PeopleSoft

PeopleSoft Upgrade Post-Implementation Audit 
June 2015

Table of Contents 

Executive Summary 
Objective, Scope & Approach                   3 
Highlights and Accomplishments                  4 
Summary of Observations                 5  10 




This document is intended solely for the use of Port of Seattle Audit Committee and Management. It is not
intended to be used or relied upon by others for any purpose whatsoever. This document provides the
Audit Committee and Management with information about the condition of the business at one point in time.
Future changes in environmental factors and actions by personnel may significantly and adversely impact
the results of these analyses in ways that this document did not and cannot anticipate.

Executive Summary 
Objective 
Protiviti was engaged by the Port of Seattle ("the Port") to perform a post-implementation review of the PeopleSoft Financials
system upgrade from version 8.4 to 9.1 to determine if the upgrade achieved the overall implementation goals, if the
functional performance and outcomes met the expected performance, to identify any lessons learned and to develop action
plans, if necessary. This document summarizes the objectives, key observations, and recommendations resulting from these
efforts as of April 2015. 
Scope 
The Post Implementation Review performed by Protiviti focused on the following key areas: 
A. Business Case and Planning; 
B. Change Management and Installation; 
C. Risk and Risk Mitigation; and 
D. Stakeholder Acceptance and Satisfaction 
i.  Quality Assurance, Stakeholder Approvals and Benefit realization 
ii.  PeopleSoft Current State Security Model Review 
Approach 
Protiviti adopted the following approach for the Post Implementation Review: 
Obtain and Review available documentation around the scope areas. 
Conduct interviews & demonstrations with stakeholders to understand processes, tools & repositories used during the
implementation that were deemed relevant to the review. 
Data sampling to corroborate the understanding obtained via interviews. 
(For Security review only)  Assess current state of PeopleSoft security model in Production and validate observations
with stakeholders. 

3      2015 Protiviti Inc. 
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.

Executive Summary 
Highlights and Accomplishments 
In the course of conducting this audit, several areas of strengths were observed that could be leveraged during future initiatives.
The following is a list of highlights and accomplishments that the Protiviti team would like to note for the benefit of the Port's
Management: 
Delivery on project objectives and business functionality  It was noted, via interviews with project team, stakeholders and
Senior Management, that the project team successfully delivered on the key objectives and business functionality. 
Project team collaboration  Per inquiry with project team and stakeholders, it was observed that there was very close
collaboration between Information Technology, Accounting and Consultant teams during the course of implementation. This
was key to completing an implementing such a scale of implementation under budget without significant schedule extension.
Project budget planning and monitoring  Planned budget and actual spend were closely aligned for this project, with the
project being implemented under budget. Per inquiry, it was noted that budget was closely monitored, regularly updated and
shared with Senior Management. There were contingencies built into the budget given the lead time required to obtain
approvals prior to commencing a project and although these were not used, it indicates a good level of planning on the team's 
part to plan for unforeseen expenditure.
Risk management: Proactive Senior Management engagement and direction  Per inquiry it was noted that the frequency
of meetings with Senior Management increased as the project moved closer to implementation. Proactive engagement by
Senior Management around risks was noted in the specific instance of resource changes implemented by the team as a result
of "sit-down" meeting with the Consultant when a skill mismatch was observed. Also, following the direction laid down by Senior
Management, the project team took some key decisions early on in the project (excluding Project costing and adopting as much
as out-of-box functionality as possible) that reduced risk exposure and contributed to a successful implementation. 
Planning documentation  Review of project documentation and information gathered via interviews indicate a high level of
initial planning, with detailed plans (Change Management Plan  for organization and system changes, Risk Management Plan
and Project Management Plan) being created upfront.

4      2015 Protiviti Inc. 
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.

Summary of Observations 
PeopleSoft Security Review: Administrative Access                                       Risk: High 
All five members of Production Support team retain administrative privileges to the application environment and
access to the database. Lack of traceability when logging into the Database using an administrative ID is a known
issue in PeopleSoft (with MS-SQL) that leaves the database vulnerable to unauthorized changes that cannot be
attributed to individual users. 
Recommendation: 
This level of access to financially sensitive information in the production environment is a high risk. Port Management or Internal Audit (IA) could
potentially decide to lower the risk rating based on their assessment of the effectiveness of the business process controls put in place, both in terms of
comprehensiveness of design and implementation effectiveness. Management should evaluate the below recommendations in the light of
resource/staff availability and any existing contractual obligations: 
Investigate the possibility of an automated mechanism to actively monitor Production environment for unauthorized changes. 
Consider setting up a production-like environment for troubleshooting production issues. 
Consider implementing a secured password vault for storing Administrator password, access to which should be limited to the appropriate
personnel, after obtaining the required approvals. Password should be changed after each access. 
Barring any changes to administrative access to reduce the risks associated with this observation, Port Management or Internal Audit should
consider conducting a thorough review of business process controls for comprehensiveness of design and implementation effectiveness to evaluate
if they adequately mitigate risks related to potential fraudulent activities. 
Consider assigning specific maintenance window for applying vendor-provided patches. 
Consider renegotiating SLAs with business, if required, in order to set expectations on turnaround time for resolving issue. 
Management Response: 
We disagree that this is a high risk issue. Shared administrative access due to deficiencies in Peoplesoft with a Microsoft SQL Server backend was a
known issue and was openly discussed with Protiviti at the front end of the project performance assessment. The process controls from AFR detailed
in item #2 provide additional layer of security to help mitigate this exposure. This exposure was also previously reviewed with Moss-Adams during our
annual financial audit and was not considered to be a finding in their report.
As stated, this access has been strictly limited to 5 key PeopleSoft system administrators who pass FAA and Police background checks and who are
essential to the operation and maintenance of our financials environment. To our knowledge no other user of this system has been successful in
developing practical formal procedures to further mitigate this risk without impacting the operations of the system, or our ability to rapidly restore it in
the event of an outage 
5      2015 Protiviti Inc. 
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.

Summary of Observations 
PeopleSoft Security Review: Segregation of Duties (SoD)                                   Risk: Medium 
There is a lack of clear definition of roles or SoD in PeopleSoft resulting in some employees having excessive access
and ability to perform potentially fraudulent transactions. 
Recommendation: 
Management should consider undertaking a full review of SoD and sensitive access followed by associated remediation measures. A 
comprehensive role definition should be created for PeopleSoft financials application with clear SoD. All roles providing duplication of
access privileges should be appropriately remediated and roles that are not actively used should be removed from the database.
Management should also establish a schedule for a review of role definitions and configuration (in Production environment) on a
quarterly basis. Additionally, Management should also enhance the authorization request form to include accurate and detailed 
description of roles to ensure appropriate access is requested for staff. 







6      2015 Protiviti Inc. 
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.

Summary of Observations 
PeopleSoft Security Review: Segregation of Duties (continued)                               Risk: Medium 

Management Response: 
Port management appreciates Protiviti's observations resulting from their review of controls limited to IT systems risk, and respects that
Protiviti could not independently verify the comprehensiveness of design or validate implementation effectiveness of the Port's
augmenting business process controls in place, due to scope limitation of the audit engagement. Port management values Protiviti's
recommendations and will give them serious consideration as we continue to seek opportunities to refine and improve the broader
systems/process internal controls environment. 
An important point is that in addition to the system access/roles security protocols in place that enable a user to transact in PeopleSoft
Financials, the Port/Accounting & Financial Reporting (AFR) department has in place solid internal controls, as shared with Protiviti, in
the form of fully documented business process internal controls. This combined internal controls framework is robust and is expected to
addresses both financial systems risk and business process operational controls taken as a whole. Together, possible system risks are
expected to be effectively mitigated through business process controls, as a key risk exposure to the Port involving its financial systems
are the execution of fraudulent transactions that may result in a loss of funds or assets, or a material misstatement in its financial
statements. Internal controls over all key transactional and business processes are in place. 
The Port's overall system of internal controls (addressing both systems risk and financial business process risks) is audited annually by
the Port's independent Certified Public Accounting firm (Moss Adams) as to design and operational effectiveness, as part of their audit
of the Port's financial statements and federal awarded funds administration/regulatory compliance. These internal controls are also
audited annually by the Washington State Auditor's Office as part of their public funds/assets accountability audit, focused on evaluating
whether public resources are handled properly and in compliance with laws and regulations, and whether effective internal controls are
in place to promote accountability and encourage sound financial management practices. The Port annually receives clean audits (no
major findings) as to the overall design and operational effectiveness of the internal controls in place including the use of the PeopleSoft
Financials system. 

7      2015 Protiviti Inc. 
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.

Summary of Observations 
PeopleSoft Security Review: Segregation of Duties (continued)                               Risk: Medium 

Management Response:(continued) 
The Port of Seattle acknowledges that a security design document for v9.1 setup/configuration is not currently present. Where a 
functional/technical design document may often be developed during a comprehensive upgrade project when security is configured; the
PeopleSoft Financials v9.1 upgrade was a technical only upgrade and within this scope the Port did not utilize resources to fully
implement formal best practice. Rather, the decision was to focus resources on functionality critical to business operations. It was
decided that security would be rolled over to the new version status quo thus, a comprehensive design document was not completed at
that time. 
However, the Port does absolutely adhere to formal security administration protocols. While undocumented in terms of design, the
business processes that support this key responsibility are firmly established and followed. All PeopleSoft Financials security requests
go through a 3-tier review and approval process. First, requests are submitted to the respective operational workgroup manager for first
tier approval. They are then forwarded to a separate team, the AFR Business Technology Analysts, for review/approval. They are then
submitted to yet another separate group, the ICT PeopleSoft Developer team. The AFR Business Technology team does not have
access to the PeopleSoft PeopleTools module where security access is administered. The ICT PeopleSoft Developers separately have
this security access to update the end users security profile in PeopleSoft. Furthermore, a quarterly security audit, separately
administered by the AFR Business Technology team, is also performed where each employee that has access to their PeopleSoft
Financials module is reviewed by the workgroup managers for reasonableness and appropriateness. 
The Port of Seattle appreciates and will consider the recommendation of creating a comprehensive security design document to
document the security protocols in place and make any further refinements as informed through this audit.



8      2015 Protiviti Inc. 
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.

Summary of Observations 
PeopleSoft Security Review: Segregation of Duties (continued)                               Risk: Medium 

Management Response:(continued) 
The Port of Seattle PeopleSoft Team (includes ICT PeopleSoft Developers and AFR Business Technology Analysts) partner, and share 
distinct and separate responsibilities, to administer security for PeopleSoft Financials. The AFR Business Technology team is
responsible for approving and auditing all transactional add/update access to PSFS modules. The ICT PeopleSoft Developers are
responsible for approving and auditing the delivered roles that are used by ICT to administer the database and associated tasks. For
this reason, the Roles that the AFR Business Technology Analysts are responsible for are "hard coded" into the query criteria that is
used to perform the audit. The role that this audit report references was an old, outdated, PeopleSoft delivered role that is no longer
being used by AFR. Hence, it was not "hard coded" into the query criteria and, therefore, did not appear in the comprehensive quarterly
audit review process.
We note that while there were roles identified that were not present on the PeopleSoft Financials Security Request Form, the
administration and audit that is performed on our security module is very comprehensive and there are no employee's with inappropriate
or unauthorized access. This is affirmed by AFR's quarterly review. 
We have, however, recognized the opportunity presented and are developing new reports that will capture all roles that are assigned to
any Port of Seattle employee, regardless of departmental ownership. The PeopleSoft Authorization Form will be updated to include all
roles that are active in the Production environment. 




9      2015 Protiviti Inc. 
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.

Summary of Observations 
PeopleSoft Security Review: Segregation of Duties (continued)                               Risk: Medium 

Management Response:(continued) 
The PeopleSoft Financials v9.1 Authorization Request form includes three (3) columns: the PSFS Module, Role, and Description. This
form is completed by the end user, or end user's manager. The descriptions of the roles are intended to be generic as our audience is
not necessarily of technical background. While the title may not be all encompassing, the information contained is accurate. The typical
business process that is followed for security is for the end user to request that we "clone" another user who is performing the same
work. The end user then populates the appropriate roles on the form to submit for approval. A form referencing the role description as
the specific technical verbiage for the page/component name would cause confusion for our end users. Nevertheless, as we plan to
develop a comprehensive security design document, we seek to find a practical balance of understanding for our end users. A
permission list/page/component/add/update/correct description can be noted, in addition to a description that makes sense to the end
user. 
The above discusses the comprehensive system/roles security and transactional/operational internal controls in place. We also clarify
that a different system security risk area that these controls would in part mitigate is in regard to Protiviti's observations provided under
the section, "PeopleSoft Security Review: Administrative Access" which is responded to separately in that section. 
Port management appreciates the analysis and observations noted by Protiviti. We will continue to build upon our sound internal 
controls that are in place, with serious consideration to the recommendations provided.
As we have collectively acknowledged, the technical upgrade from v 8.4 to v9.1 was in itself a massive and complex undertaking, but a
very successful implementation that went live smoothly and which the Port is very proud of. 



10     2015 Protiviti Inc. 
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.

Limitations of Translatable Documents

PDF files are created with text and images are placed at an exact position on a page of a fixed size.
Web pages are fluid in nature, and the exact positioning of PDF text creates presentation problems.
PDFs that are full page graphics, or scanned pages are generally unable to be made accessible, In these cases, viewing whatever plain text could be extracted is the only alternative.