You are on page 1of 2

CertifiedInformation

C I SA Systems Auditor' Chapter 2—Governance and Management of IT Section Two: Content


ISACX COW ad=

environment and even more complex in a third-party relationship. – Use of new technologies – Adoption of new products or
Typical governance activities such as goal setting, policy and newer versions/releases – New development tools and
standard development, defining roles and responsibilities, and environments
managing risk must include special considerations when dealing – Changes to physical location of service facilities – Change
with cloud technology and its providers. of vendors or subcontractors
As with all organizational changes, it is expected that some Service improvement and User Satisfaction
adjustments will need to be made to the way business processes are SLAs set the baseline by which outsourcers perform the IS function.
handled. Business processes such as data processing, development In addition, organizations can set service improvement expectations
and information retrieval are examples of potential change areas. into the contracts with associated penalties and rewards. Examples
Additionally, processes detailing the way information is stored, of service improvements include:
archived and backed up will need revisiting.  Reductions in the number of help desk calls
 Reductions in the number of system errors
The cloud presents many unique situations for businesses to  Improvements to system availability
address. One large governance issue is that business unit personnel,
who were previously forced to go through H' for service, can now Service improvements should be agreed on by users and IT with
bypass IT and receive service directly from the cloud. Policies the goals of improving user satisfaction and attaining business
must be modified or developed to address the process of sourcing, objectives. User satisfaction should be monitored by interviewing
managing and discontinuing the use of cloud services. and surveying users.

The responsibility for managing the relationship with a third


party should be assigned to a designated individual or service
2.9.3 ORGANIZATIONAL CHANGE MANAGEMENT
management team. In addition, the organization should ensure that Organizational change management involves use of a defined
the third party assigns responsibilities for checking for compliance and documented process to identify and apply technology
and enforcing the requirements of the agreements. Sufficient improvements at the infrastructure and •pplication level that are
technical skills and resources should be made available to monitor beneficial to the organization and involve all levels of the
whether requirements of the agreement, in particular the information organization impacted by the changes. This level of involvement
security requirements, are being met. Appropriate action should be and communication will ensure that the IS department fully
taken when deficiencies in the service delivery are observed. understands the users' expectations and changes are not resisted
or ignored by users once implemented.
The organization should maintain sufficient overall control and
visibility into all security aspects for sensitive or critical The IS department is the focal point for such changes by leading
information or information processing facilities accessed, or facilitating change in the organization. This includes staying
processed or managed by a third party. The organization should abreast of technology changes that could lead to significant business
ensure that they retain visibility in security activities such as change process improvements and obtaining senior management
management, identification of vulnerabilities and information commitment for the changes or projects that will be required at the
security incident reporting/response through a clearly defined user level.
reporting process, format and structure. When outsourcing, the
organization needs to be aware that the ultimate responsibility for Once senior management support is obtained to move forward with
information processed by an outsourcing party remains with the the changes or projects, the IS department can begin working with
organization. each functional area and their management to obtain support for the
changes. In addition, the IS department will need to develop a
MANAGING CHANGES TO THIRD-PARTY SERVICES communication process which is directed at the end users to update
Changes to the provision of services, including maintaining and them on the changes, the impact and benefit of the changes, and
improving existing information security policies, procedures and provide a method for obtaining user feedback and involvement.
controls, should be managed taking into account the criticality of •
business systems and processes involved and reassessing risks. User feedback should be obtained throughout the project, including
validation of the business requirements and training on and testing
The process of managing changes to a third-party service needs of the new or changed functionality.
to take into account:
 Changes made by the organization to implement: 2.9.4 FINANCIAL MANAGEMENT PRACTICES
– Enhancements to the current services offered Financial management is a critical element of all business functions.
– Development of any new applications and systems
In a cost-intensive computer environment, it is imperative that sound
– Modifications or updates of the organization's policies and
financial management practices are in place.
procedures
– New controls to resolve information security incidents and to The user-pays scheme, a form of chargeback, can improve application
improve security and monitoring of IS expenses and available resources. In this scheme
– Updates to policies, including the IT security policy the costs of IS services—including staff time, computer time and other
 Changes in third-party services to implement: relevant costs—are charged back to the end users based on a standard
– Changes and enhancements to networks (uniform) formula or calculation.
CISA Review Manual 2014 105
ISACA. All Rights Reserved.

You might also like