organization.

77
Security Governance at Motorola
  • COSO ERM in Section 404.
  • Tone at the top
  • Identification of risks, objectives, and the
    methods to manage the risks
  • Activities and procedures that are established
    and executed to address risks
  • Systems to capture and exchange the information
    needed to conduct, manage, and control its
    operations and
  • The monitoring of and responses to changing
    conditions as warranted.

Does the organizational model work?
78
Roadmap AheadSystems Complexity Will Increase
  • In-depth interviews with over 50 CIOs showed that
    rapid strategic business change and e-business
    and technology complexity will be significant
    drivers in the near future (Reich Nelson,
    2003).
  • As organizations transition into more e-business
    and more architectural complexity, it is
    reasonable to assume that the 44 of CIOs that
    sub-certify may increase

79
Additional Research
  • Partner with Hyperion to develop real time
    compliance (dashboard models) to meet Section 409
    requirements

80
  • SarbanesOxley and Enterprise Security IT
    Governance What it Takes to Get the Job Done
  • Bill Brown
  • and
  • Frank Nasuti

Slides available at www.business.mnsu.edu/brownw1
Write a Comment
User Comments (0)
About PowerShow.com