32
ATA Technologies Michael Laffoon www.atacpatech.net 731.664.0102 [email protected] About ATA Technologies ATA Technologies LLC was founded in 2004 as Trinity Solutions LLC. In 2007, we merged with Alexander Thompson Arnold CPAs to form a strong partnership. Our mission is simple: Deliver technology services, so our clients can focus on their businesses Offices in Jackson, Memphis, and Nashville with 13 employees. Network Management Business Solutions Hardware & Software Solutions Technology Assessments Remote Access Disaster Recovery Offsite Backup Services Security Solutions IT Auditing Computer Forensics

About ATA Technologies ATA Technologies Michael Laffoon

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: About ATA Technologies ATA Technologies Michael Laffoon

ATA Technologies

Michael Laffoon

www.atacpatech.net

731.664.0102

[email protected]

About ATA Technologies

ATA Technologies LLC was founded in 2004 as Trinity Solutions LLC. In 2007, we merged with Alexander Thompson Arnold CPAs to form a strong partnership.

Our mission is simple: Deliver technology services, so our clients can focus on their businesses

Offices in Jackson, Memphis, and Nashville with 13 employees.

Network Management

Business Solutions

Hardware & Software Solutions

Technology Assessments

Remote Access

Disaster Recovery

Offsite Backup Services

Security Solutions

IT Auditing

Computer Forensics

Page 2: About ATA Technologies ATA Technologies Michael Laffoon

A S T A N D A R D F O R R E P O R T I N G O N A S E R V I C E O R G A N I Z A T I O N ’ S C O N T R O L S A F F E C T I N G U S E R E N T I T I E S ' F I N A N C I A L S T A T E M E N T S . O N L Y F O R U S E B Y S E R V I C E O R G A N I Z A T I O N M A N A G E M E N T , E X I S T I N G U S E R E N T I T I E S , A N D T H E I R A U D I T O R S .

SAS No. 70, Service Organizations

Page 3: About ATA Technologies ATA Technologies Michael Laffoon

THE CPA Auditor

Page 4: About ATA Technologies ATA Technologies Michael Laffoon

SAS No. 70, Service Organizations

Misuse:

• “SAS 70 Certified” or “SAS 70 Compliant”

• Controls related to subject matter other than internal control over financial reporting

• Made report public

Page 5: About ATA Technologies ATA Technologies Michael Laffoon

Other Service Organization Control Reports

Marketplace demand for detailed report on controls on subject matter other than internal control over financial reporting include:

Security Availability Processing integrity Confidentiality Privacy

Page 6: About ATA Technologies ATA Technologies Michael Laffoon

How the AICPA Addressed Issues

Split SAS 70 into two standards: one for service auditors (SSAE 16), the other for user auditors (effective for 2012 year-end audits)

Recognized need for assessment of controls over security, availability, processing integrity, confidentiality or privacy

Brought together all options for reporting on controls at service orgs

Supported public interest by helping CPAs/service organizations correctly apply and use the standards

Page 7: About ATA Technologies ATA Technologies Michael Laffoon

The New CPA Auditor

Page 8: About ATA Technologies ATA Technologies Michael Laffoon

Report (restricted use)

Engagement performed under:

SSAE 16 (auditor obtains level of evidence and assurance as in SAS 70 service auditor engagement)

AICPA Guide, Applying SSAE No. 16, Reporting on Controls at a Service Organization

Contents of report package:

Description of service organization system CPA’s opinion on fairness of description, suitability of

design, operating effectiveness of controls

Page 9: About ATA Technologies ATA Technologies Michael Laffoon

Reports – Type 1 and Type 2

Type 1 also reports on the suitability of the design of the controls to achieve the related control objectives included in the description as of a specified date

Type 2 also reports on the suitability of the design and operating effectiveness of the controls to achieve the related control objectives included in the description throughout a specified period

Page 10: About ATA Technologies ATA Technologies Michael Laffoon

SSAE 16 (SOC 1) Report – Walkthrough

SOC 1 - Report Sections

Management Assertion

Service Auditor Opinion

Description of Systems

Test Results (for Type 2)

Complementary Controls

Other Information

Page 11: About ATA Technologies ATA Technologies Michael Laffoon

SSAE 16 (SOC 1) Report – Walkthrough

These 2 knew how to Audit

Until –

Page 12: About ATA Technologies ATA Technologies Michael Laffoon

Testing

What’s in this section: Lists of control tests that the service auditor performed Results of service auditor’s testing of each control … all of the above provided by the service auditor

What to consider when reviewing this section: Adequacy of control objectives being tested Test exceptions or errors (if any) Consider the impact of any exceptions or errors

Note: As with previous SAS 70 Type 2 reports, you may see differences in terminology among CPA firms, some may title this section “Control Objectives and Related Controls”, some may call it “Tests of Operating Effectiveness” section of the report.

Page 13: About ATA Technologies ATA Technologies Michael Laffoon

Testing (con’t)

IT Controls

Physical Controls

Physical Access

IT Assets

New Hires

Backups

Security Policies

Logical Controls

Who has access to what – Active Directory

Vlans

Network intrusion

Page 14: About ATA Technologies ATA Technologies Michael Laffoon

THE Great IT Auditor

Page 15: About ATA Technologies ATA Technologies Michael Laffoon

The NEW Team

Page 16: About ATA Technologies ATA Technologies Michael Laffoon

IT Auditing

How to ensure confidentiality, integrity, and availability of critical systems thru Administrative, Technical, and Physical controls.

Page 17: About ATA Technologies ATA Technologies Michael Laffoon

Key Areas We Look At

Ensuring confidentiality, integrity, and availability of critical systems:

Administratively

With Technical Controls

With Physical Controls

With regards to Software Development and Hardware Deployment

Page 18: About ATA Technologies ATA Technologies Michael Laffoon

Ensuring confidentiality, integrity, and availability of critical systems Administratively

Policies: Security Policy, Vendor Selection Policy, Privacy Policy, Incident Response Policy, Social Media Policy, etc.

Procedure to adding New Users Procedures for Terminations Segregation of Duties What is the flow of information, Communication, how

are events and/or failures reported. For key IT staff. Knowledge, Experience, Defined Roles

and Responsibilities, Continuous learning Are IT Initiatives and Strategic Planning defined and

documented

Page 19: About ATA Technologies ATA Technologies Michael Laffoon

Ensuring confidentiality, integrity, and availability of critical systems thru Technical Controls

Users - Authentication and Passwords How do I authenticate Password Complexity weak or strong

Length Expiration History timeouts

Network Connectivity Implementation of firewalls Who has access to firewall – unique

Antivirus Encryption How do you logically limit a users rights for their specific job

responsibility?

Page 20: About ATA Technologies ATA Technologies Michael Laffoon

Ensuring confidentiality, integrity, and availability of critical systems thru Physical Controls

Where and how is everything Physically stored and protected

Backups

How are they done, Where are they stored, Are they working?, Tested?

The Computer Room – How is it Safeguarded

Fire Suppression, failover, hardware warranty, who can get in, Camera,

The Building

Keys, Photo ID, After Hours Access,

Page 21: About ATA Technologies ATA Technologies Michael Laffoon

Ensuring confidentiality, integrity, and availability in regards to Software Development and Hardware Deployment

Software Development Is there a policy and/or procedure in place. Development of new systems and changes to existing systems are

properly authorized, reviewed, and tested and prior to implementation.

Access to Source Code: Programmers program, etc. Program changes are properly requested and authorized:

documented, sign offs, chain of process Changes are done in a test environment

Hardware Deployment Is there a policy and/or procedure in place. Are changes controlled? Are back out procedures in place?

Page 22: About ATA Technologies ATA Technologies Michael Laffoon

For more information, contact:

Michael Laffoon

ATA Technologies, LLC.

Partner

[email protected]

731.343.2221

www.atacpatech.net

Page 23: About ATA Technologies ATA Technologies Michael Laffoon

SSAE 16 (SOC 1) Report – Walkthrough

SOC 1 - Report Sections

Management Assertion

Service Auditor Opinion

Description of Systems

Test Results (for Type 2)

Complementary Controls

Other Information

Page 24: About ATA Technologies ATA Technologies Michael Laffoon

Management Assertion

The written assertion must cover: Fair presentation of the description of systems Suitability of the design of controls Operating effectiveness (Type 2 only) of controls

Management must have a “reasonable basis” The basis is the reason management believes that the controls were

appropriately designed and operating effectively throughout the period May rely on Internal Audit testing May not rely on testing done by independent service auditor

The written assertion is provided to the service auditor by management

Page 25: About ATA Technologies ATA Technologies Michael Laffoon

Reviewing the Management Assertion

What to look for when reviewing: Is the time period appropriate? Does it cover the application and/or service you are using? Does it fully acknowledge management’s responsibilities?

Management must acknowledge in writing: That their description doesn’t omit or distort information The criteria they used when making the assertion that the description is

presented fairly That their description includes any relevant details of changes to systems that

occurred during the time frame That it has identified risks that threaten the achievement of the control objectives

(risk assessment) The controls & control objectives specified provide reasonable assurance that

identified risks would not prevent the control objectives from being achieved

Page 26: About ATA Technologies ATA Technologies Michael Laffoon

Independent Service Auditor’s Opinion

What’s in the opinion: A reference to management’s assertion Description of tests of controls that were performed

Service auditor’s opinion on: Fairness of management’s description of systems Controls were suitably designed Operating effectiveness of controls tested (Type 2 only)

The Type 1 Opinion covers: Design of controls, as of a single point-in-time

The Type 2 Opinion covers: Operating effectiveness over the entire reporting period Suitability of the control design over the entire reporting period * The fair presentation of the system implemented over the entire reporting period * * these are different from the SAS 70 standard

Page 27: About ATA Technologies ATA Technologies Michael Laffoon

Reviewing the opinion

What to look for when reviewing the opinion: Is the report’s scope appropriate? Is the time period covered appropriate? Is it qualified or unqualified? Is it a Type 1 or Type 2? Is the opinion inclusive or does it contain a carve-out?

If the opinion is qualified (“except for”) Why is it qualified? What control objective(s) failed? How significant is the failure? Consider potential impact (if any) on financial reporting

If there’s a sub-servicer carve-out Service auditor expresses no opinion over controls of sub-servicers Consider the significance of what is being carved out

Page 28: About ATA Technologies ATA Technologies Michael Laffoon

Description of Systems

What’s in the description Description of management’s systems List of control objectives specified by management List of individual controls that support each objective … all of the above are provided by management

What to consider when reviewing this section: Is the description adequate? Are the control objectives adequate? Consider: If this service or application were being run in house,

what kinds of controls would your organization have in place? Then, Does the service organization have them?

Page 29: About ATA Technologies ATA Technologies Michael Laffoon

Results of Testing

What’s in this section: Lists of control tests that the service auditor performed Results of service auditor’s testing of each control … all of the above provided by the service auditor

What to consider when reviewing this section: Adequacy of control objectives being tested Test exceptions or errors (if any) Consider the impact of any exceptions or errors

Note: As with previous SAS 70 Type 2 reports, you may see differences in terminology among CPA firms, some may title this section “Control Objectives and Related Controls”, some may call it “Tests of Operating Effectiveness” section of the report.

Page 30: About ATA Technologies ATA Technologies Michael Laffoon

Complimentary User Entity Controls Considerations

Complimentary user entity controls are essential!

Identify the controls that apply to your organization

The scope of the report may cover multiple services

The report may cover multiple business units

Hosted applications may have multiple modules

Page 31: About ATA Technologies ATA Technologies Michael Laffoon

Reviewing the Complementary Control Considerations

For any listed controls that you have implemented:

Consider the design of your controls Consider the operating effectiveness of the controls

When were the controls last tested? Who did the testing? Were the results satisfactory? If not, has remediation & re-testing been performed?

For any controls that you have NOT implemented:

Document the reason for non-implementation.

Consider the risk of not implementing the control? Are there other/stronger controls that mitigate the risk?

Key Point: The control objectives specified in the SSAE 16 can only be achieved if the specified complementary user entity controls are suitably designed, implemented and operating effectively by the user entity (a/k/a you, the user of the service)

Page 32: About ATA Technologies ATA Technologies Michael Laffoon

Other Information

This information is provided by management It is not part of the description of systems

Examples of Other Information “Forward looking” information Business Continuity & Disaster Recovery Plans Discussion of future service enhancements Planned infrastructure upgrades

The service auditor is only required to read for material inconsistencies

Key Point: This section is unaudited by service auditor