Separation of duties
   HOME

TheInfoList



OR:

Separation of duties (SoD), also known as segregation of duties is the concept of having more than one person required to complete a task. It is an administrative control used by organisations to prevent fraud, sabotage, theft, misuse of information, and other security compromises. In the political realm, it is known as the
separation of powers Separation of powers refers to the division of a state's government into branches, each with separate, independent powers and responsibilities, so that the powers of one branch are not in conflict with those of the other branches. The typi ...
, as can be seen in
democracies Democracy (From grc, δημοκρατία, dēmokratía, ''dēmos'' 'people' and ''kratos'' 'rule') is a form of government in which the people have the authority to deliberate and decide legislation (" direct democracy"), or to choose go ...
where the government is separated into three independent branches: a
legislature A legislature is an assembly with the authority to make laws for a political entity such as a country or city. They are often contrasted with the executive and judicial powers of government. Laws enacted by legislatures are usually known ...
, an
executive Executive ( exe., exec., execu.) may refer to: Role or title * Executive, a senior management role in an organization ** Chief executive officer (CEO), one of the highest-ranking corporate officers (executives) or administrators ** Executive di ...
, and a
judiciary The judiciary (also known as the judicial system, judicature, judicial branch, judiciative branch, and court or judiciary system) is the system of courts that adjudicates legal disputes/disagreements and interprets, defends, and applies the law ...
.


General description

Separation of duties is a key concept of internal controls. Increased protection from fraud and errors must be balanced with the increased cost/effort required. In essence, SoD implements an appropriate level of checks and balances upon the activities of individuals. R. A. Botha and J. H. P. Eloff in the '' IBM Systems Journal'' describe SoD as follows.
Separation of duty, as a security principle, has as its primary objective the prevention of fraud and errors. This objective is achieved by disseminating the tasks and associated privileges for a specific business process among multiple users. This principle is demonstrated in the traditional example of separation of duty found in the requirement of two signatures on a cheque.
Actual job titles and organizational structure may vary greatly from one organization to another, depending on the size and nature of the business. Accordingly, rank or hierarchy are less important than the skillset and capabilities of the individuals involved. With the concept of SoD, business critical duties can be categorized into four types of functions: authorization, custody, record keeping, and reconciliation. In a perfect system, no one person should handle more than one type of function.


Principles

Principally several approaches are optionally viable as partially or entirely different paradigms: * sequential separation (two signatures principle) * individual separation ( four eyes principle) * spatial separation (separate action in separate locations) * factorial separation (several factors contribute to completion)


Auxiliary Patterns

A person with multiple functional roles has the opportunity to abuse those powers. The pattern to minimize risk is: # Start with a function that is indispensable, but potentially subject to abuse. # Divide the function into separate steps, each necessary for the function to work or for the power that enables that function to be abused. # Assign each step to a different person or organization. General categories of functions to be separated: * authorization function * recording function, e.g. preparing source documents or code or performance reports * custody of asset whether directly or indirectly, e.g. receiving checks in mail or implementing source code or database changes. * reconciliation or audit * splitting one security key in two (more) parts between responsible persons Primarily the individual separation is addressed as the only selection.


Application in general business and in accounting

The term SoD is already well known in financial accounting systems. Companies in all sizes understand not to combine roles such as receiving cheques (payment on account) and approving write-offs, depositing cash and reconciling bank statements, approving time cards and have custody of pay cheques, etc. SoD is fairly new to most Information Technology (IT) departments, but a high percentage of Sarbanes-Oxley internal audit issues come from IT. In information systems, segregation of duties helps reduce the potential damage from the actions of one person. IS or end-user department should be organized in a way to achieve adequate separation of duties. According to ISACA's Segregation of Duties Control matrix, some duties should not be combined into one position. This matrix is not an industry standard, just a general guideline suggesting which positions should be separated and which require compensating controls when combined. Depending on a company's size, functions and designations may vary. Smaller companies with a lack of SoD typically face concerns in disbursement cycles where unauthorized purchases and payments can occur. When duties cannot be separated, compensating controls should be in place. Compensating controls are internal controls that are intended to reduce the risk of an existing or potential control weakness. If a single person can carry out and conceal errors and/or irregularities in the course of performing their day-to-day activities, they have been assigned SoD incompatible duties. There are several control mechanisms that can help to enforce the segregation of duties: # Audit trails enable IT managers or Auditors to recreate the actual transaction flow from the point of origination to its existence on an updated file. Good audit trails should be enabled to provide information on who initiated the transaction, the time of day and date of entry, the type of entry, what fields of information it contained, and what files it updated. # Reconciliation of applications and an independent verification process is ultimately the responsibility of users, which can be used to increase the level of confidence that an application ran successfully. # Exception reports are handled at supervisory level, backed up by evidence noting that exceptions are handled properly and in timely fashion. A signature of the person who prepares the report is normally required. # Manual or automated system or application transaction logs should be maintained, which record all processed system commands or application transactions. # Supervisory review should be performed through observation and inquiry. # To compensate mistakes or intentional failures by following a prescribed procedure, independent reviews are recommended. Such reviews can help detect errors and irregularities.


Application in information systems

The accounting profession has invested significantly in separation of duties because of the understood risks accumulated over hundreds of years of accounting practice. By contrast, many corporations in the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
found that an unexpectedly high proportion of their Sarbanes-Oxley internal control issues came from IT. Separation of duties is commonly used in large IT organizations so that no single person is in a position to introduce fraudulent or malicious code or data without detection.
Role-based access control In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users. It is an approach to implement mandatory access control (MAC) or discretionary access control ...
is frequently used in IT systems where SoD is required. More recently, as the number of roles increases in a growing organization, a hybrid access control model with
Attribute-based access control Attribute-based access control (ABAC), also known as policy-based access control for IAM, defines an access control paradigm whereby a subject's authorization to perform a set of operations is determined by evaluating attributes associated with the ...
is used to resolve the limitations of it's role-based counterpart. Strict control of software and data changes will require that the same person or organizations performs only one of the following roles: * Identification of a requirement (or change request); e.g. a business person * Authorization and approval; e.g. an IT governance board or manager * Design and development; e.g. a developer * Review, inspection and approval; e.g. another developer or architect. * Implementation in production; typically a software change or
system administrator A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to en ...
. This is not an exhaustive presentation of the
software development life cycle In software engineering, a software development process is a process of dividing software development work into smaller, parallel, or sequential steps or sub-processes to improve design, product management. It is also known as a software d ...
, but a list of critical development functions applicable to separation of duties. To successfully implement separation of duties in information systems a number of concerns need to be addressed: * The process used to ensure a person's authorization rights in the system is in line with his role in the organization. * The
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
method used such as knowledge of a password, possession of an object (key, token) or a biometrical characteristic. * Circumvention of rights in the system can occur through database administration access, user administration access, tools which provide back-door access or supplier installed user accounts. Specific controls such as a review of an activity log may be required to address this specific concern.


References


External links

*
Nick Szabo Nicholas Szabo is a computer scientist, legal scholar, and cryptographer known for his research in digital contracts and digital currency. He graduated from the University of Washington in 1989 with a degree in computer science and received a J ...
's essay on
"Segregation/separation of duties definition"
ISACA
"Segregate Duties to Lessen Security Risks"
''
Datamation ''Datamation'' is a computer magazine that was published in print form in the United States between 1957 and 1998,
''
"Transparency, Partitioning, Separation, Rotation and Supervision of Responsibilities"
ISM3 {{Separation of powers Auditing terms Data security