• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

ERP Systems

Auditing Controls in ERP Systems - 2019

ERP Systems

MIS 5121.401 ■ Fall 2019 ■ Jim Baranello, CISM, CRISC, MBA
  • HomePage
  • About
  • Syllabus
  • Roster / Schedule / Teams

Week 08: Security 2, Finance 2

Week 8: Security 2, Finance 2 Wrap-up

October 24, 2020 by Jim Baranello, CISM, CRISC, MBA

Continuing great job on the discussions. Keep up the good work.   My summary view is:

Q1: Do businesses rely too much on security administrators vs. security of the entire network?  Most of you highlighted the network being the highest risk.  I tend to agree with you – as in today’s computer environments, the network get’s you in the door.  Nevertheless, it’s important to manage all areas of security and make sure even the administrators are using state of the art practices and techniques.   Risks are everywhere.

Q2: Why only have one posting period open at a time? As you pointed out, this is mainly to prevent errant postings in the wrong month.  It also supports the discipline of making sure when events occur in the real or physical world, the corresponding transaction(s) occur in the ERP system.

Q3: What’s the most important finance / accounting control? …authorization control? Some good discussion on this question.  I would have preferred you using my list to prioritize but most of you didn’t have that list due to my late posting of the video.  My experience is that documented policies & procedures with strong reconciliation and auditing that they are followed is critical.  Focus as usual on the high value and high risk items.

Q4: Have you experienced difficult, cumbersome, … security problems?  Thanks for sharing some great stories of your real experiences.  Most of you highlighted password headaches.  Regardless, it’s important to understand the end results of what users are actually doing (law of unintended consequences).  If you lock down the process tight so everyone writes the password down on their screen – in the end you have poor security.  In the end, a balance is necessary – is the complexity worth the headache?  However, who gets to set balance is usually someone at the top of the organization.

Filed Under: Week 08: Security 2, Finance 2 Tagged With:

Guest Lecturer Steven Yannelli Bio

October 19, 2020 by Jim Baranello, CISM, CRISC, MBA Leave a Comment

Below is a brief bio of our guest lecturer on Monday (October 23)

“Steven Yannelli is a recognized leader in SAP application security who has worked in ERP security for the past 15 years. For six years, he managed the largest international SAP implementation to date (at Walmart) and has been a consultant with Deloitte & Touche and PriceWaterhouseCoopers. He is also a US Army combat veteran who served as a Captain and Commanding Officer within the 56thStryker Brigade Combat Team. He deployed to Iraq from 2008-2009 where he managed a secure communications network.

Steven holds a CISSP certification and a graduate degree from Drexel University. He is now a Senior Manager at CSL Behring and currently leads their global SAP security and consulting teams across four countries.”

Filed Under: General, Week 08: Security 2, Finance 2 Tagged With:

Week 8: Questions

October 17, 2020 by Jim Baranello, CISM, CRISC, MBA Leave a Comment

  1. Do you believe businesses rely too much on administrators to configure the security protocols in programs like SAP, rather than look for security in the entire network?  Explain
  2. What is the relevance of only being able to have one posting period open at a time for real time financial postings?  What does this prevent from happening?
  3. Consider the list of financial and accounting controls discussed in class.  Rank them.  Which to you believe is the most important, the least.  Why?
  4. You’ve used various computer systems in your lifetime, career.  System security is complex and often maligned as cumbersome, difficult, bureaucratic, etc.  Have you seen these problems in your experience?   Explain

Filed Under: Week 08: Security 2, Finance 2 Tagged With:

Primary Sidebar

Weekly Discussions

  • Assignments (11)
  • Exams (7)
  • General (8)
  • Real World Control Failure Presentations (3)
  • Week 01: Introduction (2)
  • Week 02: Business Process; Assertions (4)
  • Week 03: Fraud, P2P Controls (2)
  • Week 04: OTC Process, Types of Controls (3)
  • Week 05: Inventory & Shipping Controls (3)
  • Week 06: Invoicing & Collection Controls (1)
  • Week 07: General IT vs. SAP Controls, Security 1 (2)
  • Week 08: Security 2, Finance 2 (3)
  • Week 09: Security: User Mgmt, Segregation of Duties (2)
  • Week 10: Data; SOD/SAT Review (2)
  • Week 11: Change Management, Development (3)
  • Week 12: Table Security, Control Framework (2)
  • Week 13: SAP Futures, Special System Access (2)
  • Week 14: Character vs. Controls (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in