> I suppose my three immediate questions would be:
> 1. What is SOX intended to prevent?

Fraud and theft, no more, no less.  

When you examine it closely, SOX really is an ingeniously crafted piece
of legislation.  Rather than creating long lists of "You Must" clauses
followed by "we will Check on you by..." statements (and a gigantic
federal bureaucracy to match), SOX simply says to the CEO and CFO "You
will sign a letter stating that you have adequate financial controls in
place to prevent fraud and theft.  If you sign that letter and you're
wrong, you could go to jail".  Brilliant!  

(See a nice summary of SOX Section 404 at
http://www.aicpa.org/info/sarbanes_oxley_summary.htm)

Congress simply told the head honcho's that it is their butts that are
on the line.  The head honcho's have always had the where-with-all to
turn the organization towards security and best practices, all Congress
did was give them the motivation. :)

Now the Honcho's have to take a critical eye at the organization and ask
themselves...

"If, under our current operating practices, Rocko on the shipping Dock
can steal a semi truck full of widget's and nobody would even know they
are gone, or Jane in IT could open up a hole for Tom in AP to pay
himself 7 digit's as a phony vendor, and there is no way to capture
that, AND I don't deploy the organizations resources in such a way that
I could stop (or at least detect) those actions, I could go to jail."
All of the sudden, the Honcho's want adequate controls in place.  If you
were in their shoes, you would too.

And I know from personal experience that if you take an average
production iSeries system with, say 800 users on it, somewhere between
25% - 100% of those users could rob the place blind because there are
little, or no, controls deployed to prevent this.  In the old days, we
all used to just wink at each other and say "Aww... Our users are too
{(A) Nice, B) Honest, C) Stupid, D) Busy, E) Select your own adjective
}, they are not going to steal from us".  Today the CEO and CFO look at
those 800 people and say "I guess they probably won't steal from us -
but if I guess wrong, I could face criminal charges".  

And all of the sudden they start viewing system security differently.
They start orientating themselves to the same posture that IT Security
professionals have had all along - "Nobody gets access on less they
absolutely need it."  You, the System Admin, may think this is useless
and wasteful, but get used to it because it is the future of computing.


> 2. How effective is it at actually enforcing what it's
> intended to
> prevent?

As effective as the CEO wants it to be - everyone has a pain tolerance -
at some point the CEO will decide that there are enough controls in
place that he/she stands a high chance of _not_ going to jail, and will
ease up (a bit).  Personally I think SOX already is very, very
effective, because the folks who have the highest ability to influence
the outcomes (Honcho's) have the most skin in the game.  Again, this
part was pure brilliance.

> 3. What are the new methods of circumventing it?

Remember, SOX does not say how to secure your iSeries (or any other
system).  It does not state an opinion on what QSECURITY level you
should be at, or what your Password Change Interval should be.  It just
says that you must have adequate controls in place, and you must get an
external auditor to agree with you (in writing) that there are adequate
controls in place.  All of the auditors are playing this one very
nervously because they remember what happened to Arthur Anderson.

(An Arthur Anderson "Partner" lied, and committed other crimes, in an
effort to cover up Enron's financial misdeeds.  Because he was a
"Partner", the entire corporation was liable for his crimes, and so the
company was convicted of a felony.  Felons are not allowed to hold
corporate charters, and so on the very day that Arthur Anderson was
convicted of a felony, it lost its license to do business as a
corporation.  On that day a 100+ year old icon of American business just
ceased to exist.)

So there is no _one_ way to "circumvent SOX.   You have (or should have)
a security policy, and then you should manage your business according to
that policy.  Your auditors will generally be happy if they can measure
your adherence to your own written policy, and grade you on how well you
are doing what you said you would do.   

That is the essence of SOX.  Do good things.  Manage your company so
that people can not steal from the business without being detected.  If
you do this, you are well on your way to SOX Compliance.   If you don't
do this, maybe you ought not to be the one running the business (or its
IT assets)?

JMHO,

jte




--
John Earl | Chief Technology Officer
The PowerTech Group
19426 68th Ave. S
Seattle, WA 98032
(253) 872-7788 ext. 302
john.earl@xxxxxxxxxxxxx
www.powertech.com 
Celebrating our 10th Anniversary Year!
 

 
This email message and any attachments are intended only for the use of
the intended recipients and may contain information that is privileged
and confidential. If you are not the intended recipient, any
dissemination, distribution, or copying is strictly prohibited. If you
received this email message in error, please immediately notify the
sender by replying to this email message, or by telephone, and delete
the message from your email system.
--




As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.