You are on page 1of 13

Chapter 1 IS Audit Process Chapter Overview

Develop and/or implement a risk-based IS audit strategy and objectives, in compliance with generally accepted standards, to ensure that the organization's information technology and business processes are adequately controlled, monitored, and assessed, and are aligned with the organisations business objectives. Plan specific audits to ensure that the IS audit strategy and objectives are achieved. Obtain sufficient, reliable, relevant, and useful evidence to achieve the audit objectives.

The Auditing is defined as Systematic process by which a competent, independent person objectively obtains and evaluates evidence regarding assertions about an economic entity or event for the purpose of forming an opinion about and reporting on the degree to which the assertion conforms to an identified set of standards. IS auditing is The process of collecting and evaluating evidence to determine whether information systems and IT environments adequately safeguard assets, maintain data and system integrity, provide relevant and reliable information, achieve organizational goals effectively, consume resources efficiently, and have in effect internal controls that provide reasonable assurance that operational and control objectives will be met.

Role of IS auditing
Perform separate IT audits Perform integrated audits Perform technical and IT operational audits etc. Audits primary role is to provide a statement of assurance as to whether adequate and reliable internal controls are in place and are operating in an efficient and effective manner. Understanding of business roles in systems under development or purchase of software and project management; Application of risk-oriented audit approaches; Application of standards (national or international) to improve and implement quality systems in software development; Evaluation of System Development Life Cycle (SDLC) or new development techniques (e.g., prototyping, end-user computing, rapid systems or application development); Evaluation of technologies and communication protocols such as EDI, client server model, LAN and WAN, and integrated voice/data/video systems; Use of computer assisted audit tools and techniques.

IS auditing involves:

Types of IS Audits
General Control Examination (Known in the past as facility audit) Application Systems Audit System Under Development Audit Technical or Special Topic Audits etc.

Why IS Audit??
Greater reliance on Information Systems and Technology

Growing Concern for Data Security due to Proliferation of technology Legal requirement Complexity of Information Systems and Technology

Audit Process
Audit Mission Audit Charter Information Gathering Risk Analysis Audit Plan Short term plan Long term plan

Abide IS Audit standards, guidelines and procedures

IS Auditing standards:
are to inform IS auditors of the minimum level of acceptable performance required to meet the professional responsibilities. Inform the management and other related parties of the professional expectation concerning the work of practitioners.

Guidelines provide guidance in applying IS Auditing standards. Procedures provide examples of procedures an IS auditor might follow in an audit engagement.

Audit Phases
Gather information and Plan Obtain Understanding of Internal Control Perform Compliance Tests Perform Substantive Tests Conclude the Audit

Other Professional Bodies Standards


ISA6 - Risk Assessments And Internal Controls Addendum 1 To Above - EDP Characteristics And Considerations Supplement 1 To ISA 6 - EDP Environments - Stand Alone Computers

Supp. 2 To ISA 6 EDP Environments - On-Line Computers Supp. 3 To ISA 6 EDP Environments - Database Systems ISA15: Auditing In A Computer Information Systems Environment ISA 16: Computer-Assisted Audit Techniques

Audit Mission
Should commensurate with the role of audit within the organization Should be realistic and ambitious Should be approved by Audit Committee and the highest level of management Should be supported by appropriate strategic plans

Audit Charter / Engagement letter


Identifies responsibility, accountability and authority of audit Should be approved by highest level of management Should take into consideration current IT environment and challenges faced by the audit Should comply with relevant laws and regulations

Information Gathering
Reviewing documentation regarding Information Systems Meeting relevant management representatives Reviewing reports, industry publications etc. Reviewing documentation pertaining to current IT Projects Observation

Risk Assessment
The potential that a given threat will exploit the vulnerabilities of an asset or a group of assets to cause loss or damage to the assets Risk analysis is part of the audit planning and it helps identify risks and vulnerabilities so that the auditor can determine the controls needed to mitigate those risks. The IS auditor is often focused towards a particular class of risks associated with information and the underlying information systems and processes. Some of the risks associated with information technology are: Improper use of technology Repetition of errors Cascading of errors

Illogical processing Inability to control technology Equipment failure Incorrect data entry Concentration of data

Elements of Risk The threats to information system asset are: Unauthorized access Utility failure Loss of key personnel Tampering Safety of personnel Hardware failure Natural disasters Human errors Disgruntled employees

Impact on assets based on threats and vulnerabilities


Physical destruction of assets Loss of data Theft of the information Indirect theft of assets Delay loss Reduced productivity & income, extra expense, license penalties etc. Delay damage/service outage Fraud via IT Altered or omitted data Application or file tampering Unauthorized disclosure of IT data Accidental, intentional and malicious acts Physical theft Petty, insider, breaking & entering, armed robbery

Probabilities of threats (combination of the likelihood and frequency of occurrence) High loss per event High frequency of occurrence High loss per event Low frequency of occurrence

Low loss per event High frequency of occurrence

Low loss per event Low frequency of occurrence

Controls
The policies, procedures, practices and organizational structures, designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected. Internal control includes all measures and practices that are used to mitigate exposures to risks that could potentially prevent an organization from achieving its objectives. Internal control is not solely a procedure or policy that is performed at a certain point in time, but rather it is continually operating at all levels within an organization.

Main objectives of the internal control process Safeguarding of assets (security objectives); Efficiency and effectiveness of operations (operational objectives); Reliability and completeness of accounting/financial and management information (information objectives); and, Compliance with organizational policies and procedures as well as applicable laws and regulations (compliance objectives).

Information Systems Control Preventive (in order to avoid occurrence) Detective (in order to detect or identify occurrences) Corrective (In order to correct or restore controls)

Chapter 2 Chapter Overview


Management Plannng and Organization of IS

Information Systems Strategy Policies and Procedures IS Management Practices IS Organizational Structure and Responsibilities Auditing the Management, Planning and Organization of IS

The objective of this content area is to ensure that the IS Auditor Understands and can evaluate the strategies, policies, standards, procedures and related practices for the management, planning and organization of IS." Chapter Summary: According to the Certification Board, this Content Area will represent approximately 11% of the CISA examination. (approximately 22 questions) Overall business strategies and policies, identifying the areas concerning information processing, and gaining an understanding of the business practices and functions. Identifying significant functional areas, tasks and reporting responsibilities of IS departments to gain an understanding of the organization's information processing environment through review of relevant documentation, inquiry and observation Evaluating management practices, procedures and organizational structure of IS departments to assess their adequacy by determining whether they are efficient and effective and include appropriate controls. Testing the controls to determine compliance with appropriate standards by applying suitable audit techniques. Assessing the organizational control environment to determine that control objectives were achieved by analyzing test results and other audit evidence.
Information Systems Strategy. Strategic Planning Long-range planning for the organization Long-range planning for the IS department Steering Committee(s) The IS Department should have long range (i.e. greater than one year, typically between 3 and 5 years) and short range (i.e., one year or business cycle) plans. These plans should be consistent with the organization's broader plans for attaining the organizations goals. Typical objectives normally associated with strategic planning are: Long-Range Planning for the Organization - should address issues pertinent to its contribution to the organization's achievement of long-range goals. Long-Range Planning for the Information Systems Department - should be consistent with--and integrated into--senior management's long-range plans and recognize organizational goals, organization changes, technological advances, and regulatory requirements. Steering Committee An organizations senior management should appoint a planning or steering committee to oversee information systems department activities. Its duties and responsibilities should be defined in a formal charter. Strategic Planning Short-range planning for the organization and for the IS department Review of planning for the organization and for the IS department

Short-Range Planning for the Organization and for the Information Systems Department - should ensure that appropriate Information Systems Department resources are allocated on a basis consistent with the overall organization's short range plans. Review of Planning for the Organization and for the Information Systems Department - Management reports should be provided for senior management's review of the organization's progression toward identified goals.

Planning/Steering Committee Board representation Steering committee Board Representation The board should have a member responsible for information technology who understands the risks and issues. Steering Committee Provides an organization with direction in harmony with the corporate mission and objectives. The cofor mmittee consists of various managers that are representative of all the business areas in the organization. Their goal is to review and act upon all requests new system needs in accordance with the corporate objectives. To this end it is the responsibility of the committee to ensure efficient use of data processing resources and set the priorities, examine costs and provide support for various projects. Policies and Procedures Policies Procedures Human Resources Policies/Practices Outsourcing Practices Policies are high level documents. They represent the corporate philosophy of an organization. To be effective, they must be clear and concise. Management must create a positive control environment by assuming responsibility for formulating, developing, documenting, promulgating and controlling policies covering general goals and directives. Management should take the steps necessary to ensure that employees affected by a specific policy receive a full explanation of the policy and that they understand its intent. In addition to corporate policies that set the tone for the organization as a whole, individual divisions and departments should define lower level policies. These would apply to the employees and operations of these units and would focus at the operational level. A top-down approach to the development of lower level policies in instances when they are derived from corporate policies is desirable, as it ensures consistency across the organization. Management should review all policies. Policies need to be updated to reflect significant changes within the organization or department. Written IS policies should originate at the corporate level to ensure uniformity. Policies should be clear and concise to allow for easy compliance and enforcement.

Human Resource Policies/Practices Hiring practices Employee handbook Promotion policies Training Hiring Practices Hiring practices are important to ensure that the most effective and efficient staff is chosen and that the company is in compliance with legal recruitment requirements. Employee Handbook Distributed to all employees upon being hired, should explain items such as: security policies and procedures, company expectations, employee benefits, etc. Promotion Policies

Must be fair and understood by employees. Policies should be based on objective criteria and consider an individual's performance, education, experience and level of responsibility. Training Training should be provided on a fair and regular basis to all employees. This is particularly important when new hardware and/or software is being implemented. Training should include relevant management training, project management training, and technical training. Human Resource Policies/ Practices Scheduling and time reporting Employee performance evaluations Required vacations Termination policies Scheduling and Time Reporting Proper scheduling provides for a more efficient operation and use of computing resources. Time reporting allows management to monitor the scheduling process. Employee Performance Evaluations Employee assessment must be a standard and regular feature for all IS staff. The HR department should ensure that IS managers and employees set mutually agreed goals/expected results. Required Vacations Ensures that at least once a year someone else performs the function. Termination Policies Established to provide clearly defined steps for employee separation. Outsourcing Practices Reasons for embarking on outsourcing Services provided by a third party Possible advantages of outsourcing Possible disadvantages of outsourcing Business risks from outsourcing Audit/security concerns of outsourcing

IS MANAGEMENT PRACTICES
Management Principles IS Assessment Methods Quality Management IS Standards CMM

Management Principles People management Management of change Focus on good processes Security Handling third parties
People management Personnel in a typical IS department is highly qualified, highly educated and usually do not feel that their jobs are at risk. IT professionals are prepared to switch jobs frequently and normal perks of money and a managerial job title are not an inducement. Therefore, employee training and development and challenging assignments are very important. Management of change Not only is turnover of people more frequent, but the department is constantly in a state of flux handling demands for new applications and new technologies. It is important for an IS department to stay abreast of technology and proactively embrace change whenever necessary. Focus on good processes

Because of the rate of change, it is important for IS departments to implement and enforce good processes. There must be documented procedures for all aspects of the department whether it be programming standards, testing or back ups of data. Security The concern for security is far more important and pervasive within IS than most other departments. The Internet has intensified this concern. The IS department must be equally concerned about business continuity and disaster recovery. Handling third parties IS departments have many vendors who must all work together to deliver the desired results. IS Assessment Methods IS budgets Capacity and growth planning User satisfaction Industry standards/benchmarking Financial management practices Goal accomplishments IS Budgets Allow forecasting, monitoring and analyzing financial information. They allow for an adequate allocation of funds, especially in an IS environment where expenses can be cost-intensive Capacity and Growth Planning Used to assess whether the operation is running as efficiently and effectively as possible. This activity must be reflective of the long and short range business plans and must be considered within the budgeting process. Use simulation or modeling techniques to identify any shortfalls in capacity or bottlenecks that may adversely affect service and budget for augmented or replacement equipment. Determining unused capacity and saturation point of the present system. Estimating growth rate of existing system. Determining system up gradation point by comparing the growth rate of system with system saturation point. User Satisfaction It is one of the measures to ensure an effective information processing operation. Users and IT should agree on a level of service, which should be periodically audited. Industry Standards / Benchmarking Provide a means of determining the level of performance provided by similar information processing facility environments. These statistics can be obtained from vendor user groups, industry publications and professional associations. Financial Management Practices Critical to have sound financial management practices in place. Goal Accomplishment comparing performance with predefined goals.

QUALITY MANAGEMENT
ISO Standards Capability Maturity Model (CMM) Quality Management Quality management is the means by which IS department-based processes are controlled, measured and improved. Processes in this context are defined as a set of tasks that when properly performed produces the desired results. Quality Management

Software development, maintenance and implementation Acquisition of hardware and software Day-to-day operations Security Human resource management General administration

Standards to Assist the Organization


ISO 9000 ISO 9001 Provides guideline for companies in design, development, production, installation or servicing. ISO 9002 ISO standard interpretation ISO 9000 2000 ISO 9126 Capability Maturity Model Provides guidelines on how to choose the appropriate Standards

Provides guidelines for companies in production, installation or servicing. ISO 9003 For companies in final inspection and testing. ISO 9004 A guideline to aid in interpretation of the standards ISO 9126 Provides the definition of the characteristics and associated quality evaluation process used when specifying the quality requirements of software products. ISO 9000 2000

Quality Measures of ISO 9000


Leadership Human Resource Development and Management Management of Process Quality Customer Focus and Satisfaction

Capability Maturity Model (CMM) Maturity Levels Process Capabilities Key Process Areas Goals Common Features Key Practices IS ORGANIZATIONAL STRUCTURE AND RESPONSIBILITIES Management Structures Line management Project management IS Responsibilities and Duties Operations Data entry -- online and batch Control group Librarian Operations Includes all the staff required to run the computer efficiently and effectively. Can be sub-divided into three categories. Physical Security Data Security and Processing Controls. Data Entry Generally, in modern on-line environments, data entry is performed by personnel in the user departments. On-Line Data Entry An on-line system provides various screen edits to perform basic input verification of the data entered, e.g. range checks, alpha-numeric checks, limit checks, and valid predefined value checks from an internal table. The department manager or supervisor would be required to provide for an adequate separation of duties by being responsible for overrides and resubmission of errors or rejected entries. Batch Data Entry Data entry within the typical information systems department is often the responsibility of the Data Control Department. Control Group The input/output control group should be in a separate area where only authorized personnel are permitted entry. The supervisor of the Control Group usually reports to the IPF Operations Manager. Librarian

The librarian is required to record, issue and receive, and safeguard all program and data files that are maintained on computer tapes and/or disks in an IPF.

IS Responsibilities and Duties


Security administration Quality assurance Database administration Security Administration Security administration must begin with management's commitment. Upper management should develop and enforce a written policy that clearly states the standards and procedures to be followed. Quality Assurance (QA) The QA group usually performs testing and verification to ensure that programs, program changes, and documentation adhere to standards and naming conventions prior to programs being moved into production. Data Base Administration The Data Base Administrator (DBA) is responsible for the actual design, definition, and the proper maintenance of the corporate data bases. Since the DBA should have no application programming or end user responsibilities, he/she should be prohibited from accessing the production data within the data bases for which this person administers. IS RESPONSIBILITIES AND DUTIES Systems analysis Application programming Systems programming Network management Help desk administration Systems Analysis Systems analysts are specialists who design systems based on the needs of the user. This individual is responsible for interpreting the needs of the user and determining the programs and the programmers necessary to create the particular application. Applications Programming The applications programming area is made up of the applications programmers who are responsible for developing new and maintaining systems in production. They should work in a test environment only and should not move test versions into the production environment. Systems Programming Systems programmers are responsible for maintaining the systems software including the operating system. This function may allow for unrestricted access to the entire system. Network Management This position is responsible for technical and administrative control over the local area network. Depending upon the policy of the company, this position can report to the director of the IPF or may report to the end-user manager. Help Desk Administration It is a unit within an organization that responds to technical questions from users. Most software companies have help-desks. Questions and answers can be delivered by telephone, fax or e-mail. Help desk personnel may use third party help desk software that enables them to quickly find answers to common questions. SEPARATION OF DUTIES WITHIN IS Transaction authorization Reconciliation Custody of assets Access to data Separation of Duties Control Matrix Transaction Authorization Transaction authorization is the responsibility of the user department. Authorization is delegated to the degree that it relates to the particular level of responsibility of the authorized individual in the department. Periodic checks must be performed by both management and audit to detect the unauthorized entry of transactions. Reconciliation

Reconciliation is the ultimate responsibility of the user. In some organizations, limited reconciliation of applications may be performed by the Data Control group with the use of control totals and balancing sheets. This type of independent verification increases the level of confidence that the applications ran successfully and that the data is in proper balance. Custody of Assets Custody of corporate assets must be determined and assigned appropriately. The "data owner" has responsibility for determining authorization levels required to provide adequate security, while the data security administration group is often responsible for implementing and enforcing the security system. Separation of Duties within IS Authorization Forms User Authorization Tables Exception Reporting Audit Trails Transaction Logs

AUDITING THE MANAGEMENT, PLANNING AND ORGANIZATION OF IS Reviewing Documentation Interviewing and Observing Personnel in the Performance of Duties Reviewing Contractual Commitments

Reviewing Documentation Information technology strategies, security policy documentation, organization/functional charts and steering committee reports, job descriptions, system development and program change procedures, operations procedures, and human resource manuals provide valuable evidence to the IS auditor. Interviewing and Observing Personnel in the Performance of Their Duties. The candidate should be able to evaluate the information provided from an interview for the audit and how the Observation technique can also be one of the most confident ways to ensure integrity in the identification of personnel duties.
The Review of Contractual Commitments Represents one of the IS auditors compliance reviews that should help verify management participation in the contracting process ensuring a proper level of timely contract compliance.

Interviewing and Observing Personnel in the Performance of their Duties Actual functions Security awareness Reporting relationships Actual Functions Observation is the best test to ensure that the individual who is assigned and authorized to perform a particular function is the person who is actually doing the job. Security Awareness Security awareness should be observed to verify an individual's understanding and practice of good preventive and detective security measures to safeguard the company's assets and data. Reporting Relationships Reporting relationships should be observed to ensure that assigned responsibilities and adequate separation of duties are being practiced.

Reviewing Contractual Commitments Development of contract requirements Contract bidding process Contract selection process

Contract acceptance Contract maintenance Contract compliance

You might also like