SlideShare a Scribd company logo
1 of 43
Although technology provides opportunities for growth and development, it also
represents threats, such as disruption, deception, theft, and fraud.
Fortunately, technology also can provide protection from threats.
Executives should know the right questions to ask and what the answers mean.
1. Why should I understand IT risks and controls? Assurance and reliability.
2. What is to be protected? Trust, but controls provide the basis for trust
3. Where are IT controls applied? Everywhere
4. Who is responsible? Everyone. However, ...
5. When should IT risks and controls be assessed? Always (continuously).
6. How much control is enough? Management must decide based on risk appetite,
tolerance and mandatory regulations.
IT controls have 2 sig elements: the automation of business controls (which support
business mgt and gov) and control of the IT environment and operations (which support
the IT applications and infrastructures).
The CAE needs to consider and assess both elements.
IT controls:
 Provide for assurance related to the reliability of inf and inf services.
 Help mitigate the risks associated with an organization’s use of technology.
 They range:
From corporate policiy to their physical implementation within coded instruction;
From physical access protection through the ability to trace actions and
transactions to responsible individuals; and
From automatic edits to reasonability analyses for large bodies of data.
The following are examples of key control concepts:
 Assurance is provided by the IT controls within the system of IC. This assurance
should be continuous and provide a reliable trail of evidence.
 IArs’ assurance is an indp and obj assessment that the IT-related controls are
operating as intended. This assurance is based on understanding, examining, and
assessing key controls related to risks they manage and performing sufficient testing
to ensure controls are designed appr and functioning effectively and continuously.
Key Concept
 Standard 2130.A1: ―Control‖ – The IAA must evaluate adequacy and effectiveness of
controls in responding to risks within the org’s gov, operations, and IS, regarding:
Achievement of the organization’s strategic objectives;
Reliability and integrity of financial and operational information;
Effectiveness and efficiency of operations and programs;
Safeguarding of assets; and
Compliance with laws, regulations, policies, procedures, and contracts.
 IAr need to understand the range of controls available for mitigating IT risks.
IT Governance
 IT gov provides the FW to ensure that IT can support the org’s overall business need.
 IT gov consists of leadership, org structures, and processes that ensure that org’s IT
sustains and supports the org’s strategies and obj.
Proper appl of IT gov principles has ability to influence and impact entire org and how IT
interacts with the business.
Identification and mgt of IT risks and enablement of improved IT operations:
IT gov needs to be an integral part of the overall corporate RM efforts so that appropriate
techniques can be incorporated into IT activities.
Enhancing the relationship between the business and IT:
IT gov provides mechanism to link the use of IT to an org’s overall strategies and goals.
Visibility into IT management’s ability to achieve its objectives:
Metrics and goals are established to measure 2E of IT daily operations.
Mgt of risks and identf of continuous improv opportunities for business and IT outcome:
Identf and mgt of IT risks will enable the IT activity to run the business of IT more
effectively while also identifying potential opportunities to improve its practices.
IT gov improving adaptability of IT to changing business and IT environments:
IT gov provides a foundation for IT to better manage its responsibilities and support of
business through defined processes and roles and responsibilities of IT personnel.
Several key components that lead to effective IT governance, including:
Leadership
 Evaluate relationship b/w IT obj and org’s current/strategic needs.
 Assess involvement of IT leader in devp and execution of org’s strategic goal.
 Review how roles and responsibilities are assigned within IT activity and whether
personnel perform them as designed.
 Review role of SM and Board in helping establish and maintain strong IT gov.
Organization structures.
Review how the business and IT personnel are interacting and comm’ current and future
needs through org structure, include existence of roles and reporting relationship.
IT processes.
 Evaluate IT process actv and control in place to manage the needs of business while
providing necessary assurance over business processes and underlying system.
 Determine how IT will be measured in helping the organization achieve these goals.
Several key components that lead to effective IT governance, including:
Risk management.
Review the IT actvity’s processes to identify, assess, and monitor/mitigate risks
within the IT environment.
Determine the accountability personnel have within the RM process and how well
these expectations are being met.
Understand what events have occurred and impacted the IT activity to determine
whether appropriate RM practices are in place and whether risk demographics were
appropriately documented and, if needed, updated after the event.
Control activities.
Assess the IT-defined key control activities to manage its business and the support
of the overall organization.
IA should review ownership, documentation, and self-validation aspects.
The control set should be robust enough to address the identified risks.
No Role Responsibilities
1. Board The Board should:
 Understand strategic value of IT function.
 Become informed of role and impact of IT
on the enterprise.
 Set strategic direction and expect return.
 Consider how management assigns
responsibilities.
 Oversee how transformation happens.
 Understand constraint within mgt operate
 Oversee enterprise alignment.
 Direct mgt to deliver measurable value
through IT.
 Oversee enterprise risk.
 Support learning, growth, and
management of resources.
 Oversee how performance is measured.
 Obtain assurance.
2. Executive
managem
ent
Executive management should:
 Become informed of role and impact of IT
 Cascade strategy, policy, and goal down
into enterprise, align the IT org w/ goal.
 Determine required capabilities and invst.
 Assign accountability.
 Sustain current operations.
 Provide org structure and resource.
 Embed accountabilities for RM and
control over IT.
 Measure performance.
 Focus on core business competencies IT
 Focus on important IT processes that
improve business value.
 Create a flexible and adaptive enterprise
that leverages inf and knowledge.
 Strengthen value delivery.
 Develop strategies to optimize IT costs.
 Have clear external sourcing strategies.
No Role Responsibilities
3. SM SM should:
Manage business and executive
expectations relative to IT.
Drive IT strategy devp and execute it.
Link IT budgets to strategic aims and obj.
Ensure measurable value is delivered on
time and budget.
Implmt IT standard, policy and control FW
Inform and educate executive on IT issue.
Look ways of increasing IT value contribut.
Ensure good mgt over IT projects.
Provide IT infrastr to facilitate cost-efficient
creation and sharing of busnss intelligence
Ensure the availability of suitable IT
resources, skills, and infrastructure to
meet obj and create value.
Assess risks, mitigate efficiently, and
make risks transparent to stakeholders.
Ensure that roles critical for managing IT
risks are appropriately defined and staffed.
Ensure the day-to-day mgt and verification
of IT processes and controls.
Implement performance measures directly
and demonstrably linked to the strategy.
Focus on core IT competencies.
4 IAA The internal audit activity should:
Ensure a sufficient baseline level of IT
audit expertise in the department.
Include evl of IT in its planning process.
Assess whether IT gov in the org sustains
and supports strategies and obj.
Identify and assess the risk exposures
relating to the org’s IS.
Assess control respond to risk in org’s IS.
Ensure that audit dept has the IT expertise
Consider use tech-based audit technique.
IT controls are selected and implt on the basis of the risks they are designed to manage.
No list of controls is universally applicable across all types of organizations.
The CAE should be able to advise AC that the IC FW is reliable and provides a level of
assurance appropriate to the organization’s risk appetite.
Therefore, the CAE should consider whether:
 The org’s IT environment is consistent with the org’s risk appetite.
 The IC FW is adequate to ensure the org’s perf remains within the risk tolerances.
COSO defines risk appetite as:
“… degree of risk, on a broad level, that company or org is willing to accept in pursuit of
its goals. Mgt considers org’s risk appetite first in evl’ strategic alternatives, then in
setting of obj aligned w/ selected strategy, and in devl’ mechanisms to manage risks.”
COSO defines risk tolerance as:
“… acceptable level of variation relative to achievement of obj. In setting risk tolerance,
mgt considers relative importance of obj and aligns risk tolerance w/ its risk appetite.”
4.1 Risk Considerations in Determining the Adequacy of IT Controls
When considering the adequacy of IT controls within the org’s IC FW, CAE should
consider the processes established by mgt to determine:
The use, value, and criticality of information.
The org’s risk appetite and tolerance for each business function and process.
IT risks faced by the org and quality of service provided to its users.
The complexity of the IT infrastructure.
The appropriate IT controls and the benefits they provide.
4.1.1 The IT Environment
The inventory of IT infrastructure components reveals basic inf about environment’s
vulnerabilities. For ex, business systems and networks connected to the Internet are
exposed to threats, organizations must make certain that their systems and network
architectures include fundamental controls that ensure basic security.
The complete inventory of the or’s IT hardware, software, network, and data component
forms the foundation for assessing the vulnerabilities within the IT infrastructure.
4.1.2 IT Risks Faced by the Organization
CAE discusses IT risk issues with the CIO and process owners to assess whether all
related parties have an appr awareness and understanding of the technical risks, as
well as their roles in applying and maintaining effective controls.
4.1.3 Risk Appetite and Tolerance
Armed w/ the knowledge of IT risks, auditor can validate the existence of effective
controls to meet the org’s established risk appetite and its risk tolerance.
An organization’s use of ERM must include IT risks as part of this process. ERM
includes methods and processes to manage risks and seize opportunities in achieving
the organization’s objectives. It typically starts with identifying particular events or
circumstances relevant to the organization’s objectives (e.g., the risks of data
breaches), assessing them in terms of likelihood and magnitude of impact (e.g., the
inherent risk of a data breach is rated high, and the impact also is rated as high),
determining a response (e.g., new policies to better secure the organization’s data), and
monitoring progress on the implementation of responses (e.g., the IT activity’s
implementation of new security measures to avoid data breaches).
4.1.4 Performing a Risk Analysis
A risk analysis should be performed with involvement from various roles and dept
within org, including CRO, CAE, IT activity, and business representatives.
Basic questions associated with the risk assessment process include:
Which IT assets are at risk, and what is value of their confident, intgr, and availab?
What could happen to adversely affect that inf’s asset value? Vulnerability analysis
and mapping of vulnr to threats and potentially impacted inf assets.
If a threat event happened, how bad could its impact be?
How often might the event be expected to occur (frequency of occurrence)?
How certain are the answers to the first four questions (uncertainty analysis)?
What can be done to reduce the risk?
How much will it cost?
Is it cost-efficient?
Determining the value of the inf processed and stored is not an easy task due to the
multidimensional nature of value. The CAE will find it helpful to work with the CRO to
coordinate and align the IT-related risks.
4.2 Risk Mitigation Strategies
Instead of — or in combination with — other options, controls may be devised and
implemented to prevent the risk from manifesting itself to limit the likelihood of this
manifestation or to minimize its effects.
Accept the risk.
Eliminate the risk.
Share the risk.
Control/mitigate the risk.
Increase the risk to obtain more opportunities (red).
IT controls applied when controlling or mitigating the risks is the best option.
Basic set of controls that should be in place to provide fundamental level of IT control.
IT infrastructure controls / General Control, include network controls, database
controls, operating system controls, and hardware controls.
Application Control, include input edit controls, process completion or reconciliation
controls, and exception report controls.
CAE should gain an overview of the important controls.
CAE should obtain an understanding of key IT initiatives to comprehend how the IT
infrastructure and applications may be changing during a defined period of time.
Some questions can be considered when evaluating the control environment and
selecting a suitable set of controls.
Do IT policies — including IT controls — exist?
Have responsibilities for IT and IT controls been defined, assigned, and accepted?
Is the control designed effectively?
Is the control operating effectively?
Does the control achieve the desired result?
Some questions ....
Is the mix of preventive, detective, and corrective controls effective?
Do the controls provide evidence when control parameters are exceeded or when
controls fail? How is mgt alerted to failures, and which steps to be taken?
Is evidence retained (e.g., through an audit trail)?
Are the IT infrastructure equipment and tools logically and physically secured?
Are access and authentication control mechanisms used?
Are controls in place to protect the operating envt and data from viruses and other
malicious software?
Are firewall-related controls implemented?
Do firewall polices exist?
Are external and internal vulnerability assessments completed, and have risks been
identified and resolved appropriately?
Are change and configuration mgt and quality assurance processes in place?
Are structured monitoring and service measurement processes in place?
Have the risks of outsourced services been taken into consideration? (For details on
this, refer to GTAG 7: IT Outsourcing.)
Introduction and PCI Data Security Standard Overview
The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to
encourage and enhance cardholder data security and facilitate the broad adoption of
consistent data security measures globally.
PCI DSS provides a baseline of technical and operational requirements designed to
protect cardholder data.
PCI DSS applies to all entities involved in payment card processing —including
merchants, processors, acquirers, issuers, and service providers, as well as all other
entities which store, process or transmit cardholder data.
PCI DSS comprises a minimum set of requirements for protecting cardholders
data, and may be enhanced by additional controls and practices to further mitigate
risks. Below is a high-level overview of the 12 PCI DSS requirements.
PCI Data Security Standard – High Level Overview
Build and maintain a Secure
Network
1.
2.
Install and maintain firewall config to protect cardholder data.
Do not use vendor-supplied defaults for system passwords and
other security parameters.
Protect Cardholder Data (CHD) 3.
4.
Protect stored cardholder data.
Encrypt transmission of CHD across open public networks.
Maintain a Vulnerability
Management Program
5.
6.
Use and regularly update anti-virus software or programs
Develop and maintain secure systems and applications.
Implement Strong Access
Control
Measures
7.
8.
9.
Restrict access to cardholder data by business need to know
Assign a unique ID to each person with computer access
Restrict physical access to cardholder data
Regularly Monitor and Test
Networks
10.
11.
Track and monitor all access to network resources and CHD.
Regularly test security systems and processes.
Maintain an Information Security
Policy
12. Maintain a policy that addresses information security for all
personnel
Introduction and PCI Data Security Standard Overview
Business procedures constantly change as technology continues to evolve, and
threats emerge as new vulnerabilities are discovered.
Audit methods improve as IAr adopt an approach where IT control issues in support
of the business objectives are a top priority.
Mgt provides IT control metrics and reporting, and auditors attest to their validity and
opine on their value. IAr should liaise with mgt at all levels to agree on the validity
and effectiveness of the metrics and assurances for reporting.
The IA process provides a formal structure for addressing IT controls within the
overall system of IC.
The Structure of IT Auditing, divides the assessment into a logical series of steps.
IAr’s role in IT controls begins with a sound conceptual understanding and
culminates in providing the results of risk and control assessments.
CAE should oversee the pursuit of continuous learning and reassessment as new
tech emerge and as dependencies, strategies, risks, and requirements change.
The Structure of IT Auditing
ASSESSINGITCONTROLS
Understanding IT Controls
Governence - Management – Technical
General and Application
Prevention, Detection, Correction
Information – Security
Importance of IT Controls
Reliability and Effectiveness
Competitive Advantage
Legislation and Regulation
Roles and Responsibilities
Governance
Management
Audit
Based on Risk
Risk Analysis
Risk Response
Baseline Controls
Monitoring and Techniques
Control Framework
Frequency
Assessment
Methodologies
Audit Committee Interface
Control environment within IT (e.g. tone at the
top from the CIO, the ethical climate, mgt
philosophy, and operating style) is critically
important.
IT controls encompass IC processes that
provide assurance for inf and inf services and
help control or mitigate the risks associated
with an org’s use of technology.
6.1 IT General and Application Controls
By IT Control classifications, the control analyst
and auditor are better able to establish their
positions in the control FW and answer key questions such as:
Are detective IC adequate to identify error that may get past the preventive IC?
Are corrective controls sufficient to fix the errors once detected?
6.1.1 IT General Controls
General controls apply to all systems components, processes, and data for a given
organization or systems environment.
Include: IT governance, risk management, resource management, IT operations,
application development and maintenance, user management, logical security,
physical security, change management, backup and recovery, and business continuity.
6.1.2 Application Controls
Application controls pertain to the scope of individual business processes or
application systems.
Include: data edits, segregation of business functions (e.g., transc initiation versus
authorization), balancing of processing totals, transc logging, and error reporting.
Control Classification:
Preventive controls prevent errors, omissions, or security incidents from occurring.
Example: include simple data entry edits that block alphabetic characters from being
entered into numeric fields; access controls that protect sensitive data or system
resources from unauthorized people;
Detective controls detect errors or incidents that elude preventive controls.
Example: identify account numbers of inactive accounts or accounts that have been
flagged for monitoring of suspicious activities, uncover activities or events that exceed
authorized limits or violate known patterns in data that may indicate improper
manipulation.
Corrective controls correct errors, omissions, or incidents once they have been
detected.
Example: correction of data entry errors to identifying and removing unauthorized users
or software from systems or networks to recovery from incidents, disruptions, or
disasters.
6.2 IT Governance, Management, and Technical Controls
Classification of IT control by group responsible is gov, mgt, technical, and application.
6.2.1 IT Governance Controls
Rest on board, involves overseeing effective inf mgt, principles, policies, and
processes and ensuring that they are in place and performing correctly.
6.2.2 Management Controls
Mgt must make sure the IT controls needed to achieve the organization’s
established objectives are applied and ensure reliable and continuous processing.
6.2.3 Technical Controls
Technical controls form the backbone of mgt’s control framework. These controls
are specific to the technologies in use within the organization’s IT infrastructures.
Examples: opr system controls, database controls, encryption, and logging.
6.2.4 Application Controls
Pertain to the scope of individual business processes or application systems. They
include controls of input, processing, and output.
6.3 IT Controls — What to Expect
Individual controls within org can be classified within
hierarchy of IT controls — from overall highlevel policy
statements issued by mgt and endorsed by Board, down
to the specific control mechanisms incorporated into
application systems.
6.3.1 Policies
Org need to define their goals and obj through
strategic plans and policy statements. IT policy statements may include:
A general policy on the level of security and privacy throughout the organization.
A statement on the classification of inf and the rights of access at each level.
A definition of the concepts of data and system ownership, as well as the authority
necessary to originate, modify, or delete information.
Personnel policies that define and enforce conditions for staff in sensitive areas.
Definitions of overall business continuity plannin requirements.
6.3.2 Standards
The organization should have an IT blueprint that supports its overall strategy and sets the
tone for the resultant IT policies and standards. IT management should consider:
Systems development processes: Standards apply to the processes for
designing, developing, testing, implementing, and maintaining systems and programs. If
application development is outsourced or systems from vendors, CAE should ascertain
providers apply standards consistent w/ the org’s standards or acceptable to org.
Systems software configuration: The way products — such as operating
systems, networking software, and database management systems — are configured
can either enhance security or create weaknesses that can be exploited.
Application controls: Standards should define the types of controls that must be present
across the whole range of business activities as well as specific controls.
Data structures: Consistent data def across full range of applcs ensures that disparate
systems can access data seamlessly and security controls can be applied uniformly.
Documentation: Standards should specify the minimum level of documentation required.
As with policies, standards should be approved by mgt and made available to everyone.
6.3.3 Organization and Management
Organization and management play a major role in the whole system of IT control. Lines of
reporting and responsibility to be defined and effective control systems to be implemented.
Important controls include segregation of incompatible duties, fin control, and change mgt.
6.3.3.1 Segregation of Duties
The functions of initiating, authorizing, inputting, processing, and checking data should
be separated. Segregation of duties controls are implemented by granting access
privileges in accordance with job requirements. Traditional segr of duties is divided
between systems devp and IT operations.
6.3.3.2 Financial Controls
Because org make considerable investments in IT, budgetary and fin controls are
necessary to ensure the tech yields projected ROI or proposed savings.
6.3.3.3 Change Management
Change mgt processes ensure changes to the IT environment, systems software, appl
system, and data are applied in a manner that enforces appr segr of duties; ensure that
changes work and implemented as required; and prevents changes being exploited.
6.3.3 Organization and Management
6.3.4 Physical and Environmental Controls
All equipment must be protected, typical physical and environmental controls include:
Locating servers in locked rooms to which access is restricted.
Restricting server access to specific individuals.
Providing fire detection and suppression equipment.
Housing sensitive equipment, applications, and data away from environmental
hazards, such as low-lying flood plains, flight paths, or flammable liquid stores.
It is also consider contingency planning. Business continuity planning must be tested.
6.3.5 Systems Software Controls
Software may be configured to accommodate highly specialized needs and normally
requires a high degree of specialization to securely maintain it. Configuration
techniques can control logical access to the applications. Conf techniques also provide
the means to enforce segr of duties, generate specialized audit trails, and apply data
integrity controls through access control lists, filters, and activity logs.
6.3.3 Organization and Management
6.3.5 Systems Software Controls
Some key technical controls to be expected in a wellmanaged IT environment include:
Access rights allocated and controlled according to the organization’s stated policy.
Division of duties enforced through systems software and other configuration
controls.
Intrusion and vulnerability assessment, prevention, and detection in place and
continuously monitored.
Intrusion testing performed on a regular basis.
Encryption services applied where confidentiality is a stated requirement.
Change management processes — including patch management — in place to ensure
a tightly controlled process for applying all changes and patches to
software, systems, network components, and data.
6.3.3 Organization and Management
6.3.6 Systems Development and Acquisition Controls
Methodologies are chosen to suit the particular circumstances. By examining appl dev
procedures, auditor can gain assurance that appl controls are adequate. Some basic
control issues should be addressed in all systems devp and acquisition work, for ex:
User requirements be documented, and their achievement be measured.
Systems design should follow a formal process to ensure that user requirements and
controls are designed into the system.
Systems devp should be conducted in a structured manner to ensure that
requirements and approved design features are incorporated into product.
Testing should ensure that individual sys work as required, sys interfaces operate as
expected, and sys owner confirmed that intended functionality has been provided.
Appl maintenance should ensure that changes in appl sys follow a consistent pattern
of control. Change mgt should be subject to structured assurance validation.
Where systems devp is outsourced, provider contracts should require similar controls.
Project mgt techniques and controls should be part ofthe development process.
6.3.3 Organization and Management
6.3.7 Application Controls
The objective of controls over application systems is to ensure that:
All input data is accurate, complete, authorized, and correct.
All data is processed as intended.
All data stored is accurate and complete.
All output is accurate and complete.
A record is maintained to track the process of data from input to storage and to the
eventual output.
Because application controls now represent a large percentage of business controls,
they should be a key concern of every internal auditor.
6.3.3 Organization and Management
6.3.7 Application Controls
There are several types of generic controls that should exist in any application.
Input controls:
To check the integrity of data entered into a business application. Input is checked to
ensure that it remains within specified parameters.
Processing controls:
To ensure processing is complete, accurate, and authorized.
Output controls:
Address what is done w/ data. They should compare results with the intended result
and check them against the input.
Integrity controls:
Monitor data in process / storage to ensure that data remains consistent and correct.
Management trail:
An audit trail enable mgt to track transc from the source to the ultimate result and to
trace backward from results to identify the transc and events they record.
6.3.3 Organization and Management
6.4 Information Security
Information security applies to both infrastructure and data and is the foundation for the
reliability of most other IT controls. Elements of information security are:
Confidentiality: Confidential inf must be divulged only as appr and protected from
unauthorized disclosure or interception, includes privacy consideration.
Integrity: Inf integrity refers to the state of data as being correct and complete,
includes the reliability of fin processing and reporting.
Availability: Inf must be available to the business, its customers, and partners when,
where, and in the manner needed, includes the ability to recover from losses,
disruption, or corruption of data and IT services, also BCP.
6.5 IT Controls Framework
A control FW is a structured way of categorizing and identifying controls to adequately
secure an IT environment. The framework can be informal or formal.
The process of choosing a control FW should involve all concerned parties.
IAr must uphold four principles: integrity, objectivity, confidentiality, and competency.
CAE should know what kind and level of IT skills and competencies are required for
auditing the effectiveness of the controls over the identified business risks.
Examples for mapping business risks and required IT controls as well as the skills/
competencies needed to perform the audit, as follow:
Business Risk IT Control IT Skills and Competencies
Information security
management
A sound, logical security
control
Security adm; access controls at
network, operating system,
database, and application levels
Critical business
disruption
Ensuring availability of
critical business
applications
Business continuity and disaster
recovery planning for the IT
facilities (including network
infrastructure, operating systems,
databases, and applications)
Inaccurate and
incomplete financial and
management reporting
Securing data
confidentiality
and availability
Application controls, change
controls, and SDLC controls
Each org should examine existing control FW to determine which of them most closely
fit its needs. IAA will assess FW’s adequacy and use it for planning and performing IA.
CAE needs an overall knowledge of IT risk issues to assess the effectiveness and
appropriateness of IT controls. Categorizing IT controls according to their org
placement, purpose, and functionality is useful in assessing their value and adequacy,
as well as the adequacy of the system of IC. Knowledge of available IT controls, the
driving forces for controls, and org roles and responsibilities allows for comprehensive
risk analyses and assessments.
In assessing control effectiveness, it also is useful to understand whether the controls
are mandated or voluntary, discretionary or nondiscretionary, manual or automated,
primary or secondary, and subject to management override.
Finally, the assessment of IT controls involves selecting key controls for testing,
evaluating test results, and determining whether evidence indicates any significant
control weaknesses.
8.1 Computer Aided Audit Techniques and the Use of Data Analysis
CAEs should consider use of CAAT - data analysis tool - to obtain real-time perspective
of the IT risk landscape and to potentially identify anomalies. Data analysis also can
constantly assess the operating effectiveness of IC and review indicator of emerging risk.
Key challenges: CAE needs to obtain technical skill, access data analysis tool, leverage
reporting/extract tool, access data sources, and develop a strategy that focuses on the
highest org risks.
Continuous auditing (by IAr) similar to continuous monitoring (by mgt ). IA may test,
review, or leverage the use of continuous monitoring.
8.2 Using Automated Risk Assessment
CAE may find that strengthening his/her risk assessment requires numeric scoring or
detailed risk assessment. Certain tools are available for automating the risk analysis
process.
Collecting inherent and residual risk factors allows CAE to provide summary inf, such as
heat maps or risk profiles that meet the organization’s risk profile.
8.3 Reporting on IT Controls
CAEs can use a number of report formats.
1. Begin with simple updates on the assessment. The CAE should first determine the
inherent level of risk over certain key IT processes. The update may include sig
findings or issues. Progress on audit recommendations might be part of IT update.
2. Report in a BSC. This may align with the CIO’s reporting of IT strategy or operations
using an IT balanced scorecard. When CAE reports on IT as part of the regular audit
report, the report typically would include issues related to inf security
incidents, change mgt exceptions, project devp status, operation incident
reporting, capital spending, or other metrics that measure key IT risks and controls.
3. A private or executive session. This type of reporting generally covers significant
issues. For example, it may include IA team not being able to access requested
data, key IT individuals not providing complete or full disclosure, or IT leaders
leaving the IAr out of key steering committee discussions. Another challenging issue
for a private session might be the lack of support by the CIO.
Assessing IT risks and controls represents one of the first steps in gaining an
understanding of the IT environment and its sig in business risk mgt.
The next step, assessing and understanding IT governance, permits the CAE to identify
who is accountable for what in IT and how IT leadership, in cooperation with business
leaders, deploys the IT strategy.
Analyzing IT risks is a logical next step in the process. Each organization — driven by
the requirements of its nature and size of business — operates different technology
infrastructure, applications, interfaces, and uses different policies to achieve IT strategy.
There are many models and approaches to analyzing IT risks, and CAE should select the
models that best fit his or her organization. CAE rates the IT risk levels and determines
what will be included in the overall audit plan. CAE must identify and assess what
technical skills and competencies are required based on the overall audit plan. CAEs
can use internally developed technical skills, hired skills, or external providers.
Assessing the IT risks and controls requires a thoughtful and organized plan. CAEs
should plan sufficient time and skilled resources to do a professional job and create a
sustainable process for ongoing analysis.
Actions Questions
1. Identify the IT control environment of the org, including:
a. Values. b. Philosophy.
c. Management style. d. IT awareness.
e. Organization. f. Policies.
g. Standards.
• Do corporate policies and standards that describe the
need for IT controls exist?
2. Identify relevant legislation and regulation impacting IT
control:
a. Governance. b. Reporting.
c. Data protection. d. Compliance.
• What legislation exists that impacts need for IT
controls?
• Has mgt taken steps to ensure compliance with this
legislation?
3. Identify role and responsibilities for IT control in relation to:
a. Board of directors.
i. Audit committee. ii. Risk committee.
iii. Governance committee. iv. Finance committee.
b. Management.
i. CEO. ii. CFO and controller.
iii. CIO. iv. Chief Security Officer (CSO).
v. CISO. vi. CRO.
c. Audit.
i. Internal audit.
ii. External audit.
• Have all relevant responsibilities for IT controls been
allocated to individual roles?
• Is the allocation of responsibilities compatible with
the need to apply division of duties?
• Are IT responsibilities documented?
• Are IT C responsibility communicated to whole org?
• Do individuals clearly understand their responsibility
in relation to IT C?
• What evidence is there of individuals exercising their
responsibilities?
• Does internal audit employ sufficient IT audit
specialists to address the IT C issues?
Actions Questions
4. Identify the risk assessment process. Does it address:
a. Risk appetite?
b. Risk tolerance?
c. Risk analysis?
d. Matching risks to IT controls?
• How is org’s risk appetite and tolerance determined?
• Is org’s risk appetite and tolerance authorized at
board level?
• Are risk appetite and tolerance clearly understood by
all those with a responsibility for IT control?
• Does org use a formal risk analysis process?
• Is the process understood by everyone responsible
for IT control?
• Is the process used consistently throughout org?
5. Identify all monitoring processes, including:
a. Regulatory.
b. Normal in-house.
c. Other than internal auditing.
• What processes exist to monitor compliance w/ all
relevant legislation plus internal policies and
standards?
• Does mgt carry out monitoring processes outside IA?
6. Identify inf and communication mechanisms, such as:
a. Control information.
b. Control failures.
• What metrics are provided to the Board, its
committees, and mgt in relation to IT security?
• What additional reports are provided regularly to the
Board and management?
• Is management always provided with reports when IT
control failures occur?
• Do the Board and its committees receive similar
reports of ITcontrol failures?
Gtag 1 information risk and control
Gtag 1 information risk and control

More Related Content

What's hot

IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITShivamSharma909
 
Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationInfosecTrain
 
Sox In Telecom Industry
Sox In Telecom IndustrySox In Telecom Industry
Sox In Telecom IndustryMahesh Panchal
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made EasyJerry Bishop
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionRishabh Software
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides SlideTeam
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Yasir Khan
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk ManagementTudor Damian
 

What's hot (20)

IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
SOX- IT Perspective
SOX- IT PerspectiveSOX- IT Perspective
SOX- IT Perspective
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Coso erm
Coso ermCoso erm
Coso erm
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
Cisa domain 4
Cisa domain 4Cisa domain 4
Cisa domain 4
 
Cisa domain 3
Cisa domain 3Cisa domain 3
Cisa domain 3
 
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
 
Sox In Telecom Industry
Sox In Telecom IndustrySox In Telecom Industry
Sox In Telecom Industry
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides Business Continuity Plan PowerPoint Presentation Slides
Business Continuity Plan PowerPoint Presentation Slides
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 

Viewers also liked (8)

Mobile GestBuk
Mobile GestBukMobile GestBuk
Mobile GestBuk
 
Qaip yulias c sihombing
Qaip yulias c sihombingQaip yulias c sihombing
Qaip yulias c sihombing
 
Ifrs fin accounting quick review
Ifrs fin accounting quick reviewIfrs fin accounting quick review
Ifrs fin accounting quick review
 
Cobit 41 framework
Cobit 41 frameworkCobit 41 framework
Cobit 41 framework
 
Iso 31000 summary 2
Iso 31000 summary   2Iso 31000 summary   2
Iso 31000 summary 2
 
Overview ippf
Overview ippfOverview ippf
Overview ippf
 
Ict In Disaster Risk Reduction India Case
Ict In Disaster Risk Reduction  India CaseIct In Disaster Risk Reduction  India Case
Ict In Disaster Risk Reduction India Case
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk Management
 

Similar to Gtag 1 information risk and control

COBIT 4.0
COBIT 4.0COBIT 4.0
COBIT 4.0bluekiu
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...GrapesTech Solutions
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCERudy Shoushany
 
Cobit Training course
Cobit Training courseCobit Training course
Cobit Training courseIman Baradari
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangThang Ta Hoang
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfSALES97
 
IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptxFaith Shimba
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfkimangeloullero
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramInfo-Tech Research Group
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007David Cunningham
 

Similar to Gtag 1 information risk and control (20)

COBIT 4.0
COBIT 4.0COBIT 4.0
COBIT 4.0
 
Task 2
Task 2Task 2
Task 2
 
Ict governance
Ict governanceIct governance
Ict governance
 
Grc and is audit
Grc and is auditGrc and is audit
Grc and is audit
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
It governance
It governanceIt governance
It governance
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCE
 
Fetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelolaFetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelola
 
Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007Accountability Corbit Overview 06262007
Accountability Corbit Overview 06262007
 
Understanding co bit 4.1
Understanding co bit 4.1Understanding co bit 4.1
Understanding co bit 4.1
 
Cobit Training course
Cobit Training courseCobit Training course
Cobit Training course
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Cisa 2013 ch2
Cisa 2013 ch2Cisa 2013 ch2
Cisa 2013 ch2
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_Thang
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdf
 
IT Governance.pptx
IT Governance.pptxIT Governance.pptx
IT Governance.pptx
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 

Recently uploaded

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 

Recently uploaded (20)

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 

Gtag 1 information risk and control

  • 1.
  • 2.
  • 3. Although technology provides opportunities for growth and development, it also represents threats, such as disruption, deception, theft, and fraud. Fortunately, technology also can provide protection from threats. Executives should know the right questions to ask and what the answers mean. 1. Why should I understand IT risks and controls? Assurance and reliability. 2. What is to be protected? Trust, but controls provide the basis for trust 3. Where are IT controls applied? Everywhere 4. Who is responsible? Everyone. However, ... 5. When should IT risks and controls be assessed? Always (continuously). 6. How much control is enough? Management must decide based on risk appetite, tolerance and mandatory regulations. IT controls have 2 sig elements: the automation of business controls (which support business mgt and gov) and control of the IT environment and operations (which support the IT applications and infrastructures). The CAE needs to consider and assess both elements.
  • 4. IT controls:  Provide for assurance related to the reliability of inf and inf services.  Help mitigate the risks associated with an organization’s use of technology.  They range: From corporate policiy to their physical implementation within coded instruction; From physical access protection through the ability to trace actions and transactions to responsible individuals; and From automatic edits to reasonability analyses for large bodies of data. The following are examples of key control concepts:  Assurance is provided by the IT controls within the system of IC. This assurance should be continuous and provide a reliable trail of evidence.  IArs’ assurance is an indp and obj assessment that the IT-related controls are operating as intended. This assurance is based on understanding, examining, and assessing key controls related to risks they manage and performing sufficient testing to ensure controls are designed appr and functioning effectively and continuously.
  • 5. Key Concept  Standard 2130.A1: ―Control‖ – The IAA must evaluate adequacy and effectiveness of controls in responding to risks within the org’s gov, operations, and IS, regarding: Achievement of the organization’s strategic objectives; Reliability and integrity of financial and operational information; Effectiveness and efficiency of operations and programs; Safeguarding of assets; and Compliance with laws, regulations, policies, procedures, and contracts.  IAr need to understand the range of controls available for mitigating IT risks. IT Governance  IT gov provides the FW to ensure that IT can support the org’s overall business need.  IT gov consists of leadership, org structures, and processes that ensure that org’s IT sustains and supports the org’s strategies and obj.
  • 6. Proper appl of IT gov principles has ability to influence and impact entire org and how IT interacts with the business. Identification and mgt of IT risks and enablement of improved IT operations: IT gov needs to be an integral part of the overall corporate RM efforts so that appropriate techniques can be incorporated into IT activities. Enhancing the relationship between the business and IT: IT gov provides mechanism to link the use of IT to an org’s overall strategies and goals. Visibility into IT management’s ability to achieve its objectives: Metrics and goals are established to measure 2E of IT daily operations. Mgt of risks and identf of continuous improv opportunities for business and IT outcome: Identf and mgt of IT risks will enable the IT activity to run the business of IT more effectively while also identifying potential opportunities to improve its practices. IT gov improving adaptability of IT to changing business and IT environments: IT gov provides a foundation for IT to better manage its responsibilities and support of business through defined processes and roles and responsibilities of IT personnel.
  • 7. Several key components that lead to effective IT governance, including: Leadership  Evaluate relationship b/w IT obj and org’s current/strategic needs.  Assess involvement of IT leader in devp and execution of org’s strategic goal.  Review how roles and responsibilities are assigned within IT activity and whether personnel perform them as designed.  Review role of SM and Board in helping establish and maintain strong IT gov. Organization structures. Review how the business and IT personnel are interacting and comm’ current and future needs through org structure, include existence of roles and reporting relationship. IT processes.  Evaluate IT process actv and control in place to manage the needs of business while providing necessary assurance over business processes and underlying system.  Determine how IT will be measured in helping the organization achieve these goals.
  • 8. Several key components that lead to effective IT governance, including: Risk management. Review the IT actvity’s processes to identify, assess, and monitor/mitigate risks within the IT environment. Determine the accountability personnel have within the RM process and how well these expectations are being met. Understand what events have occurred and impacted the IT activity to determine whether appropriate RM practices are in place and whether risk demographics were appropriately documented and, if needed, updated after the event. Control activities. Assess the IT-defined key control activities to manage its business and the support of the overall organization. IA should review ownership, documentation, and self-validation aspects. The control set should be robust enough to address the identified risks.
  • 9. No Role Responsibilities 1. Board The Board should:  Understand strategic value of IT function.  Become informed of role and impact of IT on the enterprise.  Set strategic direction and expect return.  Consider how management assigns responsibilities.  Oversee how transformation happens.  Understand constraint within mgt operate  Oversee enterprise alignment.  Direct mgt to deliver measurable value through IT.  Oversee enterprise risk.  Support learning, growth, and management of resources.  Oversee how performance is measured.  Obtain assurance. 2. Executive managem ent Executive management should:  Become informed of role and impact of IT  Cascade strategy, policy, and goal down into enterprise, align the IT org w/ goal.  Determine required capabilities and invst.  Assign accountability.  Sustain current operations.  Provide org structure and resource.  Embed accountabilities for RM and control over IT.  Measure performance.  Focus on core business competencies IT  Focus on important IT processes that improve business value.  Create a flexible and adaptive enterprise that leverages inf and knowledge.  Strengthen value delivery.  Develop strategies to optimize IT costs.  Have clear external sourcing strategies.
  • 10. No Role Responsibilities 3. SM SM should: Manage business and executive expectations relative to IT. Drive IT strategy devp and execute it. Link IT budgets to strategic aims and obj. Ensure measurable value is delivered on time and budget. Implmt IT standard, policy and control FW Inform and educate executive on IT issue. Look ways of increasing IT value contribut. Ensure good mgt over IT projects. Provide IT infrastr to facilitate cost-efficient creation and sharing of busnss intelligence Ensure the availability of suitable IT resources, skills, and infrastructure to meet obj and create value. Assess risks, mitigate efficiently, and make risks transparent to stakeholders. Ensure that roles critical for managing IT risks are appropriately defined and staffed. Ensure the day-to-day mgt and verification of IT processes and controls. Implement performance measures directly and demonstrably linked to the strategy. Focus on core IT competencies. 4 IAA The internal audit activity should: Ensure a sufficient baseline level of IT audit expertise in the department. Include evl of IT in its planning process. Assess whether IT gov in the org sustains and supports strategies and obj. Identify and assess the risk exposures relating to the org’s IS. Assess control respond to risk in org’s IS. Ensure that audit dept has the IT expertise Consider use tech-based audit technique.
  • 11. IT controls are selected and implt on the basis of the risks they are designed to manage. No list of controls is universally applicable across all types of organizations. The CAE should be able to advise AC that the IC FW is reliable and provides a level of assurance appropriate to the organization’s risk appetite. Therefore, the CAE should consider whether:  The org’s IT environment is consistent with the org’s risk appetite.  The IC FW is adequate to ensure the org’s perf remains within the risk tolerances. COSO defines risk appetite as: “… degree of risk, on a broad level, that company or org is willing to accept in pursuit of its goals. Mgt considers org’s risk appetite first in evl’ strategic alternatives, then in setting of obj aligned w/ selected strategy, and in devl’ mechanisms to manage risks.” COSO defines risk tolerance as: “… acceptable level of variation relative to achievement of obj. In setting risk tolerance, mgt considers relative importance of obj and aligns risk tolerance w/ its risk appetite.”
  • 12. 4.1 Risk Considerations in Determining the Adequacy of IT Controls When considering the adequacy of IT controls within the org’s IC FW, CAE should consider the processes established by mgt to determine: The use, value, and criticality of information. The org’s risk appetite and tolerance for each business function and process. IT risks faced by the org and quality of service provided to its users. The complexity of the IT infrastructure. The appropriate IT controls and the benefits they provide. 4.1.1 The IT Environment The inventory of IT infrastructure components reveals basic inf about environment’s vulnerabilities. For ex, business systems and networks connected to the Internet are exposed to threats, organizations must make certain that their systems and network architectures include fundamental controls that ensure basic security. The complete inventory of the or’s IT hardware, software, network, and data component forms the foundation for assessing the vulnerabilities within the IT infrastructure.
  • 13. 4.1.2 IT Risks Faced by the Organization CAE discusses IT risk issues with the CIO and process owners to assess whether all related parties have an appr awareness and understanding of the technical risks, as well as their roles in applying and maintaining effective controls. 4.1.3 Risk Appetite and Tolerance Armed w/ the knowledge of IT risks, auditor can validate the existence of effective controls to meet the org’s established risk appetite and its risk tolerance. An organization’s use of ERM must include IT risks as part of this process. ERM includes methods and processes to manage risks and seize opportunities in achieving the organization’s objectives. It typically starts with identifying particular events or circumstances relevant to the organization’s objectives (e.g., the risks of data breaches), assessing them in terms of likelihood and magnitude of impact (e.g., the inherent risk of a data breach is rated high, and the impact also is rated as high), determining a response (e.g., new policies to better secure the organization’s data), and monitoring progress on the implementation of responses (e.g., the IT activity’s implementation of new security measures to avoid data breaches).
  • 14. 4.1.4 Performing a Risk Analysis A risk analysis should be performed with involvement from various roles and dept within org, including CRO, CAE, IT activity, and business representatives. Basic questions associated with the risk assessment process include: Which IT assets are at risk, and what is value of their confident, intgr, and availab? What could happen to adversely affect that inf’s asset value? Vulnerability analysis and mapping of vulnr to threats and potentially impacted inf assets. If a threat event happened, how bad could its impact be? How often might the event be expected to occur (frequency of occurrence)? How certain are the answers to the first four questions (uncertainty analysis)? What can be done to reduce the risk? How much will it cost? Is it cost-efficient? Determining the value of the inf processed and stored is not an easy task due to the multidimensional nature of value. The CAE will find it helpful to work with the CRO to coordinate and align the IT-related risks.
  • 15. 4.2 Risk Mitigation Strategies Instead of — or in combination with — other options, controls may be devised and implemented to prevent the risk from manifesting itself to limit the likelihood of this manifestation or to minimize its effects. Accept the risk. Eliminate the risk. Share the risk. Control/mitigate the risk. Increase the risk to obtain more opportunities (red).
  • 16. IT controls applied when controlling or mitigating the risks is the best option. Basic set of controls that should be in place to provide fundamental level of IT control. IT infrastructure controls / General Control, include network controls, database controls, operating system controls, and hardware controls. Application Control, include input edit controls, process completion or reconciliation controls, and exception report controls. CAE should gain an overview of the important controls. CAE should obtain an understanding of key IT initiatives to comprehend how the IT infrastructure and applications may be changing during a defined period of time. Some questions can be considered when evaluating the control environment and selecting a suitable set of controls. Do IT policies — including IT controls — exist? Have responsibilities for IT and IT controls been defined, assigned, and accepted? Is the control designed effectively? Is the control operating effectively? Does the control achieve the desired result?
  • 17. Some questions .... Is the mix of preventive, detective, and corrective controls effective? Do the controls provide evidence when control parameters are exceeded or when controls fail? How is mgt alerted to failures, and which steps to be taken? Is evidence retained (e.g., through an audit trail)? Are the IT infrastructure equipment and tools logically and physically secured? Are access and authentication control mechanisms used? Are controls in place to protect the operating envt and data from viruses and other malicious software? Are firewall-related controls implemented? Do firewall polices exist? Are external and internal vulnerability assessments completed, and have risks been identified and resolved appropriately? Are change and configuration mgt and quality assurance processes in place? Are structured monitoring and service measurement processes in place? Have the risks of outsourced services been taken into consideration? (For details on this, refer to GTAG 7: IT Outsourcing.)
  • 18. Introduction and PCI Data Security Standard Overview The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data. PCI DSS applies to all entities involved in payment card processing —including merchants, processors, acquirers, issuers, and service providers, as well as all other entities which store, process or transmit cardholder data. PCI DSS comprises a minimum set of requirements for protecting cardholders data, and may be enhanced by additional controls and practices to further mitigate risks. Below is a high-level overview of the 12 PCI DSS requirements.
  • 19. PCI Data Security Standard – High Level Overview Build and maintain a Secure Network 1. 2. Install and maintain firewall config to protect cardholder data. Do not use vendor-supplied defaults for system passwords and other security parameters. Protect Cardholder Data (CHD) 3. 4. Protect stored cardholder data. Encrypt transmission of CHD across open public networks. Maintain a Vulnerability Management Program 5. 6. Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications. Implement Strong Access Control Measures 7. 8. 9. Restrict access to cardholder data by business need to know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Regularly Monitor and Test Networks 10. 11. Track and monitor all access to network resources and CHD. Regularly test security systems and processes. Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel
  • 20. Introduction and PCI Data Security Standard Overview Business procedures constantly change as technology continues to evolve, and threats emerge as new vulnerabilities are discovered. Audit methods improve as IAr adopt an approach where IT control issues in support of the business objectives are a top priority. Mgt provides IT control metrics and reporting, and auditors attest to their validity and opine on their value. IAr should liaise with mgt at all levels to agree on the validity and effectiveness of the metrics and assurances for reporting. The IA process provides a formal structure for addressing IT controls within the overall system of IC. The Structure of IT Auditing, divides the assessment into a logical series of steps. IAr’s role in IT controls begins with a sound conceptual understanding and culminates in providing the results of risk and control assessments. CAE should oversee the pursuit of continuous learning and reassessment as new tech emerge and as dependencies, strategies, risks, and requirements change.
  • 21. The Structure of IT Auditing ASSESSINGITCONTROLS Understanding IT Controls Governence - Management – Technical General and Application Prevention, Detection, Correction Information – Security Importance of IT Controls Reliability and Effectiveness Competitive Advantage Legislation and Regulation Roles and Responsibilities Governance Management Audit Based on Risk Risk Analysis Risk Response Baseline Controls Monitoring and Techniques Control Framework Frequency Assessment Methodologies Audit Committee Interface
  • 22. Control environment within IT (e.g. tone at the top from the CIO, the ethical climate, mgt philosophy, and operating style) is critically important. IT controls encompass IC processes that provide assurance for inf and inf services and help control or mitigate the risks associated with an org’s use of technology. 6.1 IT General and Application Controls By IT Control classifications, the control analyst and auditor are better able to establish their positions in the control FW and answer key questions such as: Are detective IC adequate to identify error that may get past the preventive IC? Are corrective controls sufficient to fix the errors once detected?
  • 23. 6.1.1 IT General Controls General controls apply to all systems components, processes, and data for a given organization or systems environment. Include: IT governance, risk management, resource management, IT operations, application development and maintenance, user management, logical security, physical security, change management, backup and recovery, and business continuity. 6.1.2 Application Controls Application controls pertain to the scope of individual business processes or application systems. Include: data edits, segregation of business functions (e.g., transc initiation versus authorization), balancing of processing totals, transc logging, and error reporting.
  • 24. Control Classification: Preventive controls prevent errors, omissions, or security incidents from occurring. Example: include simple data entry edits that block alphabetic characters from being entered into numeric fields; access controls that protect sensitive data or system resources from unauthorized people; Detective controls detect errors or incidents that elude preventive controls. Example: identify account numbers of inactive accounts or accounts that have been flagged for monitoring of suspicious activities, uncover activities or events that exceed authorized limits or violate known patterns in data that may indicate improper manipulation. Corrective controls correct errors, omissions, or incidents once they have been detected. Example: correction of data entry errors to identifying and removing unauthorized users or software from systems or networks to recovery from incidents, disruptions, or disasters.
  • 25. 6.2 IT Governance, Management, and Technical Controls Classification of IT control by group responsible is gov, mgt, technical, and application. 6.2.1 IT Governance Controls Rest on board, involves overseeing effective inf mgt, principles, policies, and processes and ensuring that they are in place and performing correctly. 6.2.2 Management Controls Mgt must make sure the IT controls needed to achieve the organization’s established objectives are applied and ensure reliable and continuous processing. 6.2.3 Technical Controls Technical controls form the backbone of mgt’s control framework. These controls are specific to the technologies in use within the organization’s IT infrastructures. Examples: opr system controls, database controls, encryption, and logging. 6.2.4 Application Controls Pertain to the scope of individual business processes or application systems. They include controls of input, processing, and output.
  • 26. 6.3 IT Controls — What to Expect Individual controls within org can be classified within hierarchy of IT controls — from overall highlevel policy statements issued by mgt and endorsed by Board, down to the specific control mechanisms incorporated into application systems. 6.3.1 Policies Org need to define their goals and obj through strategic plans and policy statements. IT policy statements may include: A general policy on the level of security and privacy throughout the organization. A statement on the classification of inf and the rights of access at each level. A definition of the concepts of data and system ownership, as well as the authority necessary to originate, modify, or delete information. Personnel policies that define and enforce conditions for staff in sensitive areas. Definitions of overall business continuity plannin requirements.
  • 27. 6.3.2 Standards The organization should have an IT blueprint that supports its overall strategy and sets the tone for the resultant IT policies and standards. IT management should consider: Systems development processes: Standards apply to the processes for designing, developing, testing, implementing, and maintaining systems and programs. If application development is outsourced or systems from vendors, CAE should ascertain providers apply standards consistent w/ the org’s standards or acceptable to org. Systems software configuration: The way products — such as operating systems, networking software, and database management systems — are configured can either enhance security or create weaknesses that can be exploited. Application controls: Standards should define the types of controls that must be present across the whole range of business activities as well as specific controls. Data structures: Consistent data def across full range of applcs ensures that disparate systems can access data seamlessly and security controls can be applied uniformly. Documentation: Standards should specify the minimum level of documentation required. As with policies, standards should be approved by mgt and made available to everyone.
  • 28. 6.3.3 Organization and Management Organization and management play a major role in the whole system of IT control. Lines of reporting and responsibility to be defined and effective control systems to be implemented. Important controls include segregation of incompatible duties, fin control, and change mgt. 6.3.3.1 Segregation of Duties The functions of initiating, authorizing, inputting, processing, and checking data should be separated. Segregation of duties controls are implemented by granting access privileges in accordance with job requirements. Traditional segr of duties is divided between systems devp and IT operations. 6.3.3.2 Financial Controls Because org make considerable investments in IT, budgetary and fin controls are necessary to ensure the tech yields projected ROI or proposed savings. 6.3.3.3 Change Management Change mgt processes ensure changes to the IT environment, systems software, appl system, and data are applied in a manner that enforces appr segr of duties; ensure that changes work and implemented as required; and prevents changes being exploited.
  • 29. 6.3.3 Organization and Management 6.3.4 Physical and Environmental Controls All equipment must be protected, typical physical and environmental controls include: Locating servers in locked rooms to which access is restricted. Restricting server access to specific individuals. Providing fire detection and suppression equipment. Housing sensitive equipment, applications, and data away from environmental hazards, such as low-lying flood plains, flight paths, or flammable liquid stores. It is also consider contingency planning. Business continuity planning must be tested. 6.3.5 Systems Software Controls Software may be configured to accommodate highly specialized needs and normally requires a high degree of specialization to securely maintain it. Configuration techniques can control logical access to the applications. Conf techniques also provide the means to enforce segr of duties, generate specialized audit trails, and apply data integrity controls through access control lists, filters, and activity logs.
  • 30. 6.3.3 Organization and Management 6.3.5 Systems Software Controls Some key technical controls to be expected in a wellmanaged IT environment include: Access rights allocated and controlled according to the organization’s stated policy. Division of duties enforced through systems software and other configuration controls. Intrusion and vulnerability assessment, prevention, and detection in place and continuously monitored. Intrusion testing performed on a regular basis. Encryption services applied where confidentiality is a stated requirement. Change management processes — including patch management — in place to ensure a tightly controlled process for applying all changes and patches to software, systems, network components, and data.
  • 31. 6.3.3 Organization and Management 6.3.6 Systems Development and Acquisition Controls Methodologies are chosen to suit the particular circumstances. By examining appl dev procedures, auditor can gain assurance that appl controls are adequate. Some basic control issues should be addressed in all systems devp and acquisition work, for ex: User requirements be documented, and their achievement be measured. Systems design should follow a formal process to ensure that user requirements and controls are designed into the system. Systems devp should be conducted in a structured manner to ensure that requirements and approved design features are incorporated into product. Testing should ensure that individual sys work as required, sys interfaces operate as expected, and sys owner confirmed that intended functionality has been provided. Appl maintenance should ensure that changes in appl sys follow a consistent pattern of control. Change mgt should be subject to structured assurance validation. Where systems devp is outsourced, provider contracts should require similar controls. Project mgt techniques and controls should be part ofthe development process.
  • 32. 6.3.3 Organization and Management 6.3.7 Application Controls The objective of controls over application systems is to ensure that: All input data is accurate, complete, authorized, and correct. All data is processed as intended. All data stored is accurate and complete. All output is accurate and complete. A record is maintained to track the process of data from input to storage and to the eventual output. Because application controls now represent a large percentage of business controls, they should be a key concern of every internal auditor.
  • 33. 6.3.3 Organization and Management 6.3.7 Application Controls There are several types of generic controls that should exist in any application. Input controls: To check the integrity of data entered into a business application. Input is checked to ensure that it remains within specified parameters. Processing controls: To ensure processing is complete, accurate, and authorized. Output controls: Address what is done w/ data. They should compare results with the intended result and check them against the input. Integrity controls: Monitor data in process / storage to ensure that data remains consistent and correct. Management trail: An audit trail enable mgt to track transc from the source to the ultimate result and to trace backward from results to identify the transc and events they record.
  • 34. 6.3.3 Organization and Management 6.4 Information Security Information security applies to both infrastructure and data and is the foundation for the reliability of most other IT controls. Elements of information security are: Confidentiality: Confidential inf must be divulged only as appr and protected from unauthorized disclosure or interception, includes privacy consideration. Integrity: Inf integrity refers to the state of data as being correct and complete, includes the reliability of fin processing and reporting. Availability: Inf must be available to the business, its customers, and partners when, where, and in the manner needed, includes the ability to recover from losses, disruption, or corruption of data and IT services, also BCP. 6.5 IT Controls Framework A control FW is a structured way of categorizing and identifying controls to adequately secure an IT environment. The framework can be informal or formal. The process of choosing a control FW should involve all concerned parties.
  • 35. IAr must uphold four principles: integrity, objectivity, confidentiality, and competency. CAE should know what kind and level of IT skills and competencies are required for auditing the effectiveness of the controls over the identified business risks. Examples for mapping business risks and required IT controls as well as the skills/ competencies needed to perform the audit, as follow: Business Risk IT Control IT Skills and Competencies Information security management A sound, logical security control Security adm; access controls at network, operating system, database, and application levels Critical business disruption Ensuring availability of critical business applications Business continuity and disaster recovery planning for the IT facilities (including network infrastructure, operating systems, databases, and applications) Inaccurate and incomplete financial and management reporting Securing data confidentiality and availability Application controls, change controls, and SDLC controls
  • 36. Each org should examine existing control FW to determine which of them most closely fit its needs. IAA will assess FW’s adequacy and use it for planning and performing IA. CAE needs an overall knowledge of IT risk issues to assess the effectiveness and appropriateness of IT controls. Categorizing IT controls according to their org placement, purpose, and functionality is useful in assessing their value and adequacy, as well as the adequacy of the system of IC. Knowledge of available IT controls, the driving forces for controls, and org roles and responsibilities allows for comprehensive risk analyses and assessments. In assessing control effectiveness, it also is useful to understand whether the controls are mandated or voluntary, discretionary or nondiscretionary, manual or automated, primary or secondary, and subject to management override. Finally, the assessment of IT controls involves selecting key controls for testing, evaluating test results, and determining whether evidence indicates any significant control weaknesses.
  • 37. 8.1 Computer Aided Audit Techniques and the Use of Data Analysis CAEs should consider use of CAAT - data analysis tool - to obtain real-time perspective of the IT risk landscape and to potentially identify anomalies. Data analysis also can constantly assess the operating effectiveness of IC and review indicator of emerging risk. Key challenges: CAE needs to obtain technical skill, access data analysis tool, leverage reporting/extract tool, access data sources, and develop a strategy that focuses on the highest org risks. Continuous auditing (by IAr) similar to continuous monitoring (by mgt ). IA may test, review, or leverage the use of continuous monitoring. 8.2 Using Automated Risk Assessment CAE may find that strengthening his/her risk assessment requires numeric scoring or detailed risk assessment. Certain tools are available for automating the risk analysis process. Collecting inherent and residual risk factors allows CAE to provide summary inf, such as heat maps or risk profiles that meet the organization’s risk profile.
  • 38. 8.3 Reporting on IT Controls CAEs can use a number of report formats. 1. Begin with simple updates on the assessment. The CAE should first determine the inherent level of risk over certain key IT processes. The update may include sig findings or issues. Progress on audit recommendations might be part of IT update. 2. Report in a BSC. This may align with the CIO’s reporting of IT strategy or operations using an IT balanced scorecard. When CAE reports on IT as part of the regular audit report, the report typically would include issues related to inf security incidents, change mgt exceptions, project devp status, operation incident reporting, capital spending, or other metrics that measure key IT risks and controls. 3. A private or executive session. This type of reporting generally covers significant issues. For example, it may include IA team not being able to access requested data, key IT individuals not providing complete or full disclosure, or IT leaders leaving the IAr out of key steering committee discussions. Another challenging issue for a private session might be the lack of support by the CIO.
  • 39. Assessing IT risks and controls represents one of the first steps in gaining an understanding of the IT environment and its sig in business risk mgt. The next step, assessing and understanding IT governance, permits the CAE to identify who is accountable for what in IT and how IT leadership, in cooperation with business leaders, deploys the IT strategy. Analyzing IT risks is a logical next step in the process. Each organization — driven by the requirements of its nature and size of business — operates different technology infrastructure, applications, interfaces, and uses different policies to achieve IT strategy. There are many models and approaches to analyzing IT risks, and CAE should select the models that best fit his or her organization. CAE rates the IT risk levels and determines what will be included in the overall audit plan. CAE must identify and assess what technical skills and competencies are required based on the overall audit plan. CAEs can use internally developed technical skills, hired skills, or external providers. Assessing the IT risks and controls requires a thoughtful and organized plan. CAEs should plan sufficient time and skilled resources to do a professional job and create a sustainable process for ongoing analysis.
  • 40. Actions Questions 1. Identify the IT control environment of the org, including: a. Values. b. Philosophy. c. Management style. d. IT awareness. e. Organization. f. Policies. g. Standards. • Do corporate policies and standards that describe the need for IT controls exist? 2. Identify relevant legislation and regulation impacting IT control: a. Governance. b. Reporting. c. Data protection. d. Compliance. • What legislation exists that impacts need for IT controls? • Has mgt taken steps to ensure compliance with this legislation? 3. Identify role and responsibilities for IT control in relation to: a. Board of directors. i. Audit committee. ii. Risk committee. iii. Governance committee. iv. Finance committee. b. Management. i. CEO. ii. CFO and controller. iii. CIO. iv. Chief Security Officer (CSO). v. CISO. vi. CRO. c. Audit. i. Internal audit. ii. External audit. • Have all relevant responsibilities for IT controls been allocated to individual roles? • Is the allocation of responsibilities compatible with the need to apply division of duties? • Are IT responsibilities documented? • Are IT C responsibility communicated to whole org? • Do individuals clearly understand their responsibility in relation to IT C? • What evidence is there of individuals exercising their responsibilities? • Does internal audit employ sufficient IT audit specialists to address the IT C issues?
  • 41. Actions Questions 4. Identify the risk assessment process. Does it address: a. Risk appetite? b. Risk tolerance? c. Risk analysis? d. Matching risks to IT controls? • How is org’s risk appetite and tolerance determined? • Is org’s risk appetite and tolerance authorized at board level? • Are risk appetite and tolerance clearly understood by all those with a responsibility for IT control? • Does org use a formal risk analysis process? • Is the process understood by everyone responsible for IT control? • Is the process used consistently throughout org? 5. Identify all monitoring processes, including: a. Regulatory. b. Normal in-house. c. Other than internal auditing. • What processes exist to monitor compliance w/ all relevant legislation plus internal policies and standards? • Does mgt carry out monitoring processes outside IA? 6. Identify inf and communication mechanisms, such as: a. Control information. b. Control failures. • What metrics are provided to the Board, its committees, and mgt in relation to IT security? • What additional reports are provided regularly to the Board and management? • Is management always provided with reports when IT control failures occur? • Do the Board and its committees receive similar reports of ITcontrol failures?