Download as pdf or txt
Download as pdf or txt
You are on page 1of 82

[

Control Testing in SAP


IT, Financial and Operational
Richard Fowler, CISA, CIA
Larry Panayi, CISA

Huntington Ingalls
Northrop Grumman

[ Learning Points
Understand how to assess and test the SAP technology
infrastructure
Understand how to assess and test the SAP General
Ledger and other financial reporting modules
Understand how to assess and test SAP production,
planning and procurement modules.

Real Experience. Real Advantage.

[ Return on Investment
Our basic assumption is that, if your organization is
running SAP, then you are large enough, complex
enough, or savvy enough to also have an internal audit
function.
Auditors need to know how to conduct a more effective
application review of SAP, and should understand the
infrastructure, key operations, and configuration.
By ensuring that the auditors know how to properly focus
on the key controls as they conduct audits in SAP, the
business can be assured of minimizing the time needed to
support the audit.
Real Experience. Real Advantage.

[ Best Practices
Audits of SAP are performed to provide assurance that
the financial data is correct and that the organization can
rely on the information and processing within SAP
Learn a methodology for testing and specific test steps
that can be used for any number of SAP audits, including
but not limited to SOX testing, general computer control
testing, application control testing, and financial report
testing
Use and modify sample audit programs to enhance SAP
testing

Real Experience. Real Advantage.

[ Who We Are Huntington Ingalls


Over a century designing, building,
overhauling and repairing ships for the
U.S. Navy, the U.S. Coast Guard and
world navies
The nation's sole industrial designer,
builder and refueler of nuclear-powered
aircraft carriers
One of only two companies capable of
designing and building nuclear-powered
submarines

Have built over 40 percent of the U.S.


Navys current surface combatant fleet

ERP Used: SAP ECC 6.0 & ECC 5.0


5

Real Experience. Real Advantage.

[ Who We Are Northrop Grumman


Northrop Grumman Corporation (NYSE: NOC) is a leading global security
company providing innovative systems, products and solutions in
aerospace, electronics, information systems, and technical services to
government and commercial customers worldwide.

ERP Used: SAP ECC 6.0


6

Real Experience. Real Advantage.

[ Agenda
SAP from a business perspective
What SAP does for the user community

SAP from a technology perspective


Typical landscape
Business Impact and Risk

Auditing the business side COSO, IIA guidance


General ledgers, financial statements, billings
Operations: production planning, procurement

Auditing the technology side ISACA, COBIT guidance


Application/General computing controls
Configuration settings (IMG)

Developing the audit program


Questions and comments
Real Experience. Real Advantage.

[ SAP from a business perspective


SAP can address almost every aspect of every business:

Financial Accounting (FI)


Controlling (CO)
Asset Management (AM)
Materials Management (MM)
Sales and Distribution (SD)
Quality Management (QM)
Plant Maintenance (PM)
Human Resources (HR)
Supply Chain Management (SCM)
Customer Relationship Management (CRM)
Governance, Risk & Compliance (GRC)

Real Experience. Real Advantage.

[ SAP from a business perspective


Which business areas rely on controls?

All of them, of course, but


Are those controls effective?
Are they efficient?
Are they warranted?
SAP is configured out of the box to provide a good level
of basic controls for the business user and management

Real Experience. Real Advantage.

[ SAP from a business perspective


Thats where the auditors come in, to test the controls

The tests should ensure that the controls are effective,


that is, verify that they designed to actually mitigate risks
The tests should also ensure that controls are efficient,
that is, verify that they are actually mitigating the risks
In some cases, auditors can identify excessive or
redundant controls that can be eliminated
Lets briefly go through how to test these controls

Real Experience. Real Advantage.

10

[ SAP from a business perspective


Dos
Incorporate a top down approach
Document what you do, why, and your conclusions
Be specific about remediation timelines & responsibilities

And Donts
Forget to document and retain test procedures
Neglect testing tests of design and tests of effectiveness
Fail to conclude on your findings

Real Experience. Real Advantage.

11

[ SAP from a business perspective - Finance


Identify Significant Accounts and Processes

2011
Balance
Sheets

Document Processes & Controls

Analyze the controls


efficiency and
effectiveness

Financial
Implications

Financial
Statements

Significant
Accounts
Process
Implications

Inherent and Key


Business Risks

Significant
Processes

What can go
WRONG?

Managements
Assertions

Internal Controls

Real Experience. Real Advantage.

Evaluate & Monitor

And, of course, report

12

[ SAP from a business perspective - Finance


OK, so which accounts are significant?

Select them based on:


Errors of importance
*
Size and composition
(Acct Balances: FS10, F.08)
High transaction volume (Line Items: F.42, FB09D, FBL1N)
Transaction complexity
Subjectivity in determining account balance
Nature of the account
(Suspense accounts, reserve accounts)

* Errors that individually or collectively could have a material effect on the financial
statements Revenue Recognition (VF45, VF47), Goodwill Valuation (CX67)

Real Experience. Real Advantage.

13

[ SAP from a business perspective - Finance


With the accounts identified, lets see

What can go wrong?:


Errors of importance
Restatement, significant deficiencies
Size and composition
Inability to effectively analyze data
High transaction volume Data noise, difficult to distinguish trends
Transaction complexity Hidden errors
Subjectivity in determining
account balance
Non-compliance with GAAP and/or IFRS
Nature of the account
Fraud

Real Experience. Real Advantage.

14

[ SAP from a business perspective - Finance


So what is in place to mitigate the risks?

Internal Controls:
Errors of importance
Management review, executive approval
Size and composition
SAP configuration
High transaction volume SAP configuration
Transaction complexity SAP configuration
Subjectivity in determining
account balance
SAP configuration
Nature of the account
SAP configuration

And THATs what SAP does for the financial user.

Real Experience. Real Advantage.

15

[ SAP from a business perspective Material planning


Identify Material Needs

Document Processes & Controls

Evaluate & Monitor

Analyze the controls


efficiency and
effectiveness

Contract
Specifications

Material
Requirements

Inventory
on Hand

Scheduled
Delivery

Work in
Progress

Material Requirements
Planning

What can go
WRONG?

Budget

Internal Controls

Real Experience. Real Advantage.

And, of course, report

16

[ SAP from a business perspective Material planning


So what are we concerned with in material procurement?

Key objectives:
Material identification
(MB51)
Material need date
(Part of PO, see ME23N)
Inventory on hand
(MB03)
Warehouse availability (LS03)
Matl req planning
(MD04)
Scrap / excess inventory (WAM03)

Real Experience. Real Advantage.

17

[ SAP from a business perspective Material planning


With the material processes identified, lets see

What can go wrong?:


Material identification
Wrong material, contract violation, liability
Material need date
Schedule delay
Inventory on hand
Excess material ordered
Warehouse availability Lost material, insufficient storage space
Matl req planning
Shelf life expires, material not available
Scrap / excess inventory Waste, unnecessary costs, fraud

Real Experience. Real Advantage.

18

[ SAP from a business perspective Material planning


So what is in place to mitigate the risks?

Internal Controls:
Material identification
Engineering / management review
Material need date
Engineering / management review
Inventory on hand
SAP Configuration
Warehouse availability SAP Configuration
Matl req planning
SAP Configuration
Scrap / excess inventory SAP Configuration

And THATs what SAP does for the planning, procurement


and material user.

Real Experience. Real Advantage.

19

[ Agenda
SAP from a business perspective
What SAP does for the user community

SAP from a technology perspective


Typical landscape
Business Impact and Risk

Auditing the business side COSO, IIA guidance


General ledgers, financial statements, billings
Operations: production planning, procurement

Auditing the technology side ISACA, COBIT guidance


Application/General computing controls
Configuration settings (IMG)

Developing the audit program


Questions and comments
Real Experience. Real Advantage.

20

[ SAP from a technology perspective - Landscape


Ideally, in an SAP environment, a three-four system
landscape exists. This consists of the Sandbox,
Development, Quality Assurance and the Production
Server.
The objective
of design is to
enhance
"configuration
pipeline
management".

Real Experience. Real Advantage.

21

[ SAP from a technology perspective - Business


Impact and Risk
Improper configuration of SAP could result in an inability
for the enterprise to execute its critical processes.
Risks resulting from ineffective or incorrect configurations
or use of SAP could result in some of the following:

Disclosure of privileged information


Single points of failure
Low data quality
Loss of physical assets
Loss of intellectual property
Loss of competitive advantage
Loss of customer confidence
Violation of regulatory requirements

Real Experience. Real Advantage.

22

[ Agenda
SAP from a business perspective
What SAP does for the user community

SAP from a technology perspective


Typical landscape
Business Impact and Risk

Auditing the business side COSO, IIA guidance


General ledgers, financial statements, billings
Operations: production planning, procurement

Auditing the technology side ISACA, COBIT guidance


Application/General computing controls
Configuration settings (IMG)

Developing the audit program


Questions and comments
Real Experience. Real Advantage.

23

[ Auditing the business side COSO, IIA guidance

The COSO cube has been used as an auditing model


since its initial release in 1993.
Real Experience. Real Advantage.

24

[ Auditing the business side COSO, IIA guidance

There is also a COSO model for use with organizations


with an enterprise risk management framework.
Real Experience. Real Advantage.

25

[ Auditing the business side COSO, IIA guidance


Regardless of the model used, COSO recommends a
risk-based approach to auditing.
The IIA supports this approach, and has included it in
their International Professional Practices Framework.
There are proposed changes to both the COSO
framework and the IPPF standards, but no significant
changes to the audit approach or fieldwork standards.

Real Experience. Real Advantage.

26

[ Auditing the business side COSO, IIA guidance


GTAG 8, Auditing
Application Controls, is
provided by the IIA as
guidance.
It can be used to help
map the key controls to
the appropriate SAP tests.
Designed for looking at
application controls, the
same approach can be
used for manual controls, embedded controls, hybrid, etc.

Real Experience. Real Advantage.

27

[ Auditing the business side Financial


Going back to the Financial risks and controls, we had:

Errors of importance Management review, executive approval


Size and composition SAP configuration
High transaction vol. SAP configuration
Transaction complexity SAP configuration
Subjectivity in determining
account balance
SAP configuration
Nature of the account SAP configuration

Real Experience. Real Advantage.

28

[ Auditing the business side Financial


How can we test the effectiveness of the management
reviews and executive approvals that prevent or detect
errors of importance?
Manual test obtain a sample of managements account
reviews and verify
1. that the reviews are routinely performed
2. through inquiry what is being reviewed
3. that errors, when noted, are corrected
No, its not specific to SAP but we wanted to be complete.

Real Experience. Real Advantage.

29

[ Auditing the business side Financial


How can we test the effectiveness of the SAP configuration
that controls or limits account size and composition?
The IMG (t_code SPRO) has detailed configuration settings for a
number of account types:
G/L, A/R, A/P, bank accounts, asset accounts, lease accounts, retail
ledger accounts, special purpose accounts, customer accounts,
vendor accounts, material accounts, etc. There are a lot of types.
The configuration settings can limit what transactions can be posted
to an account (via the posting key), what roles can post or edit
information (via permissions).

Real Experience. Real Advantage.

30

[ Auditing the business side Financial


What if there are no configured limits to account size and
composition?
We can use FS10N to get details of a single account, or F.08 to get a
series of accounts. Download the results for separate periods to
assess month-to-month changes (horizontal analysis) or year-to-year
(vertical analysis).
Determine by comparison whether the account has an unusual size
(account balance greatly increased or decreased) based on other
months and/or years.

Real Experience. Real Advantage.

31

[ Auditing the business side Financial


How can we test the effectiveness of the SAP configuration
that controls or limits account transaction volume?
As before, the IMG (t_code SPRO) has detailed configuration settings,
particularly for automatic posting.
If there are automatic postings or payments, review the configuration
settings with the financial or accounting manager to understand the
critical processes (theres probably a lot in OMR6).
Use t_code F110 to review automatic payment parameters, and also
t_code F822 to review automatic payment blocks.

Real Experience. Real Advantage.

32

[ Auditing the business side Financial


How can we test the effectiveness of the SAP configuration
that controls or limits account transaction complexity?
Again, the IMG (t_code SPRO) has detailed configuration settings, and
here wed be looking for document types.
Most account transactions will need only a limited number of
document types. If there are no limits established, it will be easier for
an incorrect transaction to be posted.
To test the accounts document types, run FS10N or F.08 as before
and download the data. Use Excel to find any odd or unusual
document types, and in SAP drill down to see what they are for and
whether they were posted properly. (You can usually get someone in
Accounting to help with this determination.)

Real Experience. Real Advantage.

33

[ Auditing the business side Financial


How can we test the effectiveness of the SAP configuration
that controls or limits transaction amounts?
For a change, lets look at the IMG (t_code SPRO) for the detailed
configuration settings, this time for tolerance limits (OMR6).
Verify that there are limits established, especially for automatic
payments (e.g., 3-way match).
To test the tolerances, look at MRBR to see if there are any
transactions that have been blocked or being outside the tolerance
limits. Inquire as to how these issues are resolved, and look for
documentation of cleared blocks in the past.

Real Experience. Real Advantage.

34

[ Auditing the business side Financial


How can we test the effectiveness of the SAP configuration
that controls or limits the type of account being used?
Finally, lets look at the IMG (t_code SPRO) for one more detailed
configuration setting, this time for account groups (OBD4).
Determine which accounts are associated with which account groups.
To test the settings, determine what field(s) define the account group.
Use FS10N or F.08 to verify that the fields for a given period either
have or do not have the values established, and there you have it.

Real Experience. Real Advantage.

35

[ Auditing the business side Material planning


Going back to the material management risks and controls,
we had:

Material identification
Material need date
Inventory on hand
Warehouse availability
Matl req planning
Scrap / excess inventory

Real Experience. Real Advantage.

Engineering / management review


Engineering / management review
SAP Configuration
SAP Configuration
SAP Configuration
SAP Configuration

36

[ Auditing the business side Material planning


(We may go through these fast, or even skip them all, based on time.)

How can we test the effectiveness of managements reviews


of material identification and/or material need dates?
Material is usually identified initially on a drawing before it is loaded
into SAP or other production system to generate a Bill of Material.
Drawings should all show the preparer and reviewer/approver. If
there is a change management process in place, you can check the
files to see if material changes are also approved and by whom.
Material need dates are going to be based on several factors, such as
economic ordering quantity, first assembly schedule date, labor
resource availability, etc. Discuss with engineering and planning
management how the first need date is established.
Not very SAP dependent, but included for completeness.
Real Experience. Real Advantage.

37

[ Auditing the business side Material planning


How do we know what material is already in inventory?
We want to verify that material is not being ordered when its already
available. Transaction MB52 is great for this. Transaction MB03 or
IWBK can help.
Look at a sample of recent material purchases. Note the need dates
and the quantities, as well as any special requirements that may be
included as part of the PO.
Look up the material in SAP. MB52 will tell you how much is on hand
now. With MB03, you can drill down to find material movements and
where the material is located. With IWBK, you can get an overview of
the availability of material.
This will help you identify unnecessary orders or verify that the
material planning is adequate.
Real Experience. Real Advantage.

38

[ Auditing the business side Material planning


How can we determine if the MRP process is functioning
effectively?
MRP is part of the production planning module (PP), and involves
capacity planning, cost estimates, resource planning, scheduling, bills
of material, etc. This is a full audit by itself, not just an audit step.
We can, however, spot check some attributes to see if there are
issues. Transaction CS03 displays a bill of material (my company has
modified this into a ZBOM transaction to suit our own requirements). CS15
lets us know where else similar material is being used.
More detailed planning can be viewed using MCP1 to view SAPs
operational analysis based on material, plant, work center and date
ranges. We can assess the MRP controllers effectiveness using
MCP5 (actually used for material analysis). MD05 displays the MRP
list, which is also useful.
Real Experience. Real Advantage.

39

[ Auditing the business side Material planning


How can we assess processes to scrap excess material?
Material can be damaged, use-by dates can expire, specifications can
be out of date all situations that make material unusable.
Scrapping is a material movement, so transaction MIGO_GI (or
MB1A) is used with movement type 501, 551, or 555. We can use
MIGO_TR (or MB1B) to get a list of material meeting these
movement types.
There should be some documented local procedures that define
specific requirements for scrapping material. After all, thats an
avenue for fraud and we want to minimize that. Review the
procedures and then sample the material listed from above. Verify
that the requirements have been met.

Real Experience. Real Advantage.

40

[ Agenda
SAP from a business perspective
What SAP does for the user community

SAP from a technology perspective


Typical landscape
Business Impact and Risk

Auditing the business side COSO, IIA guidance


General ledgers, financial statements, billings
Operations: production planning, procurement

Auditing the technology side ISACA, COBIT guidance


Application/General computing controls
Configuration settings (IMG)

Developing the audit program


Questions and comments
Real Experience. Real Advantage.

41

[ Auditing the technology side ISACA - COBIT


guidance
ISACA Controls Framework
COBIT is an IT governance framework and supporting
tool set that allows managers to bridge the gap among
control requirements, technical issues and business risks.
COBIT enables clear policy development and good
practice for IT control throughout enterprises.
Utilizing COBIT as the control framework on which IT
audit/assurance activities are based aligns IT
audit/assurance with good practices as developed by the
enterprise.

Real Experience. Real Advantage.

42

[ Auditing the technology side ISACA - COBIT


guidance
Application controls
Controls embedded in financial and business applications
to prevent or detect unauthorized transactions
Controls to ensure the completeness, accuracy and
validity of processing transactions
Includes controls such as:
Balancing control activity within the system
Check digits
Predefined data listings
Data reasonableness tests
Logic tests, range limits, etc.
Real Experience. Real Advantage.

43

[ Auditing the technology side ISACA - COBIT


guidance
General computer controls
Controls to ensure the proper development and
implementation of applications, the integrity of program
and data files and of computer operations

Includes controls such as:


Logical access over infrastructure, applications, and data
System development life cycle
Program change management
Data center physical security
System and data backup and recovery
Computer operation
Real Experience. Real Advantage.

44

[ Auditing the technology side ISACA - COBIT


guidance
Automated testing of automated controls
SAP GRC Compliance Calibrator
SAP Solution Manager
Included SAP functions: SU22, SU24, SUIM,
SE16N, SAP logs, SAP reports (eg, RSPARAM)

Third-party solutions for control testing

(there are others)

Approva BizRights
ACL Direct Link
I-DEAS
Cognos
WinShuttle

Real Experience. Real Advantage.

45

[ Auditing the technology side ISACA - COBIT


guidance
Changes to master data have been authorized
Customer master data, use tcode OV51 (also accessible
using transaction code SA38 and program RFDABL00) to
generate a list denoting the date and time of change, old
and new values for fields, and details of the user who input
the change

User access to create and maintain customer, material


and pricing master data is appropriate
Customer master data - tcodes FD01/FD02/FD05/FD06
(Finance), VD01/VD02/VD05/VD06 (Sales),
XD01/XD02/XD05/XD06/XD07/XD99 (Central)
Material master data - tcodes MM01 (Create), MM02
(Change), MM06 (Delete)
Pricing master data - tcodes VK11 and VK12
Real Experience. Real Advantage.

46

[ Auditing the technology side ISACA - COBIT


guidance
COBIT References PO4
Ensure there is an appropriate segregation of duties/
incompatible functions (SUIM, SE16, USOBT, AGR_USERS)

Basis administration
Transport/import
Develop program change
Develop role change
User security administration
Change monitoring
User testing
Authorize change
Perform change

Real Experience. Real Advantage.

47

[ Auditing the technology side ISACA - COBIT


guidance
COBIT References DS4, DS5, DS9, DS12
Access to information and information systems is authorized
Information systems processing is protected physically from
unauthorized access and from accidental or deliberate loss
or damage
Information processing can be recovered and resumed after
operations have been interrupted
Critical user activities can be maintained and recovered
following interruption
Configuration changes are made in the development
environment and transported to production
Changes to critical number ranges are controlled

Real Experience. Real Advantage.

48

[ Auditing the technology side ISACA - COBIT


guidance
COBIT References AI6, DS5, DS13, PO4
Access to system and customizing tables is narrowly
restricted
Application modifications are planned, tested and
implemented in a phased manner
Customized ABAP/4 programs are secured appropriately
Batch processing operations are secured appropriately
Critical and sensitive transaction codes are locked in
production
Strong password management for system users
SAP Router is configured to act as a gateway to secure
communications
Remote access by software vendors is controlled adequately
Real Experience. Real Advantage.

49

[ Auditing the technology side ISACA - COBIT


guidance
COBIT References - DS5, PO2
SAP ERP Remote Function Call (RFC) and Common
Programming InterfaceCommunications (CPI-C) are
secured
Technology infrastructure is configured to secure
communications and operations in the SAP ERP
environment
Firewall
Secure Network Communications (SNC)
Secure Store and Forward (SSF) mechanisms and digital
signatures
Workstation security
Operating system and database security
Real Experience. Real Advantage.

50

[ Auditing the technology side ISACA - COBIT


guidance
COBIT References AI1, AI6, DS5, DS9, DS11, ME1, PO2
Superuser SAP* is properly secured
Set system parameter (login/no_automatic_user_ sapstar)
Default passwords for users DDIC, SAPCPIC and
EarlyWatch been changed
Powerful profiles is restricted (SAP_ALL, SAP_NEW)
Logging & monitoring activities in place for use of powerful
accounts and profiles
Changes made to the data dictionary are authorized and
reviewed regularly
Log and trace files are appropriately configured and secured

Real Experience. Real Advantage.

51

[ Auditing the technology side Configuration (IMG)


Use transaction SPRO to view the IMG

Click the find button to


search for key terms

Real Experience. Real Advantage.

52

[ Auditing the technology side Configuration (IMG)


You can then double click any item on the list and it will take you to
the location within the IMG.

Real Experience. Real Advantage.

53

[ Auditing the technology side Configuration (IMG)


This is helpful when you want to document where a control is
performed.
When you try and
execute the item, it
will show you the
tcode used.
Information is helpful
when discussing with
auditee or IT persons.
Another useful tool is
Performance Assistance
Provides notes about
each configurable control.

Real Experience. Real Advantage.

54

[ Auditing the technology side Configuration (IMG)

The Performance
Assistant provides you
with more detailed
information about the
control to help you
understand how it works.

Lots
more info
Real Experience. Real Advantage.

55

[ Auditing the technology side Configuration (IMG)


Other IMG Configurations tcode SPRO
Customer Account Groups: Menu PathFinancial
Accounting > Accounts Receivable & Accounts Payable >
Customer Accounts > Master Data> Preparation for
Creating Customer Master Data > Define Account Group
With Screen Layout (Customers)
Material Types: Menu PathLogistics General > Material
Master > Basic Settings > Material Types > Define
Attributes of Material Types
Industry Sector: Menu PathLogistics General > Material
Master > Field Selection > Define industry sectors and
industry-sector specific field selection

Real Experience. Real Advantage.

56

[ Auditing the technology side Configuration (IMG)


Pricing condition types and records Menu PathSales and
Distribution > Basic Functions > Pricing: and tcodes:
V-44 for material price condition record
V-48 for price list type condition records
V-52 for customer-specific condition type

Other configurable controls


3-Way Match
SE16 and tables LFM1 (verify GR-IV is checked)
LFA1 (Global listing of vendors) Although a vendor shows in
LFM1, it could be disabled globally in this table and is N/A

Invoice Payment Approval

Real Experience. Real Advantage.

57

[ Auditing the technology side Configuration (IMG)


PO Release Workflow
Obtain the PO release strategy table that are set for users
based on their release level
T16FS obtain the PO release strategy table defined for PO
release amount for particular sectors.

JV Workflow
Approval Matrix Set Up used to determine if appropriate
approvers for JV document is set up in SAP (JV user is not
same as JV approver)

Tolerance Limits
SE16, T169G (can choose 1 or many company codes to view)

Automatic Posting
Identifies the various procedures that generate automatic
postings to the GL
Use Tcode OBYC (need business mgt. or SAP BASIS to
execute)
Real Experience. Real Advantage.

58

[ Agenda
SAP from a business perspective
What SAP does for the user community

SAP from a technology perspective


Typical landscape
Business Impact and Risk

Auditing the business side COSO, IIA guidance


General ledgers, financial statements, billings
Operations: production planning, procurement

Auditing the technology side ISACA, COBIT guidance


Application/General computing controls
Configuration settings (IMG)

Developing the audit program


Questions and comments
Real Experience. Real Advantage.

59

[ Developing the audit program


Having identified the key processes, inherent risks,
internal controls, and potential test steps this applies
for both the business side and the IT side it is pretty
straightforward to build the audit program.
Use whatever format is accepted in your organization:
Word document
Excel spreadsheet

Risk & control report from TeamMate , Audit Leverage ,

MK Insight , or other audit management software


SAP QM includes auditing transactions, but they are
aligned more with lot sampling than internal auditing

Real Experience. Real Advantage.

60

[ Developing the audit program


IIA Standard 2201: Planning Considerations

In planning the engagement, internal auditors must


consider:

The objectives of the activity being reviewed and the means by which the
activity controls its performance;
The significant risks to the activity, its objectives, resources, and operations
and the means by which the potential impact of risk is kept to an acceptable
level;
The adequacy and effectiveness of the activity's risk management and
control processes compared to a relevant control framework or model

Note that weve gone over these items already.

Real Experience. Real Advantage.

61

[ Developing the audit program


ISACA Standard S5: Planning
Plan the IS audit coverage to address the audit objectives and
comply with applicable laws and professional auditing standards.
Develop and document a risk-based audit approach.
Obtain an understanding of the activity being audited. The
knowledge required should be determined by the nature of the
organization, its environment, risks and the objectives of the audit.
Perform a risk assessment to provide reasonable assurance that all
material items will be adequately covered during the audit. Audit
strategies, materiality levels and resources can then be developed.

Not a great deal of difference in planning an audit.

Real Experience. Real Advantage.

62

[ Developing the audit program


The audit program must include the test steps, naturally.
It does not need to include a description of the control
being tested, but thats nice to have as a reminder during
the testing of what were looking for.
If you dont include the control, include a reference to
where the control in documented.
To meet the current (and proposed) standards in the audit
profession, auditors must document their risk assessment
process used in planning the audit.
If not in the audit program itself, document the links from
Process/Objective Risks Controls Audit Tests

Real Experience. Real Advantage.

63

[ Developing the audit program


Application Objectives

Data is input without


errors

Data is input completely

Data is input timely

Objective Risks

Mitigating Controls

Control Statement

Typos in data input are not


detected

Edit checks

Edit checks eliminate common typographic errors. Where possible, the application
includes processes to validate financial values for reasonableness and approval
limits; looks for proper formats and required fields; uses standardized input screens;
verifies sequences (e.g., missing items), range checks, and check digits;and performs
cross checks (e.g., where certain policies are only valid with certain premium table
codes).

Duplicate record entry may


not be detected

Record checks

Records are checked for key fields as part of data validation process to minimize
duplicate data entry, including using fuzzy logic for close matches.

Key fields are not entered

Field Verification

Key fields are mandatory entries, and the record cannot be stored with certain items
incomplete or pending.

Some records are skipped /


not entered

System checks

Cross system checks are used to ensure records are input in sequence

Post-close data entry


invalidates parts of periodic
financial reporting

Validation checks

Post-closing data entries are permitted, but require management approval to assure
the impact is known.

Late data entry changes


impact of management
reports

Field Verification

Late data entry is flagged in a special report to management.

Real Experience. Real Advantage.

Test Plan

64

[ Developing the audit program

Real Experience. Real Advantage.

65

[ Agenda
SAP from a business perspective
What SAP does for the user community

SAP from a technology perspective


Typical landscape
Business Impact and Risk

Auditing the business side COSO, IIA guidance


General ledgers, financial statements, billings
Operations: production planning, procurement

Auditing the technology side ISACA, COBIT guidance


Application/General computing controls
Configuration settings (IMG)

Developing the audit program


Questions and comments
Real Experience. Real Advantage.

66

[ Questions & Comments

Real Experience. Real Advantage.

67

[ Key Learnings
Audits of SAP are performed to provide assurance that
the financial data is correct and that the organization can
rely on the information and processing within SAP
Learn a methodology for testing and specific test steps
that can be used for any number of SAP audits, including
but not limited to SOX testing, general computer control
testing, application control testing, and financial report
testing
Use and modify sample audit programs to enhance SAP
testing

Real Experience. Real Advantage.

68

Thank you for participating.


Please remember to complete and return your
evaluation form following this session.
For ongoing education on this area of focus, visit the
Year-Round Community page at www.asug.com/yrc

Real Experience. Real Advantage.

SESSION CODE:
1913

69

[ Appendix A Useful Transaction Codes, Tables,


and Reports

Real Experience. Real Advantage.

70

[ SAP Transaction Codes for Security and


Troubleshooting

User Maintenance:
SU01
Maintain User (SU01D)
SU02
Maintain Authorization Profiles
SU03
Maintain Authorizations
SU10
Mass changes to User Master
SU12
Mass Changes to User Master Records
SU20
Maintain Authorization Fields
SU21
Maintain Authorization Objects
SU50
Maintain User Defaults
SU51
Maintain User Address
SU52
Maintain User Parameters
SU53
Display Check Values
SU54
Maintain User Menu
SU55
Start user menu
SU56
Analyze user buffer (Security Check
SUIM
User Information System

Real Experience. Real Advantage.

71

[ SAP Transaction Codes for Security and


Troubleshooting

Authorization Objects:
SU22
Auth. object usage in transactions
SU30
Total checks in the area of authorizations

Table Security:
SUCH
Translatability CHECKs
SUCU
Table authorizations: Customizing

Correction & Transport:


SE09 Workbench Organizer
SE10 Customizing Organizer
Data Dictionary:
SE11 ABAP/4 Dictionary Maintenance
SE12 ABAP/4 Dictionary Display
SE13 Maintain Technical Settings (Tables)
SE14 Utilities for Dictionary Tables
SE15 ABAP/4 Repository Information System
SE85 ABAP/4 Dictionary Information System

Real Experience. Real Advantage.

72

[ SAP Transaction Codes for Security and


Troubleshooting
Table Display and Maintenance:
SE16 Data Browser
SE17 General Table Display
SM31 Table Maintenance
Tracing a Transaction:
SE30 ABAP/4 Runtime Analysis
ST01 System Trace
STAT User Activity at UNIX Level (this transaction is very slow)
ABAP/4 Workbench:
SE36 ABAP/4: Logical Databases
SE37 ABAP/4 Function Modules
SE38 ABAP/4 Program Development
SE80 ABAP/4 Development Workbench
SE81 SAP Application Hierarchy
SE82 Customer Application Hierarchy
SE84 ABAP/4 Repository Information System
SE86 ABAP/4 Repository Information System

Real Experience. Real Advantage.

73

[ SAP Transaction Codes for Security and


Troubleshooting
Transaction Maintenance:
SE93 Maintain Transaction Codes
SE43 Menu path with transaction codes (Main Menu is S000)
Knowledge and understanding of SAP R/3 basic system administration skills:
SM21 System Log
SE06 Set up Workbench Organizer
SM04 Current Users on the Client
Other Transactions:
SU22 Authorization Objects used in Transaction Codes
SU23 Load Tables in TAUTL
SU24 Authorization Objects used in Transactions (Profile Generator)
SU25 Copy Initial Defaults
SU26 Compare Authorization Checks

Real Experience. Real Advantage.

74

[ Standard Security Reports-SA38

Program
RSUSR000
RSUSR002
RSUSR003
RSUSR004
Objs.
RSUSR005
RSUSR006
RSUSR007
RSUSR010
Object
RSUSR020
RSUSR030
RSUSR040
RSUSR100
RSUSR101
RSUSR102
RSUSR400
RSPARAM
RSCSAUTH
RSABAUTH

Real Experience. Real Advantage.

Short description
Current Active Users
Lists of Users According to Complex Selection Criteria
Check the Passwords of Users SAP* and DDIC in all Clients
Restrict User Values to the Following Simple Profiles and Auth.
List of Users With Critical Authorizations
List of User Master Records Locked Due to Incorrect Logon
List Users Whose Address Data is Incomplete
Transaction Lists According to Selection With User, Profile or
List Profiles by Complex Selection Criteria
List Authorizations According to Complex Selection Criteria
List Authorization Objects by Complex Selection Criteria
List Change Documents for Users
List Change Documents for Profiles
List Change Documents for Authorizations
Test Environment Authorization Checks (SAP Systems Only)
List system parameters (Tcode RZ11 or TU02)
Maintain program/report authorization groups
Transfers authorization groups from TRDIR to TPGP

75

[ Important Security Tables

DD02V
List of Tables and Descriptions
TSTC
Transaction Listing
TSTCA
Values for Transaction Code Authorizations
TSTCT
Transactions with Description
TACT
Activities that can be Protected
TACTT
Activities that can be Protected with Descriptions
TACTZ
Authorization Objects and Valid Activities
TBRG
Authorization Objects and Authorization Groups
TBRGT
Auth Objects and Auth Groups with Descriptions
TDDAT
Table Authorization Groups
TOBJ
Authorization Objects
TOBJC
Authorization Object w Class assignment
TOBJT
Authorization Objects and Descriptions
TOBC
Authorization Object Classes
TOBCT
Authorization Object Classes and Descriptions
TPGP
ABAP/4 Authorization Groups
TPGPT
Long Texts for ABAP/4 Program Groups
TRDIR
System Table TRDIR, ABAP/4 Programs with Authorization
TRDIRE
System Tables w attributes
TACTZ
Valid Activities
USOBT
Transaction codes w Authorization Objects checked. Used with
Profile Generator

Real Experience. Real Advantage.

76

[ Additional Useful Tables


User Master Tables
USR01
User Master Records
USR02
User ID and Passwords (includes last logon data)
USR04
User Master Authorizations
USR10
Authorization Profiles
USR11
User Master Profiles and Descriptions
USR12
User Master Authorization Values
USR40
Non-permissible password values
Change Logs
USH02
Change history for logon data (inc. account lock
indicator, User Flag.
USH04
Change history for authorizations
USH10
Change history for authorization profiles
USH12
Change history for authorization values
Authorization Tables
UST04
User Masters (all Users with profiles)
UST10C
User Master: Composite Profiles
UST10S
User Master: Simple profiles
UST12
User Master: Authorizations
Real Experience. Real Advantage.

77

[ Reviewing Technical Security Access Controls

Password Audit Steps:

Using RSPARAM / RSPPARAM report (SA38) - determine PW control


settings
Login/password_Expiration Frequency of forced password change
(default = 0 = off)
Login/min_password Minimum password length (default = 3)
Login/fails_to_user_lock Number of invalid password attempts before
user is locked (default = 12)
Login/failed_user_auto_unlock -- If user account is locked is it
permanently locked until released by administrator or automatically
unlocked at midnight
(default = 1 = unlocked at midnight)
Rdisp/gui_auto_logout User is logged off of SAP after a period of
inactivity
(default = 7200 seconds = 2 hours)
Login/disable_multi_gui_login (default = 0 = multiple logons permitted)
NOTE: if multi-login is disabled some users can still be permitted multiple
logins via the login/multi_login_users setting where user-ids can be
listed which can be permitted to logon multiple times

Real Experience. Real Advantage.

78

[ Reviewing Technical Security Access Controls


Determine who can alter number ranges
TC = SPRO, SNRO
Object = S_NUMBER
Activities = 02 (chg), 11(chg), 13 (initialize), 17(maintain)
Determine who can do table updates in production (should not be
permitted)
TC= SM30, SM31
Object = S_TABU_DIS, (client independent tables also require
S_TABU_CLI )
Activity = 01, 02
Data Dictionary updates in production should not be permitted
TC = SE11, SE15, SE16, SE38, SE80
Object = S_DEVELOP
Activities = 01, 02, 06, 07
Real Experience. Real Advantage.

79

[ Reports RSUSR via AID, SA38, or SUIM


May need system administrator to run for you
RSUSR002 provides a wide variety of profile review options
RSUSR003 check passwords for SAP* and DDIC
RSUSR005 , 009 list of users with critical authorizations (this
report requires significant computer resources to run must
update table SUKRI with authorizations to check)
RSUSR006 locked users / unsuccessful login attempts
RSUSR010 transactions executable by user, profile,
authorization
RSUSR060 where used lists
RSUSR100, 101, 102 changes to UMR, profiles,
authorizations
RSUSR200 -- Users with original passwords, users not logged
in for xx days, users who have not changed password in xx
days

Real Experience. Real Advantage.

80

[ Reports RSUSR via AID, SA38, or SUIM Cont.

RSUSR002 as seen on previous slide can also be used to determine


who has access to powerful BASIS transactions including:

DBxx Database related transactions


SCC4, SCC5 Client administration
SE01-SE10 CTS / TMS commands
SE11, SE12, SE13, SE14 Table structure maintenance
SE15 Data Dictionary
SE38 ABAP Editor
SE93 Maintains transactions
SM01 Lock / unlock transactions
SM12 Lock entries
SM30, SM31 Table Maintenance
SM32 Updates Table USR40 with invalid passwords
SM37 Displays and deletes processing job logsSM49 Execute
external operating system commands
SM52 Execute operating system commands
SM59 Maintain Remote Function Calls destination definitions
SM69 Maintain external commands
SP01 Administer print spools
SU01, SU02, SU03 Security Administration transactions

Real Experience. Real Advantage.

81

Thank you for participating.


Please remember to complete and return your
evaluation form following this session.
For ongoing education on this area of focus, visit the
Year-Round Community page at www.asug.com/yrc

Real Experience. Real Advantage.

SESSION CODE:
1913

82

You might also like