Database Reference
In-Depth Information
7.
Review the concurrent program log for errors:
ii. Click on View in the menu bar, and then on Requests in the
View menu.
ii. A Find Requests form opens. Click on the Specific Requests radio
button and, in the Request ID field, enter the ID number for your
request. Click on the Find button.
iii. A Requests form will appear. Its grid contains an entry for your
request. When its status is set to Completed (you may need to click
on the Refresh Data button), click on the View Log button.
8.
If successful, exit Oracle EBS and log in. SQL rules are implemented via
the custom library, which may be cached when you log in. In order to test
recently compiled rules, log out and log in to the application.
Summary
In this chapter, you learned to establish an IT Audit management program to
mitigate information technology risks. The scope of an IT Audit plan includes
testing general computer controls, as well as application controls. IT Audit
approach requires an assessment of the controls framework adopted by the
IT organization. In addition, we have provided instruction to set up IT and
Application controls using Oracle GRC Control Suite, which can be deployed
to improve your overall control environment.
IT Audit plan starts by reviewing the control documentation that defines the IT
standards, organization structure, budgets, policies, and procedures. IT auditors
evaluate controls in many different ways, including manual control testing,
assessment of periodic end-user surveys, and effectiveness of monitoring controls.
Oracle GRC Manager can be used to manage the IT Audit plan.
 
Search WWH ::




Custom Search