ISACA Conference San Francisco, CA May 18, 2005 Oracle Applications Security and Controls Presented By: Brijen Joshi ISACA Conference Slide 1 Agenda 1. 2. 3. 4. 5. 6. Objectives Oracle ERP Overview Oracle ERP Security Oracle Workflow and Security How to Secure Oracle Applications Security and Controls Considerations by Business Cycle 7. Segregation of Duties ISACA Conference Slide 2 1. Objectives • Become familiar with Oracle terminology and concepts • Understand security and control features within Oracle Applications • Discuss leading practices to secure Oracle Applications • Realize importance of segregation of duties ISACA Conference Slide 3 Agenda 1. 2. 3. 4. 5. 6. Objectives Oracle ERP Overview Oracle ERP Security Oracle Workflow and Security How to Secure Oracle Applications Security and Controls Considerations by Business Cycle 7. Segregation of Duties ISACA Conference Slide 4 2. Oracle ERP Overview Human Resources Payroll Human Resources Training Administration Time Management Advanced Benefits Finance General Ledger Financial Analyzer Cash Management Payables Receivables Fixed Assets CRM Marketing (3 modules) Sales (5 modules) Service (5 modules) Call Center (5 modules) Manufacturing Engineering Bills of Material Master Scheduling / MRP Capacity Work in Process Quality Human Front Office Resources Cost Management Process (OPM) Finance Manufacturing Applied Rhythm Factory Planning Technology Rhythm Advanced Scheduling Project Manufacturing Supply Chain Projects Flow Manufacturing Management Self-Service Projects Project Costing Project Billing Personal Time & Expense Activity Management Gateway Self-Service Project Connect Applied Technology Web Customers Workflow Web Suppliers Alert (Business Agents) Web Employees Applications Data Warehouse EDI Gateway ISACA Conference Slide 5 Supply Chain Management Order Entry Purchasing Product Configurator Supply Chain Planning Supplier Scheduling Inventory Agenda 1. 2. 3. 4. 5. 6. Objectives Oracle ERP Overview Oracle ERP Security Oracle Workflow and Security How to Secure Oracle Applications Security and Controls Considerations by Business Cycle 7. Segregation of Duties ISACA Conference Slide 6 Oracle ERP Security Issues • Oracle Applications is huge and complex – – – • Acquisition of other major ERPs – • More than 100 modules Millions of lines of coding Hundreds of configurations (settings) PeopleSoft, JDE, Siebel, etc…… Multiple Technologies involved – ISACA Conference Multiple technologies like Networks, OS, Web server, Application Server, Database, Reporting, etc.. Slide 7 Oracle ERP Security Issues (cont’d) • Many seeded account passwords and seeded configuration settings that are not secure • Multiple access avenues: – – – – ISACA Conference Applications - any account with Sysadmin responsibility Process Tab – ANZ Menus Database – system, sys, apps, applsys UNIX - root, oracle, applmgr Slide 8 Oracle ERP Security Issues (cont’d) • Complex regulatory environment • Customization and Extensions to Oracle Applications • Security and Controls not on the “critical path” during implementations ISACA Conference Slide 9 Agenda 1. 2. 3. 4. 5. 6. Objectives Oracle ERP Overview Oracle ERP Security Oracle Workflow and Security How to Secure Oracle Applications Security and Controls Considerations by Business Cycle 7. Segregation of Duties ISACA Conference Slide 10 Oracle Workflow and Security What does it Do? • Oracle Workflow automates standard business processes, allowing for transparency and a recorded history of process transactions • Oracle Workflow is highly customizable and is used to drive processes through the system from start to finish. Who uses it? • Workflow Specialist configures workflow during install • End Users • Workflow Administrator ISACA Conference Slide 11 Oracle Workflow and Security (cont’d) Most Commonly Used Seeded Workflows General Ledger Order Management Journal Entry Approval Order and Return Processing iExpense Expense Report Approvals Schedule, ship and pack delivery Purchasing Terminated Employees Requisition and PO Document Approval Accounts Payable Auto Document Creation Invoice Approval Receipt Confirmation Process Pay (Positive Pay) Message Exceeding of Price/Receipt Tolerances Receivables Projects Credit Memo Approvals Projects Approval Credit Application Approval Project Accounting iTime Timecard Approval ISACA Conference Slide 12 Agenda 1. 2. 3. 4. 5. 6. Objectives Oracle ERP Overview Oracle ERP Security Oracle Workflow and Security How to Secure Oracle Applications Security and Controls Considerations by Business Cycle 7. Segregation of Duties 8. Configurable Controls ISACA Conference Slide 13 Control Structure Internal and External Control Structure Downstream Upstream ORACLE Suppliers EDI E - Commerce Customers Interfaces Data Feeds Linked Systems Interfaces Data Feeds EDI E - Commerce IT Infrastructure External Controls Internal Controls Non-Linked Suppliers Interfaces Data Feeds Business Processes Internal Controls Interfaces Data Feeds External Controls Non-Linked Suppliers Controls reliance is achieved through a convergence of efficient systems and effective internal and external controls ISACA Conference Slide 14 Application Security Managing Risk by Ensuring that Key Controls are Adequately Implemented Over APPLICATION SECURITY: • • • • • • • Security Administration - managed by appropriate management within the organization Security Impact Assessment - on business processes and user environment Security Design - current and future needs are assessed and implemented with high priority controls environment Security Strategy/Approach - controls over application to ensure unauthorized users can not access the production environment Segregation of Duties - controls over business process are adequate and implemented Security Functionality - comprehensively utilized and maintained On-going Security Administration - managed and maintained by appropriate management within the organization ISACA Conference Slide 15 Business Process Team Oracle Apps Functionality Controls & Security Team Control Requirements & Oracle Security Expertise Change Management (Stakeholder) Business Requirements Oracle Apps (User Responsibility Profiles) Some Leading Practices to Secure Oracle • Improvisation Vs Perfection • Enable / Use standard Oracle Applications features in System Administration module • Change Default Installation Passwords and disable unused default Oracle Applications Accounts – – – – – – ISACA Conference Default database administration schemas Schemas belonging to optional database features neither used nor patched by E-Business Suite Schemas belonging to optional database features used but not patched by E-Business Suite Schemas belonging to optional database features used and patched by E-Business Suite Schemas common to all E-Business Suite products Schemas associated with specific E-Business Suite products Slide 16 Some Leading Practices to Secure Oracle (Cont’d) • Restrict ‘Back-end’ access to the Database • Review of standard reports to access signon, unsuccessful signon, responsibility usage, form usage and concurrent request usage. • Enabling Auditing on certain Tables • Oracle Alerts • Keep watching ‘Security Alerts’ from Oracle for latest security patches and other sources like Computerworld, ITToolbox.com, etc. ISACA Conference Slide 17 Some Leading Practices to Secure Oracle (Cont’d) Profile Options – Signon / Suggested settings • Signon Password No Reuse – “180” • Signon Password Length – “6-8” • Signon Password Hard to Guess – “Y” • Signon Password Failure Limit – “3” • Sign on:Audit Level – “Form” • Sign on: Notification – “Y” ISACA Conference Slide 18 Some Leading Practices to Secure Oracle (Cont’d) Other Security Related Profile options Profile Option / Suggested setup • AuditTrail:Activate – “Y” • Concurrent:Report Access Level - “User” • FND:Diagnostics - “No” • Utilities:Diagnostics – “No” ISACA Conference Slide 19 Agenda 1. 2. 3. 4. 5. 6. Objectives Oracle ERP Overview Oracle ERP Security Oracle Workflow and Security How to Secure Oracle Applications Security and Controls Considerations by Business Cycle 7. Segregation of Duties ISACA Conference Slide 20 Security and Controls Considerations by Business Cycle A ‘configurable control’ is • Any setting in Oracle Apps that can be modified, and which can affect the operation of a function in Oracle Apps – Profile options – Transaction type settings – Financial options – Payment options – Invoice options • Different from ‘inherent’ controls, which are preprogrammed settings that are generally not overrideable or modifiable (e.g. quantity values not allowing nonnumeric characters) ISACA Conference Slide 21 Security and Controls Considerations by Business Cycle The following key cycles will be discussed in the next few slides • • • Order to Cash Procure to Pay General Ledger/Financial Close ISACA Conference Slide 22 Security and Controls Considerations by Business Cycle 1. Order to Cash – – – – – ISACA Conference OM Transactions type Setting Holds: Operational and Financial Processing Constraints Rules Payment Terms Credit Limit and Credit Check Slide 23 Security and Controls Considerations by Business Cycle 2. Procure to Pay – – – – – ISACA Conference Document Types – PO, Requisitions, etc Approval Limits and Approval Groups Tolerances Invoice Matching Banks setup Slide 24 Security and Controls Considerations by Business Cycle 3. General Ledger/Financial Close – – – – – ISACA Conference GL Chart of Accounts, Security rules, Cross-validation rules Journal Approval and Posting Consolidation Mapping Rules Translation and Exchange Rates Suspense Posting and Dynamic insert option Slide 25 Agenda 1. 2. 3. 4. 5. 6. Objectives Oracle ERP Overview Oracle ERP Security Oracle Workflow and Security How to Secure Oracle Applications Security and Controls Considerations by Business Cycle 7. Segregation of Duties ISACA Conference Slide 26 Segregation of Duties What is ‘Segregation of Duties’ (SOD)? • The principle of separating incompatible functions from an individual • Designed to prevent, rather than detect • Reduces risk, as circumventing a well designed SOD environment requires collusion • SOD includes system level segregation as well as segregation of manual processes ISACA Conference Slide 27 Segregation of Duties What must be segregated? ISACA Conference Record Keeping Custody of Assets Authorization Reconciliation Slide 28 Segregation of Duties Segregation of Duties and restricted access is a multidimensional challenge. Business Units / Sets of Books General Ledger Security Organizations Roles and Responsibilities Accounting Transactions Approval Hieararchy w rkflo Wo Custom Code ISACA Conference Slide 29 Tools may be used to assist in the initial analysis of segregation of duties and the design of Roles and Responsibilities. In addition, other dimensions of the ERP application security should be understood to assess the full nature of segregation of duties weaknesses. Segregation of Duties In a practical way, SOD is enforced in Oracle through responsibilities! • A responsibility defines a set of menu options and functions that are accessible to a user and defines reports and processes which may be run • Responsibilities usually grant access to just one Oracle module, such as General Ledger or Accounts Payable • A user can be assigned more than one responsibility • Role Based Access Control (RBAC) - new feature in 11.5.10 ISACA Conference Slide 30 Responsibility Security Segregation of Duties Main Menu Menu Forms Applications User Menu Forms Responsibility Request Security Group Reports User Name Password Request Sets Concurrent Programs Role Based Access Control - RBAC Security Rules Flexfield Values Report Parameters ISACA Conference Slide 31 Segregation of Duties Potential traps with SOD reviews • Oracle standard menus / forms • Custom pll’s • Customised forms or functions • IT users with superuser responsibilities • Process Tab ISACA Conference Slide 32 Segregation of Duties Finally… • Baseline testing of user access is a critical step • The strength of the change control environment will impact the ability to rely on the baseline of segregation of duties and user access ISACA Conference Slide 33 Summary • Oracle Security is complex and needs appropriate handling – Right kind of people – Use of tools like LogicalApps, Applimation, Oracle ICM • Oracle automated controls include: • Configurable parameters and settings • User access controls and responsibilities • Review of Oracle configurations and access levels are always as of a ‘point-in-time’ • Segregation of Duties is critical – Requires use of right tool to perform the review – Manual review not recommended ISACA Conference Slide 34 Contact Information Email: brijen.m.joshi@us.pwc.com ISACA Conference Slide 35