top of page

A SOX compliance checklist should include the following items that draw heavily from Sarbanes-Oxley Sections 302 and 404. For each item, the signing officer(s) must attest to the validity of all reported information.

​

 1. Establish safeguards to prevent data tampering 


Implement a ERP system or GRC software that tracks user logins access to all computers that contain sensitive data and detects break-in attempts to computers, databases, fixed and removable storage, and websites.

​

 2. Establish safeguards to establish timelines

 
Implement an ERP system or GRC software that timestamps all data as it is received in real-time. This data should be stored at a remote location as soon as it is received, thereby preventing data alteration or loss. In addition, log information should be moved to a secure location and an encryped MD5 checksum created, thereby preventing any tampering.

​

 3. Establish verifiable controls to track data access


Implement an ERP system or GRC software that can receive data messages from virtually an unlimited number of sources. Collection of data should be supported from file queues, FTP transfers, and databases, independent of the actual framework used, such as COBIT and ISO/IEC 27000.

 

4. Ensure that safeguards are operational


Implement an ERP system or GRC software that can issue daily reports to e-mail addresses and distribute reports via RSS, making it easy to verify that the system is up and running from any location.

​

 5. Periodically report the effectiveness of safeguards


Implement an ERP system or GRC software that generates multiple types of reports, including a report on all messages, critical messages, alerts and uses a ticketing system that archives what security problems and activities have occurred.

​

6. Detect Security Breaches

 
Implement an ERP system or GRC software that performs semantic analysis of messages in real-time and uses correlation threads, counters, alerts, and triggers that refine and reduce incoming messages into high-level alerts. These alert then generate tickets that list the security breach, send out email, or update an incident management system.

​

 7. Disclose security safeguards to SOX auditors


Implement an ERP system or GRC software that provides access to auditors using role-based permissions. Auditors may be permitted complete access to specific reports and facilities without the ability to actually make changes to these components, or reconfigure the system.

 

 8. Disclose security breaches to SOX auditors


Implement an ERP system or GRC software capable of detecting and logging security breaches, notifying security personnel in real-time, and permitting resolution to security incidents to be entered and stored. All input messages are continuously correlated to create tickets that record security breaches and other events.

 

9. Disclose failures of security safeguards to SOX auditors


Implement an ERP system or GRC software that periodically tests network and file integrity, and verifies that messages are logged. Ideally the system interfaces with common security test software and port scanners to verify that the system is successfully monitoring IT security.

bottom of page