Database Reference
In-Depth Information
7.
Review the concurrent program log for errors:
ii. Click on
View
in the menu bar, and then on
Requests
in the
View
menu.
ii. A
Find Requests
form opens. Click on the
Specific Requests
radio
button and, in the
Request ID
field, enter the ID number for your
request. Click on the
Find
button.
iii. A
Requests
form will appear. Its grid contains an entry for your
request. When its status is set to
Completed
(you may need to click
on the
Refresh Data
button), click on the
View Log
button.
8.
If successful, exit Oracle EBS and log in. SQL rules are implemented via
the custom library, which may be cached when you log in. In order to test
recently compiled rules, log out and log in to the application.
Summary
In this chapter, you learned to establish an IT Audit management program to
mitigate information technology risks. The scope of an IT Audit plan includes
testing general computer controls, as well as application controls. IT Audit
approach requires an assessment of the controls framework adopted by the
IT organization. In addition, we have provided instruction to set up IT and
Application controls using Oracle GRC Control Suite, which can be deployed
to improve your overall control environment.
IT Audit plan starts by reviewing the control documentation that defines the IT
standards, organization structure, budgets, policies, and procedures. IT auditors
evaluate controls in many different ways, including manual control testing,
assessment of periodic end-user surveys, and effectiveness of monitoring controls.
Oracle GRC Manager can be used to manage the IT Audit plan.
Search WWH ::
Custom Search