Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

SOX Compliance

Note: SOX policy framework requires Enterprise Edition.

The Sarbanes-Oxley Act (SOX) policy framework detects exposure of financial data and internal controls information that could impact financial reporting integrity.

Overview

SOX establishes requirements for public company financial reporting and internal controls. Aquilon DLP’s SOX policy helps organizations comply with:

  • Section 302: Corporate responsibility for financial reports
  • Section 404: Management assessment of internal controls
  • Section 409: Real-time issuer disclosures

Protected Data Categories

The SOX policy detects:

Data CategoryScannersSeveritySOX Section
Financial Account Numbersbank_account, iban, aba_routingCritical302, 404
Tax Identifiersein, ssnCritical302
Internal Financial Datafinancial_keywordHigh404
Audit Documentationaudit_keywordHigh404
Executive Communicationsexec_keywordMedium302

International Subsidiaries

Multinational corporations with global subsidiaries must protect employee and financial data across jurisdictions. Aquilon DLP includes 28 country-specific national ID scanners for comprehensive coverage.

Global Employee and Tax Data

RegionScannersSOX Relevance
Europegermany_steurid, france_nir, uk_nino, + 11 moreEU subsidiary employee tax data
Americasbrazil_cpf, argentina_cuit, + 2 moreLatin American subsidiary payroll
Asia-Pacificindia_pan, japan_my_number, + 6 moreAPAC subsidiary financial records

Note: SOX Section 404 internal controls extend to material subsidiaries. Unauthorized exposure of subsidiary employee tax identifiers or financial data may indicate control deficiencies.

See Policy Frameworks for the complete list of all 28 national ID scanners.

Scanner Mappings

Critical Severity

Financial data requiring immediate protection:

  • Bank Account Numbers: Direct access to company funds
  • IBAN/SWIFT: International financial identifiers
  • ABA Routing Numbers: US bank routing information
  • EIN: Employer Identification Number
  • Tax Documents: Tax returns, W-2s, 1099s

High Severity

Internal controls and audit information:

  • Financial Statements: Balance sheets, P&L, cash flow
  • Audit Working Papers: Internal audit documentation
  • Control Documentation: SOX control matrices, test results
  • Material Information: Pre-earnings, M&A data

Medium Severity

  • Executive Communications: C-suite financial discussions
  • Budget Data: Forecasts, projections
  • Vendor Financial Data: AP/AR information

Configuration

Basic Configuration

[policies]
enabled_policies = ["sox"]

Advanced Configuration

[policies.policy_configs.sox]
settings = { confidence_threshold = "0.75", sensitivity_level = "3", detect_material_info = "true" }

Configuration Options

OptionDescriptionDefault
confidence_thresholdMinimum scanner confidence0.7
sensitivity_levelSeverity multiplier2
detect_material_infoFlag material non-public informationtrue
quiet_period_daysDays before earnings (heightened sensitivity)14

Context Detection

The SOX policy elevates severity when financial context is detected. Enable the sox_financial context profile for automatic keyword detection:

[context]
enabled_profiles = ["sox_financial"]  # Add to existing profiles

Financial Context Keywords

The sox_financial profile detects:

  • Strong indicators: 10-K, 10-Q, 8-K, SEC filing, GAAP, IFRS, PCAOB, balance sheet, income statement, SOX 404, material weakness
  • Weak indicators: revenue, earnings, quarterly, annual, profit, EBITDA, margin, budget, forecast, audit

Note: The SOX policy requires explicit financial context signals for financial_figures findings to avoid false positives on arbitrary currency amounts (e.g., $10 in shell scripts).

Quiet Period Detection

During earnings quiet periods, severity is elevated for:

  • Financial projections
  • Earnings estimates
  • Material business changes

Violation Metadata

Each SOX violation includes:

{
  "policy": "SOX",
  "severity": "critical",
  "data_category": "financial_account",
  "sox_section": "302",
  "material_info": false,
  "control_impact": "financial_reporting"
}

Compliance Reporting

Query Financial Data Exposures

-- All critical financial data exposures
SELECT path, scanner, severity, timestamp
FROM aquilon_dlp_alerts
WHERE policy = 'SOX'
  AND severity = 'critical';

-- Internal controls documentation exposure
SELECT * FROM aquilon_dlp_alerts
WHERE policy = 'SOX'
  AND scanner LIKE '%audit%';

-- Financial data by department (based on path)
SELECT
  CASE
    WHEN path LIKE '%/finance/%' THEN 'Finance'
    WHEN path LIKE '%/accounting/%' THEN 'Accounting'
    WHEN path LIKE '%/treasury/%' THEN 'Treasury'
    ELSE 'Other'
  END as department,
  COUNT(*) as count
FROM aquilon_dlp_alerts
WHERE policy = 'SOX'
GROUP BY department;

Audit Committee Reporting

Generate reports for audit committee:

-- SOX control deficiency indicators
SELECT
  date(timestamp) as date,
  severity,
  COUNT(*) as findings
FROM aquilon_dlp_alerts
WHERE policy = 'SOX'
  AND timestamp > datetime('now', '-30 days')
GROUP BY date, severity
ORDER BY date DESC;

Best Practices

Monitoring Strategy

  1. Immediate alert: Bank accounts, tax IDs, material info
  2. Daily review: Financial statements, audit documentation
  3. Weekly audit: Executive communications, budget data

Control Environment

Use findings to strengthen internal controls:

  1. Identify: Where financial data is stored
  2. Assess: Whether storage is appropriate
  3. Remediate: Move to secure locations
  4. Document: Update control documentation

Segregation of Duties

Monitor for inappropriate access patterns:

-- Financial data in non-finance directories
SELECT * FROM aquilon_dlp_alerts
WHERE policy = 'SOX'
  AND severity = 'critical'
  AND path NOT LIKE '%/finance/%'
  AND path NOT LIKE '%/accounting/%';