Access Control Guide
Access Control Guide
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 1
FOR INTERNAL USE ONLY
Security Model - Overview
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 2
FOR INTERNAL USE ONLY
KPMG Perspective on
Access to Programs and Data
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 3
FOR INTERNAL USE ONLY
Security Policy/User Awareness
Objectives
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 4
FOR INTERNAL USE ONLY
Security Policy/User Awareness
TOD/TOE
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 5
FOR INTERNAL USE ONLY
Security Policy/User Awareness
TOD/TOE
TOE
- Review policy to confirm approval and periodic
review/update.
- Confirm policy is available to all employees.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 6
FOR INTERNAL USE ONLY
Security Policy/User Awareness
Considerations
♦ Review content of policy, as a minimum would expect it to contain:
− those responsible to enforcing the policy.
− Logical access controls.
− rules surrounding physical computing assets.
− employee responsibilities.
− movement of data.
− virus controls.
− Backups.
− change management and system development.
− internet usage.
− e-mail.
In general ensure that ITGC sections are covered in the policy and
relevant to in-scope systems.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 7
FOR INTERNAL USE ONLY
Security Policy/User Awareness
TOD/TOE
2. User awareness
End-users are aware of their roles and responsibilities with
respect to information security.
TOD
♦ Determine whether end users have received appropriate
information security awareness sessions.
♦ Review the security policy to ensure that it addresses the
information security responsibilities of end users (or separate
end user information security policy has been prepared).
♦ Ensure that users sign non disclosure agreements. Test sample
if available.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 8
FOR INTERNAL USE ONLY
Security Policy/User Awareness
TOD/TOE
TOE
- Select sample of users and ensure they have signed
the non disclosure agreements
(consider KAM sampling. If 52 users = weekly
control, i.e. Select 8 samples).
- Confirm policy is available to all employees.
- Inquire sample users to determine they are aware of
the information security policy.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 9
FOR INTERNAL USE ONLY
Security Policy/User Awareness
TOD/TOE
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 10
FOR INTERNAL USE ONLY
Security Policy/User Awareness
TOD/TOE
TOE
- Inspect additional reports based on KAM sample
size.
NOTE
The difference between the security function and IT
internal audit.
- Responsibilities.
- Independence.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 11
FOR INTERNAL USE ONLY
KPMG Perspective on
Access to Programs and Data
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 12
FOR INTERNAL USE ONLY
Physical Access Controls
Objectives
♦ Physical access to information systems relevant to
financial reporting is appropriately restricted to
authorized individuals.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 13
FOR INTERNAL USE ONLY
Physical Access Controls
TOD/TOE
1. Physical Access Controls
Physical access to computer facilities that house the financial applications
(including DBs and network devices) is restricted to appropriate personnel.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 14
FOR INTERNAL USE ONLY
Physical Access Controls
TOD/TOE
TOE
♦ Ensure that the fire suppression system is inspected
annually - (evidence)? Are hand-held fire extinguishers
tagged for inspection and inspected annually?
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 15
FOR INTERNAL USE ONLY
Physical Access Controls
Considerations
♦ Physical access controls
− Door locks – bolting/electronic/Biometric.
− Logging – Manual/Electronic.
− Identification badges (photo IDs).
− Video cameras/ Security guards.
− Controlled visitor access.
− Location of the rooms.
♦ Environmental controls
− air conditioning.
− fire suppression system using materials as (FM2000, COs or Halon).
− Hand held fire extinguishers and smoke detectors.
− UPS (Uninterrupted power supply).
− Generators in case of certain clients.
− Flammable materials!!
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 16
FOR INTERNAL USE ONLY
KPMG Perspective on
Access to Programs and Data
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 17
FOR INTERNAL USE ONLY
Configuration of Access Rules
Objectives
♦ IT systems often have the ability to define certain
roles or profiles with defined access to programs
and data.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 18
FOR INTERNAL USE ONLY
Configuration of Access Rules
Examples
− A key client assertion-level control dictates that
no staff outside the finance department should
have access to the accounting module
− The system should contain a ‘role’ or group of
users that only have access to the accounting
module.
− The system should have the ability to add only
finance department employees to this group
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 19
FOR INTERNAL USE ONLY
Configuration of Access Rules
TOD/TOE
1. SOD
Controls are in place to allow for effective translation of
business rules into system access rules
TOD (per system)
♦ Inquire whether rule based authorization (group/role) or
individual assigned privileges are used for in scope systems.
♦ Inquire that users assigned different levels of access based on
their job role.
♦ Check the system to understand how is this assigned? E.g.
assigning individual menus or responsibility levels containing a
number of menus.
♦ Ensure that there is a specific mapping/Matrix in place for
assigning access rights or are levels assigned on an ad hoc
basis.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 20
FOR INTERNAL USE ONLY
Configuration of Access Rules
TOD/TOE
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 21
FOR INTERNAL USE ONLY
Configuration of Access Rules
TOD/TOE
2. Internal Audit
Internal Audit or other entity management performs a
periodic review of the entity’s segregation of duties.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 22
FOR INTERNAL USE ONLY
Configuration of Access Rules
SoD – Key Areas to Look Out For
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 23
FOR INTERNAL USE ONLY
KPMG Perspective on
Access to Programs and Data
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 24
FOR INTERNAL USE ONLY
Identification and Authentication
Objectives
♦ The use of a userID and password (user’s credentials
for ), or other more robust methods.
♦ Access to programs and data is appropriately
restricted by the implementation of identification and
authentication mechanisms.
♦ Effectiveness of authentication controls (e.g.,
passwords).
♦ Sufficient logical security controls in place for
applications and systems that support financial
reporting (e.g., network, infrastructure, applications,
databases, etc.).
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 25
FOR INTERNAL USE ONLY
Identification and Authentication
♦ Key Elements:
− No shared id’s
− Password rules (or other mechanisms) that are appropriate to the
relevant risks, including:
• Initial password change after first logon (review procedure during
access administration).
• Complexity:
− Minimum password lengths (6-8).
− Alpha-numeric and special characters.
• Forced password changes (30-90).
• previous passwords cannot be reused (eg. last 10)
• a limited number of login attempts before the user account is locked.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 26
FOR INTERNAL USE ONLY
Identification and Authentication
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 27
FOR INTERNAL USE ONLY
Identification and Authentication
TOD/TOE
1. Identification
♦ Individual User-ID’s should be issued for each user.
No shared logon is allowed to provide accountability
of transactions.
TOD
♦ Inquire about the access mechanisms in place.
♦ Check whether a standard naming convention is in
place for user-IDs.
♦ Observe a user accesses to the in-scope systems and
check identification and authentication method.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 28
FOR INTERNAL USE ONLY
Identification and Authentication
TOD/TOE
TOE
♦ Inspect the user list and search for generic userIDs
like “ADMIN, test, sales, audit, etc.” to determine that
no function userIDs exist which could be shared
among several individuals.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 29
FOR INTERNAL USE ONLY
Identification and Authentication
TOD/TOE
2. Authentication mechanisms
♦ For each Application and IT platform, adequate password-based
access restrictions is in place.
TOD (automated control covers the TOE)
♦ Inspect the policy to ensure that individual systems password
criteria are detailed in the IT security policies.
♦ If not, who decides password criteria of systems? Is this
appropriate?
♦ Review the system parameters for passwords to verify that the
system enforces secure password settings inline with the
security policy.
♦ Review procedures for password resets by help-desk or other
personnel to determine the authenticity of the user requesting
the password reset.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 30
FOR INTERNAL USE ONLY
Identification and Authentication
Consideration on passwords review
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 31
FOR INTERNAL USE ONLY
Identification and Authentication
TOD/TOE
3. Remote Access
♦ Remote access to the network and in-scope systems is
restricted and monitored.
TOD
♦ Identify whether users are able to access the network remotely
(e.g. via a dial up connection or VPN).
♦ If so identify whether access is restricted to certain programs or
files and that access is appropriately authorised.
♦ What is the process for allowing users remote access to the
network? ensure only appropriate users are able to access the
network remotely, based on authorisation from appropriate line
manager.
♦ Review the security controls in place for remote access,
authentication mechanism (e.g. by secureID system) and
security logging.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 32
FOR INTERNAL USE ONLY
Identification and Authentication
TOD/TOE
TOE
♦ Obtain a list of users with remote access and select a
sample (in line with KAM sampling) to ensure that for
each user there is appropriate supporting
documentation allowing the user remote access.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 33
FOR INTERNAL USE ONLY
Identification and Authentication
TOD/TOE
4. Audit Logs (all layers)
♦ Effective mechanisms are in place to log security
activity and identify potential violations and then
escalate and act upon them in a timely manner to
reduce the risk of unauthorized / inappropriate access
to the entity’s relevant financial reporting applications
or data.
TOD (covers TOE):
♦ Review in-scope systems’ parameters to ensure that
audit logs are activated and all security violations and
financial transactions are logged.
♦ Logging features/activities are in line with the security
policy.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 34
FOR INTERNAL USE ONLY
Identification and Authentication
TOD/TOE
♦ Logging facilities and log information should be protected against
unauthorized access:
− log files being edited or deleted;
− storage capacity of the log file media being exceeded, resulting in
either the failure to record events or over-writing of past recorded
events.
♦ Check whether alerting mechanism is in place to notify
administrators/information owners about certain activities or
transactions.
♦ Inquire about the incident reporting and escalation mechanism. Inspect
the policy, if any and select one sample for review.
TOE
♦ Inspect a sample of reports of security violations and ensure that
violations are properly escalated and resolved. (KAM sample size)
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 35
FOR INTERNAL USE ONLY
Identification and Authentication
TOD/TOE
5. LAC of O/S, DB, and network devices
♦ Use specific audit programs and select relevant
controls for review.
♦ Examples:
− Authentication mechanisms.
− Auditing and reporting.
− Security configuration standards defines the minimum security
requirements.
− System-specific security settings.
− Management of service accounts.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 36
FOR INTERNAL USE ONLY
KPMG Perspective on
Access to Programs and Data
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 37
FOR INTERNAL USE ONLY
Access Administration
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 38
FOR INTERNAL USE ONLY
Access Administration
Key
Key Elements:
Concepts
♦ User accounts are added, modified and
deleted with the following elements:
− Privileges based on authorized duties
− Approved by appropriate management
− Documented
− In a timely manner
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 39
FOR INTERNAL USE ONLY
Administering New Users
♦ Consider new users for each operating system, network and application
in scope, not just network!!
− Tests should be recorded separately on the ITGC for clarity
♦ Accounts set up in the year should be recorded within each application
− IT staff should be able to print these out for us to choose a sample to
check authorization
♦ Authorization can be via email / forms etc.
− Ideally both line managers and IT
♦ System access requests should be specific and not just “full” access
− E.g., purchase ledger
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 40
FOR INTERNAL USE ONLY
Administering Changed Users
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 41
FOR INTERNAL USE ONLY
Administering Terminated Users
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 42
FOR INTERNAL USE ONLY
Administering Disabled Users
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 43
FOR INTERNAL USE ONLY
Access Administration
TOD/TOE
1. Adding new users
There are procedures in place for the management of users and thier
privileges for in-scope systems. The management procedures require
formal approvals for the establishment of users and granting of
privileges.
TOD
♦ Understand the process for setting up new users on the application and
network.
♦ Inspect a user access request form (electronic or manual) for one
individual to ensure that there is a clear indication of the authorization.
(Consider vendor users (temporary system access), remote access and
physical access).
♦ Inquire whether user-access request forms are retained, and where.
♦ Review procedure for granting initial passwords.
♦ Are there any controls in place to ensure ‘ghost users’ are not setup?
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 44
FOR INTERNAL USE ONLY
Access Administration
TOD/TOE
TOE
♦ Obtain an electronic list of current network users and current
employees. Use IDEA to match the two databases. Follow up any areas
where there are users who are not employees.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 45
FOR INTERNAL USE ONLY
Access Administration
TOD/TOE
1. Deleting, disabling and changing user access
For each in-scope IT system, adequate arrangements are in place for
deleting, disabling and changing users access.
TOD
♦ Through discussions with IT manager, information owners and HR
ascertain the process for:
− removing leavers from the systems.
− amending access rights of transfers.
− disabling users on long leave.
(Consider vendor access, remote access and physical access).
♦ Ensure the process is aligned with the policy, if any.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 46
FOR INTERNAL USE ONLY
Access Administration
TOD/TOE
TOE (to be tested during TOD if there is no formal user access
management procedure in place)
♦ Obtain a list of current year leavers from payroll/HR and ensure all are
removed from the system. If not applicable select a sample based on
KAM sampling.
♦ Obtain a list of current year transfers from payroll/HR and select a
sample based on KAM sampling, and ensure their access rights are
changes as approved by line manager.
♦ Obtain a list of users who are currently on long leave and ensure all
system access are disabled. If not applicable select a sample based on
KAM sampling.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 47
FOR INTERNAL USE ONLY
KPMG Perspective on
Access to Programs and Data
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 48
FOR INTERNAL USE ONLY
Monitoring System Access
Objectives
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 49
FOR INTERNAL USE ONLY
Monitoring System Access
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 50
FOR INTERNAL USE ONLY
Monitoring System Access
TOD/TOE
The entity performs a periodic review of active users and user
access rights to identify and remove inappropriate system access.
Access changes due to the review process are appropriately
documented and the documentation is retained.
TOD
♦ Inquire whether a periodic review of systems access rights is
undertaken. How often? (Expect at least annually).
♦ Who carries out the review, someone other than the systems
administrator?
♦ How the review and access changes due to the review are
documented?
Before making recommendation consider the value this will add to
the system’s security. If there are strong and robust controls over
starters and leavers in place may consider that it is not necessary.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 51
FOR INTERNAL USE ONLY
Monitoring System Access
TOD/TOE
TOE
♦ Review the documentation supports the performance of a review of users
and their access rights.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 52
FOR INTERNAL USE ONLY
KPMG Perspective on
Access to Programs and Data
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 53
FOR INTERNAL USE ONLY
Super-users
Objectives
• Controls are in place to restrict super user
access to an appropriate group of individuals.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 54
FOR INTERNAL USE ONLY
Super-users
♦ Powerful userIDs ('super users') whose access rights could override
controls.
♦ Such super users may exist at the system level (e.g., system, security and
database administrators) as well as at the application level.
System level:
♦ Administrators.
♦ Special system logon IDs.
♦ System “exits”.
♦ Special system or database utilities.
Application level:
♦ The ability to perform sensitive transactions (i.e., book a
journal entry with no approvals, issue checks with no
approvals, write off receivables with no approvals).
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 55
FOR INTERNAL USE ONLY
Super-users
NOTE:
♦ Operating system level (audited as an ITGC)
♦ Application level (these may be audited as an application control within
each process – this should be coordinated within audit team)
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 56
FOR INTERNAL USE ONLY
Super-users
TOD/TOE
The entity follows an appropriate policy for super user access to IT
applications.
TOD
♦ Review security policy and identify any criteria over who has super user
access.
♦ Obtain a list of super users for in-scope systems and determine that the
individuals with access have appropriate job functions, and inline with the
policy, if any.
(Print screen of administrators on system levels).
♦ Who decided/authorized this access? Formal form in place?
♦ Ensure that access to powerful system level ID’s is logged, where
possible, and recorded for appropriate review. Check whether the log can
be amended and who have access to amend the log.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 57
FOR INTERNAL USE ONLY
Super-users
TOD/TOE
TOE
♦ Bases on KAM sampling, select a sample of users’ access outside
of the super-user function and ensure that they don’t have
powerful system level IDs.
♦ Inspect of the log report reviews and ensure that any unusual
activity was followed up on and appropriately resolved. Consider
KAM sample size.
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 58
FOR INTERNAL USE ONLY
Control Deficiencies
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 59
FOR INTERNAL USE ONLY
Access to Programs and Data – Key Points
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 60
FOR INTERNAL USE ONLY
Learning Points Access to Programs and
Data – Key Points (continued)
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 61
FOR INTERNAL USE ONLY
Common issues
© [year] [legal member firm name], a [jurisdiction] [legal structure] and a member firm of the KPMG network of independent member firms affiliated with KPMG
International, a Swiss cooperative. All rights reserved. Printed in [country in which the publication will be printed]. 62
FOR INTERNAL USE ONLY
Access to Programs and Data - Common
Issues
♦ Password parameters for all in-scope applications is
not being tested (including network, database etc)