Euc End User Computing Checklist
Euc End User Computing Checklist
In a world where employees leverage user- your organization’s bottom line, your IT department
may want to sunset the EUC and implement a more
centered applications (like Excel, Access,
formal, IT-owned business application. Other EUCs,
Python, and other democratized tools), IT however, may never justify a full application and so
departments worry about encroaching should remain subject to the right controls and the
continuous evidencing of those controls.
risks — and for good reason.
The right EUC risk management strategy gives you
End-user computing (EUC) refers to any application visibility and evidence of the risks you run, allowing
supporting a critical process that is developed you to make informed decisions as you navigate a
or managed by end users rather than an IT complex and ever-changing technology landscape.
department or professional software engineering
team. And though they can be wildly useful in
helping teams boost efficiency in
their everyday work, they are seldom
managed with the same governance
protocols or security checks that IT
departments maintain in their custom
applications.
There are four main categories of EUC risk - have you evaluated your applications with these categories in mind?
FINANCIAL RISK
• Data Accuracy and Loss: Inaccurate or incomplete EUC data can result in financial miscalculationsm,
potentially leading to financial losses or regulatory compliance issues.
• Resource Utilization: Inefficient use of resources, icluding hardware, software licenses, and personnel,
can result in unnecessary expenses and inefficiencies.
• Vendor or Supplier Risks: Despendence on specific vendors or suppliers for EUC solutions can expose
the organization to financial risk if these if these entities fail to deliver or experience financial instability.
OPERATIONAL RISK
• Downtime: EUC system downtime can disrupt business operations, causing productivity losses and
revenue reduction. Downtime can result from technical issues, software glitches, or cyberattacks, and
causes issues with business continuity.
• Service Level Agreements (SLAs): Failure to meet SLAs can result in penalties, contractual breaches,
and damage to customer relations.
REGULATORY RISK
• Non-Compliance: Failure to adhere to regulatory requirements, such as BCBS 239, SR 11-7, Solvency II,
or industry-specific standards, can lead to legal penalties, fines, and reputational damage.
REPUTATIONAL RISK
• Negative Public Perception: Any issues related to EUC, such as data breaches, system failures, or
regulatory violations, can tarnish the organization’s reputation, leading to crashing share prcies,
executive churn, and difficulty gaining and keeping customers.
• Customer Confidence: EUC-related problems can erode customer confidence and loyalty,
and rebuilding trust will require significant effort and resources, if it is even possible.
KEEP IN MIND: While companies have paid off financial losses in years, the impact of
reputational loss can last generations. Any and every EUC risk can result in reputational
loss – from data breaches to downtime to non-compliance – so it is critical that you
take the time to recognize your risks and take steps to keep them controlled.
4
White Paper: The Ultimate End-User Computing (EUC) Checklist
PwC produced an early list of requirements to demonstrate spreadsheet control to meet the need for
compliance with Sarbanes-Oxley legislation. The objectives defined during this intensive period of controls
implementation have now become standard elements for later spreadsheet control projects initiated under
many later regimes, such as MIFID1 &2, Dodd Frank, CCAR, OCC Model Risk, COSO 2013, PCAOB Alert 11, UK PRA, Basel
II, Solvency 2 and NAIC model audit rules.
Change control: All changes are highlighted and may be reported via dashboards, emails, or reports
V
ersion control: Automated version control for all files, even when they are updated by folder and name
(e.g. /Jan/Report31.xls changing to /Feb/Report01/xls)
Access control: Access to the file may be prevented at the file level
I nput control: All inputs can be monitored against definable tolerance levels; these may be absolute
thresholds or relative to previous values
S
ecurity and Integrity of Data: Cells/ranges/sheets and files may be protected to restrict access and
thereby protect the data and formulas embedded in spreadsheets
D
ocumentation: Facilitates the preparation of documentation on the objectives and functions of the
spreadsheet and ensures that it is maintained
A
rchiving: Files may be archived according to corporate retention policies in a protected segregated
location
L ogic inspection: Automated logic analysis on bulk inventories or individual files for both cell- and VBA-
based content
S
egregation of duties: Ownership procedures, multi-level sign-off, and more can be automated and
subject to control
A
udit control: A complete risk assessment should be applied
automatically to bulk inventories or individual files to expose poor
spreadsheet practices that would lead to error or fraud
HOT TIP: Managing EUC with controls is not just good practice – it is
regulated. From the perspective of the financial services industry, three
pieces of regulation in particular – BCBS 239, Supervisory Guidance on Model
Risk Management (SR11-7), and Solvency II – have set the stage both for
specific EUCs control issues and for the wider expectations on data quality.
5
White Paper: The Ultimate End-User Computing (EUC) Checklist
By understanding all of your EUCs, their costs, risks, and benefits, employers can determine whether an EUC ought
to be further centralized and transformed into an IT-owned core business application, or whether it ought to
remain in the hands of your business users. In both cases, full visibility into an EUC is necessary.
If someone comes asking questions about your EUC management program, are you prepared to supply
evidence of:
A discovery process for new EUC risk detection to ensure inventory completeness
An end-of-life plan for an EUC (Need more support on this topic? See our Decommissioning EUCs Guide)
Once you have these pieces of evidence ready to go, you are also prepared to provide strategic and financial
counsel to your IT team. By identifying risks and understanding the business impact of your EUCs, your department
is prepared to determine which EUCs should be left alone (monitoring aside) and which should be transformed into
new business applications.
**Embed automated monitoring and reporting into your tech stack DNA via integrated EUC risk management
technology for a more comprehensive risk inventory. See last page for more information.
While strategizing around EUC risk management, the number of items to account for can feel overwhelming. Not to
mention, auditing and monitoring your EUC risk is not a point-in-time exercise – it has to be continuous.
Flexible, customizable technology can help you automate governance, scan files according to your EUC risk
criteria in near real-time, and give your executives and stakeholders greater insights simultaneously.
Explore ClusterSeven
6
White Paper: The Ultimate End-User Computing (EUC) Checklist
ABOUT MITRATECH
Mitratech is a proven global technology partner for corporate legal, risk
& compliance, and HR professionals seeking to maximize productivity,
control expense, and mitigate risk by deepening operational alignment,
increasing visibility, and spurring collaboration across their organization.
info@mitratech.com
www.mitratech.com