1 Continuous Monitoring of Business Process Controls: A Pilot Implementation of a Continuous Auditing System at Michael G. Alles Gerard Brennan Alexander.

Slides:



Advertisements
Similar presentations
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Advertisements

1 Continuity Equations: Analytical Monitoring of Business Processes and Anomaly Detection in Continuous Auditing Michael G. Alles Alexander Kogan Miklos.
ITAuditing Using GAS & CAATs
Overview of IS Controls, Auditing, and Security Fall 2005.
Auditing Computer-Based Information Systems
Group 3 John Gregory John Marsh Gerri Houston Samantha McNeily.
Auditing Computer Systems
The Islamic University of Gaza
Implementing Continuous Auditing in a Global Real Time Economy Miklos A. Vasarhelyi KPMG Professor of AIS Rutgers University Technology Consultant AT&T.
1. Research Topics for Continuous Auditing Mike Groomer Professor of Accounting and Information Systems Kelley School of Business Indiana University.
The Acceptance and Adoption of Continuous Auditing by Internal Auditors: A Micro Analysis Miklos A. Vasarhelyi Micheal Alles Siripan Kuenkaikaew James.
Miklos A. Vasarhelyi Siripan Kuenkaikaew Silvia Romero
Continuous Auditing Technology Adoption in Leading Internal Audit Organizations Miklos A. Vasarhelyi Siripan Kuenkaikaew.
CHAPTER 10 & 13 IS within the Organization & Acquiring IS and Applications.
Managing Data Resources
Lecture 13 Revision IMS Systems Analysis and Design.
SYSchange for z/OS By Pristine Software April 2009 Thomas Phillips April 2009 SYSchange Pristine Software.
IS Audit Function Knowledge
1 Software Testing and Quality Assurance Lecture 15 - Planning for Testing (Chapter 3, A Practical Guide to Testing Object- Oriented Software)
Evolution of the Siemens Experience in its Effort to Test IT Controls on a Continuous Basis Rolf Haardörfer IT Audit Professional Siemens Corporation Tenth.
Computers: Tools for an Information Age
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
The Information Systems Audit Process
Audit Automation as the Foundation of Continuous Auditing Michael Alles Alexander Kogan Miklos A. Vasarhelyi J. Donald Warren, Jr.
SAFA- IFAC Regional SMP Forum
MIS 175 Spring 2002 Chapter 9MIS Transaction Processing Systems Manual or automatic – all businesses systematically process transactions Function:
Principles and Problems of Audit Automation as a Precursor to Continuous Auditing Michael Alles Alexander Kogan Miklos A. Vasarhelyi.
Information Technology Audit
How Will Continuous Auditing and XBRL-GL Work Together to Provide Improved Business Value? Nigel J. R. Matthews, BASc, CA ACL Services Ltd.
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
1.Database plan 2.Information systems plan 3.Technology plan 4.Business strategy plan 5.Enterprise analysis Which of the following serves as a road map.
Continuation From Chapter From Chapter 1
SEC835 Database and Web application security Information Security Architecture.
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
System Implementation. System Implementation and Seven major activities Coding Testing Installation Documentation Training Support Purpose To convert.
S/W Project Management Software Process Models. Objectives To understand  Software process and process models, including the main characteristics of.
Information Fusion in Continuous Assurance Johan Perols University of San Diego Uday Murthy University of South Florida UWCISA Symposium October 2, 2009.
CST203-2 Database Management Systems Lecture 2. One Tier Architecture Eg: In this scenario, a workgroup database is stored in a shared location on a single.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
(SIA) 14 Internal Audit in an Information Technology Environment Standard should be read in the conjunction with the “Preface to the Standards on Internal.
- 1 - Roadmap to Re-aligning the Customer Master with Oracle's TCA Northern California OAUG March 7, 2005.
Chapter 5 Internal Control over Financial Reporting
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
Implications of Information Technology for the Audit Process
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
IT Service Delivery And Support Week Eleven – Auditing Application Control IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA.
Implementing Continuous Auditing in a Global Real Time Economy Miklos A. Vasarhelyi KPMG Professor of AIS Rutgers University Technology Consultant AT&T.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
SOFTWARE DESIGN.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Lecture 7: Requirements Engineering
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
© 2009 IBM Corporation Maximize Cost Savings While Improving Visibility Into Lines of Business Wendy Tam, CDC Product Marketing Manager
1 Continuity Equations: Analytical Monitoring of Business Processes in Continuous Auditing Michael G. Alles Alexander Kogan Miklos A. Vasarhelyi Jia Wu.
Data Analytics – A Cost Effective Approach to Reducing Operating Costs Automatically “find what matters” in the data from building equipment systems and.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
 System Requirement Specification and System Planning.
Managing Data Resources File Organization and databases for business information systems.
What we mean by Big Data and Advanced Analytics
The Holmes Platform and Applications
N-Tier Architecture.
Developing the Overall Audit Plan and Audit Program
Auditing Information Technology
The Systems Engineering Context
Audit Automation as the Foundation of Continuous Auditing
Defining Internal Control
Types of CAATs Session 3.
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Overview Activities from additional UP disciplines are needed to bring a system into being Implementation Testing Deployment Configuration and change management.
Presentation transcript:

1 Continuous Monitoring of Business Process Controls: A Pilot Implementation of a Continuous Auditing System at Michael G. Alles Gerard Brennan Alexander Kogan Miklos A. Vasarhelyi

2 IT-enabled Business Processes (BPs) A business process is “a set of logically related tasks performed to achieve a defined business outcome,” Davenport and Short (1990). Modern information technology makes it possible to measure and monitor business processes at the unprecedented level of detail (disaggregation) on the real-time basis. Continuous auditing (CA) methodology can utilize the IT capability to capture BP data at the source and in the disaggregate and unfiltered form to achieve more efficient, effective and timely audit.

3 Two Approaches Towards Continuous Auditing of BPs The environment of highly automated and tightly- coupled BPs (e.g., an integrated enterprise system) enables CA based on continuous monitoring of process control settings. Unfortunately, there are numerous enterprise environments where process controls are either not automated or their settings are not readily accessible. In environments such as loosely-coupled legacy data processing systems, automated audit procedures of CA have to be data-oriented (tests of details and analytical procedures).

4 Ways of Verifying Existence, Correctness and Functioning of BP Controls Verifying that the observations of a BP agree with the existence, correctness and functioning of a control; benefit - can be applied even if controls are not directly accessible by the auditor; problem - the observed behavior of the BP may not completely cover the whole range of control functions. Verifying by executing a prohibited BP behavior that it either cannot happen or is detected and compensated for; problem - auditor has read-only access to the production system and cannot run “penetration testing”. Verifying that retrieved control settings stored in the enterprise system match the benchmark; problem - relies on the assumption that the programming code of the control in the production system is correct (customization).

5 Conceptual View of Continuous Monitoring of BP Control Settings The environment of highly automated and tightly-coupled BPs enables CA based on continuous monitoring of business process control settings. Online access to automated BP control settings (available in ERP systems) from the continuous assurance system. Enterprise-dependent benchmarks of acceptable control settings. Frequent (e.g., daily, hourly) comparison of actual settings with the benchmarks. Automatic generation of alarms in case of critical deviations, such as individual accounts without passwords, aggregation of weaknesses in certain control areas (e.g., segregation of duties).

6 Pilot Implementation of CMBPC Systems by Siemens IT Internal Audit CA/R/Lab approached by Siemens IT internal audit to explore use of CA methodology to streamline audit of SAP system controls at Siemens USA. Siemens is uniquely SAP enabled with 60+ applications in the USA alone. IT internal audit examines sites on a 2 year cycle: labor intensive, costly. Internal audit needed to find resources to take on 404 implementation without increase in headcount.

7 CA Value Proposition as Seen by Siemens

8 Siemens Pilot Leverages Audit Action Sheets of External Auditor Key success enabler for pilot is the ability to use AASs provided by KPMG (Germany). Provides template for CA analytics: 1. No need to reinvent the wheel. 2. Immediate buy in from relevant parties. 3. Satisfies external auditor AASs: need to determine which ones can be CA- enabled. AASs included a mixture of tasks some of which could only be accomplished by a human, such as: –interviewing the client about their reconciliation procedures; while some others involved well-scripted interactions with the client’s enterprise system such as: –execute a certain SAP R/3 transaction and/or report and verify that its result is as specified.

9 Audit Action Sheet Example

10 AAS Procedure and Rating

11 AAS Formalization

12 Existing IT Audit Procedures at Siemens

13 Steps of Piloting a CA Implementation Determining the best mode for the continuous monitoring of the chosen BP controls. Developing a system architecture for this task (either a monitoring and control layer or an embedded audit module). Designing the interaction and integration between the CA mechanism and the ERP system. Developing guidelines for the formalization of the AAPs into a computer executable form, including the determination of those AAPs which are automatable and those requiring reengineering. Creating processes for managing the alarms generated by the automated CA system and putting in place the required set of audit trails. Formulating a change management plan to move the project from the pilot stage to industrial strength software.

14 System Architecture for Continuous Monitoring of BP Control Settings Continuous assurance system: Embedded audit modules (EAMs) vs. independent control and monitoring layer (CML). EAMs are tightly coupled with the enterprise system  1)can be triggered by suspicious events, but 2)are intrinsically more vulnerable to manipulation. CML relies on remote (read-only) access to the enterprise system  1)its code and environment are well-protected, but 2)can’t query the enterprise system too often, and therefore may miss suspicious enterprise events. CML implementation is less reliant on the cooperation of the enterprise personnel.

15 Interaction of CA System with ERP System Modern enterprise systems have a 3-tier architecture (presentation, application, database). CML can query the system through the application tier using its APIs (e.g., BAPIs in SAP R/3); or EAM can be implemented as a sub-module of the application (e.g., Coded in ABAP in SAP R/3). CML can query the enterprise database directly (using SQL through ODBC); or EAM can be implemented as a trigger (written in SQL) stored in the database. The latter approach is strongly resented by enterprise personnel and (in the case of EAM) de facto prohibited by enterprise software vendors.

16 Enterprise System Presentation Tier Application Tier Database Tier Internet CMBPC System Program Logic and User Interface Database of System Settings and Audit Trail Architecture of Generic CMBPC System

17 Pilot CMBPC System at Siemens

18 Siemens Audit Leverage Tool SALT The SALT pilot was prototyped using the formal Siemens SAP audit process in the basis area (the application layer operating system for SAP) covering the application level controls applicable to any SAP system. 12 AASs were chosen as representative of challenges in formalizing and reengineering. SAP E-audit download provided sample data for the model. The pilot was developed in Visual Basic to serve as a test environment for evaluating technical research questions regarding continuous auditing / assurance.

19 Screenshots from SALT

20 Reengineering and Formalization in CA Implementation Implementation of CMBPC starting with a clean slate is the most logical and efficient solution, BUT – impractical – clearing it with external auditor presents tremendous complications and delays. Automation requires formalization of AASs some of which are formalizable while others are not (such as those that require human observation of BPs and interviewing enterprise personnel). Unavoidability of reengineering stems from the necessity for the formalizable and non-formalizable parts of the audit program to be identified and handled separately. Formalizable procedures are to be separated out, automated (by two experienced auditors!) and executed with high frequency. Formalization creates uniformity and assures that every implemented procedure is state of the art.

21 Control and Alarm Hierarchy and Its Management Organization of controls: identify risk areas, break them down into sub-areas, and develop controls to eliminate or mitigate these risks  enterprise controls form a top-down hierarchy. Active component of CMBPC– automatically triggered audit alarms; critical – exception conditions to trigger alarms. Problem associated with the automatic generation of alarms in CMBPC – the alarm flood: either initial flood or overly conservative benchmarks. The alarms form a hierarchy corresponding to and derived from the control hierarchy  hierarchical alarm management. “Enabled/disabled” alarm flag; “disabled” in a node overrides the settings in all the children nodes down the hierarchy tree. The set of alarm recipients specified in a node applies by recursion to all the children nodes down the hierarchy tree.

22 Developers of Continuous Monitoring Software Three main categories: enterprise software vendors, large public accounting firms, and established audit software vendors. Enterprise software vendors traditionally provided very limited CM capabilities within their systems (e.g., SAP’s Audit Information System); often quoted reason – lack of demand (assurance does not contribute directly to the bottom line!). Large public accounting firms have been experimenting with CM software (e.g., KPMG’s KOLA), but remain ambivalent (and question the value proposition, ROI, …).

23 Developers of Continuous Monitoring Software - II Established audit software (CAAT) vendors have domain knowledge and well-developed libraries of audit tests, and see an opportunity to leverage this intellectual property in the emerging field of CA (e.g., ACL Continuous Controls Monitoring solution for purchase-to-payment cycle). SarbOx has created a window of opportunity to sell CA software as a Section 404 compliance tool. Large internal audit shops have been implementing ad-hoc CA-type procedures to mitigate business risks in certain high impact areas, and to achieve labor savings due to automation of audit tasks.

24 Continuing Work Developing a methodology for formalizing audit procedures. Extending CA higher up the audit value chain—dealing with auditor judgment. Managing audit alarms and preventing alarm floods. Establishing ROI from the pilot. Scaling up to the production level. Technology is available, laws and standards are (mostly) in place, time is now. How to make it worthwhile (trade-off between cost, effectiveness, efficiency and timeliness)?