SOX.2.0.12:: Difference between revisions
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
<blockquote style="background: white; border: 1px solid black; padding: 1em;"> | <blockquote style="background: white; border: 1px solid black; padding: 1em;"> | ||
Obtain the organization’s vendor management policy and discuss with those responsible for third-party service management if they follow such standards. Obtain and test evidence that the selection of vendors for outsourced services is performed in accordance with the organization’s vendor management policy. .<br> | Obtain the organization’s vendor management policy and discuss with those responsible for third-party service management if they follow such standards. Obtain and test evidence that the selection of vendors for outsourced services is performed in accordance with the organization’s vendor management policy. .<br> | ||
<br> | |||
</blockquote> | </blockquote> | ||
Revision as of 18:01, 14 June 2006
- 1. Risk: Business requirements are not met or third parties have inappropriate access to business data stores and business processes.
- a. SOX.2.0.12 Selection of vendors for outsourced services is performed in accordance with the organization’s vendor management policy.
Testing Procedures
Obtain the organization’s vendor management policy and discuss with those responsible for third-party service management if they follow such standards. Obtain and test evidence that the selection of vendors for outsourced services is performed in accordance with the organization’s vendor management policy. .
Testing Frequency
Quarterly validation of all systems within scope.
Evidence Archive Location
Insert hyperlink or location of evidence archive.
Control Stewards Process Narrative
The AIX operating system prevents the addition of duplicate Ids. Furthermore, the regular review of administrator IDs listed above serves as a backstop for this control.
Control Steward – Steve Somebody
Process Illustration
Replace this test by inserting a process diagram, flowchart or other visual representation to illustrate the process narrative as necessary. Include a brief description of the process illustration.
Control Status and Auditors Commentary
The control is effective. It is technically impossible to establish identical user accounts on a UNIX operating system.
File:Greenlock.jpg
Status is acceptable.
Control Exception Commentary
Status is acceptable.
Remediation Plan
Remediation is not required at this time.