what does external auditor look for during sap audit

7
What does an external auditor look for in SAP R/3 during SOX 404 Audits? Ram Bapu, CISSP, CISM Sandra Keigwin, CISSP

Upload: technuts

Post on 03-Apr-2015

265 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: What does external auditor look for during SAP audit

What does an external auditor look for in SAP R/3 during SOX 404 Audits?

Ram Bapu, CISSP, CISM Sandra Keigwin, CISSP

Page 2: What does external auditor look for during SAP audit

What does an external auditor look for in SAP during SOX 404 Audits?

Corporations have most of the business processes run by implementing modules of an ERP such as SAP. The operations of business process becomes smooth but at the cost of complexity. The modular design of SAP R/3 leads to complex user access, conflict of duties and so on. Consequently, Auditing SAP R/3 is equally complex. Several existing implementations have found to have not taken care of issues such as undocumented access security or the missing authoritative ownership of the whole big picture or excessive privileges was allocated for the personnel, etc. Just walking into any SAP implementation done years ago, there are several issues that the external auditor can find as deficiencies. (See Appendix A for the definitions of SOX 404 Deficiencies - Significant Deficiency, Material weakness and control deficiencies) that has dire consequence of potential misstatements in 10Q. Even with the recent ‘go-live’ implementations, dynamic changes in the corporate world would end up creating deficiencies if due care is not taken. Consequently, It is observed that several corporations with huge SAP implementations have scheduled SAP audits as frequent as semi-annual. Thus it is important to understand the mindset of external auditors. Following are the issues that the external auditor will look for:

1. Segregation of duties – In SAP R/3, segregation of incompatible functions is a major control point. So, fixing the incompatible functions before the external auditor would get to see would be the key. Assessing whether incompatible functions are assigned to SAP users can be a tedious task. So how does one go about addressing such incompatibility issues? Let me explain using an example of the accounts payable process in SAP. Ideally, in A/P segregation of duties should exist between purchasing, goods receiving, invoice processing and cash disbursement functionalities. Below,

Step 1 - Document the entire process of payables. This would include Raising Purchase requisition, releasing purchase requisition, raising a purchase order PO, releasing purchase order, goods receipt, invoice entry, and finally processing payments.

Step 2 - For each of the sub-process identified above, identify the relevant transaction code in SAP. This can be done using the standard menus in SAP.

Step 3 - Identify the key control points within the process. In our example above, key control points would be raise PO, goods receipt, enter invoice, create and changing vendor master records.

Step 4 - Identify if there are any other incompatible duties. One such incompatible function would be payment processing and vendor master maintenance.

Step 5 - Identify the transaction codes in SAP, which allow access to these incompatible functions. Now in SAP the relevant transaction codes would be: XK01 / XK02 - Create Vendor / Change Vendor details, ME21 - Create PO, ME28 - Release PO, MB01 - Goods Receipt, MIRA / MIRO - Invoice Entry. The incompatible functions relevant for segregation of duties would be

XK01 / XK02 and ME28 ME21 and ME28 ME28 and MB01 XK01 / XK02 and MIRA / MIRO

Page 3: What does external auditor look for during SAP audit

Step 6 - Identify employees within the organization who have access to such incompatible functions. This can be done using SUIM, data analysis tools. If required analysis can be even done at the authorization profile level.

Step 7 - Once users with access to incompatible functions are identified, access to such functions should be restricted. The BASIS person who is responsible and knowledgeable enough to carry out such task should do this. External auditors steps would be very similar to above steps.

2. Inconsistent business process procedure – This is very commonly seen in today’s corporate environment where M&A is part of the game. The first question that’s asked is how was the data moved and what are the process procedures in place for each of the entity. Process procedures are crucial to be consistent across all the entity/business process, as inconsistent procedure will make the business prone for financial misstatements. For example, in one of the SAP audits of a corporation, all master material lists had tolerance limits excepting one master materials list belonging to one of the entity that was bought few years ago. This can be found out by running a filter on all master material lists for materials that allow over tolerance limits. The design risk here was, Users were allowed to specify delivery tolerances that would permit acceptance of delivery of a significantly larger quantity of goods than were ordered (Via requirements planning document and PO) and approved. Also, the overriding of delivery tolerances was allowed rather than preventing. Potentially, if the invoice was processed and paid based on this, there would be a misstatement. The business process procedures are categorized as manual and automated. The above is an example of automated procedure. An example of Manual business process procedures is central payment procedure in place or procedure followed when a new application server is released to production and certain procedures are passed such as OS patches brought up-to date, Anti-virus scanner with latest signatures installed, database hardened, server being taken through penetration tests and so on. Inconsistencies in Manual business process procedures are easy to find and remediate when compared to automated business process procedures. Consequently, external auditor would have automated scripts that discover inconsistencies in automated process procedures in place. We recommend that the SAP R/3 procedures be reviewed semi-annually for any inconsistent procedures due to changes that would have crept in, a tight SLDC process in place and finally enable STP (Straight-through processing) and use Transaction manager. The advantage of using Transaction manager is, it manages the execution of each step of the transaction's process, performs the accounting, ensures that separation of duties is enforced and captures the audit trail associated with that transaction. Not only does this increased automation save time spent on executing these steps, it eliminates the errors (and resulting investigation and reprocessing) that are a normal consequence of a manual approach.

3. Unsecured customized programs - Almost all SAP implementations have many customized 'Z'

transactions or 'Y' transactions built in to suit the business process. Although there is nothing wrong the problem is, these customized transactions are not secured, making them vulnerable. External auditor would look how secure they are. Make sure that they are secured either via S_TCODE or assigning an authorization object to the transaction via transaction code SE93. SAP auditors can find a listing of all customized Y and Z transactions through the menu path (Menu Path >> system >> Services >> Reporting) or through transaction SA38. Below is a screen shot that appears.

Page 4: What does external auditor look for during SAP audit

Here to find all programs i.e. customized transactions beginning with "Y" and "Z", in the ‘Program’ field, enter "YA" in the field ‘from’ and "ZZ" in the field ‘to’. The listing of all customized programs within SAP appears. On this listing, external auditors would look for the following three issues.

a. Customized Transaction Title - As an SAP auditor, the first thing you should check is that all custom programs have sufficiently descriptive titles stating the purpose of the program. Any missing title descriptions should be reported.

b. Test Transactions - Next, click on the binocular button and make a search for terms like "TST" or "TEST". Ideally, there should not be any customized Y or Z transactions in the production environment. Test programs Y and Z lying in production environment should be removed.

c. Critical Customized Transactions - SAP Customized transactions which are used to execute critical functions like deleting codes, other programs etc pose another security risk. SAP auditors can find such programs using terms like "DEL", "DELETE" or "REMOVE". Such programs are normally are the ones which need to be removed from SAP before Go Live but have been overlooked. Apart form these, other programs which look conspicuous / attract attention like ones with exclamation marks (!), question marks (?), should also be investigated by R/3 auditors.

4. Excessive or Unauthorized access to Master table & SAP basis - Many companies make the mistake of giving access to sensitive BASIS transactions like SE13, SE38, SM49, SU10, SU12, SM13, SC38, SM59, KE54 etc to users in production. On the other hand access is given to BASIS or development staff to run transactions in SAP production environment. Such unrestricted access can lead to a potential control deficiency under Sarbanes Oxley. We recommend that during the semi-annual audit, business owners check these areas for any creep of violations.

5. Unrestricted posting periods – Corporations strictly close the books at specified timeline but

some of the corporations allow posting as closing of the books are not done in a timely manner. If that’s happening, SAP R/3 does not have any control in avoiding a misstatement. Make sure that business owners close the books at specified timeline. Else, unauthorized entries in previous open periods can result in severe deficiency under SOX.

6. SAP access to terminated employees or presence of redundant ‘testing’ users accounts – 80% of the time, we have observed that corporations would have access for terminated employees are not revoked. Another popular observation is the presence of redundant users accounts that was created to test with names very close to current employee with same role, functions and authorizations. The lack of tight change management with proper test environment and release to production process in place is the main reason for this. During semi-annual audit, business owners need to review for any such violations.

7. Database and OS hardening – Recommend the SAP R/3 servers to have database hardened and

OS patches to be current with anti-virus signatures to be current. Also recommend that unnecessary ports to be closed, vulnerability checks are performed and accordingly remediate before moving the server to production.

8. Interfaces and error handling – A typical SAP system may have many interfaces from existing

legacy systems as well as interfaces to other external systems. Inbound interfaces to SAP from

Page 5: What does external auditor look for during SAP audit

legacy systems usually consist of a file, which is sent from the legacy system to SAP, and processed in the background via a standard SAP transaction. Outbound interfaces from SAP to external systems usually consist of a file, which is sent from SAP to the external system and processed at periodic intervals by the external system. Alternatively, users can download data from SAP to their PC and then process it as they wish, for example, in a spreadsheet.

Appropriate procedures need to be implemented to ensure the use of interfaces is well controlled and to protect the integrity of system data. Following are the critical issues that external auditors would look for:

a. Data interfaced from legacy systems into SAP or from SAP to external systems may not

be completely transferred or the files loaded may be corrupted.

b. Unauthorized changes may be made during batch input error correction.

c. Unauthorized changes may be made to batch input (interfaced files) without detection.

The key is the documented error codes for every failure in transferring between legacy/SAP and these errors are detected and corrected in a timely manner with sufficient audit trails and approvals.

9. Inherent and configurable controls - Inherent controls are predefined controls that defined in

SAP R/3. Such controls do not need to be configured separately in SAP. Such inherent controls are helpful in preventing any major errors since SAP itself prevents the same thorough such inherent controls.

Below are some of the inherent controls that could be utilized to prevent errors leading to SOX 404 deficiencies.

Duplicate checks through message control

Sequential documents through number ranges

Automatic integration and postings

Online data analysis

All transactions through unique documents

History of transactions executed by users retained including date, time and user.

Logging and history of program changes

Configurable controls are those customized to the business process needs. These are added during first implementation before going-live or can be added at any point of time. SAP AIS (Audit Information System) consists of tools, which can be used to monitor inherent controls within SAP as well as configurable controls within SAP.

Page 6: What does external auditor look for during SAP audit

Appendix A A paper on Compliance week (Oct 2004) noted that 51% of disclosures in recent months were due to problematic financial systems. Other big issues showing up as significant deficiencies/ material weaknesses: - Personnel Issues: segregation of duties, inadequate staffing/training, supervision issues- Tone at the Top (following instances of restatement)- Poorly documented accounting practices. So, What is this significant deficiencies/ material weakness? The following is an excerpt taken directly from aicpa.org.

Control Deficiency: The design or operation of a control that does not allow management or employees, in the normal course of performing their assigned functions, to prevent or detect misstatements on a timely basis.

Example: A member of the accounting department has been assigned responsibility to perform reconciliations on all bank accounts on a monthly basis. This person also has responsibility for opening the mail and preparing the daily deposit to the bank. The person’s manager is required to review each reconciliation when completed, but the manager does not consistently sign off on the reconciliation indicating review. Two internal control deficiencies exist here: (1) the lack of segregation of duties because one individual is preparing the cash deposit and reconciling the cash accounts and (2) the lack of documentation of a control because the manager does not evidence review so it is not clear that the review has been performed.

Significant Deficiency: A control deficiency that adversely affects the company’s ability to initiate, record, process, or report external financial data reliably in accordance with generally accepted accounting principles (GAAP). Alone or with other deficiencies, this type of control deficiency results in more than a remote likelihood that a misstatement of the financials, that is more than inconsequential in amount, will not be prevented or detected.

Example: The company uses a standard sales contract making it necessary for the accounting department to review completed sales contracts for changes to standard shipping terms to assure the proper timing for recognizing revenue from sales. Because the terms are not always reviewed, revenue has been overstated on occasion. It is unlikely that any single sales contract could result in a material overstatement of revenue, and there are controls in place to ensure that materials misstatements do not occur. However, a misstatement that is more than inconsequential yet less than material could result, creating a significant deficiency in internal control.

Material Weakness: A significant deficiency that, alone or with others, results in more than a remote likelihood that a material misstatement of the financials will not be prevented or detected.

Examples of weaknesses that would likely be considered material depending on the circumstances include:

• Ineffective oversight by the audit committee over the external financial reporting process, and the internal controls over financial reporting

• Material misstatements in the financial statements not initially identified by the company’s internal controls

Page 7: What does external auditor look for during SAP audit

• Significant deficiencies that have been communicated to management and the audit committee but that remain uncorrected after a reasonable period of time

• Restatement of previously issued financial statements to correct a material misstatement

• For larger, more complex entities, ineffective internal audit functions

• For complex entities in highly regulated industries, ineffective regulatory compliance function

• Fraud of any magnitude on the part of senior management

• An ineffective control environment