Auditing in the ERP Environments - By Arvind Dang

4,128 views
3,889 views

Published on

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,128
On SlideShare
0
From Embeds
0
Number of Embeds
20
Actions
Shares
0
Downloads
211
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Auditing in the ERP Environments - By Arvind Dang

  1. 1. Auditing in the ERP Environments 10-June’2006
  2. 2. AGENDA <ul><li>GENERAL OVERVIEW - ERP - Any Business,ERP solutions,SAP R/3 –Architecture & Application components </li></ul><ul><li>MODULES IN ERP- Logistics,Accounting – Navigation of Screen,Core Business Cycle in Manufacturing unit </li></ul><ul><li>RISK ASSESMENT IN ERP -Methology – Quantification Model , Impact-Severity X Detection,exposure,Statements – SD/MM/FI/ Common-Examples,Registers and Heat Maps – Module wise, Revenue, expenditure & Inventory cycles-Summing up </li></ul><ul><li>4. TECHANICAL RISK IN ERP - Basis application infrastructure,Risks-in Installation management,ABAP/4 work bench & transport (se38/sa38) computing center management systems,Profile Generator ( PGFC). </li></ul><ul><li>5. AUDIT IMPLEMENTATION IN ERP - Learning for auditors, Excellence Model/ Global best practices (COBIT /COSO) and New Directions in ERP Auditing </li></ul>
  3. 3. General Overview -Any Business Purchase Qty. Value Vendor Payable FA Sales Order Bill Customer Receivable HR W ages Salary Statut. Bodies Share Holders Other Business Associates Production/Service Enterprise
  4. 4. ERP solutions–What do they enable 1-Managing & Supporting the resources of organisation efficiently <ul><li>Employees </li></ul><ul><li>Customers </li></ul><ul><li>Vendors </li></ul><ul><li>Share Holders </li></ul><ul><li>Production Process </li></ul><ul><li>Material & Services </li></ul>
  5. 5. 2-.Increasing Competitiveness 3-.Reducing Costs 4.-Improving operational reporting 5.-Improving Quality decision making 6-.Enhancing customer service 7-. Improving profitability 8- Providing integrity of data 9-Enhancing productivity of value chain 10-Speed ERP solutions-what do they enable
  6. 6. <ul><li>-ERP solutions are integrated ,Configurable,Real time and often available as Cross Industry solutions </li></ul><ul><li>-Today’s presentation is primarily based on SAP Although many ERP solutions are in use :e.g.- Oracle , J.D edward,Baan,Mfg Pro etc with similar concepts. </li></ul><ul><li>SAP = Systems ,Applications,Products in Data processing </li></ul><ul><li>– ERP cost/user-Licence - Info-users – Rs. 60K + </li></ul><ul><li>‘ (Approximate) Operational-users – Rs. 90K+ </li></ul><ul><li>Developers – Rs. 350K+ </li></ul><ul><li>AMC - Rs. 17 ~ 20% </li></ul><ul><li>ERP at Eicher = SAP 4.7c (375 users) </li></ul>ERP solutions-what do they enable
  7. 7. SAP R/3 – Architecture -3 Layers Presentation Layer Application Layer Data Base Layer - SAP R/3-S/W-GUI ( Enterprises 4.7c/ECC5) with which users interact - Application Servers-with SAP R/3 Kernel that run ABAP/4 programms(WIN 2003/Server Pack 1) <ul><li>RDBMS (eg Oracle 9i with (Patch level 4)-ABAP/4 Dictionary,source &executable program. </li></ul><ul><li>TCodes-se16/tstct=120314 nos </li></ul><ul><li>- Tables(DB02) =35650 nos </li></ul>
  8. 8. SAP -R/3 Enterprises - Application components ERP AM PS CO SD QM PM HR IS WF FI MM PP
  9. 9. Modules in Logistics – Navigation of Screen <ul><li>Logistic General (LO) </li></ul><ul><li>Product Life cycle Management (PLM) </li></ul><ul><li>Sales & Distribution (SD) </li></ul><ul><li>Material Management (MM) </li></ul><ul><li>Logistics Execution (LE) </li></ul><ul><li>Production Planning & Control ( PP) </li></ul><ul><li>Plant Maintenance (PM) </li></ul><ul><li>Customer Service (CS) </li></ul><ul><li>Quality Management (QM) </li></ul><ul><li>Project System (PS) </li></ul><ul><li>Environment Health & Safety ( EH&S) </li></ul><ul><li>Retail </li></ul><ul><li>Agency Business (LO-AB) </li></ul><ul><li>Global Trade </li></ul><ul><li>Country Versions </li></ul>
  10. 10. Modules in Accounting - Navigation of Screen <ul><li>Accounting General (AC) </li></ul><ul><li>Financial Accounting (FI) </li></ul><ul><li>My SAP Banking </li></ul><ul><li>Corporate Finance Management(CFM) </li></ul><ul><li>Treasury (TR) </li></ul><ul><li>Controlling (CO) </li></ul><ul><li>Investment Management(IM) </li></ul><ul><li>Project System (PS) </li></ul><ul><li>Incentive & Commission Management </li></ul><ul><li>Enterprises Controlling </li></ul><ul><li>Rural Estate Management </li></ul><ul><li>Public Sector Management </li></ul><ul><li>Flexible real Estate Management (RE-FX) </li></ul><ul><li>Production sharing accounting systems </li></ul><ul><li>Country version </li></ul>
  11. 11. Core Business Cycle in Manufacturing Create Customer Relationship Sales Qty. Sales Order Goods issue Delivery Note Our Invoice A.R. Collection MRP Producing Inventory Create Production Order Create Vendor Relationship Production Inventory Manage-ment Handling FGS Raw Material Management Purchase requisition Purchase Order/ Scheduling Agreement Goods Receipt Vendor Invoice Verification AP Payment Reporting
  12. 12. Key business processes in Sales and Distribution (SD), Materials Management (MM) and Financial Accounting (FI) need to be studied in detail to identify their vulnerability to threats from within and outside. Based on this and experience of internal audit team, risk statements relevant to businesses are to be captured. For each risk statement, risk impact and risk exposure is to be assessed as under RISK ASSESMENT METHODOLOGY – BY A QUANTIFICATION MODEL
  13. 13. Risk Registers and Heat Maps – Module wise Using the risk impact and risk exposure scores as worked out above,all possible risk statements ( like 3 examples given for each SD/MM/FI ) need to be prepared in the form of a RISK REGISTER of many pages and ultimately ,all risk statement Sr nos to be plotted on 1 page HEAT MAP. R I SK IMPACT HIGH 100 Y1   R2   R1   MEDIUM 40 G1 Y2 R3 LOW 20 G3 G2 Y3   0 2 4 10     LOW MEDIUM HIGH RISK EXPOSURE ->
  14. 14. Risk impact ( S everity x Detectability ) to be assessed on a scale of 1 – 100 (100 being the highest adverse impact. A- Risk Severity ( on a scale of 1- 10 ) is determined based on weighted average affect on 5 parameters ie i- PBT, ii- Statutory / regulatory compliance iii- Strategic value iv- Financial statement accuracy , v- Reliability/ operational effectiveness . B- Risk Detectability ( on a scale of 1 – 10 ) is determined based on the stage of detectability of adverse event ie with in the co.or from outside customers. Risk impact - Severity X Detection
  15. 15. Risk exposure (likelihood of occurrence) to be assessed on a scale of 1-10 (10 being most likely). Risk exposure is determind based on weighted average effect of 10 parameters,responsible for the exposure ie I-Incorrect source data/ data entry ii Incorrect incomplete execution iii-Incorrect/ non verification of output iv-Skill/ resource constraint v-Inadequate segregation of duties vi-Lack of system documentation vii-Authority norms not defined/ followed viii- Inappropriate configuration/ process logic ix-Weak internal/ compensating controls x-Others (i.e.: process complexity, frequency of changes, software limitation, unassignable causes etc.)   Risk exposure
  16. 16. RISK STATEMENTS – SD-Examples S. No Risk statement Risk Risk exposure Heat zone Severity DetectabIlity Impact 1 Invoice may be raised without effecting physical delivery of the goods from depot/ plant (bill and hold) 7 8 56 5 R1 2 Sales order may not be executed in time and in full 4 6 24 3 Y2 3 Debit / credit notes sent to customers may not contain adequate supporting details 2 4 8 4 G2
  17. 17. RISK STATEMENTS – MM-Examples S. No Risk statement Risk Risk exposure Heat zone Severity DetectabIlity Impact 1 Financial authority norms for release of PO may not be mapped into SAP 4 8 32 6 R3   2 GR may be prepared for a quantity lower/ higher than vendor delivery challan 4 6 24 4 Y2 3 CENVAT credit availed may be lower than CENVATABLE excise duty credited to vendor through invoice verification 3 6 18 4 G2
  18. 18. RISK STATEMENTS – FI-Examples S. No Risk statement Risk Risk exposure Heat zone Severity DetectabIlity Impact 1 Depreciation rates may have been incorrectly set up 5 6 30 5 R3 2 Vendors account may not have been reconciled/ confirmed as per laid down frequency 5 6 30 4 Y2 3 Line items (individual entries) clearing may not have been carried out in vendor accounts 3 6 18 4 G2
  19. 19. RISK STATEMENTS – Common to all functions Examples S. No Risk statement Risk Risk exposure Heat zone Severity DetectabIlity Impact 1 SAP transaction authorizations granted to users may not relate to their assigned role/responsibility 8 8 64 8 R1 2 SAP transactions may be carried out using group IDs resulting in non traceability of transactions to any specific individual (employee) 8 8 64 8 R1 3 Audit trails (chronological log of changes) may not be reviewed/ analyzed by process owners 5 8 40 7 R3
  20. 20. Imp-table mappings &Concepts <ul><li>SD-Sales orders=vbak/vbap/vbpa-different types </li></ul><ul><li>SD-Shipping=vblk/likp/lips-different types </li></ul><ul><li>SD-Billing=konv/vbrk/vbrp/vbuk—different types,PRICING procedures </li></ul><ul><li>SD-Cust mast used in AR=knvp/knvv/kna1/knb1,sales organisation </li></ul><ul><li>MM-Purc requisition=eban/ebkn </li></ul><ul><li>MM-PO/SA=ekko/ekpo </li></ul><ul><li>MM-Deliv sch=eket/ekkn </li></ul><ul><li>MM-GR=mkpf/mseg/ekbe </li></ul><ul><li>MM-Mat Mast=marc/mlan/makt/mara/mbew </li></ul><ul><li>MM-PO inf record=konh/konp/eina/eine </li></ul><ul><li>MM-BOM-STKO/STOP </li></ul><ul><li>MM-Mat-types ,Material Movements,Material groups,Material types,purchase groups </li></ul><ul><li>FI-Paym=payr, Acctg=bkpf/bseg,-open/closed items-Cust=bsid/bsad,Vend=bsik/bsas,G/L=bsik/bsas </li></ul><ul><li>FI-Mast-G/L=skb1/ska1/skat,CC=csks/cskt,profit c=cepc/cskt </li></ul><ul><li>FI-Vend mast-used in AP=pur-lfm1/lfm2/gen-lfa1/lfb1/lfbk </li></ul><ul><li>FI-Document types-30 types- AB-acctg, BR-bank recp,KR-vend inv, RV-sale inv </li></ul><ul><li>FI-Acct types-5-A-Assets,D-Cust, K-Vend,M-Material, S-G/L , </li></ul><ul><li>FI-COA-Chart of accts </li></ul>
  21. 21. Risks in –Revenue, expend,inventory cycles-overview -400+ Configuration :- Authorisation :- Masters :- Procedure manuals:- Audit Trails :- SAP System land scope ,R/3 customizing ,organ objects,currencies, Tax procedures,charges in customer /vendor master.Document types ,depreciation keys, overhead cost allocation,PO release,Payment terms ,Pricing procedures in SD, credit controls,outgoing invoice posting/Free goods ,Automatic account determination. Authorization objects ,user management,Tolerance groups,Work flows,Conflicting combinations,owned developed transactions,super user ,change management. GL Masters-,Customer Masters,Vendor Masters, Material masters, Selling price,Tax codes,Quota arrangement,BOM. Risk based queries (SD,MM,FI) Using SAP +MS access /AIS/Critical tools/tables/LDB-SAP—eg At Eicher— SAP-Querries=106+133+25, MSAcc-Querries=103+135+39 Configuration control,Authorization ( change management,Master & Application ( PO/Sales order credits /FI documents)
  22. 22. Technical - Basis application infrastructure in SAP R/3. <ul><li>4 Key Basis Tools + Utilities </li></ul><ul><li>Installation Management guide-IMG- SPRO </li></ul><ul><li>ABAP/4 Work Bench &Transportation System ( Development + Test + Production .) </li></ul><ul><li>Computing center management system (CCMS) </li></ul><ul><li>- Utililities to monitor ,Control & Config. R/3 </li></ul><ul><li>… . Start up ,shut down,NW monitoring,security ,back ups,alerts trouble shooting,system Config.& system profile management,DBA, Profile security.) </li></ul><ul><li>D. Profile generator & security Adm.(PG&SA) </li></ul><ul><li>( SUIM-Authorisation ,Information System,SU03-.Maintainence& Authorisation. </li></ul>
  23. 23. Risks-in Installation management 1-The organisation Models :- 2-Critical no . Range:- 3-Modif of critical tables SPRO & SCC4 –control production client settings.---Risks are: - Incorrect consolidation /Inadequate reporting /Incorrect MIS/Manual work around. Assigned to individual DB record – Internal No by SAP & external no by users (snro+suim+spro). SAP –Tables –Other than X* Y* -Tables fields (SE16/SE11/DD03M)
  24. 24. Risks in ABAP/4 work bench & transport(se38/sa38). <ul><li>Change Control Procedure(Programme,Queries). </li></ul><ul><li>Development & Testing Servers. </li></ul><ul><li>Transport system testing. </li></ul><ul><li>Logs. </li></ul><ul><li>Emergency change procedures. </li></ul>
  25. 25. Risks in - computing center management systems Batch processing control :- Application server parameters:- Locking transaction codes :- Restricted Password. :- SAP Router :- On Line Support systems :- (SAP Market place ,Web) Remote function call :- Batch input (SM35) ,Administration SM(64) Processing (SM36) a) Login IPW expiration 180 day b) Min pw length 6-8 (C) Login /fails to session end (incorrect pw-3 times) SM 01 (Users who have access to lock /unlock T.code) Default PW , Name Permission table authorization with valid IP address (port 3200) Remote Access to SAP vendor Programme inter faces (SM59) Use of E-SCORE , /EPIC /DMS/ITS/ etc
  26. 26. Risks in -Profile Generator ( PGFC) :- <ul><li>Security Admin probel ( Create /change/display) </li></ul><ul><li>Super user SAP* ,SAP all </li></ul><ul><li>Authorisation documentation (Biggest risks ) </li></ul><ul><li>Log + Trace file </li></ul>
  27. 27. ERP implementation- Learnings for auditors Managing Incharge :- <ul><li>Higher no of IS auditors than traditional profile auditors. </li></ul><ul><li>ERP trained –Auditors ( Functionally /Query) </li></ul>Audit Methodology :- <ul><li>Risk assessment of audit universe (H/M/L) </li></ul><ul><li>Audit Manuals ( Query ) Excel ,M.S.Access </li></ul><ul><li>Segregation of duties. </li></ul><ul><li>User authorisation ( object level security) </li></ul><ul><li>Customized to fit each organisations’ unique needs. </li></ul>Role of Auditor :- <ul><li>Integrated approach ( involvement in project early stage for design + Controls of systems ) </li></ul><ul><li>Pre implementation review – Before go live ( Business case , project risks,Application security design). </li></ul><ul><li>Post implement review – (Application) </li></ul><ul><li>Quality assurance – BPR Programme. </li></ul>Audit involvement in project :- <ul><li>During selection & implementation ( Contribute towards establishing control environment ). </li></ul>Audit respons :- <ul><li>Environment evaluation from risk prospective, </li></ul><ul><li>Subject specials ( SD,MM,Tax) & ERP competent team </li></ul><ul><li>Efficient audit </li></ul><ul><li>Audit universe ( Business application + Basis appl.infrastructure) </li></ul><ul><li>Use HELP </li></ul>
  28. 28. Audit Excellence Model/Global best practices (COSO) <ul><li>Mapping in COSO (Committee of sponsoring Organisation of tread way commission) </li></ul><ul><li>A :- 3 Objectives Identifications : 1 Operation </li></ul><ul><li> 2 Financial Reporting </li></ul><ul><li> 3 Compliances. </li></ul><ul><li>B :- 5 Components of Internal Controls :- </li></ul><ul><li>Control Environments :- Ethics,Values,Standards, </li></ul><ul><li>Risk Assessment :- Technology,Operation,Finance,Heat Maps( Risk Impact vs ‘ Exposure). </li></ul><ul><li>Control Activities :- KPI, Polices,Procedures,TQM,Physical,Safe guards. </li></ul><ul><li>Information & Communication :- Up & down , Adequacy ,Q,Timeliness </li></ul><ul><li>Monitoring & controls :- Internal controls, Physical verification, Overheads, MIS, . , Feed backs,Forums etc </li></ul>
  29. 29. Audit Excellence Model/Global best practics (COBIT) <ul><li>Mapping to COBIT (Control Objective for Information and related Technology ). </li></ul><ul><li>MAIN PROCESS ESS No of Key Processes </li></ul><ul><li>Planning and orgainsation 11 </li></ul><ul><li>Acquisition & Implementation 6 </li></ul><ul><li>Delivery & Support 13 </li></ul><ul><li>Monitoring 4 </li></ul>LEVEL OF CONTROLS -ASSESMENT 0. Non Existance 1.Initial /Adhoc 2.Repeatable but person dependent 3.Defined –Standardized & documented. 4. Managed – Monitoring OK & Feed back system. 5. Optimized Control- Industry Best Practices
  30. 30. New Directions in ERP Auditing :- <ul><li>Risk Based Auditing linked to COSO& Cobit </li></ul><ul><li>Professional ethics& standards </li></ul><ul><li>AIS (Materiality )+ Queries development(Table down load+MS access) </li></ul><ul><li>Auditing tools- ACL/IDEA etc and many more </li></ul><ul><li>On –line continuous audit(Remote-desk top auditing) </li></ul><ul><li>E enabled applications (vendors/Dlrs, P2P, B2C) </li></ul><ul><li>Outsourcing – Competence/costs – benefit based </li></ul><ul><li>100 % transaction Audit/AUDIT thr computers </li></ul><ul><li>Continuous enhancing ERP competencies </li></ul><ul><li>Qualified Auditiors-CIA/CISA…. </li></ul>
  31. 31. References www.theiia.org Internal auditing :- Guidance for the profession :- Code of Ethics :- International Standards for the professional practices of internal auditing :- Practice Advisories :- Development & Practice Aids. www.isaca.org IS Auditing standards IS Auditing guidelines IS Auditing Procedures Standards for Professional information system control http://www.sapgenie.com/ (google search based ) http:/www.sap.com services / education http://www.sap.com/ Community Help ..sap.com
  32. 32. Arvind Dang 98711 41333 [email_address] Thank you

×