This report begins with a review of segregation of duties and sensitive access controls, and reasons why both subjects are often misunderstood by the audit and compliance community. It then offers an 11-step method for assessing business processes to find gaps where SoD and SA controls are necessary, establishing those controls, testing them for effectiveness, and documenting the process for outside review. The book includes (as appendices) several Excel spreadsheets giving examples of SoD and SA rules, and of capability listings to help assess control risks in key business processes.
- Topics
- Webcasts & Training
- Events
Join us to review the latest regulatory changes on data privacy and what they mean for your company and compliance program. Share best practices on managing cyber-risks and protecting your information in today’s work-from-home world.
Register
- Resource Library
- Special Reports
- Video
- Membership
Learn from the latest headlines and protect your company today
- Compliance called out in Walmart opioid lawsuit
- Cyber-security lessons from the SolarWinds hack
- How compliance officers can apply COSO’s ERM Framework
- Top ethics and compliance failures of 2020
Individual Corporate
No comments yet