The Sarbanes-Oxley Act of 2002, is a United States federal law enacted on July 30, 2002 in response to many major corporate and
accounting scandals. The Act is commonly called “SOX”.
S4 SOX Compliance
Without security, there can be no compliance. Security
provides the necessary checks and balances to effectively
implement compliance programs such as SOX.
Conduct periodic reviews to ensure that contractors’ roles and
access rights are appropriate and in line with agreements.
(APO07.06)
COBIT ACTIVITY
Background
The two most important sections for information security and compliance in SOX are sections 302 and 404. COBIT is used by many
companies as a framework supporting IT specific efforts towards complying with SOX sections 302 and 404. However, there are certain
aspects of COBIT that are outside the boundaries of SOX regulation. COBIT currently delineates five domains and thirty-seven processes.
These processes are then further specified into practices. In this report of S4’s applicability and support towards SOX compliance, we
focus on the practices and activities pertinent to that.
S4, SOX, and the COBIT Framework
S4 identifies authorization bypass vulnerabilities
which is an effective way to audit access rights.
In the specific case of acquisition of infrastructure, facilities and
related services, include and enforce the rights and obligations
of all parties in the contractual terms. These rights and
obligations may include service levels, maintenance
procedures, access controls, security, performance review,
basis for payment and arbitration procedures. (APO10.02)
S4 identifies third-party integrations to Salesforce
thus providing an effective way to audit data access
and the associated security controls.
Capture information on IT risk events that have materialized, for
inclusion in the IT risk profile of the enterprise. (APO12.03)
S4 identifies risk associated with custom
development and the output from S4 can be
captured in a risk register.
Undertake regular reviews of the effectiveness of the ISMS (info
security mgmt system) including meeting ISMS policy and
objectives, and review of security practices. Take into account
results of security audits, incidents, results from effectiveness
measurements, suggestions and feedback from all interested
parties. (APO13.03)
S4 is a full-spectrum application security platform
which should be used on a regular basis to review the
effectiveness of ISMS.