- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- SOX Compliance Nightmares
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-23-2005 06:35 AM
тАО09-23-2005 06:35 AM
compliance and still be able to run their respective business.
As ridiculous as many of the requirements for compliance are, we are
compelled to meet them.
We currently have an audit firm assisting us with meeting SOX compliance.
One of the high points of concern is developer access to out production
HP-UX boxes.
Some background:
1. We are a small shop with less than 20 developers.
2. The developers have logins to the production boxes, but their login
forces them into an su - to a generic user.
3. Both the generic user and the developers are not allowed direct logins.
4. All activity of the developer once su'd is recorded and reported daily.
i.e. All activity from the history file is segregated by developer with
times and commands issued.
5. All work done by the developers involves korn shell scripts, some of
which execute SQL statements against an Oracle database(s). Each script
writes out to a log file.
6. The actual execution of the korn shell scripts is handled by a third
party scheduling product.
7. Should the scheduler note an error in execution, the developers need to
access the log file in order to resolve the problem.
What the auditing firm is adamant about is that no developer has access to the
production box.
Just how are some of you coping with not allowing access, but still supporting
your servers for processes written by and supported by a development team?
Any suggestions?
dl
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-23-2005 06:46 AM
тАО09-23-2005 06:46 AM
SolutionAnyway, I won't get started down that road.
We have had good luck with auditors by thoroughly documenting things that the auditors have concerns about.
Your procedures sound VERY VERY good and very thorough. I'm not sure why the auditors would have such a problem.
The first thing I would ask is WHY they are so adament. If they say because of SOX, ask them to show you specific area of the SOX act that pertains to your situation.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-23-2005 06:47 AM
тАО09-23-2005 06:47 AM
Re: SOX Compliance Nightmares
In a perfect world, the auditor is correct; however, it seems you have some pretty good policies and procedures in place to protect production environment.
At any time during this process, your company is allowed to accept the risk associated with a given weakness. What you then end up having to do is document that you understand the risk, accept it, and what you've done to reduce that risk.
The auditors should have a procedure for doing this. If they don't, toss them out on their ear as they're not worth the probably exhorbitant fee they're charging.
HTH;
Doug
------
Senior UNIX Admin
O'Leary Computers Inc
linkedin: http://www.linkedin.com/dkoleary
Resume: http://www.olearycomputers.com/resume.html
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-23-2005 06:51 AM
тАО09-23-2005 06:51 AM
Re: SOX Compliance Nightmares
To follow up on P.Walleck's post, he is correct that these requirements can be fought. One issue that I wrestled with a client company was the auditors' demand that all umasks be set to 077. That pretty much broke the applications - go figure.
I asked them to show me the source requirement. They never could so that particular item magically went away...
All that being said, the one good thing about SOX is that it's hopefully getting companies a little more security conscious. I worked at another significantly sized client in the financial district that had root level trust relationships, root crons running out of unprotected directories, etc, etc. Getting that area cleaned up took awhile, but would probably have been impossible without the SOX legislation breathing down management's neck...
Doug
------
Senior UNIX Admin
O'Leary Computers Inc
linkedin: http://www.linkedin.com/dkoleary
Resume: http://www.olearycomputers.com/resume.html
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-23-2005 06:55 AM
тАО09-23-2005 06:55 AM
Re: SOX Compliance Nightmares
The auditors are not there to tell you how to run the business, but to find out if you know 'why' you are doing the the things you are doing.
If you have a developed set of policies and procedures with accountability, you have pretty much met the goal from your standpoint.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-23-2005 06:56 AM
тАО09-23-2005 06:56 AM
Re: SOX Compliance Nightmares
I will be using many of the suggestions especially the "show me" ones.
Thanks and keep them comming, as I am loading up my ammo box.
All points will be assigned when I close this thread.
Thanks again.
-dl
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-23-2005 09:30 AM
тАО09-23-2005 09:30 AM
Re: SOX Compliance Nightmares
If you actually read the Sarbannes-Oxley act the IT related sections are extremely vague.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-24-2005 05:49 AM
тАО09-24-2005 05:49 AM
Re: SOX Compliance Nightmares
I recently passed my second SOX audit ... and nightmare is the perfect word for this, for sure.
My suggestions:
- If possible, send a mail to the developers with the log files they would need attached. That will help you to provide an evidence on that the developers don't need access to production boxes to check their jobs, and that you/they take care of the monitorisation of those jobs.
- As mentioned by Mr. Stephenson, if possible try that your developers deposit new programs out of the production servers. They should be able to test their programs on a similar/identical test environment, but I think they are not allowed to put them in production.
- In general terms, you are a "trusted" person, but the developers not ( don't want to offend anybody ;-) ). They should not have access to productive data. If they should have accesss to the productive server ( document the business reason and get approval from your client for that ), be sure that they do not have access to the productive data ( check unix permissions, database access, etc ). In case they still need the access, try to establish a procedure to control that access. For example, if they ocasionally need it, don't give them any privilege, only warn them that they should call you whenever they need such access, so you will go to enter the required user & passwd while sitting with them to control what they do ( let's say it's some sort of "manual" sudo ). OK, it's very simple example.
- Be sure that the escalation between you and your developers is well documented too.
Regards,
Zigor
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-25-2005 10:10 PM
тАО09-25-2005 10:10 PM
Re: SOX Compliance Nightmares
We also have an automatic email of log files out of non-zero return code batch programs, to production support.
Root access is a real issue - we had to enable trusted, audit and a syslog server to which the UNIX sysadmin has no access.
But, these measures aside, you will ALWAYS need an emergency change procedure.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-25-2005 11:39 PM
тАО09-25-2005 11:39 PM
Re: SOX Compliance Nightmares
allow me to add this comment...
Though not being in the US, we are also forced to ensure that we have similar policies and procedures. In fact, our US clients are insisting that we have such an infrastructure so that we can trade together.
I believe that with time this compliance will become sort of a global standard...
good luck
kind regards
yogeeraj
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-26-2005 03:46 AM
тАО09-26-2005 03:46 AM
Re: SOX Compliance Nightmares
On the automated emails-
These are in place upon script failure. Unfortunately, the information in the email may require further investigation elsewhere in another directory or in the actual db. Likewise, access to email may not always be available as we are routing them to Outlook accounts.
On where any script changes are to be made -
1. We do have a duplicate development environment for the purpose of testing changes.
2. Not all "access needs" require a simple read of the email or tweak of a script.
3. We do have a procedure in place for moving script changes to production.
From what I am reading, I am coming to the conclusion that:
1. We may meet compliance with the login tracking.
2. We could institute a login procedure where the Operations area has control over a single user generic login, provide the password in an emergency, and change it following the user log out. (But this obviously violates some audit firm's interpretations.)
As some have pointed out, the Act is extremely vague. From that, I have printed off the Act in it's entirety and will have it in hand in order to pass it to the auditor and say "Show me where this is written."
I have also noted from the posts, each auditing firm appears to be following no set lines of audit and are expressing interpretations accordingly. (No surprise here as I have see both duplicate and new questions each year over the last 25+ years.)
The one commonality among them is "most often they have no idea what they are asking and have never worked in the real world."
Thanks for all the input.
Others that may have more to add please do so as I will probably not close this out until day end.
Again, thanks for the quality posts.
-dl
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-26-2005 10:36 AM
тАО09-26-2005 10:36 AM
Re: SOX Compliance Nightmares
Just a note, as I was assigning points, I was not indicating your replies were worht less than others. Just attempting to be fair in point assignments to all of a total of 9.
Thus with your two points assignments.
And again thanks for the input and the support of the frustration we are all going through on this.
Best regards,
-dl