Simply because there is a sharp increase of high profile instances of data mismanagement and fraud, the EUDAs are seen as an incubator for compounding issues leading to an avalanche of misinformation. There is an intense focus on data management by banks and insurers, particularly in light of Basel III, Solvency II, and other regulatory norms.
It ensures that the end users should have a better understanding of what these spreadsheets and macros do for their routine operations, better operational mode, awareness of the pitfalls, clear audit trail, version control, backup, segregation of duties and code checking with testing and maintainability.
Many industry experts, who have made efforts to do a root cause analysis have reported that the sudden surge of EUDAs was primarily due to quality, time and resources. Having this in mind, KGiSL has invested its best of resources to come out with a Controlled – User Developed Application – Automation Framework (CUDAAF).
CUDAAF is a simple, fit-for-purpose automation framework that is capable of facilitating software development by allowing designers and programmers to devote their time to meet the user’s real requirements rather than dealing with the more standard low-level details of providing a working system, thereby reducing overall development time.
CUDAAF provides you with,
Ultimately, it provides a better (and dependable) decision making through better data governance. In addition to providing robust, performing, and maintainable applications, CUDAAF prove to be more cost-effective by reducing the development-testing-implementation time by nearly 50%. CUDAAF can address requirements ranging from audit and control, through to rich data analysis, reconciliation, and validation. This ensures control way beyond a specific spreadsheet or other types of user-developed application, bringing integrity and efficiency across complete, end-to-end business processes.
A complete dashboard of applications, changes made are maintained. Reports are configured for any changes made to the logics
Provides automated version control for all files & formats (Input/output). The version of computation logics also can be maintained
Access to the applications is provided on a ‘need to access’ basis. Changes to access control lists are also traceable.
Segregation of duties
Procedures such as ownership, escalation and multi-level sign-off are supported
All inputs can be validated and monitored against definable tolerance levels
Security and integrity of data
provides facility to ensure user authentication, function-specific access controls, maker/checker facility, transaction integrity, ACID compliance
Facilitates the preparation of documentation on the objectives and functions of the spreadsheet and ensures that it is maintained
Backup is automated as part of the version control process for the applications
Files may be archived according to corporate retention policies in a protected, segregated location as defined by the user (IT personnel)
Independent logic analysis