4 Testing General and Automated Controls
|
|
|
- Britton Melton
- 9 years ago
- Views:
Transcription
1 4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn tests of general controls at various levels; To have an idea about Continuous Audit and Embedded Audit Modules, and To discuss hardware testing and review of operating system and network. 4.1 Introduction to Basics of Testing (Reasons for Testing) Testing is a scientific process performed to determine whether the controls ensure the system design effectiveness as well as the implemented system controls operational effectiveness. It involves, understanding a process and the expected results. Testing of large amounts of transactions or data is usually not possible due to time and cost constraints. Hence, sampling is done on the population (system resource) and ensures a sufficient quality and quantity to extrapolate the results of the testing into a reliable conclusion on the entire population (system resource). Testing of Controls involves obtaining the population and conducting the compliance tests either on the entire population and/or on selected samples from the population. It may also be conducted using utilities of audit tools. Testing of the controls design and the reliable results are done by one of the following methods: (i) Substantive Testing: This type of testing is used to substantiate the integrity of the actual processing. It is used to ensure that processes, not controls, are working as per the design of the control and produce the reliable results. (ii) Compliance Testing A compliance test determines if controls are working as designed. As per the policies and procedures, compliance testing results into the adherence to management directives. The Information System (IS) controls audit involves the following three phases: Planning: The auditor determines an effective and efficient way to obtain the evidential matter necessary to achieve the objectives of the IS controls audit and the audit report. For financial audits, the auditor develops an audit strategy and an audit plan. For performance audits, the auditor develops an audit plan.
2 4.2 Information Systems Control and Audit Testing: The auditor tests the effectiveness of IS controls that are relevant to the audit objectives. Reporting: The auditor concludes on the effect of any identified IS control weaknesses with respect to the audit objectives and reports the results of the audit, including any material weaknesses and other significant deficiencies. 4.2 Audit Planning In planning the IS controls audit, the auditor uses the equivalent concepts of materiality (in financial audits) and significance (in performance audits) to plan both effective and efficient audit procedures. Materiality and significance are concepts the auditor uses to determine the planned nature, timing, and extent of audit procedures. The underlying principle is that the auditor is not required to spend resources on items of little importance; that is, those that would not affect the judgment or conduct of a reasonable user of the audit report, in light of surrounding circumstances. On the basis of this principle, the auditor may determine that some areas of the IS controls audit (e.g., specific systems) are not material or significant, and therefore warrant little or no audit attention. Materiality and significance include both quantitative and qualitative factors in relation to the subject matter of the audit. Even though a system may process transactions that are quantitatively immaterial or insignificant, the system may contain sensitive information or provide an access path to other systems that contain information that is sensitive or otherwise material or significant. For example, an application that provides public information via a website, if improperly configured, may expose internal network resources, including sensitive systems, to unauthorized access. Planning occurs throughout the audit as an iterative process. (For example, based on findings from the testing phase, the auditor may change the planned audit approach, including the design of specific tests.) However, planning activities are concentrated in the planning phase, during which the objectives are to obtain an understanding of the entity and its operations, including its internal control, identify significant issues, assess risk, and design the nature, extent, and timing of audit procedures. To accomplish this, the methodology presented here is a guidance to help the auditor to perform IS system Audit testing. 4.3 Audit Testing The auditor must address many considerations that cover the nature, timing, and extent of testing. The auditor must devise an auditing testing plan and a testing methodology to determine whether the previously identified controls are effective. The auditor also tests whether the end-user applications are producing valid and accurate information. For microcomputers, several manual and automated methods are available to test for erroneous data. An initial step is to browse the directories of the PCs in which the end-user-developed application resides. Any irregularities in files should be investigated. Depending on the nature of the audit, computer-assisted techniques could also be used to audit the application. The auditor should also conduct several tests with both valid and invalid data to test the ability and extent of error detection, correction, and prevention within the application. In addition, the
3 Testing General and Automated Controls 4.3 auditor should look for controls such as input balancing and record or hash totals to ensure that the end user reconciles any differences between input and output. The intensity and extent of the testing should be related to the sensitivity and importance of the application. The auditor should be wary of too much testing and limit his or her tests to controls that cover all the key risk exposures and possible error types. The key audit concern is that the testing should reveal any type of exposure of sensitive data and that the information produced by the application is valid, intact, and correct. One should test the critical controls, processes, and apparent exposures. The auditor performs the necessary testing by using documentary evidence, corroborating interviews, and personal observation. Secondly, we may test the critical controls, processes, and apparent exposures. The auditor performs the necessary testing by using documentary evidence, corroborating interviews, and personal observation. Validation of the information obtained is prescribed by the auditor s work program. Again, this work program is the organized, written, and pre-planned approach to the study of the IT department. It calls for validation in several ways as follows: Asking different personnel the same question and comparing the answers Asking the same question in different ways at different times Comparing checklist answers to work papers, programs, documentation, tests, or other verifiable results Comparing checklist answers to observations and actual system results Conducting mini-studies of critical phases of the operation Such an intensive program allows an auditor to become informed about the operation in a short time. Programs are run on the computer to test and authenticate application programs that are run in normal processing. The audit team selects one of the many Generalized Audit Software (GAS) packages such as Microsoft Access or Excel, IDEA, or ACL and determines what changes are necessary to run the software at the installation. The auditor is to use one of these software s to do sampling, data extraction, exception reporting, summarize and foot totals, and other tasks to perform in-depth analysis and reporting capability IS Controls Audit Process The IS control Audit process involves: Obtaining an understanding of an entity and its operations and key business processes, Obtaining a general understanding of the structure of the entity s networks, Identifying key areas of audit interest (files, applications, systems, locations), Assessing IS risk on a preliminary basis, Identifying critical control points (for example, external access points to networks), Obtaining a preliminary understanding of IS controls, and Performing other audit planning procedures.
4 4.4 Information Systems Control and Audit These tasks are not generally performed as discrete, sequential steps, the IS controls specialist may gather information related to several steps concurrently, such as through interviews with key Information Technology (IT) staff or through data requests, or may perform steps in a different sequence. The auditor performs planning to determine an effective and efficient way to obtain the evidential matter necessary to support the objectives of the IS controls audit and the audit report. The nature and extent of audit planning procedures varies for each audit depending on several factors, including the entity s size and complexity, the auditor s experience with the entity, and the auditor s knowledge of the entity s operations. If the IS controls audit is performed as part of a financial audit, the auditor is to obtain an understanding of internal control over financial reporting sufficient to assess the risk of material misstatement of the financial statements whether due to error or fraud, and to design the nature, timing, and extent of further audit procedures based on that assessment. This includes performing risk assessment procedures to evaluate the design of controls relevant to an audit of financial statements and to determine whether they have been implemented. In obtaining this understanding, the auditor considers how an entity s use of information technology (IT) and manual procedures affect controls relevant to the audit. If the IS controls audit is performed as part of a performance audit, when information systems controls are determined to be significant to the audit objectives, auditors should then evaluate the design and operating effectiveness of such controls. This evaluation would include other information systems controls that impact the effectiveness of the significant controls or the reliability of information used in performing the significant controls. Auditors should obtain a sufficient understanding of information systems controls necessary to assess audit risk and plan the audit within the context of the audit objectives. Auditors need to determine which audit procedures related to information systems controls are needed to obtain sufficient, appropriate evidence to support the audit findings and conclusions. It also provides the following factors to assist the auditor in making this determination: (i) The extent to which internal controls that are significant to the audit depend on the reliability of information processed or generated by information systems. (ii) The availability of evidence outside the information system to support the findings and conclusions: It may not be possible for auditors to obtain sufficient, appropriate evidence without assessing the effectiveness of relevant information systems controls. For example, if information supporting the findings and conclusions is generated by information systems or its reliability is dependent on information systems controls; there may not be sufficient supporting or corroborating information or documentary evidence that is available other than that produced by the information systems. (iii) The relationship of information systems controls to data reliability: To obtain evidence about the reliability of computer generated information, auditors may decide to assess the effectiveness of information systems controls as part of obtaining evidence about the reliability of the data. If the auditor concludes that information systems controls are effective, the auditor may reduce the extent of direct testing of data.
5 Testing General and Automated Controls 4.5 (iv) Assessing the effectiveness of information systems controls as an audit objective: When assessing the effectiveness of information systems controls is directly a part of audit objective, auditors should test information systems controls necessary to address the audit objectives. For example, the audit may involve the effectiveness of information systems controls related to certain systems, facilities, or organizations Identify Key Areas of Audit Interest The auditor should identify key areas of audit interest, which are those that are critical to achieving the audit objectives (e.g., general support and business process application systems and files (or components thereof). For a financial audit, this would include key financial applications and data and related feeder systems. For a performance audit, this would include key systems that are likely to be significant to the audit objectives. For each key area of audit interest, the auditor should document relevant general support systems and major applications and files, including (i) the operational locations of each key system or file, (ii) significant components of the associated hardware and software (e.g., firewalls, routers, hosts, operating systems), (iii) other significant systems or system level resources that support the key areas of audit interest, and (iv) prior audit problems reported. The auditor should also identify all access paths into and out of the key areas of audit interest. By identifying the key systems, files, or locations, the auditor can concentrate efforts on them, and do little or no work associated with other areas. The auditor generally should prioritize important systems, files, or locations in order of importance to the audit objectives. The auditor may characterize these items by the sensitivity or significance of the information processed, dollar value of the transactions processed, or presence or number of key edits or other controls performed by a business process application. A preliminary understanding of the entity s IS controls, including the organization, staffing, responsibilities, authorities, and resources of the entity s security management function. The auditor should include the following information in the documentation of their preliminary understanding of the design of IS controls, to the extent relevant to the audit objectives: Identification of entitywide level controls (and appropriate system level controls) designed to achieve the control activities for each critical element within each general control area and a determination of whether they are designed effectively and implemented (placed in operation), including identification of control activities for which there are no or ineffective controls at the entitywide level and the related risks; Identification of business process level controls for key applications identified as key areas of audit interest, determination of where those controls are implemented (placed in operation) within the entity s systems, and the auditor s conclusion about whether the controls are designed effectively, including identification of control activities for which there are no or ineffective controls and the related risks and the potential impact of any
6 4.6 Information Systems Control and Audit identified design weaknesses on the completeness, accuracy, validity, and confidentiality of application data; Any internal or third-party information systems reviews, audits, or specialized systems testing (e.g., penetration tests, disaster recovery tests, and application-specific tests) performed during the last year; Management s plans of action and milestones, or their equivalent, that identify corrective actions planned to address known IS weaknesses and IS control weaknesses; Status of the prior years audit findings; Documentation for any significant computer security related incidents identified and reported for the last year; Documented security plans; Documented risk assessments for relevant systems (e.g., general support systems and major applications); System certification and accreditation documentation or equivalent for relevant systems; Documented business continuity of operations plans and disaster recovery plans; A description of the entity s use of third-party IT services; Relevant laws and regulations and their relation to the audit objectives; Description of the auditor s procedures to consider the risk of fraud, any fraud risk factors that the auditor believes could affect the audit objectives, and planned audit procedures to detect any fraud significant to the audit objectives. Audit resources planned. Current multiyear testing plans. Documentation of communications with entity management. If IS controls are performed by service organizations, conclusions whether such controls are significant to the audit objectives and any audit procedures performed with respect to such controls (e.g., review of service auditor reports) If the auditor plans to use the work of others, conclusions concerning the planned use of the work of others and any audit procedures performed with respect to using the work of others. Audit plan that adequately describes the objectives, scope, and methodology of the audit. Any decision to reduce testing of IS controls due to the identification of significant IS control weaknesses.
7 Testing General and Automated Controls Performing Information System Controls Audit Tests To understand the Information Systems relevant to the Audit in the testing phase of the IS controls audit, the auditor uses information obtained in the planning phase to test the effectiveness of IS controls that are relevant to the audit objectives. As audit evidence is obtained through performing control testing, the auditor should reassess the audit plan and consider whether changes are appropriate. While determining whether IS controls are appropriately designed and implemented and while performing tests of IS controls, the auditor should periodically assess the cumulative audit evidence obtained to identify any revisions needed to the audit plan. For example, if significant weaknesses have been identified, the auditor may decide to perform less testing in remaining areas if audit objectives have been achieved. Conversely, the performance of tests may uncover additional areas to be tested. For those IS controls that the auditor determines are properly/suitably designed and implemented, the auditor determines whether to perform tests of the operating effectiveness of such controls. In determining whether to test the operating effectiveness of IS controls, the auditor should determine whether it is possible and practicable to obtain sufficient, appropriate audit evidence without testing IS controls. For federal financial statement audits and for single audits (compliance requirements), the auditor is required to test controls that are suitably designed and implemented to achieve a low assessed level of control risk. The auditor identifies control techniques and determines the effectiveness of controls at each of the following levels: (i) Entity wide or Component Level: (General controls) Controls at the entity or component level consist of the entity-wide or component-wide (IS system modules) processes designed to achieve the control activities. They are focused on how the entity or component manages IS related to each control activity, as discussed in Chapter 3. For example, the entity or component may have an entity-wide process for configuration management, including establishment of accountability and responsibility for configuration management, broad policies and procedures, development and implementation of monitoring programs, and possibly centralized configuration management tools. The absence of entity-wide processes may be a root cause of weak or inconsistent controls; by increasing the risk that IS controls are not applied consistently across the organization. (ii) System level (General controls): Controls at the system level consist of processes for managing specific system resources related to either a general support system or major application. These controls are more specific than those at the entity or component level and generally relate to a single type of technology. Within the system level are three further levels that the auditor should assess: network, operating system, and infrastructure application. The three sublevels can be defined as follows:
8 4.8 Information Systems Control and Audit Network: A network is an interconnected or intersecting configuration or system of components. For example, a computer network allows applications operating on various computers to communicate. Operating system: An operating system is software that controls the execution of computer programs and may provide various services. For example, an operating system may provide services such as resource allocation, scheduling, input/output control, and data management. Infrastructure applications: Infrastructure applications are software that is used to assist in performing systems operations, including management of network devices. These applications include databases, , browsers, plug-ins, utilities, and applications not directly related to business processes. For example, infrastructure applications allow multiple processes running on one or more machines to interact across a network. For an example of the identification of system level controls, take configuration management. The auditor who is evaluating configuration management at the system level should determine whether the entity has applied appropriate configuration management practices for each significant type of technology (e.g., firewalls, routers) in each of the three sublevels (e.g., specific infrastructure applications). Such configuration management practices typically include standard configuration guidelines for the technology and tools to effectively determine whether the configuration guidelines are effectively implemented. (iii) Business process application level: Controls at the business process application level consist of policies and procedures for controlling specific business processes. For example, the entity s configuration management should reasonably ensure that all changes to application systems are fully tested and authorized. General control activities that are applicable to the entitywide and system levels, includes the general controls applied at the business process application level (also referred to as application security) as well as the three categories of business process application controls. The control techniques for achieving the control activities and the related audit tests vary according to the level to which they are being applied. Thus, the auditor should develop more detailed audit steps based on the entity s specific software and control techniques, after consulting with the financial or performance auditor about audit objectives and significant areas of audit interest. The Table lists specific control activities and techniques applicable at each level:
9 Testing General and Automated Controls 4.9 General Controls Business Process Application Controls Control System Level Categories Security Management Access Controls Configuration Management Segregation of Duties Contingency Planning Business Process Controls Interfaces Data Management Systems Entitywide/ Component Level Network System Level Operating Systems Infrastructure Applications Table : Control Categories Applicable at Different Levels of Audit 4.4 Testing Critical Control Points Business Process Application Level The auditor should evaluate the effectiveness of IS controls including system and/or application level controls related to each critical control point. The auditor should evaluate all potential ways in which the critical control point could be accessed. Generally, for each critical control point, this would include assessing controls related to the network, operating system, and infrastructure application components. For example, if a particular router was deemed to be a critical control point, the auditor generally should test controls related to the router itself (a network component), its operating system, and the infrastructure application that is used to manage the router. Access to any of these could lead to access to the control point. The auditor determines the appropriate scope of the IS controls audit, including the organizational entities to be addressed (e.g., entitywide, selected component(s), etc.); the breadth of the audit (e.g., overall conclusion on IS control effectiveness, review of a specific application or technology area, such as wireless network etc.); the types of IS controls to be
10 4.10 Information Systems Control and Audit tested namely general and/or business process application level controls to be tested, or selected components; or all levels of the entity s information systems, or selected levels (e.g., entitywide, system level, or business process application level, or selected components of them. 4.5 Test Effectiveness of Information System Controls The auditor should design and conduct tests of relevant control techniques that are effective in design to determine their effectiveness in operation. It is generally more efficient for the auditor to test IS controls on a tiered basis, starting with the general controls at the entitywide and system levels, followed by the general controls at the business process application level, and concluding with tests of business process application, interface, and data management system controls at the business process application level. Such a testing strategy may be used because ineffective IS controls at each tier generally preclude effective controls at the subsequent tier. If the auditor identifies IS controls for testing, the auditor should evaluate the effectiveness of general controls at the entitywide and system level; general controls at the business process application level; and specific business process application controls (business process controls, interface controls, data management system controls), and/or user controls, unless the IS controls that achieve the control objectives are general controls. The auditor should determine whether entitywide and system level general controls are effectively designed, implemented, and operating effectively by: identifying applicable general controls; determining how those controls function, and whether they have been placed in operation; and evaluating and testing the effectiveness of the identified controls. The auditor generally should use knowledge obtained in the planning phase. The auditor should document the understanding of general controls and should conclude whether such controls are effectively designed, placed in operation, and, for those controls tested, operating as intended. 4.6 Tests of General Controls at the Entitywide and System Levels The auditor may test general controls through a combination of procedures, including observation, inquiry, inspection (which includes a review of documentation on systems and procedures), and reperformance using appropriate test software. Although sampling is generally not used to test general controls, the auditor may use sampling to test certain controls, such as those involving approvals.
11 Testing General and Automated Controls 4.11 If general controls at the entitywide and system levels are not effectively designed and operating as intended, the auditor will generally be unable to obtain satisfaction that business process application-level controls are effective. In such instances, the auditor should (i) determine and document the nature and extent of risks resulting from ineffective general controls and (ii) identify and test any manual controls that achieve the control objectives that the IS controls were to achieve. However, if manual controls do not achieve the control objectives, the auditor should determine whether any specific IS controls are designed to achieve the objectives. If not, the auditor should develop appropriate findings principally to provide recommendations to improve internal control. If specific IS controls are designed to achieve the objectives, but are in fact ineffective because of poor general controls, testing would typically not be necessary, except to support findings. 4.7 Tests of General Controls at the Business Process- Application Level If the auditor reaches a favorable conclusion on general controls at the entitywide and system levels, the auditor should evaluate and test the effectiveness of general controls for those applications within which business process application controls or user controls are to be tested. These business process application level general controls are referred to as Application Security (AS) controls. If general controls are not operating effectively within the business process application, business process application controls and user controls generally will be ineffective. If the IS controls audit is part of a financial or performance audit, the IS controls specialist should discuss the nature and extent of risks resulting from ineffective general controls with the audit team. The auditor should determine whether to proceed with the evaluation of business process application controls and user controls. 4.8 Tests of Business Process Application Controls and User Controls The auditor generally should perform tests of those business process application controls (business process, interface, data management), and user controls necessary to achieve the control objectives where the entitywide, system, and application-level general controls were determined to be effective. If IS controls are not likely to be effective, the auditor should obtain a sufficient understanding of control risks arising from information systems to: identify the impact on the audit objectives, design audit procedures, and develop appropriate findings.
12 4.12 Information Systems Control and Audit Also, in such circumstances, the auditor considers whether manual controls achieve the control objectives, including manual controls that may mitigate weaknesses in IS controls. If IS controls are not likely to be effective and if manual controls do not achieve the control objectives, the auditor should identify and evaluate any specific IS controls that are designed to achieve the control objectives to develop recommendations for improving internal controls. IS controls that are not effective in design do not need to be tested. If the auditor determined in a prior year that controls in a particular accounting application were ineffective and if management indicates that controls have not significantly improved, the auditor need not test them. 4.9 Appropriateness of Control Tests To assess the operating effectiveness of IS controls, auditors should perform an appropriate mix of audit procedures to obtain sufficient, appropriate evidence to support their conclusions. Such procedures could include the following: Inquiries of IT and management personnel can enable the auditor to gather a wide variety of information about the operating effectiveness of control techniques. The auditor should corroborate responses to inquiries with other techniques. Questionnaires can be used to obtain information on controls and how they are designed. Observation of the operation of controls can be a reliable source of evidence. For example, the auditor may observe the verification of edit checks and password controls. However, observation provides evidence about controls only when the auditor was present. The auditor needs other evidence to be satisfied controls functioned the same way throughout the period. The auditor may review documentation of control polices and procedures. For example, the entity may have written policies regarding confidentiality or logical access. Review of documents will allow the auditors to understand and assess the design of controls. Inspection of approvals/reviews provides the auditor with evidence that management is performing appropriate control checks. The auditor may combine these tests with discussions and observations. Analysis of system information (e.g., configuration settings, access control lists, etc.) obtained through system or specialized software provides the auditor with evidence about actual system configuration. Data review and analysis of the output of the application processing may provide evidence about the accuracy of processing. For example, a detailed review of the data elements or analytical procedures of the data as a whole may reveal the existence of errors. Computer-assisted audit techniques (CAAT) may be used to test data files to determine whether invalid transactions were identified and corrected by programmed controls. However, the absence of invalid transactions alone is insufficient evidence that the controls effectively operated.
13 Testing General and Automated Controls 4.13 Reperformance of the control could be used to test the effectiveness of some programmed controls by reapplying the control through the use of test data. For example, the auditor could prepare a file of transactions that contains known errors and determine if the application successfully captures and reports the known errors. Based on the results of the IS controls audit tests, the auditor should determine whether the control techniques are operating effectively to achieve the control activities. Controls that are not properly designed to achieve the control activities or that are not operating effectively are potential IS control weaknesses. For each potential weakness, the auditor should determine whether there are specific compensating controls or other factors that could mitigate the potential weakness. If the auditor believes that the compensating controls or other factors could adequately mitigate the potential weakness and achieve the control activity, the auditor should obtain evidence that the compensating or other control is effectively operating and actually mitigates the potential weakness. If it effectively mitigates the potential weakness, the auditor can conclude that the control activity is achieved; however, the auditor may communicate such weaknesses to the entity. If the potential weakness is not effectively mitigated, the potential weakness is an actual weakness. The auditor evaluates its effects on IS controls in combination with other identified weaknesses in the reporting phase Multiyear Testing Plans In circumstances where the auditor regularly performs IS controls audits of the entity (as is done, for example, for annual financial audits), the auditor may determine that a multiyear plan for performing IS controls audits is appropriate. Such a plan will cover relevant key agency applications, systems, and processing centres. These strategic plans should cover not more than a three year period and include the schedule and scope of assessments to be performed during the period and the rationale for the planned approach. The auditor typically evaluates these plans annually and adjusts them for the results of prior and current audits and significant changes in the IT environment, such as implementation of new systems. Multiyear testing plans can help to assure that all agency systems and locations are considered in the IS control evaluation process, to consider relative audit risk and prioritization of systems, and to provide sufficient evidence to support an assessment of IS control effectiveness, while helping to reduce annual audit resources under certain conditions. When appropriate, this concept allows the auditor to test computer-related general and business process application controls on a risk basis rather than testing every control every year. Under a multiyear testing plan, different controls are comprehensively tested each year, so that each significant general and business process control is selected for testing at least once during the multiyear period, which should not be more than 3 years. For example, a multiyear testing plan for an entity with five significant business process applications might include comprehensive tests of two or three applications annually, covering
14 4.14 Information Systems Control and Audit all applications in a two or three year period. For systems with high IS risk, the auditor generally should perform annual testing. Such multiyear testing plans are not appropriate in all situations. For example, they are not appropriate for first-time audits, for audits where some significant business process applications or general controls have not been tested within a sufficiently recent period (no more than 3 years), or for audits of entities that do not have strong entitywide controls. Also, using this concept, the auditor performs some limited tests and other activities annually for general and business process controls not selected for full testing; examples of such activities include updating the auditor s understanding of the control environment, inquiring about control changes, and conducting walkthroughs. For example, because of the importance of system level critical control points, the auditor generally updates the understanding of these yearly through limited tests Documentation of Control Testing Phase Information developed in the testing phase that the auditor should document includes the following: An understanding of the information systems that are relevant to the audit objectives IS Control objectives and activities relevant to the audit objectives By level (e.g., entitywide, system, business process application) and system sublevel (e.g., network, operating system, infrastructure applications), a description of control techniques used by the entity to achieve the relevant IS control objectives and activities By level and sublevel, specific tests performed, including related documentation that describes the nature, timing, and extent of the tests; evidence of the effective operation of the control techniques or lack thereof (e.g., memos describing procedures and results, output of tools and related analysis); if a control is not achieved, any compensating controls or other factors and the basis for determining whether they are effective; the auditor s conclusions about the effectiveness of the entity s IS controls in achieving the control objective; and for each weakness, whether the weakness is a material weakness, significant deficiency or just a deficiency, as well as the criteria, condition, cause, and effect if necessary to achieve the audit objectives Audit Reporting After completing the testing phase, the auditor summarizes the results of the audit, draws conclusions on the individual and aggregate effect of identified IS control weaknesses on audit risk and audit objectives and reports the results of the audit. The auditor evaluates the individual and aggregate effect of all identified IS control weaknesses on the auditor s conclusions and the audit objectives. The auditor evaluates the effect of any weaknesses on the entity s ability to achieve each of the critical elements and on the risk of unauthorized access to key systems or files. Also, the auditor evaluates potential control dependencies.
15 Testing General and Automated Controls 4.15 For each critical element, the auditor should make a summary determination as to the effectiveness of the entity s related controls, considering entitywide, system, and business process application levels collectively. The auditor should evaluate the effect of related underlying control activities that are not achieved. In addition, the auditor should determine whether the weaknesses preclude the effectiveness of each of the five categories of general controls or the four categories of application-level controls. If the controls for one or more of each category s critical elements are ineffective, then the controls for the entire category are not likely to be effective. The auditor uses professional judgment in making such determinations. For federal entities, if identified weaknesses relate to IS measures reported in FISMA reporting, the auditor should determine whether they were properly reported. Also, the auditor should determine whether IS control weaknesses identified by the audit were identified in the entity s Plans of Action and Milestones (POA&M s) or equivalent document. If not, the auditor generally should attempt to determine why they were not identified by the entity as appropriate and report weaknesses in the reporting process. Also, the auditor should evaluate whether the aggregate combination of weaknesses could result in unauthorized access to systems or files supporting key areas of audit interest. Guidance for evaluating IS controls and determining the appropriate reporting are discussed separately for financial audits and attestation engagements and for performance audits in the following sections. For example, a series of weaknesses might result in individuals having the ability to gain unauthorized external access to agency systems, escalate their privileges to obtain a significant level of access to critical control points, and consequently achieve access to key areas of audit interest. The auditor can use simplified network schematics annotated with weaknesses related to key system components to document the impact of a series of weaknesses. Such documentation may be developed as the audit progresses, allowing the auditor to demonstrate on the system that the weaknesses in fact exist and can be exploited to achieve the expected result. Also, such documentation can assist in communicating the related risks to entity management. Fig is an example of a simplified network schematic annotated with weaknesses related to key system components.
16 4.16 Information Systems Control and Audit Fig Example of Network Schematic Describing System Weaknesses Further, the auditor should evaluate the potential impact of any identified weaknesses on the completeness, accuracy, validity, and confidentiality of application data relevant to the audit objectives. When IS controls audits are performed as part of a broader financial or performance audit or attestation engagement, the IS controls specialist should coordinate with the auditor to determine whether significant controls are dependent on IT processing. In very rare circumstances, the auditor may determine that IS controls, in the aggregate, are ineffective, but that the entity has overall compensating controls not dependent on IT processing or that other factors mitigate or reduce the risks arising from IS control weaknesses. For example, a manual review of support for all disbursements could mitigate certain IS risks related to a disbursement system. If compensating controls or other factors are present, the auditor should document such controls or factors, test them appropriately to determine whether they effectively mitigate the identified IS control weaknesses, and draw conclusions about the nature and extent of the risks that remain after considering such controls or factors Audit Objectives Determine which IS Control Techniques are Relevant to the Audit Objectives. For each Relevant IS Control Technique Determine Whether it is Suitably Designed to Achieve the Critical Activity and has been implemented. Perform Tests to Determine whether such Control Techniques are Operating Effectively Identify Potential Weaknesses in IS Controls and Consider Compensating Controls.
17 Testing General and Automated Controls Report Audit Results For this, Evaluate the Effects of Identified IS Control Weaknesses Financial Audits, Attestation Engagements, and Performance Audits Consider Other Audit Reporting Requirements and Related Reporting Responsibilities Substantive Testing : Where controls are determined not to be effective, substantive testing may be required to determine whether there is a material issue with the resulting financial information. In an IT audit, substantive testing is used to determine the accuracy of information being generated by a process or application. Audit tests are designed and conducted to verify the functional accuracy, efficiency, and control of the audit subject. During the audit of an IS application, for example, the auditor would build and process test data to verify the processing steps of an application. The auditor selects and uses computer-aided audit tools to gather information and conduct the planned audit tests. Ā e appropriate selection of audit tools and their effective and accurate uses are essential to adequate audit testing. For example, if the performance of an application requires analysis, a computer program analyzer or instrumentation package would be an appropriate choice for use as an audit tool. In addition, if the audit staff uses an electronic document management system to capture their audit work (e.g., interviews, electronic documents, and schedules), how well does the auditor use this support tool? Documenting Results : The final step involves evaluating the results of the work and preparing a report on the findings. The audit results should include the audit finding, conclusions, and recommendations Audit Findings : Audit findings should be formally documented and include the process area audited, the objective of the process, the control objective, the results of the test of that control, and a recommendation in the case of a control deficiency. An audit finding form serves the purpose of documenting both control strengths and weaknesses and can be used to review the control issue with the responsible IT manager to agree on corrective action. The information can then be used to prepare the formal audit report and corrective action follows up Analysis : Interviews and functional tests provide the raw materials for drafting the audit report. It cannot be emphasized enough that the design and performance of audit tests and interviews is essential to producing a quality audit report. If care is not taken, it becomes a classic case of garbage in, garbage out. Analysis is the most important factor in converting raw data into a finished product ready for inclusion in an audit report. Complete analysis of test information should provide the auditor with all the necessary information to write an audit report. Thorough analysis includes a clear understanding of the standards the cause of the deviation the control weakness that led to the deviation the materiality and exposure involved. When possible, recommendations for corrective action Analysis of the results of tests and interviews should occur as soon as possible after they are completed.
18 4.18 Information Systems Control and Audit Too often, the bulk of audit analysis occurs when the auditor sits down and writes the audit report. Timely analysis enables the auditor to determine the causes and exposures of findings early in the audit. This gives the auditor time to conduct further testing when necessary and allows everyone more time to create corrective actions. It also promotes the better use of audit time by determining findings and exposures with a minimum of testing. One of the purposes of the current work paper guidelines is to provide documentation of this analysis process. Four analysis steps may be needed: Reexamine the standards and the facts Determine the cause of the deviation Determine the materiality and exposure of the deviation Determine possible recommendations for corrective action Although these are referred to as steps, they are not necessarily performed in chronological order. Likewise, completion of one step is not always necessary to complete later steps. As in all other areas of auditing, analysis requires judgment. Following is a discussion of each of the four steps in more detail. The terms finding, deficiency, problem, and issues are basically synonymous and mean the auditor identified a situation where controls or efficiencies can be improved. The situation, if acted upon, could result in enhanced productivity; the deterrence of fraud; or the prevention of monetary loss, personal injury, or environmental damage Reexamination : This is the most essential step in performing analysis. From this step, the auditor has the requisite data to make a judgment and formulate an opinion. The two factors under consideration are a standard (for comparison to the facts) and the facts (to compare to the standard). Step one reviews the standard, the facts, and whether a discrepancy actually exists between the two Standards Compliance : Standards are the procedures, operating guidelines, regulations, good business practices, or other predefined methodologies that define how an operation under audit should function. The standard establishes the viewpoint used by the auditor to evaluate test information. Standards should be identified and evaluated at the beginning of the audit, and decisions on the appropriateness of standards should be addressed at the time the audit tests are created. Performance of the audit may give the auditor additional data to use in developing more appropriate standards. The standard used must be clearly understood by the auditor and there must be sufficient confidence that the correct standard is used. Although the standard is a written, published procedure, it may be outdated, redundant, or not appropriate. Using the wrong standard can lead to incorrect or incomplete findings. Critical evaluation of a standard can also lead to the identification of inefficient practices. Four situations may occur while evaluating standards: No standard exists either explicitly or implicitly (this may imply a high degree of risk since no standard is present to guide how a function should perform). A standard exists but is not formal (i.e., good business practices).
19 Testing General and Automated Controls 4.19 The standard is formal and published but is redundant, not cost effective, no longer necessary, or no longer appropriate in some other manner. The standard is formal and is appropriate for evaluating the work performed Facts : After reviewing the standard, the auditor must evaluate the gathered facts. The auditor should re-verify that deviations found are representative of the current control environment, have adequate support (photocopies or other hard evidence if possible), and, whenever possible, have an agreement with the audit client that deviations exist. To ensure that findings are accurate and descriptive of the population, samples should be: Large enough to reflect the behavior of the population from which they were drawn Representative of all types of individual members in the population, and representative of the current control practices (timely) If the sample fails to meet these characteristics, the deviation might not be the basis for a useful finding. To remedy this, it may be necessary to add to the sample or select an entirely new sample Verification : Finally, the auditor must again compare the findings to the reexamined standards to determine if a valid discrepancy still exists. If not, there is no issue and nothing to report. If the discrepancy is still apparent, then the analysis of the finding continues Cause : Once the auditor is sure of his or her understanding of the standard, the next step is to identify the cause of the deviation. This is based on the reexamination of the standards involved. Determining the cause of a deviation is answering the who, what, why, where, and when of a particular asset, transaction, or event. The answers provide the raw material to help make judgments about the control system currently in place. Determining the cause helps identify the exposures and aids in formulating recommendations Exposure and Materiality : This step examines the potential consequences of deviations. It answers the question, Why does this need correction? To answer this, the auditor must understand exposure and materiality. Exposure results from subjecting an asset to potential loss, harm, damage, theft, improper or inefficient use, or neglect. Assets are tangible (money, buildings, computers) or intangible (an account, data, good will), human or nonhuman. The risk is posed by people (theft, neglect, misuse) or by the environment (fire or weather). The degree of exposure is related to the proximity and severity of the risk. Proximity of the risk refers to how available the asset is to the person or environmental factor posing the risk. For example, there is less proximity to risk for small physical assets with high dollar values (e.g., computers) when there is limited access; inventory controls such as identification numbers and inventory lists; and a physical comparison of the asset to the list. The fewer controls in place the more proximate the risk. Severity of the risk refers to the potential amount of loss for each deviation. The greater the value of the asset exposed to risk and the closer the proximity to risk, the higher the potential loss for each deviation.
20 4.20 Information Systems Control and Audit Materiality is a qualitative judgment about whether a deviation s frequency of occurring and degree of exposure are significant enough for the deviation to be corrected and included in the final audit report. Frequency refers to how often an event will occur. It is the combination of the likelihood an individual transaction will deviate from the standard and the total number of transactions. With this understanding of exposure and materiality, answers to the following questions help identify why corrections should take place. What happened or can happen (exposure) because of the identified deviation? Remember the big picture. Start with the deviation found and expand outward to get to the big picture. Be specific regarding what assets, transactions, and business entities are affected. Name the risk(s) that the asset or transaction is exposed to. How serious (materiality) is this consequence in terms of some standard of value (money, time, personal injury, or ill will)? Identify which standard(s) of value apply to the deviation analyzed. Make measurements of the severity of the exposure. If extrapolating, use a statistically sound method of estimation. How often (frequency) has the deviation occurred or is it expected to occur? Upon completing this step of analysis, the auditor should have a complete understanding of the standard used to measure the deviation. Why the standard is an appropriate measure (or model) of how an asset/transaction should be handled or controlled the substantial, significant, compelling audit evidence (proof) that a deviation has occurred. What caused the deviation to occur in terms of the department/person responsible for controlling the asset/transaction, what controls were not in place or not followed that allowed the deviation to occur, and the effectiveness of management s review process and corrective action over the area under audit the degree of exposure and the materiality of the deviation. Based on this, the auditor will have sufficient data to make an informed judgment about the state of controls and the efficiency of operations in the area under audit. Conclusions Conclusions are auditor opinions, based on documented evidence, that determine whether an audit subject area meets the audit objective. All conclusions must be based on factual data obtained and documented by the auditor as a result of audit activity. The degree to which the conclusions are supported by the evidence is a function of the amount of evidence secured by the auditor Concurrent or Continuous Audit and Embedded Audit Modules Today, organizations produce information on a real-time, online basis. Real-time recordings needs real-time auditing to provide continuous assurance about the quality of the data, thus, continuous auditing. Continuous auditing enables auditors to significantly reduce and perhaps
21 Testing General and Automated Controls 4.21 eliminate the time between occurrence of the client's events and the auditor's assurance services thereon. Errors in a computerized system are generated at high speeds and the cost to correct and rerun programs are high. If these errors can be detected and corrected at the point or closest to the point of their occurrence the impact thereof would be the least. Continuous auditing techniques use two bases for collecting audit evidence. One is the use of embedded modules in the system to collect, process, and print audit evidence and the other is special audit records used to store the audit evidence collected. Types of audit tools: Different types of continuous audit techniques may be used. Some modules for obtaining data, audit trails and evidences may be built into the programs. Audit software is available which could be used for selecting and testing data. Many audit tools are also available some of which are described below: (i) Snapshots: Tracing a transaction is a computerized system can be performed with the help of snapshots or extended records. The snapshot software is built into the system at those points where material processing occurs which takes images of the flow of any transaction as it moves through the application. These images can be utilized to assess the authenticity, accuracy, and completeness of the processing carried out on the transaction. The main areas to dwell upon while involving such a system are 1) to locate the snapshot points based on materiality of transactions 2) when the snapshot will be captured and 3) the reporting system design and implementation to present data in a meaningful way. (ii) Integrated Test Facility (ITF): The ITF technique involves the creation of a dummy entity in the application system files and the processing of audit test data against the entity as a means of verifying processing authenticity, accuracy, and completeness. This test data would be included with the normal production data used as input to the application system. In such cases the auditor has to decide what would be the method to be used to enter test data and the methodology for removal of the effects of the ITF transactions. Methods of Entering Test Data: The transactions to be tested have to be tagged. The application system has to be programmed to recognize the tagged transactions and have them invoke two updates, one to the application system master file record and one to the ITF dummy entity. Auditors can also embed audit software modules in the application system programs to recognize transactions having certain characteristics as ITF transactions. Tagging live transactions as ITF transactions has the advantages of ease of use and testing with transactions representative of normal system processing. However, use of live data could mean that the limiting conditions within the system are not tested and embedded modules may interfere with the production processing. The auditors may also use test data that is specially prepared. Test transactions would be entered along with the production input into the application system. In this approach the test data is likely to achieve more complete coverage of the execution paths in the application system to be tested than selected production data and the application system
22 4.22 Information Systems Control and Audit does not have to be modified to tag the ITF transactions and to treat them in a special way. However, preparation of the test data could be time consuming and costly. Methods of Removing the Effects of ITF Transactions: The presence of ITF transactions within an application system affects the output results obtained. The effects of these transactions have to be removed. The application system may be programmed to recognize ITF transactions and to ignore them in terms of any processing that might affect users. Another method would be the removal of effects of ITF transactions by submitting additional inputs that reverse the effects of the ITF transactions. Another less used approach is to submit trivial entries so that the effects of the ITF transactions on the output are minimal. The effects of the transactions are not really removed. (iii) System Control Audit Review File (SCARF): The system control audit review file (SCARF) technique involves embedding audit software modules within a host application system to provide continuous monitoring of the system s transactions. The information collected is written onto a special audit file- the SCARF master files. Auditors then examine the information contained on this file to see if some aspect of the application system needs follow-up. In many ways, the SCARF technique is like the snapshot technique along with other data collection capabilities. Auditors might use SCARF to collect the following types of information: Application system errors - SCARF audit routines provide an independent check on the quality of system processing, whether there are any design and programming errors as well as errors that could creep into the system when it is modified and maintained. Policy and procedural variances - Organizations have to adhere to the policies, procedures and standards of the organization and the industry to which they belong. SCARF audit routines can be used to check when variations from these policies, procedures and standards have occurred. System exception - SCARF can be used to monitor different types of application system exceptions. For example, salespersons might be given some leeway in the prices they charge to customers. SCARF can be used to see how frequently salespersons override the standard price. Statistical sample -Some embedded audit routines might be statistical sampling routines, SCARF provides a convenient way of collecting all the sample information together on one file and use analytical review tools thereon. Snapshots and extended records - Snapshots and extended records can be written into the SCARF file and printed when required. Profiling data - Auditors can use embedded audit routines to collect data to build profiles of system users. Deviations from these profiles indicate that there may be some errors or irregularities. Performance measurement - Auditors can use embedded routines to collect data that is useful for measuring or improving the performance of an application system.
23 Testing General and Automated Controls 4.23 (iv) Continuous and Intermittent Simulation (CIS): This is a variation of the SCARF continuous audit technique. This technique can be used to trap exceptions whenever the application system uses a database management system. During application system processing, CIS executes in the following way: The database management system reads an application system transaction. It is passed to CIS. CIS then determines whether it wants to examine the transaction further. If yes, the next steps are performed or otherwise it waits to receive further data from the database management system. CIS replicates or simulates the application system processing. Every update to the database that arises from processing the selected transaction will be checked by CIS to determine whether discrepancies exist between the results it produces and those the application system produces. Exceptions identified by CIS are written to a exception log file. The advantage of CIS is that it does not require modifications to the application system and yet provides an online auditing capability. Advantages and Disadvantages of Continuous Auditing: Continuous auditing enables auditors to shift their focus from the traditional "transaction" audit to the "system and operations" audit. Continuous auditing has a number of potential benefits including: (1) reducing the cost of the basic audit assignment by enabling auditors to test a larger sample (up to 100 percent) of client's transactions and examine data faster and more efficiently than the manual testing required when auditing around the computer; (2) reducing the amount of time and costs auditors traditionally spend on manual examination of transactions; (3) increasing the quality of audits by allowing auditors to focus more on understanding a client's business and industry and its internal control structure; and (4) specifying transaction selection criteria to choose transactions and perform both tests of controls and substantive tests throughout the year on an ongoing basis. Audit evidence gathered by performing tests of controls can be used as a basis for reducing more costly substantive tests, analytical procedures, transactions analysis, access and data flow. With continuous auditing, auditors may conduct tests of controls simultaneously with substantive tests, analytical procedures, etc. to gather persuasive evidence regarding the quality and integrity of the client's electronic system in producing reliable and credible information. CATTs can be used in performing tests of transactions continuously throughout the year in order to reduce the extent of substantive tests to be performed at the end of a period. Some of the advantages of continuous audit techniques are as under: Timely, comprehensive and detailed auditing Evidence would be available more timely and in a comprehensive manner. The entire processing can be evaluated and analysed rather than examining the inputs and the outputs only.
24 4.24 Information Systems Control and Audit Surprise test capability As evidences are collected from the system itself by using continuous audit techniques, auditors can gather evidence without the systems staff and application system users being aware that evidence is being collected at that particular moment. This brings in the surprise test advantages. Information to system staff on meeting of objectives - Continuous audit techniques provides information to systems staff regarding the test vehicle to be used in evaluating whether an application system meets the objectives of asset safeguarding, data integrity, effectiveness, and efficiency. Training for new users Using the ITFs new users can submit data to the application system, and obtain feedback on any mistakes they make via the system s error reports. The following are some of the disadvantages and limitations of the use of the continuous audit system: Auditors should be able to obtain resources required from the organisation to support development, implementation, operation, and maintenance of continuous audit techniques. Continuous audit techniques are more likely to be used if auditors are involved in the development work associated with a new application system. Auditors need the knowledge and experience of working with computer systems to be able to use continuous audit techniques effectively and efficiently. Continuous auditing techniques are more likely to be used where the audit trail is less visible and the costs of errors and irregularities are high. Continuous audit techniques are unlikely to be effective unless they are implemented in an application system that is relatively stable Hardware Testing Hardware testing may be done to the entire system against the Functional Requirement Specification(s) (FRS) and/or the System Requirement Specification (SRS). Focus is to have almost a destructive attitude and test not only the design, but also the behaviour and even the believed expectations. It is also intended to test up to and beyond the bounds defined in the software/hardware requirements specification(s). Types of Hardware Testing Functional testing User Interface testing Usability testing Compatibility testing Model Based testing Error exit testing User help testing
25 Testing General and Automated Controls 4.25 Security testing Capacity testing Performance testing Reliability testing Recovery testing Installation testing Maintenance testing Accessibility testing 4.15 Review of Hardware Review the capacity management procedures for hardware and performance evaluation procedures to determine: Whether they ensure continuous review of performance and capacity in terms of hardware, software, networks, user needs, business needs, management objectives and service levels. Whether historical data and analysis obtained from the Information System (IS) trouble logs, processing schedules, job accounting system reports, preventative maintenance schedules and reports are used in Information System (IS) management s hardware performance monitoring. Ensure that the technical management s decision to acquire or dispose off computing related hardware and software are indeed based on results of capacity planning models and workload forecasts tempered with good business judgement. Review the hardware acquisition plan to determine: Whether the IS management has issued written policy statements regarding the acquisition of hardware. Whether the criteria for the acquisition of hardware are laid out and procedures and forms established to facilitate the acquisition approval process. Whether the hardware acquisition plan is in concurrence with the strategic business plan of management. Whether there is awareness of the budget constraints. Whether the requests for the acquisition of hardware are supported by cost benefit analysis. Whether all hardware are purchased through the IS purchasing department to take advantage of volume discounts or other quality benefits.
26 4.26 Information Systems Control and Audit Whether the environment is conducive and space is adequate to accommodate the current and new hardware. Whether IS management s hardware acquisition plan has taken into consideration technological obsolescence of the installed equipped, as well the new equipment in the acquisition plan. Whether there has been a consideration of lease expirations on current equipment. Whether documentation for hardware and software specifications, installation requirements, warranties, guarantees and likely lead-time associated with planned acquisitions is properly maintained. Review the change in management controls for the following: Determine if changes to hardware configuration are planned and timely information is given to the individual responsible for scheduling. Determine whether the change schedules allow time for adequate installation and testing of new hardware. Verify that the operator documentation is appropriately updated to reflect changes in hardware. Select samples of hardware changes that have affected the scheduling of IS processing and determine if the plans for changes are being addressed in a timely manner. Ensure there is a cross-reference between the change and its cause, i.e. the problem. Ascertain whether the system programmers, application programmers and the IS staff have been informed of all hardware changes to ensure that changes are coordinated properly. Review the preventive maintenance practices to evaluate the adequacy and the timeliness of preventive maintenance as under: Understand the frequency of scheduled preventive maintenance work performed by the hardware vendors and the in-house staff. Compare this frequency to hardware maintenance contract. Note any exceptions. Determine compliance with maintenance contractual agreements by examining maintenance log. Ascertain whether scheduled maintenance has had any adverse effect on the production schedule during peak season. Determine whether preventive maintenance logs are retained. Identify any abnormal hardware or software problems.
27 Testing General and Automated Controls 4.27 Ensure that the hardware maintenance period commences on the same day as the warranty or guarantee expires. This prevents additional maintenance charges while in warranty period and also eliminates the time gap between the expiry of the warranty period and the commencement of maintenance. Verify whether the maintenance agreement has a maintenance call response time defined. It is the maximum time allowed between notification of a problem and the arrival of the maintenance staff Operating System Review When testing operating software development, acquisition or maintenance, the following approach may be adopted: Interview technical service manager, system programming manager, and other personnel regarding: Review and approval process of option selection Test procedures for software implementation Review and approval procedures for test results Implementation procedures Documentation requirements Review the feasibility study and selection process to determine the following: Proposed system objectives and purposes are consistent with the request/proposal Same selection criteria are applied to all proposals Review cost/benefit analysis of system software procedures to determine they have addressed the following areas: Direct financial costs associated with the product Cost of product maintenance Hardware requirements and capacity of the product Training and technical support requirements Impact of the product on processing reliability Impact on data security Financial stability of the vendor s operations Review controls over the installation of changed system software to determine the following: That all appropriate levels of software have been implemented and that predecessor updates have taken place System software changes are scheduled when they least impact IS processing.
28 4.28 Information Systems Control and Audit A written plan was established for testing changes to system software. Tests are being completed as planned. Problems encountered during testing were resolved and the changes were retested. Test procedures are adequate to provide reasonable assurance that changes applied to the system correct know problems and do not create new problems. Software will be identified before it is placed into the production environment. Fallback or restoration procedures are in place in case of production failure. Review system software maintenance activities to determine the following: Changes made to the system software are documented. The vendor supports current versions of the software. Review system software change controls to determine the following: Access to the libraries containing the system software is limited to individual(s) needing to have such access. Changes to the software must be adequately documented and tested prior to implementation. Software must be properly authorized prior to moving from the test environment to the production environment. Review systems documentation specifically in the areas of: Installation control statements Parameter tables Exit definitions Activity logs/reports Review and test systems software implementation to determine adequacy of controls in: Change procedures Authorization procedures Access security features Documentation requirements Documentation of system testing Audit trails Access controls over the software in production. Review authorization documentation to determine whether: Additions, deletions or changes to access authorization have been documented.
29 Testing General and Automated Controls 4.29 Attempted violation reporting and follow-up have been documented. Review system software security for the following: Procedures have been established to restrict the ability to circumvent logical security access controls. Procedures have been established to limit access to the system interrupt capability. Existing physical and logical security provisions are adequate to restrict access to the master consoles. System software vendor-supplied installation passwords were changed at the time of installation. Review database supported information system controls to determine the following: Access to shared data is appropriate. Data organization is appropriate. Adequate change procedures are utilized to ensure the integrity of the database management software. Integrity of the database management system s data dictionary is maintained. Data redundancy is minimized by the database management system where redundant data exists, appropriate cross-referencing is maintained within the system s data dictionary or other documentation Reviewing The Network The review of controls over LANs is done to ensure that standards are in place for designing and selecting a LAN architecture and for ensuring that the costs of procuring and operating the LAN do not exceed the benefits. The unique nature of each LAN makes it difficult to define standard testing procedures to effectively perform a review. The reviewer should identify the following: LAN topology and network design Significant LAN components (such as servers and modems) Network topology (including internal LAN configuration as well as interconnections to other LANs, WANs or public networks). LAN uses, including significant traffic types and main applications used over the network. LAN administrator Significant groups of LAN users In addition, the reviewer should gain an understanding of the following: Functions performed by the LAN Administrator
30 4.30 Information Systems Control and Audit The company s division or department procedures and standards relating to network design support, naming conventions and data security. LAN transmission media and techniques, including bridges, routers and gateways. Understanding the above information should enable the reviewer to make an assessment of the significant threats to the LAN, together with the potential impact and probability of occurrence of each threat. Having assessed the risks to the LAN, the reviewer should evaluate the controls used to minimize the risks. Physical controls should protect LAN hardware and access points to the LAN by limiting access to those individuals authorized by management. Unlike most mainframes, the computers in a LAN are usually decentralized. Company data stored on a file server is easier to damage or steal than when on a mainframe and should be physically protected. The reviewer should review the following: LAN hardware devices, particularly the file server and documentation, should be located in a secure facility and restricted to the LAN administrator. The wiring closet and cabling should be secure. Keys to the LAN file server facility should be controlled to prevent or minimize the risk of unauthorized access. LAN file server housing should be locked or otherwise secured to prevent removal of boards, chips and the computer itself. To test physical security, a reviewer should perform the following: Inspect the LAN wiring closet and transmission wiring and verify they are physically secured. Observe the LAN file server computer and verify it is secured in a manner to reduce the risk of removal of components and the computer itself. Obtain a copy of the key logs for the file server room and the wiring closet, match the key logs to actual keys that have been issued an determine that all keys held are assigned to the appropriate people, for example, the LAN Administrator and support staff. Select a sample of keys held by people without authorised access to the LAN file server facility and wiring closet and determine that these keys do not permit access to these facilities. Look for LAN operating manuals and documentation not properly secured. Environmental controls for LANs are similar to those considered in the mainframe environment. However, the equipment may not require as extensive atmospheric controls as a mainframe. The following should be considered:
31 Testing General and Automated Controls 4.31 LAN file server equipment should be protected from the effects of static electricity (antistatic rug) and electrical surges (surge protector) Air conditioning and humidity control systems should be adequate to maintain temperatures within manufacturers specifications. The LAN should be equipped with an uninterrupted power supply (UPS) that will allow the LAN to operate in case of minor power fluctuations or in case of a prolonged power outage. The LAN file server facility should be kept free of dust, smoke and other matter particularly food. Backup diskettes and tapes should be protected from environmental damage and the effects of magnetic fields. To test environmental controls, a reviewer should visit the LAN file server facility and verify: Temperature and humidity are adequate. Static electricity guards are in place. Electric surge protectors are in place. Fire extinguishers are nearby. Observe the LAN file server facility, looking for food and beverage containers and tobacco products in the area and in the garbage cans. Observe the storage methods and media for backup and verify they are protected from environmental damage. LAN logical security controls should be in place to restrict, identify and report authorized and unauthorized users of the LAN. Users should be required to have unique passwords and be required to change them periodically. Passwords should be encrypted and not displayed on the computer screen when entered. LAN user access should be based on written authorization, on a need to know/need to do basis. This should include documenting requests for adds, changes and detection of LAN logical access. A LAN workstation should be disabled automatically after a short period of inactivity. Remote access to the system supervisor should be prohibited. For maximum security an individual should only be able to logon to the supervisor account on the console terminal. This combination of physical security over consoles and logical security over the supervisor account provides for maximum protection against unauthorized access. All logon attempts to the supervisor account should be logged on in the computer system.
32 4.32 Information Systems Control and Audit The LAN supervisor should maintain up-to-date information about all communication lines connected to the outside. To test logical security, a reviewer should interview the person responsible for maintaining LAN security to ensure that person is: Aware of the risks associated with physical and logical access that must be minimized. Aware of the need to actively monitor logons and to account for employee changes. Knowledgeable in how to maintain and monitor access. The reviewer should also perform the following interview users to access their awareness of management policies regarding LAN security and confidentiality. Evaluate a sample of LAN users access /security profiles to ensure access is appropriate and authorized based on the individual s responsibilities. Review a sample of the security reports to: Ensure only authorized access is occurring. Verify timely and effective review of these reports is occurring and that there is evidence of the review. Look for unauthorized users. If found, determine the adequacy and timeliness of followup procedures Attempt to gain access using variety of unauthorized logon-ids/passwords. Verify that access is denied and logged. Logon to and briefly use the LAN. Then, verify that access and use are properly recorded on the automated activity report. If the LAN logon session automatically logs off after a short period of inactivity, logon to the terminal and visually verify the automatic logoff feature. Visually search for written passwords in the general areas of the computer that utilize the LAN. If the LAN is connected to an outside source through a modem or dial-up network, attempt to gain access to the LAN through these telecommunications mediums using authorized and unauthorized management. Review a sample of LAN access change requests and determine if the appropriate management authorizes them and that the standard form has been utilized.
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS
INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
THE AUDITOR S RESPONSES TO ASSESSED RISKS
SINGAPORE STANDARD ON AUDITING SSA 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS This revised Singapore Standard on Auditing (SSA) 330 supersedes SSA 330 The Auditor s Procedures in Response to Assessed
Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls
Course Name: Internal Auditing & Controls Module: 5 Module Title: Examination phase of the internal audit Lecture and handouts prepared by Chuck Campbell Examination phase of the internal audit Module
INFORMATION SYSTEM AUDITING AND ASSURANCE
CHAPTER INFORMATION SYSTEM AUDITING AND ASSURANCE As more and more accounting and business systems were automated, it became more and more evident that the field of auditing had to change. As the systems
AUDIT PROCEDURES RECEIVABLE AND SALES
184 AUDIT PROCEDURES RECEIVABLE AND SALES Ștefan Zuca Abstract The overall objective of the audit of accounts receivable and sales is to determine if they are fairly presented in the context of the financial
INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT CONTENTS
INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Audit Evidence. AU Section 326. Introduction. Concept of Audit Evidence AU 326.03
Audit Evidence 1859 AU Section 326 Audit Evidence (Supersedes SAS No. 31.) Source: SAS No. 106. See section 9326 for interpretations of this section. Effective for audits of financial statements for periods
The Information Systems Audit
November 25, 2009 e q 1 Institute of of Pakistan ICAP Auditorium, Karachi Sajid H. Khan Executive Director Technology and Security Risk Services e q 2 IS Environment Back Office Batch Apps MIS Online Integrated
INTERNATIONAL STANDARD ON AUDITING 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS
INTERNATIONAL STANDARD ON AUDITING 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING (Effective for audits of financial statements for periods beginning on or after December 15, 2004) CONTENTS Paragraph Introduction...
Auditing Derivative Instruments, Hedging Activities, and Investments in Securities 1
Auditing Derivative Instruments 1915 AU Section 332 Auditing Derivative Instruments, Hedging Activities, and Investments in Securities 1 (Supersedes SAS No. 81.) Source: SAS No. 92. See section 9332 for
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS Paragraph Introduction... 1-2 Definitions... 3-12 Audit Evidence... 13-17 Risk Considerations
Module 6 Documenting Processes and Controls
A logical place to begin any comprehensive evaluation of internal controls is at the top entity-level controls that might have a pervasive effect on the organization. This includes a consideration of factors
An Examination of an Entity s Internal Control Over Financial Reporting That Is Integrated With an Audit of Its Financial Statements
Examination of an Entity s Internal Control 1403 AT Section 501 An Examination of an Entity s Internal Control Over Financial Reporting That Is Integrated With an Audit of Its Financial Statements Source:
Information Technology Internal Audit Report
Information Technology Internal Audit Report Report #2013-03 August 9, 2013 Table of Contents Page Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope... 5 Testing
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
Chapter 9 The Study of Internal Control and Assessment of Control Risk
Review Questions Chapter 9 The Study of Internal Control and Assessment of Control Risk 9-1 There are seven parts of the planning phase of audits: preplan, obtain background information, obtain information
[300] Accounting and internal control systems and audit risk assessments
[300] Accounting and internal control systems and audit risk assessments (Issued March 1995) Contents Paragraphs Introduction 1 12 Inherent risk 13 15 Accounting system and control environment 16 23 Internal
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
Imperial County. Office of the Auditor-Controller. Internal Audit Standard Practice Manual
Imperial County Internal Audit Standard Practice Manual Imperial County Internal Audit Standard Practice Manual Table of Contents Chapter 1 Our Mission, Our Authority, Our Responsibility 1-6 Chapter 2
IT Application Controls Questionnaire
IT Application Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks A1.a. MULTIPLE USER PROCESSING INPUT CONTROLS Input controls are the procedures and methods utilized by
Information Technology Internal Audit Report
Information Technology Internal Audit Report Report #2014-05 July 25, 2014 Table of Contents Page Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope and Testing
Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
How To Audit A Financial Statement
INTERNATIONAL STANDARD ON 400 RISK ASSESSMENTS AND INTERNAL CONTROL (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph Introduction... 1-10 Inherent
OBSERVATIONS FROM 2010 INSPECTIONS OF DOMESTIC ANNUALLY INSPECTED FIRMS REGARDING DEFICIENCIES IN AUDITS OF INTERNAL CONTROL OVER FINANCIAL REPORTING
1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org OBSERVATIONS FROM 2010 INSPECTIONS OF DOMESTIC ANNUALLY INSPECTED FIRMS REGARDING DEFICIENCIES
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 327 AU-C Section 330 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained Source: SAS No. 122.
January 2004 5(1) CHAPTER 5. Table of Contents
January 2004 5(1) Paragraph CHAPTER 5 Table of Contents 5-000 Audit of Policies, Procedures, and Internal Controls Relative to Accounting and Management Systems Page 5-001 Scope of Chapter... 501 5-100
Guidance Statement GS 007 Audit Implications of the Use of Service Organisations for Investment Management Services
GS 007 (March 2008) Guidance Statement GS 007 Audit Implications of the Use of Service Organisations for Investment Management Services Issued by the Auditing and Assurance Standards Board Obtaining a
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions
Guide to the Sarbanes-Oxley Act: IT Risks and Controls Frequently Asked Questions Table of Contents Page No. Introduction.......................................................................1 Overall
Module 2 IS Assurance Services
Module 2 IS Assurance Services Chapter 2: IS Audit In Phases Phase 2: Part: 2 of 3 CA A.Rafeq 1 Chapter 2: Agenda Chapter 2: IS Audit in Phases Phase1: Plan Phase 2: Execute Phase 3: Report 2 Phase 2:
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Inspection Observations Related to PCAOB "Risk Assessment" Auditing Standards (No. 8 through No.15)
1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org Inspection Observations Related to PCAOB "Risk Assessment" Auditing Standards (No. 8 through
Tom J. Hull & Company Type 1 SSAE 16 2014
Tom J. Hull & Company Type 1 SSAE 16 2014 REPORT ON MANAGEMENT S DESCRIPTION OF TOM J. HULL & COMPANY S SYSTEM AND THE SUITABILITY OF THE DESIGN OF CONTROLS Pursuant to Statement on Standards for Attestation
AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:
1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org STAFF VIEWS AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN
How To Audit A Company
1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202)862-8430 www.pcaobus.org STAFF AUDIT PRACTICE ALERT NO. 11 CONSIDERATIONS FOR AUDITS OF INTERNAL CONTROL OVER FINANCIAL
Master Document Audit Program
Activity Code 11510 B-1 Planning Considerations Information Technology General System Controls Audit Specific Independence Determination Members of the audit team and internal specialists consulting on
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
Audit of Financial Reporting Controls
Audit of Financial Reporting Controls WESTERN ECONOMIC DIVERSIFICATION CANADA Audit & Evaluation Branch February 2012 Table of Contents 1.0 Executive Summary 1 2.0 Statement of Assurance 1 3.0 Introduction
PHASE 9: OPERATIONS AND MAINTENANCE PHASE
PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
SOLUTION: AUDIT AND INTERNAL REVIEW, MAY 2014
SOLUTION 1(a) (a) The Auditing guideline points out that the amount or quantity of audit evidence required for the auditor to achieve the level of assurance is a matter of professional judgment. The factors
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Report on. 2010 Inspection of PricewaterhouseCoopers LLP (Headquartered in New York, New York) Public Company Accounting Oversight Board
1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8433 www.pcaobus.org Report on 2010 (Headquartered in New York, New York) Issued by the Public Company Accounting
Information Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Application controls testing in an integrated audit
Application controls testing in Application controls testing in an integrated audit Learning objectives Describe types of controls Describe application controls and classifications Discuss the nature,
Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 267 AU-C Section 315 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement Source: SAS No. 122; SAS No. 128. Effective
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Substantive Tests of Transactions and Balances
10 CHAPTER Substantive Tests of Transactions and Balances LEARNING OBJECTIVES After studying this chapter you should be able to: 1 2 identify and distinguish between tests of controls and substantive tests
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Stages of the Audit Process
Chapter 5 Stages of the Audit Process Learning Objectives Upon completion of this chapter you should be able to explain: LO 1 Explain the audit process. LO 2 Accept a new client or confirming the continuance
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
The University of Texas at Tyler. Audit of Compliance with Texas Administrative Code 202
Audit of Compliance with Texas Administrative Code 202 August 2015 OFFICE OF AUDIT AND CONSULTING SERVICES 3900 UNIVERSITY BOULEVARD TYLER, TEXAS 75799 BACKGROUND Texas Administrative Code (TAC) Title
NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division
AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate
Chapter 5. Planning the Audit Engagement
Chapter 5 Planning the Audit Engagement A. Purpose for Planning the Engagement Engagement planning is performed to provide a means for developing an understanding of the business objectives of the auditee,
Auditing Standard ASA 330 The Auditor's Responses to Assessed Risks
ASA 330 (October 2009) Auditing Standard ASA 330 The Auditor's Responses to Assessed Risks Issued by the Auditing and Assurance Standards Board Obtaining a Copy of this Auditing Standard This Auditing
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM
10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process
10-1 Auditing Business Process Auditing Business Process Objectives Understand the Auditing of the Enteties Business Process Identify the types of transactions in different Business Process Asses Control
PROJECT RISK MANAGEMENT
11 PROJECT RISK MANAGEMENT Project Risk Management includes the processes concerned with identifying, analyzing, and responding to project risk. It includes maximizing the results of positive events and
Measurement Information Model
mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides
STANDING ADVISORY GROUP MEETING
1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org RISK ASSESSMENT IN FINANCIAL STATEMENT AUDITS Introduction The Standing Advisory Group ("SAG")
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
Sarbanes-Oxley Section 404: Management s Assessment Process
Sarbanes-Oxley Section 404: Management s Assessment Process Frequently Asked Questions ADVISORY Contents 1 Introduction 2 Providing a Road Map for Management 3 Questions and Answers 3 Section I. Planning
INTERNATIONAL STANDARD ON REVIEW ENGAGEMENTS 2410 REVIEW OF INTERIM FINANCIAL INFORMATION PERFORMED BY THE INDEPENDENT AUDITOR OF THE ENTITY CONTENTS
INTERNATIONAL STANDARD ON ENGAGEMENTS 2410 OF INTERIM FINANCIAL INFORMATION PERFORMED BY THE INDEPENDENT AUDITOR OF THE ENTITY (Effective for reviews of interim financial information for periods beginning
1. FPO. Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Second Edition
1. FPO Guide to the Sarbanes-Oxley Act: IT Risks and Controls Second Edition Table of Contents Introduction... 1 Overall IT Risk and Control Approach and Considerations When Complying with Sarbanes-Oxley...
(Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS
INTERNATIONAL STANDARD ON 200 OVERALL OBJECTIVES OF THE INDEPENDENT AUDITOR AND THE CONDUCT OF AN AUDIT IN ACCORDANCE WITH INTERNATIONAL STANDARDS ON (Effective for audits of financial statements for periods
Audit Sampling. AU Section 350 AU 350.05
Audit Sampling 2067 AU Section 350 Audit Sampling (Supersedes SAS No. 1, sections 320A and 320B.) Source: SAS No. 39; SAS No. 43; SAS No. 45; SAS No. 111. See section 9350 for interpretations of this section.
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM
GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups
CHAPTER 13 AUDITING DEBT OBLIGATIONS AND STOCKHOLDERS EQUITY TRANSACTIONS
A U D I T I N G A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT 9 th Edition Karla M. Johnstone Audrey A. Gramling Larry E. Rittenberg CHAPTER 13 AUDITING DEBT OBLIGATIONS AND STOCKHOLDERS EQUITY TRANSACTIONS
3.B METHODOLOGY SERVICE PROVIDER
3.B METHODOLOGY SERVICE PROVIDER Approximately four years ago, the American Institute of Certified Public Accountants (AICPA) issued Statement on Standards for Attestation Engagements (SSAE) No. 16, Reporting
Internal Control Deliverables. For. System Development Projects
DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...
San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young
Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various
PeopleSoft Upgrade Post-Implementation Audit
PeopleSoft Upgrade Post-Implementation Audit Initially Issued on June 2015 Reissued on October 2015 with the updated management response to the first observation only on page 5 Table of Contents Executive
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
Reporting on Control Procedures at Outsourcing Entities
Auditing Guidance Statement AGS 1042 (July 2002) Reporting on Control Procedures at Outsourcing Entities Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Fundamentals Level Skills Module, F8 (IRL)
Answers Fundamentals Level Skills Module, F8 (IRL) Audit and Assurance (Irish) June 2008 Answers 1 (a) Prior year internal control questionnaires Obtain the audit file from last year s audit. Ensure that
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 315
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 315 IDENTIFYING AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT (Effective for audits of financial
Internal Audit. Audit of HRIS: A Human Resources Management Enabler
Internal Audit Audit of HRIS: A Human Resources Management Enabler November 2010 Table of Contents EXECUTIVE SUMMARY... 5 1. INTRODUCTION... 8 1.1 BACKGROUND... 8 1.2 OBJECTIVES... 9 1.3 SCOPE... 9 1.4
How To Audit A Company
INTERNATIONAL STANDARD ON AUDITING 315 IDENTIFYING AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT (Effective for audits of financial statements for
COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE
COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE COMMITTEE OF SPONSORING ORGANIZATIONS (COSO) 2013 The Committee of Sponsoring Organizations (COSO) Internal Controls Integrated Framework,
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
October 14, 2015 5(1)
October 14, 2015 5(1) Paragraph CHAPTER 5 Table of Contents 5-000 Audit of Policies, Procedures, and Internal Controls Relative to Accounting and Management Systems Page 5-001 Scope of Chapter... 501 5-100
2. Auditing. 2.1. Objective and Structure. 2.2. What Is Auditing?
- 4-2. Auditing 2.1. Objective and Structure The objective of this chapter is to introduce the background information on auditing. In section 2.2, definitions of essential terms as well as main objectives
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
Position Classification Standard for Management and Program Clerical and Assistance Series, GS-0344
Position Classification Standard for Management and Program Clerical and Assistance Series, GS-0344 Table of Contents SERIES DEFINITION... 2 EXCLUSIONS... 2 OCCUPATIONAL INFORMATION... 3 TITLES... 6 EVALUATING
