WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

ERO system: implementation, audit and control risks

( Télécharger le fichier original )
par Borhen KHATIB
INSEEC - MSc Program in Audit and Control Management 2010
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

4.2. What should be reviewed?

In any systems implementation, it is not just about the software. There are many other components that make up a successful implementation and these will be identified. Each of these areas may necessitate specialised audit, as they require a unique level of knowledge and skills set. Although I have mentioned each of these components separately, it is important to understand that they all interact with each other and are part of an organisational system.

4.2.1. Hardware

Each software vendor will provide the business with certain minimum specifications that they should follow when determining the hardware requirements of clients and servers. These requirements should be strictly adhered to. Often these specifications will be based on statistics that the auditors have provided the vendor with regarding volumes of transactions that are to be processed. Every effort should be made to ensure that these statistics are correct as this may result in sizing problems. The organisation should ensure that they size the hardware in such a manner that it provides for growth.

4.2.2. Network

There's nothing worse than going live and finding that inadequate network speed brings the system to a screeching halt. Efforts should be made to ensure that network speeds are tested and that all persons involved in system operation have access to the network. Control should also be maintained over the network to prevent unauthorised users gaining access.

4.2.3. Software

Every organisation has various layers of software upon which their ERP systems reside as well other systems, both internal and external, with which they interact - see figure 2. Audits should be conducted of software subsystems within the organisational system. The following are key areas that should be examined:

- Standard ERP parameters, including application controls, authorisations and standard security configuration.

- Application security - to ensure processing occurs in an efficient and controlled

manner, while protecting valuable data.

- Configuration decisions - to help provide reasonable assurance of the integrity of business processes and application security.

- Design documentation - to ensure appropriate security and control.

- The security administration process - to provide reasonable assurance that access granted is appropriately identified, evaluated and approved.

Many business processes may be extended out over the intranet, extranet or Internet. The auditor should provide reasonable assurance that security processes appropriately address these risks.

4.2.4. Processes

An audit of an ERP should provide assurance on the integrity of processes in use by the business. Specifically, the following tasks relating to audit and review should be undertaken.

- Identify control objectives for processes being implemented.

- Identify and assess potential business risks and financial risks in the processes

being implemented.

- Develop and design the most effective and efficient ways of controlling these risks (which implementers generally do not focus on or do not have the expertise to develop).

- Perform an independent analysis of key business activities, comparing organisation processes to leading practices and recommending process improvements.

- Provide assurance that the controls within ERP are appropriate and effective.

- Review the interfaces feeding into ERP from non-ERP systems (such as, including legacy, web-based and mobile computing applications).

- Perform audit tests focusing on business process and internal control. Many organizations reengineer business processes during ERP implementation. Review business continuity plans and provide reasonable assurance that they have been tested.

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Un démenti, si pauvre qu'il soit, rassure les sots et déroute les incrédules"   Talleyrand