Title Page

  • Company Name

  • Registered Address
  • Prepared by

  • Conducted on

Establish safeguards to prevent data tampering

  • Implement an ERP system or GRC software that tracks user logins access to all computers that contain sensitive data.

  • This system detects break-in attempts to computers, databases, fixed and removable storage, and websites.

Establish safeguards to establish timelines

  • Implement an ERP system or GRC software that timestamps all data as it is received in real-time.

  • This data should be stored at a remote location as soon as it is received, thereby preventing data alteration or loss.

  • Log information should be moved to a secure location and an encrypted MD5 checksum created, thereby preventing any tampering.

Establish verifiable controls to track data access

  • Implement an ERP system or GRC software that can receive data messages from virtually an unlimited number of sources.

  • The collection of data should be supported by file queues, FTP transfers, and databases, independent of the actual framework used, such as ISO/IEC 27000.

Ensure that safeguards are operational

  • Implement an ERP system or GRC software that can issue daily reports to e-mail addresses.

  • This system distributes reports via RSS, making it easy to verify that the system is up and running from any location.

Periodically report the effectiveness of safeguards

  • Implement an ERP system or GRC software that generates multiple types of reports, including a report on all messages, critical messages, alerts.

  • This system uses a ticketing system that archives what security problems and activities have occurred.

Detect Security Breaches

  • Implement an ERP system or GRC software that performs semantic analysis of messages in real-time and uses correlation threads, counters, alerts, and triggers that refine and reduce incoming messages into high-level alerts.

  • These alerts then generate tickets that list the security breach, send out email, or update an incident management system.

Disclose security safeguards to SOX auditors

  • Implement an ERP system or GRC software that provides access to auditors using role-based permissions.

  • Auditors may be permitted complete access to specific reports and facilities without the ability to actually make changes to these components, or reconfigure the system.

Disclose security breaches to SOX auditors

  • Implement an ERP system or GRC software capable of detecting and logging security breaches, notifying security personnel in real-time, and permitting resolution to security incidents to be entered and stored.

  • All input messages are continuously correlated to create tickets that record security breaches and other events.

Disclose failures of security safeguards to SOX auditors

  • Implement an ERP system or GRC software that periodically tests network and file integrity, and verifies that messages are logged.

  • Ideally the system interfaces with common security test software and port scanners to verify that the system is successfully monitoring IT security.

Sign Off

  • Additional Observation

  • Internal Auditor Name & Signature

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.