SARBANES-OXLEY (SOX) ACT

Similar documents
Sarbanes-Oxley Act (SOX)

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)

GLBA. The Gramm-Leach-Bliley Act

Compliance in 5 Steps

HIPAA Compliance & Privacy What You Need to Know Now

HIPAA AND SECURITY. For Healthcare Organizations

USE CASE FINANCIAL SERVICES

Single Sign-On. Introduction. Feature Sheet

E-Share: Secure Large File Sharing

CipherPost Pro Enterprise Dedicated Cloud

Secure Messaging Large File Sharing

Sarbanes-Oxley Act. Solution Brief. Sarbanes-Oxley Act. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Security in Law Firms. What you need to know and how you can use secure to win more clients

Cipherpost Pro is far more than traditional encryption.

for the Dental Industry

CipherPost Pro. Secure communications simplified. Feature Sheet

Demonstrating Compliance in the Financial Services Industry with Veriato

Secure Messaging is far more than traditional encryption.

Single Sign-On. Introduction

Cirius Secure Messaging Single Sign-On

Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper

Encryption Conundrum in Financial Services

Complete document security

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

Policy. Sensitive Information. Credit Card, Social Security, Employee, and Customer Data Version 3.4

Advanced encryption and message control to complement and enhance your security investment in ZixDLP.

WAVV Sarbanes-Oxley, HIPAA, and Privacy 101. Chattanooga, TN. Page 1. Sarbanes Oxley, HIPAA and. Sarbanes Oxley: a/k/a SOX

Archive Legislation: archiving in the United Kingdom. The key laws that affect your business

What is Penetration Testing?

Information Security in Corporation

Tracking and Reporting

Sales Training for DataMotion Products. March, 2014

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents. Feature Sheet

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Cirius Secure Messaging Enterprise Dedicated Cloud

data leak prevention and compliance for the Financial Services industry

SECURITY & PRIVACY DOCUMENTATION

E-Share: Secure Large File Sharing

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Table of Contents. Preface xiii PART I: IT GOVERNANCE CONCEPTS. Chapter 1: Importance of IT Governance for All Enterprises 3

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes

File Transfer and the GDPR

Cybersecurity It Matters to SMB

Choosing the Right Solution for Strategic Deployment of Encryption

THE PROCESS FOR ESTABLISHING DATA CLASSIFICATION. Session #155

CipherCloud CASB+ Connector for ServiceNow

Proofpoint Enterprise Archive for SEC and FINRA Compliance

IBM Internet Security Systems October Market Intelligence Brief

Getting ready for GDPR

Secure communications simplified

Regulation P & GLBA Training

Post-Secondary Institution Data-Security Overview and Requirements

CCISO Blueprint v1. EC-Council

Managing Business Risk with Assurance Report Cards

CIPHERPOST PRO. A Profitable, Essential Value-Add for Office 365

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Fine-Grained Access Control

Securing Office 365 with SecureCloud

Is Your Compliance Strategy Putting Your Business at Risk?

Mobility, Security Concerns, and Avoidance

2018 Edition. Security and Compliance for Office 365

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY

The Modern Workplace Watchdog. How Office 365 helps keep your data safe and your team productive.

Meeting the Compliance Challenge With Microsoft Exchange Server 2007 White Paper

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

GLBA, information security and incident response a compliance perspective

Feature Set. Intelligent Archiving & ediscovery Software Solutions

efax Corporate for Independent Agent Offices

USING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES

Clearing the Path to PCI DSS Version 2.0 Compliance

MaaS360 Secure Productivity Suite

Information Security Risk Strategies. By

STOP FREAKING OUT. A short, simple guide to tackle the New York Department of Financial Services Cyber Regulations

Cybersecurity The Evolving Landscape

ACH Audit Guide for Third-Party Senders Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2017

CONCEPTUAL MODELING OF AN INFORMATION SECURITY SYSTEM AND ITS VALIDATION THROUGH DLP SYSTEMS

Aligning Your Organization s Business Units to Achieve a Cohesive Cybersecurity Strategy

Financial Regulations, Enforcement & Cybersecurity

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR SARBANES OXLEYANDCOBIT

Annual Report on the Status of the Information Security Program

IBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber

6 Ways Office 365 Keeps Your and Business Secure

Data Security: Public Contracts and the Cloud

6 Vulnerabilities of the Retail Payment Ecosystem

Mobility Policy Bundle

SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks

Database Centric Information Security. Speaker Name / Title

Cloud Computing Lectures. Cloud Security

Common approaches to management. Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C.

SECURITY THAT FOLLOWS YOUR FILES ANYWHERE

Compliance and Privileged Password Management

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

Managing Cybersecurity Risk

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Cybersecurity in Higher Ed

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

Governance, Risk, and Compliance: A Practical Guide to Points of Entry

Keys to a more secure data environment

Transcription:

SARBANES-OXLEY (SOX) ACT

Table of Contents Introduction 03 Who is affected by SOX? 05 Why should my organization 05 comply with SOX? What does SOX require for email 06 compliance? How can my organization meet 08 these requirements? Developing an effective policy 08 Mitigating risk 10 Don t sacrifice functionality for 11 compliance APPRIVER.COM

Sarbanes-Oxley (Sox) Act Introduction The Sarbanes-Oxley (SOX) Act was introduced in 2002 to protect shareholders and the general public from fraudulent accounting activities by bringing greater accountability and transparency to corporations financial operations. The SOX Act mandated strict reforms to establish internal controls to accurately gather, process, and report financial information. With technology playing a critical role in organizations financial operations, information systems used by finance departments must maintain the integrity of data to ensure compliance with SOX regulations. Email security becomes a crucial part of ensuring data integrity against loss, corruption or unauthorized disclosure. In any business, email is a vital tool for communication and collaboration: a marketer emails promotions to customers, a sales rep emails sales orders to an accountant, an accountant emails accounting reports to a controller and a CFO emails a financial report to investors. Email communication has become an important means of circulating financial information, yet it also remains vulnerable and exploitable. APPRIVER 3

Email s many vulnerabilities malware, phishing attacks, unauthorized access create the risk of unauthorized disclosure, corruption, or loss of financial information, thereby thwarting SOX s goal of accurate financial reporting. Email communication policy becomes a crucial part of SOX s internal controls to safeguard information from unauthorized use, disclosure, corruption or loss. This paper briefly details SOX s effect on email security and provides a framework for how organizations can best comply with SOX requirements by developing effective policy and implementing flexible email security solutions. APPRIVER 4

Who is affected by SOX? Sarbanes-Oxley currently applies to all US public companies, their global subsidiaries and any foreign company whose shares are traded on the US stock exchange. The act makes the chief executives and chief financial officers of companies personally responsible for the information that is included in their financial accounts and systems of internal financial control. Why should my organization comply with SOX? To ensure that companies meet rules, SOX places harsh penalties on organizations and individuals who manipulate and falsify financial reports as well as for gross negligence regarding financial compliance requirements. Violators face up to 20 years in prison and or $5 million in fines for failing to keep financial operations and reporting compliant. Additionally, the SEC can distribute civil damages to investors who were harmed by corporations as well as censure brokers, dealers and investment advisors involved in potential noncompliance. There is no doubt that ensuing criminal and civil litigation, punitive fines and reputation damage of non-compliance will directly affect your company s bottom line. APPRIVER 5

What does SOX require for email compliance? While SOX does not explicitly mention requirements for email security, two provisions: 302 and 404 include requirements directly relevant to email security and compliance policy. Section 302 mandates that organizations establish, maintain and regularly evaluate the effectiveness of internal controls placed within systems that support financial operations. Similarly, section 404 tasks company management to provide evidence that verifies the effectiveness internal controls in an annual report submitted to the SEC for consideration. These broad provisions don t explicitly identify framework for how organizations should structure and evaluate these necessary internal controls for IT, much less email security. For guidance, the Information Systems Audit and Control Association has provided a widely accepted framework that translates SOX requirements into more explicit control objectives. APPRIVER 6

This framework for compliance, better known as the Control Objectives for Information and Related Technology (COBIT), in effect requires companies to implement policies and email solutions that: 1. Identify and protect financial information against unauthorized access, transmission or disclosure; 2. Authenticate individual message senders and intended recipients; 3. Secure the transmission of email communications containing financial information; 4. Secure message indexing, archiving and retention; 5. Have the ability to audit and retrieve messages as needed by auditors and compliance officers; 6. Protect email servers and other systems that store or process emails containing financial information; and 7. Track and log of message traffic. These are the main control objectives that affect email compliance. A full list of IT control objectives for SOX compliance can be found on the ISACA website. APPRIVER 7

How can my organization meet these requirements? Meeting control objectives for SOX compliance is twofold: developing an effective policy and implementing email security technologies that enforce compliance policy. Developing an effective policy There s no out-of-the-box policy that works for every organization. An effective policy will be tailored to your company the processes of reporting and circulating financial information, existing policies for acceptable email use should be considered. However, there are a few steps every organization can and should take to develop a policy for SOX compliance: LOCATE FINANCIAL INFORMATION Identify where relevant financial information is within your company, how it is being circulated via email and who can and should have access to email financial information. This will enable email solutions to later encrypt, archive or even block transmission of email content based on users, user groups, keywords and other lexicons that identify your data as sensitive. APPRIVER 8

ARCHIVE & BACK UP Identify what email messages need to be archived and backed up and how to do so in a way that facilitates compliance auditing and ediscovery in the event of legal proceedings. ENFORCE COMPLIANCE Implement technology solutions such as encryption, data leak prevention and archiving that can enforce compliance policy and provide necessary protections against unauthorized disclosure, corruption or loss of financial data. INFORM & EDUCATE Educate users on acceptable use policies for email. When users understand proper workplace email usage and the consequences of non-compliance, they will be less likely to let their guard down and make mistakes. APPRIVER 9

Mitigating risk Implemented with a well-controlled policy, the following technology solutions can mitigate the risk of corruption, leakage and loss of financial data through the email gateway as well as help address SOX technical security safeguard standards for adequate internal controls. END-TO-END ENCRYPTION To meet regulation requirements that mandate messages containing relevant confidential data be secured, end-to-end encryption is often necessary to ensure that data remains confidential and secure between the message sender and the intended recipient, preventing unauthorized access or loss. DATA LEAK PREVENTION (DLP) A DLP solution for email is essential for SOX compliance, providing enhanced mail security through content filtering, authentication, and permissions rules that limit access and transmission of sensitive information sent within and outside the organization. ARCHIVING An effective email archiving system will enable organizations to meet control objectives for message retention and auditing by capturing, preserving and ensuring that ALL messages are available for ediscovery and auditing purposes. APPRIVER 10

When encrypted and backed up, archiving provides additional protections for information against loss and unauthorized exposure. Don t sacrifice functionality for compliance While it is important to implement an email solution that conforms to and supports the control objectives laid out by COBIT, it is common for compliance technology to slow down and frustrate users on a daily basis. For example, according to a 2011 study by the Ponemon Institute, over half of email encryption users were frustrated with their encryption solutions being inflexible and difficult to use. Secure email solutions should complement existing solutions rather than complicate them. So, when considering a solution for secure email, it s important that it conforms to SOX requirements without compromising email workflows that your business depends on. This means implementing a solution that allows easy and scalable deployment, simplifies secure sharing of information, and works with your existing email infrastructure and devices. APPRIVER 11

CipherPost Pro is a cloud solution for securely sharing sensitive information that also helps address GLBA (Gramm-Leach-Bliley Act) technical security safeguard standards while allowing users to keep using email the same way they ve always done. Send secure right from your existing email clients and platforms including Microsoft Office 365, Google G-Suite, Outlook and any mobile device Leverage the Delivery Slip on every message to add controls, authentication, real-time tracking, message recall and full audit and ediscovery capabilities Helps with SOX compliance requirements for secure transmission of NPI Automates and securely delivers messages and file attachments decrypted to any email archive database or third party application through a secure API to support SEC and FINRA record retention and monitoring requirements Enables anytime, anywhere secure communication and collaboration by allowing users to send, track and receive secure email and attachments on any mobile device including ios, Android and Windows Phone CipherPost Pro offers financial services providers the most flexible solution to help address SOX technical security safeguard standards for email and file transfer. APPRIVER 12

APPRIVER.COM OR CALL 1.866.223.4645 APPRIVER 13