SAP ITGC Auditing

The basic idea behind introducing SAP (System Applications and Products) was to provide the customers the ability to interact with common corporate databases for a comprehensive range of applications. SAP is an integrated ERP (Enterprise Resource Planning) to make business process work efficiently.

Training Logo
Overview

Understanding the core business processes, the integration of SAP applications & system control to optimize the internal control system in order to meet the regulations & international standards. Basic understanding of GRC will also be provided so that participants become aware of the latest compliance tool of SAP.

  • Duration
    40 hours
  • Batches
    Customizable as per your need
  • Suitable for
    Working professionals and students working in Information system and security domain of SAP
  • Course Details
    Download PDF
What you will learn
  • Impact of the Corporate Governance, SEBI Guidelines, SOX and other auditing standards (for example, ISA) that are relevant for the auditors on the audit process
  • Compact overview of the Authorization concept.
  • Basic system settings and logs
  • Organizational units and organizational structure within an SAP system, Practical analysis of the risks and controls using test cases. General Customizing and controls in Accounting while taking into account the impact on the audit process.
  • Auditing of business processes, for example, Procurement, Production, and Sales Order Processing.
  • Auditing the end of period financial statements, for example, period- end closing in internal Accounting (Controlling) and in Financial Accounting and Asset Accounting, Evaluation of work in process, allowances, and stock.
  • Auditing of specific evaluation methods, for example, stock in an anonymous warehouse, planned cost accounting and inventory costing, actual costing. Transfer of the financial accounting data, balances, and document information to the auditor’s computer in standard format for further analysis (for example, in ACL, IDEA, Excel).
  • Protecting the SAP Server from Cyber Attack. Basic overview on SAP GRC along with some Practical's.
background

Course Agenda

01

Control -1

  • Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles/roles, critical financial reporting transactions, and segregation of duties (SOD).

02

Control - 2

  • Access for terminated and/or transferred users is removed or modified in a timely manner.

03

Control – 3

  • User access is periodically reviewed.

04

Control - 4

  • SOD is monitored and conflicting access is either removed or mapped to mitigating controls, which are documented and tested.

05

Control - 5

  • Access is authenticated through unique user IDs and passwords or other methods as a mechanism for validating that users are authorized to gain access to the system. Password parameters meet company and/or industry standards (such as, password minimum length and complexity, expiration, account lockout).

06

Control – 6

  • Privileged-level access (such as configuration and security administrators) is authorized and appropriately restricted.

07

Control – 7

  • The key attributes of the security configuration are appropriately implemented.

08

Control – 8

  • Application changes are appropriately tested and approved before moving into the production environment.

09

Control – 9

  • Access to implement changes into the application production environment is appropriately restricted and segregated from the development environment.

10

Control – 10

  • Management approves the results of the conversion of data (such as balancing and reconciliation activities) from the old application system or data structure to the new application system or data structure. Management also monitors that the conversion is performed in accordance with established conversion policies and procedures.

11

Control – 11

  • Only authorized users have the access to update the batch jobs (including interface jobs) in the job scheduling software.

12

Control – 12

  • Critical systems, programs, and/or jobs are monitored and processing errors are corrected to ensure successful completion.
background

Why Choose us?

Over 200 classes are scheduled conveniently every year with small training groups and industry experienced faculties that provides:

  • One-Stop shop for IT Training
  • Companywide IT Training Solutions
  • Interactive Teaching Methodology
  • Job Oriented Training Solutions
  • Flexible modes of training
  • Recorded sessions are available
  • Live Project Experience

In a hurry? Let's chat!

Contact us on Whatsapp
logo
Our Locations