Auditing Oracle's Fusion ERP Cloud Application
Auditing Oracle's Fusion ERP Cloud Application
This course examines Oracle's cloud application, its core elements, technical architecture, security model, role design, user configuration, patching, change management, profile options, controls monitoring and reporting, and workflow issues. NOTE: Attendees are encouraged, but not required, to bring a laptop. This course will be a combination of direct teaching and interactive activities to the extent that the attendees have access to their organization's instance.
Upcoming start dates
Suitability - Who should attend?
Internal Auditors, IT Auditors, Functional and IT teams implementing or supporting Oracle’s ERP Cloud applications.
Prerequisites
None
Outcome / Qualification etc.
NASBA Certified CPE: 16 Credits Auditing
IT Audit Certificate
What You'll learn
You will learn about the application's risks and controls, the core elements of the application, and how to audit the application effectively.
Training Course Content
1. Architectural Overview:
- cloud: differences from other applications
- presentation layer
- application layer
- database layer
- example
2. Common Elements:
- key flexfields
- descriptive flexfields
- value sets / values
- security rules
- cross-validation rules
- profile options / values
3. Organization Structure
4. Master Data Overview:
- bank account
- supplier
- customer
- item
- employee
5. Building a Proper Audit Trail:
- why an audit trail
- types of technologies to build audit trail
- what to audit
6. Application Security Configurations and Administration:
- users
- roles
- data security
- flexfield security
7. Application Security Best Practices:
- RBAC principles
- role design principles – end users and IT
- seeded users
- generic users
- role assignments
- impersonizations
- job scheduling users
- password controls
8. Workflow Security and Controls:
- workflow policies
- approve workflows via email
- delegate or transfer workflows
9. Risks and Controls Related to Privileged Users:
- risks
- ways to monitor privileged users
10. Change Management Best Practices:
- types of changes
- impact of IIA GTAG 2
- best practices
- common challenges
11. Designing and Auditing Application Controls:
- application controls types and examples
- impact of IIA GTAG 8
- benchmarking
- best practices
- common challenges
12. Protecting Sensitive Data in Production and Non-production:
- statutory requirements
- identifying and classifying
- impact on application security
- impact on database security
- impact on change management process
13. Project Risks and Implementation Audits:
- key project risks
- internal audit involvement
14. Common Audit Issues
15. Auditor Resources
Customer Outreach Award
We believe that it should be easy for you to find and compare training courses.
Our Customer Outreach Award is presented to trusted providers who are excellent at responding to enquiries, making your search quicker, more efficient and easier, too.