Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Government The Courts IT

SarBox Lawsuit Could Rewrite IT Compliance Rules 124

dasButcher notes that the Supreme Court will hear arguments next week brought by a Nevada accounting firm that asserts the oversight board for the Sarbanes-Oxley Act is unconstitutional. If the plaintiffs are successful, it could force Congress to rewrite or abandon the law used by many companies to validate tech investments for security and compliance. "Many auditing firms have used [Sarbanes-Oxley Section] 404 as a lever for imposing stringent security technology requirements on publicly traded companies regulated by SOX and their business partners. SOX security compliance has proven effective for vendors and solution providers, as it forces regulated enterprises to spend billions of dollars on technology that, many times, doesn’t prevent security incidents but does make them compliant with the law."
This discussion has been archived. No new comments can be posted.

SarBox Lawsuit Could Rewrite IT Compliance Rules

Comments Filter:
  • not found (Score:5, Funny)

    by Anonymous Coward on Tuesday December 01, 2009 @03:47PM (#30288564)
    I tried to look up this 404 thing, but I couldn't find it anywhere.
  • Well at least now they'll spend all that money on making sure things are actually secure!

    • Re: (Score:3, Insightful)

      by halcyon1234 ( 834388 )
      And to do that, they'll need a definition of "secure". One that everyone can agree on. A standard definition, on might say. And to ensure everyone who says they're secure actual is, it might be a good idea to draft a formal document that explicitly lays out those standards, as well as methods for one company to ensure another company meets those standards. Heck, if it's that important, it might be worth thinking about turning that document into a law...
      • I Know! (Score:5, Funny)

        by fuzzyfuzzyfungus ( 1223518 ) on Tuesday December 01, 2009 @04:08PM (#30288904) Journal
        In order to ensure security against DOS attacks, I think it would be reasonable to mandate that all vendors be required to prove that their programs will halt in finite time, given an arbitrary input.

        That seems like a wholly reasonable request, not too burdensome, and should improve security.
      • What about realizing that it's impossible to define security for the vast diversity of setups we all use and forget about compliance but instead draft a list of bad stuff that shouldn't happen (leaking customer info for instance) and make a law that says that companies have to do whatever they have to to avoid the things on that list. Incident would be interpreted as negligence and heavily fined.
        • You may as well make it a requirement to spend X funds on security, because requirements like that guarantee that it will be cheaper to pay the fines than to "do whatever they have to".
          • Re: (Score:3, Interesting)

            by Bigjeff5 ( 1143585 )

            Not if the fines scale in relation to the amount of information that was lost, and compensatory damages are included requiring payment of the estimated damages for each individual person's data loss (not an average spread to everyone). Of course the individual data evaluations must be done by a firm chosen by the courts, and paid in full by company that lost the data.

            It's pretty easy to structure the law such that almost any company will be bankrupted by failing to secure data. That would also be silly, b

            • Re: (Score:3, Interesting)

              One visible example is banking

              My banking site decided that 2 factor auth meant that I had to type my info into a flash widget that analyses the typing style - I sort of doubt this is even half a factor. The CC sites I use demand I have 2 passwords - 1.1 factor auth. Basically, I'm saying that it's crap.

              • Re: (Score:3, Interesting)

                by Bigjeff5 ( 1143585 )

                Exactly.

                Really, two factor authentication only offers meager protection from a subset of attacks, yet I can tell you that implimenting it at each company was probably a $50k project, or, for the less efficient companies, a $200k project.

                ROI for Sar-Box is shit. We've got a hell of a lot more expenses for a teeny bit more security.

        • Re: (Score:2, Offtopic)

          by Red Flayer ( 890720 )
          OT, but re your sig:

          Slashdot anagrams to "Sad Sloth"

          You do know that Red Alastor anagrams to "Retard Also", right?

          It also anagrams to "Trades Oral".

        • That sounds so logical and reasonable. Too bad that fact prevents it from being included in a law.

        • by DarkOx ( 621550 )

          Probably because nobody really wants that. The point of most polices is ultimately to ensure that there is no responsibility for acts of GOD. Bad stuff is always going to happen. You can have good policies in place and generally do a good job of administration and still get hacked; its possible. Someone you thought you could trust could walk away with sensitive data.

          I think most people agree that if you can show that you did your due diligence and complied with a good solid set of requirements and someth

    • by guruevi ( 827432 )

      Or they'll be able to invest that money somewhere else and become a better business. The things SOX 'protects' against are 1) outdated and 2) remotely plausible which doesn't actually protect anything. So business will still not protect anything however they won't have to invest in lawyers and consultants to implement rules that only bother the sysadmins and general productivity.

    • "Well at least now they'll spend all that money on making sure things are actually secure!"

      Why, oh why!!!???

      No sir: they'll spend all that money on making sure they earn even *more* money. What else?

  • by blitzkrieg3 ( 995849 ) on Tuesday December 01, 2009 @03:50PM (#30288634)
    How about rewriting the law so that every request to my IT department doesn't result in "This functionality would break SarBox compliance", regardless of how related to SarBox the request actually is?
    • How about rewriting the law so that every request to my IT department does result in "This functionality would break SarBox compliance", regardless of how related to SarBox the request actually is?

      T,FTFY

    • by IrquiM ( 471313 ) on Tuesday December 01, 2009 @05:48PM (#30290272) Homepage

      How about rewriting the structure of the management as they clearly do not understand what 404 is all about?

      404 doesn't tell you to do anything. It only ask you to show that you have internal controls and that they are deemed sufficient for a company of the type/size you're working for, and that you actually is following your controls. The auditors only task (related to 404) is to check that you do what you are saying and make a judgment on their observations.

      • by Bigjeff5 ( 1143585 ) on Tuesday December 01, 2009 @07:37PM (#30291604)

        404 doesn't tell you to do anything. It only ask you to show that you have internal controls and that they are deemed sufficient for a company of the type/size you're working for, and that you actually is following your controls.

        That's the rub, and that's why this guy is suing. He owned a small accounting firm because, no matter what he did, the SarBox auditor's board determined what he was doing wasn't good enough, and the only changes they would accept would prevent him from turning a profit.

        The SarBox board killed a legitimate business that was operating in good-faith compliance.

        That's far, far too much power for a bunch of nameless beureaucrats.

    • Re: (Score:3, Informative)

      by Bigjeff5 ( 1143585 )

      The sad fact is, it probably WOULD break SarBox compliance, it's frickin retarded.

      Just about everything a company does relates to SarBox either directly or indirectly, so often an IT department will become terrified to make the smallest change to avoid inadvertantly breaking compliance, or making a change while staying compliance will require more money than the change is worth.

      I.e. if you request a change to save $2000 a month in productivity losses, but maintaining the change will cost $4000 a month, it d

  • by croftj ( 2359 )

    The primary purpose of every law passed has the creating 1 or more jobs, whether they are productive jobs or not.

    • by BitHive ( 578094 )

      Wow, thanks for that keen insight into government! Maybe next you can give us a one-line treatise on the irrelevance of unions.

      • by gandhi_2 ( 1108023 ) on Tuesday December 01, 2009 @04:03PM (#30288848) Homepage

        I'll field that one:

        Unions are irrelevant.

        • It'd be nice if they were irrelevant, unfortunately all they are managing to do is drive up the cost of everything the government pays for and shield incompetent and even dangerous employees working for the government while providing no protection for the american worker from big business. Or at least that is how they work in America, that and they bury Jimmy Hoffa in Giants Stadium.
        • Re: (Score:2, Insightful)

          by Anonymous Coward

          I don't know. Unions have brought us a couple nice things here in the US until recently:

          8 hour workdays.
          5 hour work weeks.
          Our 8 year old kids out of the coal mines.
          Worker's comp for injuries.
          Unemployment.
          Labor laws.
          Banning of blacklists.
          Minimum wage.
          Vacation leave.
          Sick leave.
          Liability.
          Basic safety.

          With all the bellyaching about unions, I think people would love it if they would have to work 12-16 hour days, 7 days a week with their kids doing 12 hour days right by them. Of course, if anyone complained abo

          • by dgatwood ( 11270 )

            8 hour workdays.
            5 hour work weeks.

            Really? So you work a single 8-hour shift every second week that spans from Saturday night to Sunday morning? How odd.

          • Re: (Score:3, Insightful)

            by cayenne8 ( 626475 )
            True, the unions served their function in the early days of their existance, but, they are an anachronism today, and serve more to hurt workers and business than they do good in this day.

            They are a hindrance in the 21st century USA.

          • Hmmm.
            That's a toughy. So many to choose a couple from...

            I guess Vacation Leave and 5 hour work weeks?

          • by hmar ( 1203398 )
            No one really claims that unions were never relevant, the issue is that they have outlived their purpose, and are now nothing more than one more drain on budgets that can't afford them.
        • "I'll field that one: Unions are irrelevant."

          Now, I was going to respond thusly -- If that's true, then:

          (a) Why do about half of Americans approve of labor unions?
          http://www.gallup.com/poll/122744/Labor-Unions-Sharp-Slide-Public-Support.aspx#1 [gallup.com]

          (b) Why is there a multi-billion dollar union-busting legal industry?
          http://www.inthesetimes.com/article/3326/unionbusting_confidential/ [inthesetimes.com]

          But then I realized that the line "the union is irrelevant" is actually a quote from one of the union-busting lawyers in the article

    • Re: (Score:3, Funny)

      by Gudeldar ( 705128 )
      A comment critical of government that isn't +5?

      This is Slashdot I'm reading right?
      • Re: (Score:1, Funny)

        by Anonymous Coward
        As part of a prank, we have replaced Slashdot with the Daily Kos. Let's see what happens!
    • Wrong.

      The primary function of government is to pretend to fail.

      That way they get more money and power to correct the failure. If the purpose was to "fail" then it is no longer a failure and should be considered an accomplishment.

      Anytime you hear "failure of..." anything involved with government replace it with accomplishment.

  • SarBox? (Score:5, Informative)

    by omnichad ( 1198475 ) on Tuesday December 01, 2009 @03:59PM (#30288772) Homepage

    I've seen SOX, but never SarBox. If you're going to CamelCase, do it right: SarbOx.

  • by SuperKendall ( 25149 ) on Tuesday December 01, 2009 @04:06PM (#30288880)

    I have worked for large companies in the past, and SOX is seriously undermining the ability to make changes, or indeed for rational process to take place in the daily operation of IT.

    SOX was meant to prevent another ENRON, but those things will happen regardless of rules - look at the collapse of organizations like FannieMae, well after SOX was in place. Instead we are harming all large businesses just to prevent a one-off case that we are not really preventing anyway!

    Kill SOX and let companies get back to what they do best, instead of spending a lot of time simply deciding what compliance means and using the rules to build (even more) fiefdoms within giant companies.

    • Re: (Score:3, Insightful)

      by Knara ( 9377 )
      There's a large deal of truth to this. If you want to do (or not) do something in a large company these days, the way to justify it is to write up a proposal that uses SOX or HIPAA (preferably both) a few dozen times. Your chance of getting money for it increases exponentially.
    • by Archangel Michael ( 180766 ) on Tuesday December 01, 2009 @04:26PM (#30289128) Journal

      You can usually make the case for MOST government regulations of businesses. Laws aren't for the lawful, but for the unlawful. Wherever the line is drawn, there will always be people who skirt around at that edge.

      If laws and regulations move too far away from the edge, the laws themselves become the end of, not the means of, compliance. Everyone becomes a lawbreaker, and there is no room for discretion.

      You can see this in all the zero tolerance laws in place. Zero tolerance laws do not stop anything, and just make more people criminals, like little boys coming to kindergarten with a camping fork, knife, spoon gadget getting expelled because he brought a knife to school. Zero Tolerance! No excuses! He Broke the LAW!!!!

      I've written on this before. I call it the "There ought to be a law" syndrome. Everytime someone says "there ought to be a law", someone needs to ask a simple question "WHY?". WHY is it that the existing laws aren't applicable? How will this new law break the necessary shades of gray around the edges? Asshats live there, we all agree. Changing this isn't going to change the asshats.

      Sometimes the only thing that will change the asshats is a good old fashion asswhooping.

    • Also look at HealthSouth, which never would have been found out if it weren't for SOX.

      I think we need to keep it around, but a better breed of companies need to come around to take the pain out of it.

    • by Zalbik ( 308903 ) on Tuesday December 01, 2009 @04:46PM (#30289384)

      SOX was meant to prevent another ENRON, but those things will happen regardless of rules - look at the collapse of organizations like FannieMae, well after SOX was in place.

      Huh? Do you even have a clue what caused the collapse of Enron vs. what caused the collapse of Fannie Mae?

      To use the mandatory car analogy, your argument is something like:
      I put winter tires on my car, but then I was t-boned at an intersection when I ran a red light. See, winter tires don't help prevent accidents!

      The two scenarios were completely different. Most of what SOX requires for IT should fall under good IT practice anyways. It basically requires controls to be implemented on financial systems in order to prevent fraudulent changes to financial data.

      Now I realize people at some corporations have used SOX as a big bat to force in their own pet IT projects. Or as a way of preventing any IT changes that they don't agree with, but that isn't the fault of SOX.

      If people are building personal fiefdom's within corporations, they'll do so with or without some legislation to use as an excuse.

      • Re: (Score:3, Insightful)

        by SuperKendall ( 25149 )

        Huh? Do you even have a clue what caused the collapse of Enron vs. what caused the collapse of Fannie Mae?

        It's a loose analogy to be sure, but think about it - in both cases shareholders (or stakeholders if you like in the case of FM) were lied to about financial stability. Fannie Mae claimed there were "no issues" just months before the collapse, while hiding the true extent they were in peril with the huge number of sub-prime loans they were carrying.

        If you think about it there are way more parallels th

        • by alcourt ( 198386 )

          Instead we should have devastating fines or other punishment for companies that are found to have problems preventing fraudulent changes to data, so that companies could build in meaningful safeguards around ACTUAL financial data (with the ROI being the prevention of said fines so security groups could get funding), as opposed to safeguarding anything that smells like financial data to auditors (with the auditors of course paid more the more systems they have to audit). Let auditors audit crooks, not the innocent. Then we could also document the real bypasses to processes instead of having them but having to pretend they do not exist because auditors and high-level execs Cannot Know.

          Most of the IT portion of SOX is based around having meaningful tools to have an effective security policy to tell people what they can and cannot do, as well as means to detect when those rules are violated. It is the latter portion that seems to often cause the most grief. You cannot know where the problems exist unless you provide for an accountability trail to ensure that people manipulating financial impacting data are tracked.

    • by illumin8 ( 148082 ) on Tuesday December 01, 2009 @05:16PM (#30289812) Journal

      I have worked for large companies in the past, and SOX is seriously undermining the ability to make changes, or indeed for rational process to take place in the daily operation of IT.

      Yeah, but you need to look at the bright side of SOX for us (educated security geeks). When someone wants to do something really dumb like put a web app into production with no logging and no security, you can just tell them to fuck off, because of SOX. Also, if you're a security consultant with half a brain and know how to setup auditing on *nix related systems you can make a lot of money consulting.

      SOX is worth it just for being able to tell a stupid developer that he can't do something that puts the security of my systems in jeopardy.

      • You're exactly the type of person I was talking about. [slashdot.org]
        • by FatSean ( 18753 ) on Tuesday December 01, 2009 @06:40PM (#30290952) Homepage Journal

          So you're the developer who doesn't think about logging, security or any other kind of operational issue when you develop? Sounds like your company has you in the right box.

          • Unelss the webapp is developed for a financial system using SOX here does not really work at all.

        • Re: (Score:3, Insightful)

          by Bigjeff5 ( 1143585 )

          It sounds like you're a dumbass who doesn't give a shit about your clients' data if you think you don't need authentication and logging for a web app. You're about the only type of idiot SOX actually protects us from. If IT guys didn't need to SOX to tell dumbasses like you to fuck off, we wouldn't be stuck with SOX in the first place.

          I hope you don't do work for any systems that hold my data, that's all I'm saying.

          • by RMH101 ( 636144 )
            Agreed. There's all sorts of regulatory pressure that can apply to different industries: SoX compliance for US companies and any publically-traded foreign countries that do business with the US, there's financial regulation like Visa/Mastercard's EMV accreditation and PCI/DSS for those in the financial sector, there's the FDA for those that work in Pharma, and there's others such as the Data Protection Act in the UK - all or none may apply to your specific business, but in principle they are outlining a ba
    • by pauls2272 ( 580109 ) on Tuesday December 01, 2009 @05:16PM (#30289832)

      >I have worked for large companies in the past, and SOX is seriously undermining the ability to make changes, >or indeed for rational process to take place in the daily operation of IT.

      Absolutely agree. Although the smart companies are now just giving SOX lip service and ignoring it pretty much entirely. The company I work for now, has all kinds of memos issued saying they support SOX, hotlines, etc but it doesn’t impact real work.

      When SOX hit, the company I worked at, the Accounting dept came out with the required SOX doc and it was non negotiable. They had worked with an auditor that knew nothing of IT and it showed. I had to attend a week long class on how to fill out the dozens of new SOX forms (all manual paper forms) that were to be kept in notebooks!

          I was told that ALL CHANGES had to go on the CEO change calendar and that we would become very familiar with the assistant that scheduled the CEO change meetings. All changes had to have the 10 pounds of forms and 10+ signatures before you could implement. There also had to be “separation of duty” which meant if you were making the change, someone else had to implement it I said “great, your gonna hire another IT group – one to implement and another to install and test”. Of course, they never did this and this “separation of duty” was never followed.

      It was COMPLETE AND TOTAL NONSENSE designed by people who had no clue what they were doing or what the real world was like. Yeah, I need to put a hotfix on a server to fix a problem – I’m gonna wait 2-3 months to get on the CEO change calendar and have a meeting with the CEO But trying to talk to the accounting morons was useless – they insisted every change had to follow their written in stone procedure

      After a few weeks of complaining, the process was “refined” by having Small, Medium and Large changes and Large changes were only the changes had to go thru the above process. The difference being the number of “elements” in the change – but “element” wasn’t defined by the accounting/auditing people. The solution became that all IT changes were SMALL since there was only 1 datacenter so 1 element changing!

      The fact is that SOX was doomed to fail because you can’t impose rigorous rules on US companies if foreign companies don’t have to follow the same rules – it is a Global world out there and adding huge overhead to your domestic companies just mean more outsourcing and more domestic bankruptcies as they can’t compete with slimmer/trimmer overseas companies.

      • Re: (Score:3, Insightful)

        by hemp ( 36945 )

        I think you don't understand segregation of duties. It doesn't mean having a separate IT group, it means splitting duties between more than one person. For example, the person coding the change and the person implementing the change would be two separate people. Testing should also be separated out from the person who implemented the change.

        This does wonders for the midnight-cowboy coder who sticks in changes at 2 am and doesn't tell anyone or bother to test.

        In the case of a true emergency change, they c

        • I understand it completely and it doesn't happen in the real world in real IT depts. First, we aren't coding anything - we are implementing PTFS, hotfixes, new software releases, etc. And every place I've worked, the guy that gets the fix, tests it and implements it himself. There is no Change Control group for the sysadmins/sysprogs.

          To do that you would need to have 2 separate groups - one that downloads, installs and tests on test servers and another that just implements changes into production.

          • by FatSean ( 18753 )

            I want to know so I can never do business which such a shoddy shop. My company has strict SOD and we enforce it through tooling. We have three groups: Development, Test, Operations. I'm on development side so I check builds and docs into the source code control system. Test pulls it out, applies it to the test environment, runs tests. Test then passes the code and documentation to operations who updates any configuration parameters that differ between test and production systems and installs it with th

            • >Development, Test, Operations. I'm on development >side so I check builds and docs into the source >code control system.

              Sounds like your an application dude and not a sysadmin/sysprog. You get source from Vendors and log that into your "source code control system"? Microsoft gives you the source to Windows so you can log the changes Microsoft makes to Windows? Who maintains this "source code control system" and who implements changes into that? Another source code control system to manage the

            • What about operations where 3 people is overkill?

              Didn't think about that one eh?

              There is no reason one person can't do all of it, from developement to operations, if he follows best practices in each case. Anything more than a one-man shop should always have another person checking the work at each stage, but that does not make separation of duties necessary. It also very rarely makes sense in an IT support environment, but often the rules are made to apply to the support guys anyway.

              The easiest way to pr

          • by hemp ( 36945 )

            I sure hope you don't work at NASA or a nuclear power plant.

      • The fact is that SOX was doomed to fail because you can’t impose rigorous rules on US companies if foreign companies don’t have to follow the same rules – it is a Global world out there and adding huge overhead to your domestic companies just mean more outsourcing and more domestic bankruptcies as they can’t compete with slimmer/trimmer overseas companies.

        This is also known as 'race to the bottom.' It happens with corporate governance as well as taxes and wages.

      • I was told that ALL CHANGES had to go on the CEO change calendar and that we would become very familiar with the assistant that scheduled the CEO change meetings.

        Sounds to me like somebody in your company has a micro-management fetish. BTDTGTTS. You have my sympathy!

    • by dstar ( 34869 ) on Tuesday December 01, 2009 @06:26PM (#30290762)

      I have worked for large companies in the past, and SOX is seriously undermining the ability to make changes, or indeed for rational process to take place in the daily operation of IT.

      It's doing no such thing. People may be using it as an excuse to build an empire or do stupid things, but that's not the fault of SOX. I worked for a *VERY* large financial company (the overall IT budget, across all branches, businesses, etc, was measured in the *billions* of dollars), and not once were we stopped from doing anything because of SOX. Not once was it even an issue, either.

      Put the blame where it belongs, on stupid people. Then fire them.

  • Silver Lining. (Score:5, Interesting)

    by FatSean ( 18753 ) on Tuesday December 01, 2009 @04:10PM (#30288932) Homepage Journal

    I inherited a bunch of apps that had atrocious logging practices. They were inter-twined and when a problem arose, it was very difficult to PD. Management didn't care to spend money adding some log statements, it was good enough. SOX forced us to place logging statements at system boundries. This wasn't a complete logging overhaul but it really did help with future PD.

    • That was my experience as well ... although I was not directly involved in any SOX work, I saw it dredging up all sorts of atrociously bad practices all around that were time bombs waiting to go off (application interfaces open to the world, critical servers never being backed up, root accounts still active for people laid off years ago). Outsourcing, entropy plus plausible deniability is a dangerous cocktail in IT.
    • by http ( 589131 )
      And what, pray tell, is "PD" in this lingo you're using?
      • Problem Determination?

        • Ahh, that really clears it up.

          I thought it meant "Penguin Dynamite".

          Yeah, it didn't make much sense to me either.

          Still, it should have been Troubleshoot instead of "problem determination". Why use big words when a diminutive word will suffice?

          • by FatSean ( 18753 )

            It's the term favored by my organization, so I use it often and it has become habit.

            And PD is shorter than Troubleshoot anyway. Who doesn't know PD means Problem Determination? Given the context of the post it seemed pretty obvious.

  • From TFA "Now, here’s where things get interesting. Beckstead decided to sue PCOAB not over the deficiencies found, but rather the oversight board’s very right to existence."
    As a disclaimer I have to say I have worked for Financials IT for quite a while and SOX was quite literally the bane of our existence for over 3 years. Whether SOX is a true measure of compliance is still an open question on my mind ...
    The implication here is that if the Justices do rule in favor of Beckstead, what does
    • Are you using 1U just as an example or are there really rules somewhere about using only 1U's, and not 4U ?

      Stephan

      • Oh my! no, example only
      • Are you using 1U just as an example or are there really rules somewhere about using only 1U's, and not 4U ?

        I know right... this is Slashdot; we stick to car analogies 'round here thankyouverymuch

    • The implication here is that if the Justices do rule in favor of Beckstead, what does that say about other government organizations that "audit" citizen's affairs?

      If you had read the full article you might also have noticed that the crux of the argument is that the PCOAB is set up as an independent organization independent of the executive or legislative branches. So, if the ruling goes for Beckstead nothing happens to most other "auditing" agencies. I can't think of any off the top of my head that have been granted some manner of legal authority and are not subject to some manner of appointment process by congress or the executive branch (although some of them argua

  • by L3370 ( 1421413 )
    SOX compliance itself has more to do with accounting practices than it does with IT. IT related affairs only come into play when it goes hand in hand with the accounting/financial requirements. If you are relying entirely on SOX compliance laws and regulations to fulfill IT requirements and security standards, you are ill-prepared for IT compliance.

    For example... per SOX, business documents and financial reports must be kept for 7 years. If you're documents and records just happen to be in digital format
    • I disagree. I work in the IT dept. for a F100 company, and SOX is a complete barrier to getting anything done in a reasonable time-frame. It needs to be abandoned and reworked from ground zero.

      For example, we are slowly phasing out an old mainframe system that used to "do it all" for the organization. To support each new sub-system we must create interfaces into and out of the mainframe to access legacy functions it may still retain.

      If I make a change to one of the compartmentalized systems (say... th
  • Nitpicky, I know, but the title of the Slashdot article (not the underlying article) uses "SarBox", as if it were some brand name for a kind of box.

    It's the "Sarbanes-Oxley" Act, sometimes "Sarbox" or "SARBOX" (for those who feel compelled to treat every new word they don't know as an initialism) but "SarBox" is right out.

    "SOx" or "SOX" are much more common.

  • Who refers to Sarbanes Oxley asn SarBox? I've only ever heard of it as "SOX." I can't imagine why the "b" would be stressed, anyway.

    I know this is the internet, but we really shouldn't just go around inventing acronyms for headlines.

  • by Anonymous Coward

    I am a SOX IT auditor, so here are a few thoughts. Yes, I'm posting as an Anonymous Coward because I don't want my name tied to this in case someone from my firm sees this.

    1. SOX is not about information security and security events. It's about determining if sufficient controls are present to prevent or detect material misstatement in the financial statements. For example, you have crappy network security. A hacker breaks in and steals customer information. While very damaging, there is no impact on

    • by afidel ( 530433 )
      While that is all true, having rigorous IT compliance to SOX means that our auditors don't feel it necessary to do as deep a dive into our financial statements saving us about as much in auditing fees as our entire IT budget (which is not small for our company size). They have set a threshold for audit failures on the IT side and if we were to fail enough high priority controls they would have to do some serious forensic accounting which would be extremely labor intensive since it would have to be completed

"The only way for a reporter to look at a politician is down." -- H.L. Mencken

Working...