SlideShare a Scribd company logo
Tami Flowers
KCDC - May 16, 2014
AGILE IN A HIGHLY
REGULATED ORGANIZATION:
PART 2
Titanium Sponsors
Platinum Sponsors
Gold Sponsors
 I worked for a company with these words in it’s name:
 Federal
 Home Loan
 Bank
 That meant we had to consider
 Sarbanes Oxley Act (SOx)
 COBIT
 = internal auditors, external auditors, internal risk
management group, examiners
 = 6-9 months a year of being audited or examined
HIGHLY REGULATED ENVIRONMENT
 How adding service levels to your SDLC based on project size
or characteristics can help.
 Examples of artifacts for each service level and how to map
them back to controls.
 How a governance group to interface with auditors or
examiners can help ease your pain.
 What types of things do auditors/examiners ask for and how
to prepare.
 Lessons learned.
TODAY’S DISCUSSION
 Controls, not the HOW or the process, is the focus.
 As long as your process can show
 the controls,
 that the controls are implemented and tested
 Then the process you use to build software is up to you and
your organization.
REGULATIONS DO NOT TELL YOU HOW TO
BUILD SOFTWARE
 Business units
 Any business department that impacts financial statements
 Accounting
 Finance
 HR (executive compensation, etc.)
 IT
 IT general controls
 IT application controls
TYPES OF SOX CONTROLS
IT GENERAL CONTROLS
 Control environment, designed to shape the “tone at the top”
 Change management procedure
 Source code/document version
 Software development life cycle standards
 Logical access policies
 Incident management policies and procedures (operational
processing)
 Problem management policies and procedures
 Technical support policies and procedures
 Hardware/software configuration, installation, testing
 Disaster recovery/backup recover procedures
 Physical security
 Completeness checks – records processed end to end
 Validity checks – only valid data input or processed
 Identification – all users uniquely and irrefutably identified
 Authentication – mechanism in application system
 Authorization – only approved users have access
 Input controls – ensure data integrity fed from upstream
sources
 Forensic controls – data scientifically and mathematically
correct
IT APPLICATION CONTROLS
In all, 12 IT control objectives, which align to the Public Company Accounting Oversight Board
(PCAOB) Auditing Standard No. 2 and Control Objectives for Information and related Technology (COBIT ®), were defined for Sarbanes-Oxley. Figure 1
provides a high-level mapping of the IT control objectives for Sarbanes-Oxley described in the IT Control Objectives for Sarbanes Oxley , 2nd edition
document, IT general controls identified by the PCAOB and the COBIT 4.0 processes.
 Things that impact financial statements
 Business units should have these documented
 Talk to your CFO
BUSINESS CONTROLS
Feasibility Initiation
Release
Planning
Iterate Close Out
PROJECT LIFECYCLE
1. Identify the controls at each lifecycle stage.
A. Business controls
B. IT general controls
C. IT application controls
2. Update your SDLC and identify the controls and how you are going
to prove that the control was met, tested, or validated.
 Our friends at Wikipedia say:
 A service-level agreement is an agreement between two or more
parties, where one is the customer and the others are service
providers.
 Use them in your SDLC to define service levels
 Applicable controls
 The required deliverables or documentation
 As projects are requested, have the requestor define the SLA
SERVICE LEVEL AGREEMENTS (SLA)
 Determine what makes sense in your organization to
distinguish between levels. Examples include:
 The type of change being requested
 data change versus code/functionality change vs minor software upgrade
 Will the request impact a SOx key control or financial information
posted to the General Ledger (Accounting/Financial Reporting)
 Is the change being made to a SOx critical IT application
 Level of effort in terms of scope and business unit/developer time to
implement the request
 Cost
 # of resources
 time
 Required deliverables and controls vary between the service
levels
SERVICE LEVELS
SERVICE LEVELS
SHOW AND TELL
 Release plan with the controls identified in stories
 Test plan with specific test identified to test or validate
controls
WHERE TO TEST CONTROLS
A GOVERNANCE GROUP CAN HELP
 Interface between IT and auditors/examiners
 Set agreed upon deadlines for response to findings
 Focused on controls and keeping them updated
 Continuous monitoring of adherence
 Keep IT aware of findings, any needed action and deadlines
 Ensure IT is trained and aware of control deliverables
 Things they wanted to know
 What is our SDLC
 Controls within the SDLC
 Prove that the control was implement/tested
 Show us the documentation to prove it was tested
 If it wasn’t documented, it didn’t happen
 Show screen shots of anything with calculations, money, etc.
 Normally we knew ahead of time what they wanted to review
 Responding to requests
 Pull documentation they request; normally they’ll request a release or
project
 Save it to a location they can get to
 Responding to findings
 Material vs immaterial
 Will need to take action on the material findings; they will be disclosed
on financial statements
 May be told that the immaterial will become material if not resolved
EXAMINERS, AUDITORS, OH MY
 Perform periodic internal testing of IT controls
 Resolve any findings ahead of audits/exams
 Governance of this is a full time job
 Use a team to work through the controls and documentation
within the SDLC – include governance and multiple roles (Dev,
BA, QA, Architecture, PM)
LESSONS LEARNED
 Twitter: TamiLFlowers
 LinkedIn: Tami Flowers
 Slideshare: www.slideshare.nettamiflowers
 Thanks!
ME

More Related Content

What's hot

Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties SolutionsAhmed Abdul Hamed
 
Government and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP SystemsGovernment and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP Systems
Dan Aldridge, ERP Software Evangelist, LION
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
PECB
 
Sap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftSap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftPennonSoft
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
Sharing Slides Training
 
IT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterIT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit Center
Gary Pennington
 
System Design and Analysis 2
System Design and Analysis 2System Design and Analysis 2
System Design and Analysis 2Boeun Tim
 
Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23
Smart ERP Solutions, Inc.
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
Ed Tobias
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3aGene Kim
 
Iiaic08 power point cs2-3_track_regulatory session v3
Iiaic08 power point cs2-3_track_regulatory session v3Iiaic08 power point cs2-3_track_regulatory session v3
Iiaic08 power point cs2-3_track_regulatory session v3
Gene Kim
 
BIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and DependenciesBIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and Dependencies
Ramiro Cid
 
Continuous auditing
Continuous auditingContinuous auditing
Continuous auditing
acc626tan
 
Numara change & approval mgmt
Numara change & approval mgmtNumara change & approval mgmt
Numara change & approval mgmt
San Francisco Bay Area
 
Continuous Auditing D.French
Continuous Auditing D.FrenchContinuous Auditing D.French
Continuous Auditing D.French
Dan French
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Frameworkbarnetdh
 
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and SafetyREGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
360factors
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
Network Intelligence India
 
Modern Finance Tour London May 2016
Modern Finance Tour London May 2016Modern Finance Tour London May 2016
Modern Finance Tour London May 2016
BlackLine
 

What's hot (20)

Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
Government and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP SystemsGovernment and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP Systems
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
 
Sap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftSap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoft
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
IT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterIT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit Center
 
System Design and Analysis 2
System Design and Analysis 2System Design and Analysis 2
System Design and Analysis 2
 
Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 
Iiaic08 power point cs2-3_track_regulatory session v3
Iiaic08 power point cs2-3_track_regulatory session v3Iiaic08 power point cs2-3_track_regulatory session v3
Iiaic08 power point cs2-3_track_regulatory session v3
 
BIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and DependenciesBIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and Dependencies
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
Continuous auditing
Continuous auditingContinuous auditing
Continuous auditing
 
Numara change & approval mgmt
Numara change & approval mgmtNumara change & approval mgmt
Numara change & approval mgmt
 
Continuous Auditing D.French
Continuous Auditing D.FrenchContinuous Auditing D.French
Continuous Auditing D.French
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Framework
 
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and SafetyREGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
Modern Finance Tour London May 2016
Modern Finance Tour London May 2016Modern Finance Tour London May 2016
Modern Finance Tour London May 2016
 

Viewers also liked

Agile Data Governance
Agile Data GovernanceAgile Data Governance
Agile Data Governance
Tami Flowers
 
How to simplify agile estimating and planning
How to simplify agile estimating and planningHow to simplify agile estimating and planning
How to simplify agile estimating and planning
Tami Flowers
 
Agile Data Governance Tutorial
Agile Data Governance TutorialAgile Data Governance Tutorial
Agile Data Governance Tutorial
Tami Flowers
 
Agile and Auditors
Agile and AuditorsAgile and Auditors
Agile and AuditorsVersionOne
 
Agile Process Audit
Agile Process AuditAgile Process Audit
Agile Process Audit
Xebia IT Architects
 
Data Governance in an Agile SCRUM Lean MVP World
Data Governance in an Agile SCRUM Lean MVP WorldData Governance in an Agile SCRUM Lean MVP World
Data Governance in an Agile SCRUM Lean MVP World
DATAVERSITY
 

Viewers also liked (6)

Agile Data Governance
Agile Data GovernanceAgile Data Governance
Agile Data Governance
 
How to simplify agile estimating and planning
How to simplify agile estimating and planningHow to simplify agile estimating and planning
How to simplify agile estimating and planning
 
Agile Data Governance Tutorial
Agile Data Governance TutorialAgile Data Governance Tutorial
Agile Data Governance Tutorial
 
Agile and Auditors
Agile and AuditorsAgile and Auditors
Agile and Auditors
 
Agile Process Audit
Agile Process AuditAgile Process Audit
Agile Process Audit
 
Data Governance in an Agile SCRUM Lean MVP World
Data Governance in an Agile SCRUM Lean MVP WorldData Governance in an Agile SCRUM Lean MVP World
Data Governance in an Agile SCRUM Lean MVP World
 

Similar to Agile in a highly regulated organization: part 2 2014

Agile in a highly regulated organization
Agile in a highly regulated organizationAgile in a highly regulated organization
Agile in a highly regulated organizationTami Flowers
 
Dimension data pursuing compliance in public cloud white paper
Dimension data pursuing compliance in public cloud white paperDimension data pursuing compliance in public cloud white paper
Dimension data pursuing compliance in public cloud white paperJason Cumberland
 
Documents system
Documents systemDocuments system
Documents system
Deepak Amoli
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
Marc Vael
 
Jason uyderv pmi 2 16 12
Jason uyderv pmi 2 16 12Jason uyderv pmi 2 16 12
Jason uyderv pmi 2 16 12
Jason Uyder
 
Security audit
Security auditSecurity audit
Security audit
Rosaria Dee
 
A knowledge based collaborative model for the rapid integration of platforms,...
A knowledge based collaborative model for the rapid integration of platforms,...A knowledge based collaborative model for the rapid integration of platforms,...
A knowledge based collaborative model for the rapid integration of platforms,...
paulkfenton
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
Tommy Seah
 
Iso 9001 2015 process audit checklist
Iso 9001 2015 process audit checklistIso 9001 2015 process audit checklist
Iso 9001 2015 process audit checklist
Cinthiia Akamii
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
CA CISA Jayjit Biswas
 
Best Practices for Regulatory Change Management
Best Practices for Regulatory Change ManagementBest Practices for Regulatory Change Management
Best Practices for Regulatory Change Management
Nimonik
 
Continuous auditing tianli xie_20241457
Continuous auditing tianli xie_20241457Continuous auditing tianli xie_20241457
Continuous auditing tianli xie_20241457pcrabbit999
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
FixNix Inc.,
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Abdulaziz AlFaify
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
Maher Manan
 
Business Objectives & Control Objectives in Information Technology
Business Objectives  &  Control Objectives  in  Information TechnologyBusiness Objectives  &  Control Objectives  in  Information Technology
Business Objectives & Control Objectives in Information Technology
Mufaddal Nullwala
 
The DevOps promise: IT delivery that’s hot-off-the-catwalk and made-to-last
The DevOps promise:  IT delivery that’s hot-off-the-catwalk and made-to-lastThe DevOps promise:  IT delivery that’s hot-off-the-catwalk and made-to-last
The DevOps promise: IT delivery that’s hot-off-the-catwalk and made-to-last
Peter Shirley-Quirk
 
SDLC_Intro.ppt
SDLC_Intro.pptSDLC_Intro.ppt
SDLC_Intro.ppt
shoukatali154717
 
CEIS Review Q1 2016
CEIS Review Q1 2016CEIS Review Q1 2016
CEIS Review Q1 2016
CEIS Review INC.
 

Similar to Agile in a highly regulated organization: part 2 2014 (20)

Agile in a highly regulated organization
Agile in a highly regulated organizationAgile in a highly regulated organization
Agile in a highly regulated organization
 
Dimension data pursuing compliance in public cloud white paper
Dimension data pursuing compliance in public cloud white paperDimension data pursuing compliance in public cloud white paper
Dimension data pursuing compliance in public cloud white paper
 
Documents system
Documents systemDocuments system
Documents system
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
Jason uyderv pmi 2 16 12
Jason uyderv pmi 2 16 12Jason uyderv pmi 2 16 12
Jason uyderv pmi 2 16 12
 
Security audit
Security auditSecurity audit
Security audit
 
A knowledge based collaborative model for the rapid integration of platforms,...
A knowledge based collaborative model for the rapid integration of platforms,...A knowledge based collaborative model for the rapid integration of platforms,...
A knowledge based collaborative model for the rapid integration of platforms,...
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Iso 9001 2015 process audit checklist
Iso 9001 2015 process audit checklistIso 9001 2015 process audit checklist
Iso 9001 2015 process audit checklist
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
Best Practices for Regulatory Change Management
Best Practices for Regulatory Change ManagementBest Practices for Regulatory Change Management
Best Practices for Regulatory Change Management
 
Continuous auditing tianli xie_20241457
Continuous auditing tianli xie_20241457Continuous auditing tianli xie_20241457
Continuous auditing tianli xie_20241457
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
1B project MS V2
1B project MS V21B project MS V2
1B project MS V2
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Business Objectives & Control Objectives in Information Technology
Business Objectives  &  Control Objectives  in  Information TechnologyBusiness Objectives  &  Control Objectives  in  Information Technology
Business Objectives & Control Objectives in Information Technology
 
The DevOps promise: IT delivery that’s hot-off-the-catwalk and made-to-last
The DevOps promise:  IT delivery that’s hot-off-the-catwalk and made-to-lastThe DevOps promise:  IT delivery that’s hot-off-the-catwalk and made-to-last
The DevOps promise: IT delivery that’s hot-off-the-catwalk and made-to-last
 
SDLC_Intro.ppt
SDLC_Intro.pptSDLC_Intro.ppt
SDLC_Intro.ppt
 
CEIS Review Q1 2016
CEIS Review Q1 2016CEIS Review Q1 2016
CEIS Review Q1 2016
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Agile in a highly regulated organization: part 2 2014

  • 1. Tami Flowers KCDC - May 16, 2014 AGILE IN A HIGHLY REGULATED ORGANIZATION: PART 2
  • 3.  I worked for a company with these words in it’s name:  Federal  Home Loan  Bank  That meant we had to consider  Sarbanes Oxley Act (SOx)  COBIT  = internal auditors, external auditors, internal risk management group, examiners  = 6-9 months a year of being audited or examined HIGHLY REGULATED ENVIRONMENT
  • 4.  How adding service levels to your SDLC based on project size or characteristics can help.  Examples of artifacts for each service level and how to map them back to controls.  How a governance group to interface with auditors or examiners can help ease your pain.  What types of things do auditors/examiners ask for and how to prepare.  Lessons learned. TODAY’S DISCUSSION
  • 5.  Controls, not the HOW or the process, is the focus.  As long as your process can show  the controls,  that the controls are implemented and tested  Then the process you use to build software is up to you and your organization. REGULATIONS DO NOT TELL YOU HOW TO BUILD SOFTWARE
  • 6.  Business units  Any business department that impacts financial statements  Accounting  Finance  HR (executive compensation, etc.)  IT  IT general controls  IT application controls TYPES OF SOX CONTROLS
  • 7. IT GENERAL CONTROLS  Control environment, designed to shape the “tone at the top”  Change management procedure  Source code/document version  Software development life cycle standards  Logical access policies  Incident management policies and procedures (operational processing)  Problem management policies and procedures  Technical support policies and procedures  Hardware/software configuration, installation, testing  Disaster recovery/backup recover procedures  Physical security
  • 8.  Completeness checks – records processed end to end  Validity checks – only valid data input or processed  Identification – all users uniquely and irrefutably identified  Authentication – mechanism in application system  Authorization – only approved users have access  Input controls – ensure data integrity fed from upstream sources  Forensic controls – data scientifically and mathematically correct IT APPLICATION CONTROLS
  • 9. In all, 12 IT control objectives, which align to the Public Company Accounting Oversight Board (PCAOB) Auditing Standard No. 2 and Control Objectives for Information and related Technology (COBIT ®), were defined for Sarbanes-Oxley. Figure 1 provides a high-level mapping of the IT control objectives for Sarbanes-Oxley described in the IT Control Objectives for Sarbanes Oxley , 2nd edition document, IT general controls identified by the PCAOB and the COBIT 4.0 processes.
  • 10.  Things that impact financial statements  Business units should have these documented  Talk to your CFO BUSINESS CONTROLS
  • 11. Feasibility Initiation Release Planning Iterate Close Out PROJECT LIFECYCLE 1. Identify the controls at each lifecycle stage. A. Business controls B. IT general controls C. IT application controls 2. Update your SDLC and identify the controls and how you are going to prove that the control was met, tested, or validated.
  • 12.  Our friends at Wikipedia say:  A service-level agreement is an agreement between two or more parties, where one is the customer and the others are service providers.  Use them in your SDLC to define service levels  Applicable controls  The required deliverables or documentation  As projects are requested, have the requestor define the SLA SERVICE LEVEL AGREEMENTS (SLA)
  • 13.  Determine what makes sense in your organization to distinguish between levels. Examples include:  The type of change being requested  data change versus code/functionality change vs minor software upgrade  Will the request impact a SOx key control or financial information posted to the General Ledger (Accounting/Financial Reporting)  Is the change being made to a SOx critical IT application  Level of effort in terms of scope and business unit/developer time to implement the request  Cost  # of resources  time  Required deliverables and controls vary between the service levels SERVICE LEVELS
  • 16.  Release plan with the controls identified in stories  Test plan with specific test identified to test or validate controls WHERE TO TEST CONTROLS
  • 17. A GOVERNANCE GROUP CAN HELP  Interface between IT and auditors/examiners  Set agreed upon deadlines for response to findings  Focused on controls and keeping them updated  Continuous monitoring of adherence  Keep IT aware of findings, any needed action and deadlines  Ensure IT is trained and aware of control deliverables
  • 18.  Things they wanted to know  What is our SDLC  Controls within the SDLC  Prove that the control was implement/tested  Show us the documentation to prove it was tested  If it wasn’t documented, it didn’t happen  Show screen shots of anything with calculations, money, etc.  Normally we knew ahead of time what they wanted to review  Responding to requests  Pull documentation they request; normally they’ll request a release or project  Save it to a location they can get to  Responding to findings  Material vs immaterial  Will need to take action on the material findings; they will be disclosed on financial statements  May be told that the immaterial will become material if not resolved EXAMINERS, AUDITORS, OH MY
  • 19.  Perform periodic internal testing of IT controls  Resolve any findings ahead of audits/exams  Governance of this is a full time job  Use a team to work through the controls and documentation within the SDLC – include governance and multiple roles (Dev, BA, QA, Architecture, PM) LESSONS LEARNED
  • 20.  Twitter: TamiLFlowers  LinkedIn: Tami Flowers  Slideshare: www.slideshare.nettamiflowers  Thanks! ME

Editor's Notes

  1. Public Company Accounting Oversight Board