0Sarbanes-Oxley, Fraud Prevention, and IMCA:: A Framework for Effective Controls Assurance

5
auditing Why are IT operational controls so important? In most large businesses, critical finan- cial processes run automatically on a vast, complex computing and network- ing infrastructure. It’s tempting to believe that this infrastructure is a mon- umental, unchanging entity and once policies are established and the systems are running, everything is fine. In fact, IT operations are often surprisingly and alarmingly fluid. New servers and network devices are put into production. New software is installed. Old software is patched. Hundreds of con- figurations change daily. Systems can change from a known good state either intentionally or via a process known as “integrity drift.” Security breaches or unin- tentional errors create vulnerabilities that go unnoticed. Even remedying security breaches or patching software can cause changes that are never fully documented. The need for effective change manage- ment is driven by two factors: compliance with Sarbanes-Oxley Section 404 and the need to drive towards operational excel- lence. First, it is clear to auditors that financial applications reside on top of infrastructure systems. Indications of poor service levels are an immediate flag for control issues. The ERP system may be running flawlessly, but if nobody can reach it due to a network failure, failed system upgrade, or improperly tested business rule change, then there are issues. For today’s organizations to oper- ate effectively, access to systems must adhere to defined service levels. According to the Information Technology Infrastructure Library (ITIL) and BS15000 frameworks, as well as audit- ing and control frameworks such as COBIT and COSO, IT operational integrity hinges on change and configura- tion management processes. Proven integri- ty assurance software can verify that these processes are actively managed and that monitored systems match a known, good state. When organizations put internal con- trols in place for meeting compliance regu- lations the only way to assure that internal controls are effective is to assure the integri- ty of the critical underlying IT change and configuration management processes. What is the silver lining? When IT best practices and integrity assurance frame- works are implemented, organizations can not only evaluate systems and con- trols against a known good state and meet compliance regulations, they gain under- standable, verifiable information enabling them to significantly improve systems availability, IT service quality, IT staff productivity and cost savings. What is Sarbanes-Oxley Section 404? Section 404 of the Sarbanes-Oxley Act of 2002 holds executives of publicly held United States companies responsible for the accuracy of financial statements and financial information issued by their companies. They must also analyse and explain their procedures for internal financial controls based on standards set by the Public Company Accounting Oversight Board. Soon, these analyses and explanations will have to be reviewed by external auditors who must attest to their effectiveness. 12 Sarbanes-Oxley, Fraud Prevention, and IMCA: A Framework for Effective Controls Assurance Gene Kim, VP & CTO, Tripwire Many companies are starting to grapple with the new regulatory compliance impacts of Sarbanes-Oxley, which holds officers of US publicly held companies accountable and responsible for the internal system of controls. For many, espe- cially auditors and risk management officers, Sarbanes-Oxley represents an extremely rare opportunity to increase controls assurance to reduce the risk of fraud. Most organizations facing the enormous scope of Sarbanes-Oxley are over- whelmed by its scope, and are sometimes hampered by the perception that com- pliance will create not only an enormous amount of work, but will provide little value back to the business. and stolen assets. The civil courts are also able to award damages to a victim of corporate espionage. The Orders available to obtain disclosure of assets, freeze those assets and search for evi- dence are also extremely flexible and can be tailor made to assist in a given situation. The advantage of pursuing civil proceedings is an enhanced chance to recover damages and property which may not be the case if criminal proceed- ings are commenced. References 1 Metro 25 July 2003 2 KPMG's India Fraud Survey Report 2002 3 Global Risk News: Corporate espi- onage: Are you safe? Merchant International Group - June 5 2003 4 Business Software Alliance Press Release: BSA and IDC Announce Findings of Largest Ever Study Into Software Piracy (2/04/2003) 5 BBC News UK edition Sunday 13 July 2003 10:53 UK 6 Dyson Appliances Ltd V Hoover Ltd (2001)[2001] EWCA Civ 1440 7 ACFE UK Fraud Manual Volume II

Transcript of 0Sarbanes-Oxley, Fraud Prevention, and IMCA:: A Framework for Effective Controls Assurance

Page 1: 0Sarbanes-Oxley, Fraud Prevention, and IMCA:: A Framework for Effective Controls Assurance

auditing

Why are IT operational controls so important? In most large businesses, critical finan-cial processes run automatically on avast, complex computing and network-ing infrastructure. It’s tempting tobelieve that this infrastructure is a mon-umental, unchanging entity and oncepolicies are established and the systemsare running, everything is fine. In fact,IT operations are often surprisingly andalarmingly fluid.

New servers and network devices are putinto production. New software is installed.Old software is patched. Hundreds of con-figurations change daily. Systems canchange from a known good state eitherintentionally or via a process known as“integrity drift.” Security breaches or unin-tentional errors create vulnerabilities that

go unnoticed. Even remedying securitybreaches or patching software can causechanges that are never fully documented.

The need for effective change manage-ment is driven by two factors: compliancewith Sarbanes-Oxley Section 404 and theneed to drive towards operational excel-lence. First, it is clear to auditors thatfinancial applications reside on top ofinfrastructure systems. Indications ofpoor service levels are an immediate flagfor control issues. The ERP system maybe running flawlessly, but if nobody canreach it due to a network failure, failedsystem upgrade, or improperly testedbusiness rule change, then there areissues. For today’s organizations to oper-ate effectively, access to systems mustadhere to defined service levels.

According to the InformationTechnology Infrastructure Library (ITIL)

and BS15000 frameworks, as well as audit-ing and control frameworks such asCOBIT and COSO, IT operationalintegrity hinges on change and configura-tion management processes. Proven integri-ty assurance software can verify that theseprocesses are actively managed and thatmonitored systems match a known, goodstate. When organizations put internal con-trols in place for meeting compliance regu-lations the only way to assure that internalcontrols are effective is to assure the integri-ty of the critical underlying IT change andconfiguration management processes.

What is the silver lining? When IT bestpractices and integrity assurance frame-works are implemented, organizationscan not only evaluate systems and con-trols against a known good state and meetcompliance regulations, they gain under-standable, verifiable information enablingthem to significantly improve systemsavailability, IT service quality, IT staffproductivity and cost savings.

What is Sarbanes-OxleySection 404?Section 404 of the Sarbanes-Oxley Act of2002 holds executives of publicly heldUnited States companies responsible forthe accuracy of financial statements andfinancial information issued by theircompanies. They must also analyse andexplain their procedures for internalfinancial controls based on standards setby the Public Company AccountingOversight Board. Soon, these analysesand explanations will have to be reviewedby external auditors who must attest totheir effectiveness.

12

Sarbanes-Oxley, FraudPrevention, and IMCA:A Framework for Effective Controls Assurance

Gene Kim,VP & CTO,Tripwire

Many companies are starting to grapple with the new regulatory complianceimpacts of Sarbanes-Oxley, which holds officers of US publicly held companiesaccountable and responsible for the internal system of controls. For many, espe-cially auditors and risk management officers, Sarbanes-Oxley represents anextremely rare opportunity to increase controls assurance to reduce the risk offraud. Most organizations facing the enormous scope of Sarbanes-Oxley are over-whelmed by its scope, and are sometimes hampered by the perception that com-pliance will create not only an enormous amount of work, but will provide littlevalue back to the business.

and stolen assets. The civil courts arealso able to award damages to a victimof corporate espionage. The Ordersavailable to obtain disclosure of assets,freeze those assets and search for evi-dence are also extremely flexible andcan be tailor made to assist in a givensituation. The advantage of pursuingcivil proceedings is an enhanced chanceto recover damages and property which

may not be the case if criminal proceed-ings are commenced.

References1Metro 25 July 20032KPMG's India Fraud Survey Report2002 3Global Risk News: Corporate espi-onage: Are you safe? Merchant

International Group - June 5 20034Business Software Alliance Press Release:BSA and IDC Announce Findings ofLargest Ever Study Into Software Piracy(2/04/2003)5BBC News UK edition Sunday 13 July2003 10:53 UK6Dyson Appliances Ltd V Hoover Ltd(2001)[2001] EWCA Civ 14407ACFE UK Fraud Manual Volume II

Page 2: 0Sarbanes-Oxley, Fraud Prevention, and IMCA:: A Framework for Effective Controls Assurance

auditing

13

According to the Institute of InternalAudit, reliability of internal controls andfinancial reporting depends on technicalcontrols such as change managementand monitoring of information, systems,programmes, and operational configura-tions. Financial reporting integritydepends on the integrity of IT systemsand processes that support financialdata. Auditors will look for and evaluatethe effectiveness of key preventative controls including:• Authorization processes establishing

procedures for authorizing transac-tions.

• Separation of duties to prevent circum-venting the authorisation processes.

• Effective change management employ-ing detective controls to ensure that allchanges go through established autho-risation processes .

• Effective change documentation of allauthorized infrastructure changerequests, change authorisations andresulting infrastructure changes.

• Documentation of exceptions orchanges made outside the changemanagement process; documentationof “ad hoc” fixes.

The role of ITIL best practices: a framework forverifiable and repeatableprocessesAn accepted framework for IT practiceshelps ensure that the necessary controlsare in place—and effective. The mostwidely accepted framework for themanagement and delivery of IT servicesis ITIL. More than 42 000 certifiedITIL consultants help companiesimplement ITIL best practices, primari-ly in Europe and Canada althoughincreasingly in the US.

The ITIL represents a process-basedapproach to IT activity. All activity isclassified under two broad umbrellas aseither Service Management or ServiceDelivery. Rather than basing best prac-tices on technology, ITIL focuses oncritical business processes and disci-plines needed for delivering high-quality

services. This approach defines IT quali-ty as the level of alignment between IT services and actual business needs. As aresult, organizations can mature theirbest practices without regard to specifictechnologies or obsolescence. ITIL’saccessibility makes it easier for seniorexecutives to both sponsor and shepherdIT quality improvement efforts.

ITIL provides a comprehensive, con-sistent volume of best practices drawnfrom the collective experience of thou-sands of IT practitioners. A series ofbooks guide organizations in the envi-ronmental facilities and practicalaccommodations required for provi-sioning quality IT services. Out of theITIL framework has emergedBS15000, the first standard for IT ser-vice management.

Three ITIL/BS15000 process areasrepresent the key leverage points for IToperations: Release, Controls andResolution processes.• Release processes—release processes

include planning, designing, building,and configuring hardware and softwarereleases to create an accepted library ofbuild components. With an acceptedlibrary of known good builds, organi-zations can ensure the integrity of sys-tem configurations at all times.Organizations typically invest in release

processes last; yet these processes deliv-er the highest return on investmentbecause they assure integrity of theentire pre-production infrastructurewhere the cost of defect repair is leastexpensive.

• Control processes—these processescontrol the number of unique configu-rations and assets required for efficient-ly delivering IT services. They alsoprevent service interruptions and unau-thorized changes. Configuration man-agement identifies all workinginfrastructure components and putsthese components under management.When implemented, control processesenable the IT team to plan ongoingmaintenance, ensure all critical itemsare maintained, and when necessary,recreate infrastructure.

• Resolution processes—these processesenable organizations to manage inci-dents and problems, while providingfor controlled, consistent managementof IT customers and issues.

Controls maturity spectrum – the road mapEven with a best practices framework, ITprofessionals still need a place to start.The first step is for an organization to

Figure 1: Best in class: server/sysadmin ratios

Page 3: 0Sarbanes-Oxley, Fraud Prevention, and IMCA:: A Framework for Effective Controls Assurance

auditing

determine which systems and processeswork, and which don’t. Internal controlscan be characterised as being at one of fivelevels:• Unreliable—an unpredictable environ-

ment where controls are not designedor in place

• Informal—controls are designed and inplace but not documented

• Standardized—controls are designed,in place and documented

• Monitored—standardised controlswith periodic testing for effectivedesign and operation with reporting to management

• Optimized—integrated internal con-trols with real-time monitoring bymanagement and continuousimprovement

Risks and controls:modern IT realitiesEven when organizations have controls inplace and appear to manage them, thedesired high-control-reliance environmentmay not truly exist. Controls may be cir-cumvented in several ways, for example:• Management by belief

There is a well-documented changemanagement system, however it is notactively enforced. Consequently, datacentre staff routinely make changeswithout going through the requiredchange management process, which cir-cumvents the controls.

• Separate roles in theory.The organization has separated appli-cation development and application

operations tasks so that neither groupcan access the other group’s infra-structure. They are both supported bythe same technical support teamallowing a support engineer access toboth the development and opera-tional infrastructure, and thus, cir-cumvent controls.

• Uncontrolled configuration driftAn organization has an area for stagingapplications before production deploy-ment. After production, configurationsare allowed to drift and the originalknown good state is lost. This nullifiesaudit results from the pre-productionenvironment.

• shell gameAn organization frantically prepares fora scheduled audit, making the needed

14

Unreliable Informal Standardised Monitored Optimized

ControlsChange None Inconsistently Regular change Infrastructure Managementmanagement managed changes, management meetings, monitored for receiving and processes such as ensuring changes are changes, and correlated tracking change

change authorised and scheduled with authorised success rates and notification work orders and reinforcingannouncement integrity of change culture of

management process change management

Configuration None Inconsistent Comprehensive asset Infrastructure is Managementmanagement documentation of and configuration monitored to ensure receiving andprocesses infrastructure assets management database that deployed setting targets

con-figurations, of relevant assets and infrastructure for number ofversions, dependencies to matches configuration uniqueservice levels, business processes management database configurations inbusiness process deployment and

operationalstaffing and costs

ResolutionService High number of High-risk changes Stakeholders have Causal factors of outages Management isleve outages and protracted are sometimes averted regular forum to are being used in receiving and settingstability problem resolution at the last minute authorize and analyze problem management, targets for MTTR,

times. Highly through change potential impacts of and frequency of MTBF, and changeunpredictable service notifications. However, changes, before being outages is decreasing success rateslevels, with inconsistent high outage made in production.MTTR and MTBF rates remain. Some changes that wouldwith efforts increasingly result in outages arefocused on fire-fighting being prevented.

ReleaseRepeatable Infrastructure changes Some documentation Majority of Relevance of release Management isbuild and are deployed into and process exists infrastructure changes management processes receiving and settingacceptance production in an for deployment being made through being tracked by targets for process ad hoc manner, and change application. the release management auditing configurations configuration counts, and

and are non- Slower rate of processes, slowing in deployment against release managementreproducible. increase of unique down increase of "known good state" processes areNumber of unique configuration counts configuration counts delivering higherconfigurations in levels of platformdeployment stability and featureincreasing quickly delivery

Table 1: Standards of Internal Processes

Page 4: 0Sarbanes-Oxley, Fraud Prevention, and IMCA:: A Framework for Effective Controls Assurance

auditing

changes. During audit interviews andinspection, the auditor sees the config-urations and compares for them.However, when the auditor leaves, allconfigurations are rolled back into anon-complying state.

Using IMCA as a controlsself-assessmentAssessing and documenting a compa-ny’s current level of assurance can begreatly simplified with a standardizedassessment tool. Assessment results canthen clearly point the way to necessarypractice improvements. The IntegrityManagement Capabilities Assessment(IMCA) is a benchmarking and assess-ment tool based on ITIL and the BS 15000 Code of IT practice. TheIMCA assesses Control, ProblemManagement (Resolution), ReleaseManagement, and Security processesand assigns the organization a score ineach area. It provides organizationswith two critical perspectives:

1. A descriptive view—captures aclear, detailed picture of an organiza-tion’s current control strengths andweaknesses and how the controls areoperationalized and verified.

2. A prescriptive plan—presents spe-cific recommendations based on the ITenvironment being measured so that theorganization can augment or bootstrapnecessary controls. Part of the prescrip-tion for improvement is a comprehen-sive report and an evaluation standardfor measuring how well a company’scontrols meet Sarbanes-Oxley compli-ance requirements.

Putting the IMCA into practice

IMCA assessments begin by interviewingkey participants from each of the organi-zation’s primary IT disciplines. A com-pleted questionnaire is used to score IToperations in its Release, Control,Resolution and Security control capabili-ties. Scores are then compared with aggregate data from other companies in the same industry as well as with indus-try best practices. Final results are

delivered in a comprehensive report that documents strengths and areas for improvement.

Release processes

Release processes capture and store thegood known state of all infrastructure con-figurations. With these captured, an orga-nization can quickly recreate a known,good configuration in the event of an inci-dent such as a disaster, security breach,vendor failure, or a virus or worm out-break. Release processes also efficiently andreliably deliver changes into the produc-tion environment, including softwarepatches and upgrades. Assured releaseprocesses ensure that provisioned systemsmatch the known, good builds and that allconfigurations have repeatable builds.

Control processes

Control process assurance ensures thatchanges to production configurations arereliably controlled and applied. Thisincludes assuring that all changes can betraced to a valid business reason and thatSecurity, Operations, and R&D or other

stakeholders have evaluated changes forpotential operational risks before deploy-ing them. The IMCA examines an orga-nization’s operational controls andconfiguration management practices.Stakeholders must review all proposedinfrastructure and software changesbefore they are made, ensuring a known-good repository for all standard configu-rations used across the enterprise andpreventing configuration drift anduncontrolled changes.

The sample IMCA assessment showedthat no formal change managementprocess is documented and there is noconsistent change authorization process.The assessment also uncovered the lack ofdetective controls to map changes to validbusiness reasons, resulting in loss ofprocess integrity during change and con-figuration management. Despite havingrollback capabilities to revert infrastruc-ture into a known good state, this capa-bility was never used because of a lack ofintegration between IT operations andR&D. Consequently, IT operations staffhave little or no ability to maintain stableand predictable service levels.

15

Figure 2: In the example IMCA report above, the organisation hasworld-class release management processes in two areas, but had clearcontrol deficiencies, especially in integrating security into IT operationalprocesses. In this case, security and change management stakeholdersare not sufficiently involved in release planning processes. As a result,issues caused unnecessary rework and chaos. Furthermore, despitehaving formal operations acceptance processes, some releases stillwent into production without sufficient review.

Page 5: 0Sarbanes-Oxley, Fraud Prevention, and IMCA:: A Framework for Effective Controls Assurance

Resolution processes

This part of the assessment analyzes thecompany’s problem managementprocesses with the goal of decreasingMean Time to Resolve (MTTR) outages.Studies show that up to 80% of all sys-tem outages result from authorizedemployees changing something in theinfrastructure. When an outage occurs,the most time-consuming part of reme-dying it is pinpointing the location andnature of the problem. Assured resolu-tion processes not only minimize out-ages and fire-fighting time, they alsoimprove diagnosis and problem manage-ment practices.

The sample IMCA assessment clearlyidentified an inability to rule out changeas a causal factor early in the problemmanagement process. Best-in-class orga-nizations will integrate all relevant evi-dence into the problem ticket to ensurethat causality and problem solving skillsare used as part of the problem resolu-tion process. The underlying issues thatcaused poor service levels, although verymuch a property of resolution processes,stem from controls and release processproblems.

Security processes

Security is a by-product of many otherprocesses and controls operating togethereffectively. The IMCA examines an orga-nization’s ability to understand theknown good state of its IT infrastructure,govern how it is configured and built, anddetermine whether a change is maliciousor authorized.

The benefits of IMCA and IToperational processesOrganizations that assess their integritymanagement controls and processesgain valuable insight into strengths,weaknesses, and areas of risk. With theinformation that IMCA delivers, chart-ing a course toward best-in-class IToperations can be made tangible andmeasurable. IMCA enables organiza-tions to:

• Establish a beach head for operationalbest practices, allowing future process improvement.

• Create a set of metrics for measuringprogress, such as high server/systemadmin ratios, low MTTR, high MeanTime Between Failures (MTBF), andearliest integration of security intooperational lifecycles.

• Target weak areas for quick wins andimmediate benefit.

• Create hard organizational changeboundaries to improve accountabilityand responsibility.

• Enforce change management processintegrity.

• Measure and articulate the businessbenefit of process improvements.

• Use the reporting mechanism to meetSarbanes-Oxley controls assurancerequirements.

Once these repeatable and verifiableprocesses are in place, IT organizationscan start generating key metrics duringrelease, control, and resolution processesensuring that practices are working.These metrics include:• Release processes.• Time to provision known, good build.• Number of fixes/turns to match

known, good build.• Percentage of deployed systems that

match known, good build.• Percentage of deployed systems that

have security sign-off.• Number of pre-production engineers.• Servers/platform-build ratio.• Control processes.• Number of changes made in data

center.• Percentage of changes that were

pre-announced.• Percentage of changes going through

change management system.• Number of changes that map to

authorized business reason.• Percentage of outages caused by

change.• Number of changes that obsolete

repeatable builds.• Ops “clean shift handover” success

rate• Number of outages caused by change.

• Number of times change managementprocesses were circumvented.

• Number of changes that obsoleterelease processes.

• Resolution processes.• Outage and issue MTTR. • Number of critical outages.• Number of problems. • Number of known errors.• Aggregate outage downtime.• Number of inappropriate escalations.• Change success rate. • MTBF.• Percentage of time spent managing

problems.• Server/sys admin ratio.

The silver lining: what’sgood for IT is good for auditAccording to a study conducted by the ITProcess Institute, organizations thatinvested the most in implementing bestpractices reaped the most benefits:• Higher service levels. • Better security. • Efficient cost structures.• Control structures most effective for

detecting fraud and unauthorized change.Ensuring compliance with Sarbanes-

Oxley is an opportunity for organiza-tions to greatly improve operationalstability and efficiency. Accepted bestpractices, ITIL, guide the way. Provensoftware solutions and leading networkmanagement frameworks put teethbehind best practices. Internal controlsput in place now to comply with regula-tory mandates will soon pay off in a sil-ver lining—greater security, significantcost savings and high-quality informa-tion services.

To find out more about IMCA, go tohttp://www.tripwire.com/imca orhttp://www.itpi.org. (At the time of thiswriting, all the intellectual property ofIMCA has been donated to the ITProcess Institute, and the content is beingmoved to the ITPI website.)

For more information about ITIL, visithttp://www.ogc.gov.uk/itil/. For moreinformation about BS15000, visithttp://www.bs15000.org.uk/.

auditing

16