ISACA PowerPoint Presentation

advertisement
ISACA Conference
San Francisco, CA
May 18, 2005
Oracle Applications Security and Controls
Presented By:
Brijen Joshi
ISACA Conference
Slide 1
Agenda
1.
2.
3.
4.
5.
6.
Objectives
Oracle ERP Overview
Oracle ERP Security
Oracle Workflow and Security
How to Secure Oracle Applications
Security and Controls Considerations by
Business Cycle
7. Segregation of Duties
ISACA Conference
Slide 2
1.
Objectives
• Become familiar with Oracle terminology and
concepts
• Understand security and control features within
Oracle Applications
• Discuss leading practices to secure Oracle
Applications
• Realize importance of segregation of duties
ISACA Conference
Slide 3
Agenda
1.
2.
3.
4.
5.
6.
Objectives
Oracle ERP Overview
Oracle ERP Security
Oracle Workflow and Security
How to Secure Oracle Applications
Security and Controls Considerations by
Business Cycle
7. Segregation of Duties
ISACA Conference
Slide 4
2.
Oracle ERP Overview
Human Resources
Payroll
Human Resources
Training Administration
Time Management
Advanced Benefits
Finance
General Ledger
Financial Analyzer
Cash Management
Payables
Receivables
Fixed Assets
CRM
Marketing (3 modules)
Sales (5 modules)
Service (5 modules)
Call Center (5 modules)
Manufacturing
Engineering
Bills of Material
Master Scheduling / MRP
Capacity
Work in Process
Quality
Human
Front Office
Resources
Cost Management
Process (OPM)
Finance
Manufacturing
Applied
Rhythm Factory Planning
Technology
Rhythm Advanced Scheduling
Project Manufacturing
Supply Chain
Projects
Flow Manufacturing
Management
Self-Service
Projects
Project Costing
Project Billing
Personal Time & Expense
Activity Management Gateway
Self-Service
Project Connect Applied Technology
Web Customers
Workflow
Web Suppliers
Alert (Business Agents)
Web Employees
Applications Data Warehouse
EDI Gateway
ISACA Conference
Slide 5
Supply Chain Management
Order Entry
Purchasing
Product Configurator
Supply Chain Planning
Supplier Scheduling
Inventory
Agenda
1.
2.
3.
4.
5.
6.
Objectives
Oracle ERP Overview
Oracle ERP Security
Oracle Workflow and Security
How to Secure Oracle Applications
Security and Controls Considerations by
Business Cycle
7. Segregation of Duties
ISACA Conference
Slide 6
Oracle ERP Security Issues
•
Oracle Applications is huge and complex
–
–
–
•
Acquisition of other major ERPs
–
•
More than 100 modules
Millions of lines of coding
Hundreds of configurations (settings)
PeopleSoft, JDE, Siebel, etc……
Multiple Technologies involved
–
ISACA Conference
Multiple technologies like Networks, OS, Web server,
Application Server, Database, Reporting, etc..
Slide 7
Oracle ERP Security Issues (cont’d)
•
Many seeded account passwords and seeded
configuration settings that are not secure
•
Multiple access avenues:
–
–
–
–
ISACA Conference
Applications - any account with Sysadmin
responsibility
Process Tab – ANZ Menus
Database – system, sys, apps, applsys
UNIX - root, oracle, applmgr
Slide 8
Oracle ERP Security Issues (cont’d)
•
Complex regulatory environment
•
Customization and Extensions to Oracle
Applications
•
Security and Controls not on the “critical path”
during implementations
ISACA Conference
Slide 9
Agenda
1.
2.
3.
4.
5.
6.
Objectives
Oracle ERP Overview
Oracle ERP Security
Oracle Workflow and Security
How to Secure Oracle Applications
Security and Controls Considerations by
Business Cycle
7. Segregation of Duties
ISACA Conference
Slide 10
Oracle Workflow and Security
What does it Do?
• Oracle Workflow automates standard business processes,
allowing for transparency and a recorded history of
process transactions
• Oracle Workflow is highly customizable and is used to
drive processes through the system from start to finish.
Who uses it?
• Workflow Specialist configures workflow during install
• End Users
• Workflow Administrator
ISACA Conference
Slide 11
Oracle Workflow and Security (cont’d)
Most Commonly Used Seeded Workflows
General Ledger
Order Management
Journal Entry Approval
Order and Return Processing
iExpense
Expense Report Approvals
Schedule, ship and pack delivery
Purchasing
Terminated Employees
Requisition and PO Document Approval
Accounts Payable
Auto Document Creation
Invoice Approval
Receipt Confirmation
Process Pay (Positive Pay) Message
Exceeding of Price/Receipt Tolerances
Receivables
Projects
Credit Memo Approvals
Projects Approval
Credit Application Approval
Project Accounting
iTime
Timecard Approval
ISACA Conference
Slide 12
Agenda
1.
2.
3.
4.
5.
6.
Objectives
Oracle ERP Overview
Oracle ERP Security
Oracle Workflow and Security
How to Secure Oracle Applications
Security and Controls Considerations by
Business Cycle
7. Segregation of Duties
8. Configurable Controls
ISACA Conference
Slide 13
Control Structure
Internal and External Control Structure
Downstream
Upstream
ORACLE
Suppliers
EDI
E - Commerce
Customers
Interfaces
Data Feeds
Linked Systems
Interfaces
Data Feeds
EDI
E - Commerce
IT Infrastructure
External
Controls
Internal
Controls
Non-Linked
Suppliers
Interfaces
Data Feeds
Business
Processes
Internal
Controls
Interfaces
Data Feeds
External
Controls
Non-Linked
Suppliers
Controls reliance is achieved through a convergence of
efficient systems and effective internal and external controls
ISACA Conference
Slide 14
Application Security
Managing Risk by Ensuring that
Key Controls are Adequately Implemented Over
APPLICATION SECURITY:
•
•
•
•
•
•
•
Security Administration - managed by
appropriate management within the organization
Security Impact Assessment - on business
processes and user environment
Security Design - current and future needs are
assessed and implemented with high priority
controls environment
Security Strategy/Approach - controls over
application to ensure unauthorized users can not
access the production environment
Segregation of Duties - controls over business
process are adequate and implemented
Security Functionality - comprehensively
utilized and maintained
On-going Security Administration - managed
and maintained by appropriate management
within the organization
ISACA Conference
Slide 15
Business
Process
Team
Oracle Apps
Functionality
Controls
& Security
Team
Control
Requirements &
Oracle Security
Expertise
Change
Management
(Stakeholder)
Business
Requirements
Oracle Apps
(User
Responsibility
Profiles)
Some Leading Practices to Secure Oracle
•
Improvisation Vs Perfection
•
Enable / Use standard Oracle Applications features in System
Administration module
•
Change Default Installation Passwords and disable unused
default Oracle Applications Accounts
–
–
–
–
–
–
ISACA Conference
Default database administration schemas
Schemas belonging to optional database features neither used nor
patched by E-Business Suite
Schemas belonging to optional database features used but not
patched by E-Business Suite
Schemas belonging to optional database features used and patched
by E-Business Suite
Schemas common to all E-Business Suite products
Schemas associated with specific E-Business Suite products
Slide 16
Some Leading Practices to Secure Oracle (Cont’d)
•
Restrict ‘Back-end’ access to the Database
•
Review of standard reports to access signon,
unsuccessful signon, responsibility usage, form usage
and concurrent request usage.
•
Enabling Auditing on certain Tables
•
Oracle Alerts
•
Keep watching ‘Security Alerts’ from Oracle for latest
security patches and other sources like Computerworld,
ITToolbox.com, etc.
ISACA Conference
Slide 17
Some Leading Practices to Secure Oracle (Cont’d)
Profile Options – Signon / Suggested settings
• Signon Password No Reuse – “180”
• Signon Password Length – “6-8”
• Signon Password Hard to Guess – “Y”
• Signon Password Failure Limit – “3”
• Sign on:Audit Level – “Form”
• Sign on: Notification – “Y”
ISACA Conference
Slide 18
Some Leading Practices to Secure Oracle (Cont’d)
Other Security Related Profile options
Profile Option / Suggested setup
• AuditTrail:Activate – “Y”
• Concurrent:Report Access Level - “User”
• FND:Diagnostics - “No”
• Utilities:Diagnostics – “No”
ISACA Conference
Slide 19
Agenda
1.
2.
3.
4.
5.
6.
Objectives
Oracle ERP Overview
Oracle ERP Security
Oracle Workflow and Security
How to Secure Oracle Applications
Security and Controls Considerations by
Business Cycle
7. Segregation of Duties
ISACA Conference
Slide 20
Security and Controls Considerations by Business
Cycle
A ‘configurable control’ is
•
Any setting in Oracle Apps that can be modified, and
which can affect the operation of a function in Oracle Apps
– Profile options
– Transaction type settings
– Financial options
– Payment options
– Invoice options
•
Different from ‘inherent’ controls, which are preprogrammed settings that are generally not overrideable
or modifiable (e.g. quantity values not allowing nonnumeric characters)
ISACA Conference
Slide 21
Security and Controls Considerations by Business
Cycle
The following key cycles will be discussed in the
next few slides
•
•
•
Order to Cash
Procure to Pay
General Ledger/Financial Close
ISACA Conference
Slide 22
Security and Controls Considerations by Business
Cycle
1. Order to Cash
–
–
–
–
–
ISACA Conference
OM Transactions type Setting
Holds: Operational and Financial
Processing Constraints Rules
Payment Terms
Credit Limit and Credit Check
Slide 23
Security and Controls Considerations by Business
Cycle
2. Procure to Pay
–
–
–
–
–
ISACA Conference
Document Types – PO, Requisitions, etc
Approval Limits and Approval Groups
Tolerances
Invoice Matching
Banks setup
Slide 24
Security and Controls Considerations by Business
Cycle
3. General Ledger/Financial Close
–
–
–
–
–
ISACA Conference
GL Chart of Accounts, Security rules, Cross-validation
rules
Journal Approval and Posting
Consolidation Mapping Rules
Translation and Exchange Rates
Suspense Posting and Dynamic insert option
Slide 25
Agenda
1.
2.
3.
4.
5.
6.
Objectives
Oracle ERP Overview
Oracle ERP Security
Oracle Workflow and Security
How to Secure Oracle Applications
Security and Controls Considerations by
Business Cycle
7. Segregation of Duties
ISACA Conference
Slide 26
Segregation of Duties
What is ‘Segregation of Duties’ (SOD)?
•
The principle of separating incompatible functions from an
individual
•
Designed to prevent, rather than detect
•
Reduces risk, as circumventing a well designed SOD
environment requires collusion
•
SOD includes system level segregation as well as
segregation of manual processes
ISACA Conference
Slide 27
Segregation of Duties
What must be segregated?
ISACA Conference
Record
Keeping
Custody of
Assets
Authorization
Reconciliation
Slide 28
Segregation of Duties
Segregation of Duties and
restricted access is a multidimensional challenge.
Business Units /
Sets of Books
General Ledger
Security
Organizations
Roles and
Responsibilities
Accounting
Transactions
Approval
Hieararchy
w
rkflo
Wo
Custom Code
ISACA Conference
Slide 29
Tools may be used to assist
in the initial analysis of
segregation of duties and
the design of Roles and
Responsibilities. In addition,
other dimensions of the
ERP application security
should be understood to
assess the full nature of
segregation of duties
weaknesses.
Segregation of Duties
In a practical way, SOD is enforced in Oracle through
responsibilities!
•
A responsibility defines a set of menu options and
functions that are accessible to a user and defines reports
and processes which may be run
•
Responsibilities usually grant access to just one Oracle
module, such as General Ledger or Accounts Payable
•
A user can be assigned more than one responsibility
•
Role Based Access Control (RBAC) - new feature in
11.5.10
ISACA Conference
Slide 30
Responsibility Security
Segregation of Duties
Main Menu
Menu
Forms
Applications
User
Menu
Forms
Responsibility
Request Security Group
Reports
User Name
Password
Request Sets
Concurrent Programs
Role Based
Access Control
- RBAC
Security Rules
Flexfield Values
Report Parameters
ISACA Conference
Slide 31
Segregation of Duties
Potential traps with SOD reviews
• Oracle standard menus / forms
• Custom pll’s
• Customised forms or functions
• IT users with superuser responsibilities
• Process Tab
ISACA Conference
Slide 32
Segregation of Duties
Finally…
•
Baseline testing of user access is a critical step
•
The strength of the change control environment
will impact the ability to rely on the baseline of
segregation of duties and user access
ISACA Conference
Slide 33
Summary
• Oracle Security is complex and needs
appropriate handling
– Right kind of people
– Use of tools like LogicalApps, Applimation, Oracle ICM
• Oracle automated controls include:
• Configurable parameters and settings
• User access controls and responsibilities
• Review of Oracle configurations and access
levels are always as of a ‘point-in-time’
• Segregation of Duties is critical
– Requires use of right tool to perform the review
– Manual review not recommended
ISACA Conference
Slide 34
Contact Information
Email: brijen.m.joshi@us.pwc.com
ISACA Conference
Slide 35
Download