"It is
impossible for ideas to compete in the marketplace if no forum for Addressing the Key Implications of Sarbanes-Oxley Contributed by IBM - Tivoli Group
Introduction
The Sarbanes-Oxley Act of 2002 (SOX) introduced
significant changes to financial practice and corporate management regulation.
Passed in the wake of numerous corporate scandals, SOX is a complex piece of
legislation that requires companies to make major changes to bring their
organizations into compliance. The act holds top executives personally
responsible for the accuracy and timeliness of their company’s financial data —
under threat of criminal prosecution. Thus, SOX compliance has become a top
priority for The act also sets deadlines for compliance, all of which will take effect during the next two years. Of the sections already in effect, the most publicized has been Section 302, implemented in August 2002, which requires CEOs and CFOs to personally certify quarterly and annual financial statements. The first indictment of a CEO for failure to comply with the act occurred in 2003. This is just the tip of the iceberg — violating SOX can bring fines up to $5 million or 20 years in prison. Smart companies recognize that Sarbanes-Oxley presents an opportunity to improve information management and increase efficiency. According to the technology research firm The META Group Inc., “Many firms will utilize the Sarbanes-Oxley Act as a means of improving business efficiency, going beyond what is merely required to comply … Forty-nine percent of firms polled believe SOX is a necessary cost of doing business and 39 percent say it will eventually make them more competitive.” For business leaders who recognize that change is both a challenge and an opportunity, SOX represents a gateway to bigger and better things. The trick is to comply and use compliance as a lever for positioning your company for maximum business effectiveness and continued success during the long term. Even private companies not bound by the law often are adopting SOX as a template for their internal data retention, control and management practices. By looking beyond details of compliance, your company can leverage SOX initiatives to build an on demand environment that has the flexibility to respond quickly to changes in your business environment. This paper highlights some key requirements of SOX, their effects on IT departments and how IBM solutions can help you optimize your business practices. IT challenges
A recommended control framework: COSO, COBIT and
ITIL In its final rule for SOX, the United States Securities and Exchange
Commission (SEC) mandated that a company’s internal control of financial
reporting must be based on a recognized internal control framework. On May 23,
2003, the SEC defined in final ruling 2003-66 the requirements for reporting on
internal controls, see: Under the final rules, management’s annual internal control report will have to contain:
The rule referred specifically to the framework created by the Committee of the Sponsoring Organizations of the Treadway Committee (COSO) and suggests its use as a model framework (the COSO official Web site is at: www.coso.org By requiring a company to adopt an internal control framework for its control environment, the SEC merely requires a systematic process methodology for evaluating internal control over financial reporting. Evidence of this systemization comes in the form of policy and procedure guidelines, reports and process documentation including audit logs and reports detailing conformance to the policies and procedures. A COSO evaluation is principally about documenting what a company does to addressing the key implications of Sarbanes-Oxley. IT managers need detailed guidelines to establish, document and evaluate their company’s controls support the five steps of the COSO internal controls methodology and providing supporting materials broken down by each step. The COSO Framework contemplates satisfying the intent of each of the five steps: Control Environment, Risk Assessment, Control Activities, Information and Communication, and Monitoring. According to the “SEC Final Rule: Management’s Reports on Internal Control Over Financial Reporting and Certification of Disclosure in Exchange Act Periodic Reports” (August 14, 2003) the scope of internal control includes “policies, plans, procedures, processes, systems, activities, functions, projects, initiatives, and endeavors of all types at all levels of a company.” The importance of IT controls is implicit in the COSO internal control framework, but IT managers need detailed guidelines to establish, document and evaluate their company’s controls. Of the IT control frameworks available, the model of choice among many external auditors is Control Objectives for Information and Related Technology (COBIT) — a general computer control framework developed by the IT Governance Institute (the COBIT official Web site is at www.itgi.org The detailed COBIT control objectives align with COSO and define its controls from an IT perspective. The framework incorporates Information Technology Infrastructure Library (ITIL) best practices for service delivery and support (the ITIL official Web site is at www.itil.co.uk COBIT can help IT managers address specific control objectives for SOX compliance. SOX IT challenges A critical SOX IT challenge is to manage vast and ever-increasing amounts of business data and information in ways that verify accuracy. IT managers want technology solutions that satisfy control requirements without sacrificing performance. Your systems and infrastructure should incorporate several specific capabilities. Your technology should facilitate establishment, monitoring and documentation of internal controls and data management — in a way that provides proof of effective controls. Lotus Workplace for Business Controls and Reporting, Tivoli software and IBM Global Services Business Consulting Services work together to help address SOX requirements and optimize business controls and data management should contain scrupulous access controls and protect data, business records and financial information from unauthorized or inadvertent alteration, destruction or corruption. All interactions with systems that house critical records and information should have audit trails to accurately track every transaction. Archival and storage systems and the media used to retain required records must support reliable, long-term access. In addition, records information and management software and hardware should be flexible and support new policies and procedures as your company grows and changes. Although a number of vendors claim to have software solutions to support compliance, most focus on a single component or requirement. IBM takes a different approach. Beyond just SOX, IBM analysts and consultants have found commonalities among more than 50 new laws and regulations that have been introduced during the last several years, and we have worked with customers to develop integrated solutions that can help address multiple challenges. This unified approach enables businesses to meet the challenges associated with deadlines and be proactive in meeting future requirements driven by changes in the legal and regulatory operating environments for many public organizations. Many of the regulatory compliance issues facing publicly traded organizations today involve controls applied through technology to help reduce the risk of noncompliance, and IBM has developed a prescriptive approach to the most common findings identified through the internal audits of IBM customers. These findings and mitigation strategies can be found in the appendix of this white paper. IBM integrated compliance solutions IBM Lotus® Workplace for Business Controls and Reporting, IBM Tivoli® management solutions and IBM Global Services Business Consulting Services (ibm.com/services/us/index.wss/so/bcs/a1002618) supply integrated software and services offerings that can help your company through the compliance process. These solutions work together to help address SOX requirements and help improve business controls and data management at each level. Identify control deficiencies with the Lotus Workplace for Business Controls & Reporting solution The first step in your company’s compliance efforts should be to assess the effectiveness of your current internal controls and information management processes. Lotus Workplace for Business Controls and Reporting provides an organized approach to identify potential issues. By automating workflow, the offering helps document and evaluate internal business controls. This documentation helps support the identification of risks and controls and evaluate the effectiveness of these controls. It also links to multiple data sources, even from different vendors, to tell you where content is located and how it is managed. Lotus Workplace for Business Controls and Reporting is a cost effective way to assess controls, with minimal impact on day-to-day operations. For more information on Lotus Workplace for Business Controls and Reporting, visit www.lotus.com/sox Use Tivoli solutions to address SOX compliance challenges While Lotus Workplace for Business Controls and Reporting focuses on automating the evaluation and assessment of business controls, the Tivoli software portfolio helps customers mitigate weaknesses in their organizations’ internal controls. Tivoli software provides a suite of solutions to strengthen internal controls with automated solutions and procedures for financial data and systems, strengthen data retention and help mitigate security risks. Three real-world examples from different industries illustrate how Tivoli integrated offerings have helped enable companies to correct gaps identified by auditors and implement robust, company-wide internal controls that help support their compliance program. Case one — retail chain Internal auditors focus on ineffective controls on updates to financial data The scenario A large retailer hired a Big 4 accounting firm to assess the chain’s internal controls in terms of IT processes around the creation, update, manipulation and use of the financial data for sales, purchasing and accounting. Each of these systems - accounting, sales and purchasing - had its own database. The organization's financial systems used an Enterprise Resource Planning (ERP) software application to manage operational details and create the main financial data and reports for all SEC filings. Internal auditors found excellent controls concerning the organization’s use of financial data through this system. However, after closer analysis of the organization’s behavior and process for updating financial data, the internal audit team identified a significant practice that could impact the integrity of the financial data. Auditors found that the organization used a variety of desktop tools throughout the organization to access, update, create and delete financial data directly in the underlying databases of the ERP system. These actions only required the system user to have an internal user ID and password to authenticate to the database. The organization had no controls over the activity of the user once they were “logged in.” The primary risk focused on activities and access through desktop Microsoft® Open Database Connectivity (ODBC) applications like Microsoft Access, Microsoft Excel and the like. The access and update privileges in these systems were not maintained in the database or at the network level; no controls were in place beyond the requirement for basic authentication. Internal auditors determined that this represented a significant threat to the integrity of the financial data and accountability of the organization’s processes and procedures for reporting financial activity and would require notation on the financial reports left unmitigated. Audit findings
Auditors reported that these unmitigated updates,
inserts and deletions through ODBC presented a significant risk, especially
because the organization had no way to track these transactions. Although the
retailer had security policies in place, inadequate logging neutralized the
ability of these policies to manage risk and preserve the integrity of financial
data. Auditors also reported inadequate internal controls of user ID privileges.
The lack of company-wide, role-based access definitions resulted in multiple
directories Customer’s strategy for mitigation Working with the internal audit team, the customer identified three key IT processes and requirements that would need to be changed to mitigate these findings.
To meet the first challenge — control of financial data updates and changes — the retailer chose IBM Tivoli Access Manager and IBM Tivoli Privacy Manager. Tivoli Access Manager applies a consistent access policy that spans crucial financial systems, including controls that help prevent overrides from local administrators. In addition, the organization selected Tivoli Privacy Manager to help apply the organization’s “Information Classification and Control” standard to financial data. Tivoli Privacy Manager would be used to intercept all system calls to the financial systems data, offering a layer of protection around the financial systems databases. This “database proxy” approach would allow the organization to control who could update, delete or create financial data at a transaction and data level. Integrating Tivoli Access Manager and Tivoli Privacy Manager would control access and updates to the financial systems data by evaluating the user’s access and update privileges and the system call initiated against the financial data — to control activity of the ERP system and ODBC access to the financial databases. It also creates an audit trail of who accessed what system and when, allowing access and updates to be monitored efficiently. Tivoli Privacy Manager authorizes access based on specific use, data and purpose criteria of each transaction and creates a granular audit trail down to individual data items. Automated access control and tracking helps minimize the time and cost of manual review and creates a clear link between the organization’s policy, procedures and standards for IT activity and updates to financial systems. The second objective was to help strengthen the organization’s controls over the creation of user IDs and their privileges for IT system activity. The customer selected IBM Tivoli Identity Manager to create an identity management life-cycle framework of controls and segregation of duties for user IDs and access privileges. Tivoli Identity Manager automates the creation of user IDs and the association of system privileges and can include a workflow process that allows a segregation of duties for access to sensitive systems such as financial reporting systems. The organization created a role-based access policy and used Tivoli Identity Manager to implement this policy consistently across all IT systems in the organization. In addition, they were able to help prove conformance to the organization’s policies and maintain compliance with these policies and standards through the use of the Tivoli Identity Manager automated user ID account reconciliation process. This helped the organization verify that there were no user IDs with excessive system privileges and no user IDs that were not tied to real users of the organization, enabling the organization to ensure that all access to financial systems would be based on corporate policy, as well as provide an audit trail of creation of user IDs and who approved the association of privileges for access to financial systems. This helped the organization provide consistent association of system privileges enterprise wide. As with most organizations today, different authoritative sources existed for existing users and user accounts. IBM Tivoli Directory Integrator helped identify these different authoritative sources for user account attributes, including the organization’s HR systems and ERP system, and consolidate access into a single virtual repository. By creating a single, reliable source of information on individual users and their access rights, Tivoli Directory Integrator enforces role-based privileges to help protect data from unauthorized access throughout the organization. The third objective was to increase the quality of the logging and reporting infrastructure of the key IT systems that could impact the quality of the financial reporting. The focus was on creating a strong link between the organization’s policy and standards around access and updates to the financial systems and the user accounts allowed to implement transactions within those systems. The customer’s strategy was to use Tivoli Identity Manager logs to collect the secondary approvals to associate access privileges with the financial systems and log the conformance determination of all access and updates to the financial data. By consolidating the evaluation of conformance, logging and reporting, the organization could reduce its ongoing audit costs for evaluating the effectiveness of its internal controls and clearly link its policy and standards to the IT systems activity. Case two — insurance company Internal audit focuses on risk management and accountability The scenario A regional insurance company’s internal auditors examined the organization’s risk management and IT security controls as a part of its SOX compliance program efforts. As with many other financial service firms, the company has an office of risk management and a separate office for security management. As the company started its SOX internal audit, these two offices started to examine their existing controls and monitoring systems that support their IT operational processes as part of an overall IT risk and regulatory compliance assessment. The first task undertaken by the internal audit team was the development of an inventory of IT audit logs and IT security event audit logs. While internal auditors developed this inventory, they also collected the status of the subject system for conformance to the organization’s standards for audit logs, security and operating system and application configuration baseline. In addition to the application systems, they identified all of the dedicated security controls including the firewall, intrusion detection systems and remote access points. Each of these systems creates logs, identifies security risk events and records them in the system audit log and reports. This inventory became quite large because the team identified all of the agent offices directly connected to the company’s internal systems over high-speed Internet connections. The inventory revealed that most of the security controls had implemented various standards inconsistently, and many of the systems did not use the company’s baseline configuration standards or the retention standard for audit logging data. It became clear to the internal audit team that the IT processes for examining threats and risks to the enterprise systems were ineffective and inconsistent. Many of the systems and security control alerts were never noticed or examined by the security team. In addition, these logs and reports from the security systems often were not examined as a part of its annual IT assessment. The company used these findings to drive the development of a new IT risk analysis process. As a part of this new process it also created the requirement that all audit logs be centrally integrated and retained for a consistent period of time online and then archived for several years. The organization had stringent security standards with clear configuration definitions for its servers, firewalls and other security devices — based on risks associated with the threats to the confidentiality and integrity of sensitive data, including financial data and customer records. However, the company had no central data collection or report processes to track security risk events centrally, and the existing controls did not adequately pinpoint sources of data access or changes. The company had no way of knowing which servers complied with configuration standards and had no process for updating systems. For example, if Microsoft issued a patch for Microsoft Windows® 2000 or Microsoft Windows NT®, the insurance company could not track which servers had installed the patch or when it had been applied. Audit findings The organization’s internal auditors found that the lack of an enterprise-wide risk management process and lack of IT technology to help manage conformance to the organization’s standards and policies made the existing standards program ineffective. In many ways, the illusion of security created more risk. Data could be compromised — or lost — without detection, because the company did not consistently monitor security alerts or system access. Auditors made four primary findings around these issues and made several recommendations including:
The security and risk management team evaluated the findings and recommendations from the internal audit team and developed a strategy designed to accomplish four key objectives:
The first step was to replace the diverse identification and authentication system with IBM Tivoli Access Manager for e-business and IBM Tivoli Access Manager for Operating Systems on the company’s UNIX® boxes. The security and risk management team implemented a common LDAP directory containing user credentials for all registered and authorized users of any enterprise system. This included credentials for all independent agents of the company. With this software the company could implement a common authentication standard and easily integrate the credential information into their diverse systems. In addition, this credential information would be used to identify users who create, approve and manage system change requests. It would also be used by various systems to record activity in system audit logs. The second phase of the remediation program included using two key Tivoli software tools to help track and manage access and disclosure of sensitive data types to work towards the goal of developing the centralized logging infrastructure. The customer selected the Tivoli Access Manager family of software and Tivoli Privacy Manager to create audit logs of all system access to privileged operations on the large UNIX systems and to sensitive data types stored on those systems. Tivoli Privacy Manager audit logs and all other security device logs and system logs would be collected and analyzed for potential risks and threats by IBM Tivoli Risk Manager. Tivoli Risk Manager collected security alerts across the company and reported the events to a central location for analysis. Once the activity could be recorded and analyzed through the audit logging and risk management system, the third phase of the project was started: develop and implement an enterprise technology change control system and procedures. The development team targeted two primary technology domains. The first was the configuration of each operating platform. The objective was to reduce risks associated with excessive privileges, misconfigured systems for security standards and rapid deployment of security patches and configuration changes that may be identified through the risk management system. The customer selected Tivoli Configuration Manager and IBM Tivoli Compliance Manager to address these needs and implement the change management system. To address the need for servers being updated in a timely manner, the insurance company chose Tivoli Configuration Manager. This solution allows IT to control the implementation of patches and updates. By managing the rollout process, Tivoli Configuration Manager provides the ability to test, approve and implement changes to servers from one location, verifying that every server has the same configuration. As an additional anticipated benefit, the technology support organization expected to substantially reduce the number of help-desk calls from agent offices requesting help in resolving misconfigured systems. The enterprise operational team would have a clear view into the status of all systems and be able to track and manage the rollout of patches and system upgrades across the enterprise and across all of the remotely connected agent offices. Logs from these three primary systems — audit logging and reporting, the risk management system and change management system — would be archived by the new storage management system based on Tivoli Storage Manager. The policy-based implementation of backup and archival processes allowed the organization to implement a new data retention policy across all systems and leverage the investment in a centralized, consistent system. The company decided to implement all three projects at the same time, staggering them by several weeks. Each project would first be implemented in their system testing lab and policies refined as needed. Once the policy and system configuration was stabilized and reviewed by the internal audit team, the organization would begin to roll out the new enterprise infrastructure. This inclusion of internal audit helped bridge IT management, security management and risk management offices. The company’s expectations for this new capability went beyond SOX program support to include better risk management and support for other legal and regulatory compliance programs. Case three — regional bank Data retention without data management The scenario An assessment for a regional bank revealed that storage management practices were operating independently of the bank’s data retention practices. One of the storage management practices had storage administrators freeing up space by deleting data that had not been accessed in a year. The storage administrators needed alternative cost-effective storage systems for the retention of managed data. Audit findings The bank’s internal auditors recommended a storage system that could prevent the deletion of the data needed for data retention requirements. Customer’s strategy for mitigation The use of IBM TotalStorage® Data Retention 450, which leverages the intelligent capabilities of IBM Tivoli Storage Manager for Data Retention, helps prevent the storage administrators from inadvertently deleting retained data prematurely. Additionally, TotalStorage Data Retention 450 provides a storage platform to address the requirement for cost-effective storage. Tivoli Risk Manager allows management of security incidents from a single Web-based security console. It integrates data from applications, operating systems and network devices to provide real-time visualization and management of security events. By automatically generating incident reports, Tivoli Risk Manager lets the bank quickly identify exposure and take action to fix it. The solution also stores records of security alerts and incidents that prove the effectiveness of security management. The bank enhanced the security of its data by implementing Tivoli Privacy Manager. This solution authorizes access to sensitive data according to specific criteria for data use, data type and transaction purpose. The granular audit trail of Tivoli Privacy Manager logs user access all the way down to individual line items. To extend the data storage capabilities of Tivoli software, the bank added IBM DB2® Records Manager. The DB2 Records Manager solution stores electronic documents in their original formats, so important e-mail and sales activity data are retained as required. Other Tivoli solutions These scenarios represent selected findings related to Tivoli software, but they are by no means comprehensive in describing Tivoli solutions or the complete capabilities of the Tivoli security software portfolio. Tivoli software has been used to help many organizations meet their objectives as a result of various laws and regulations and serves as a business enabler to help reduce the level of effort for integrating systems within an organization and across organizational boundaries. Tivoli products enable management of data, users, transactions and systems based on your company’s business policies. Tivoli security software can help organizations integrate their security controls and automate their security processes. Tivoli software enables organizations to “externalize” controls over their IT systems by implementing a system that contains and manages IT resources by policy. This “externalization” and policy-based control will help organizations establish a direct link between their IT governance policies and standards and the systems they manage. For a detailed description of the Tivoli suite of products, visit http://www.ibm.com/tivoli Addressing your complexity through integrated solutions
IBM solutions include powerful products that integrate seamlessly with one another and with your current applications. IBM solutions provide companies with confidence in their internal controls today and the resilience to respond to future requirements. IBM will work with your company to construct customized solutions quickly and cost-effectively. Appendix: Common IT assessment findings:
This matrix is based on interviews with IBM Business
Partners that perform audits and the experience with IBM
DB2, Lotus, IBM, the IBM logo,
the On Demand Business logo, Tivoli, TotalStorage and WebSphere are trademarks
of International Business Machines Corporation in the United States, other
countries or both. UNIX is a trademark of The Open Group in the United States
and other countries. Microsoft, Windows and Windows NT are trademarks of
Microsoft Corporation in the United States, other countries or both. Other
company, product and service names may be trademarks or service marks of others.
Each IBM customer is responsible for ensuring its own compliance with legal
requirements. It is the customer’s sole responsibility to obtain advice of
competent legal counsel as to the identification and interpretation of any
relevant laws and regulatory requirements that may affect its business and any
actions the customer may need to take to comply with such laws. IBM does not
provide legal advice or represent or warrant that its products or services
ensure compliance with any law or regulation. Software products and services
provided by third parties are sold or licensed under the terms and conditions of
the third-party providers. Product availability, warranty services and support
for third-party products are the direct responsibility of the third-party
providers. IBM is not liable for and makes no representations, warranties or
guarantees regarding third-party products or services.
|