G11 EFFECT OF PERVASIVE IS CONTROLS
|
|
|
- Griselda Barton
- 9 years ago
- Views:
Transcription
1 IS AUDITING GUIDELINE G11 EFFECT OF PERVASIVE IS CONTROLS The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically to IS auditing. One of the goals of ISACA is to advance globally applicable standards to meet its vision. The development and dissemination of the IS Auditing Standards are a cornerstone of the ISACA professional contribution to the audit community. The framework for the IS Auditing Standards provides multiple levels of guidance: Standards define mandatory requirements for IS auditing and reporting. They inform: IS auditors of the minimum level of acceptable performance required to meet the professional responsibilities set out in the ISACA Code of Professional Ethics Management and other interested parties of the profession s expectations concerning the work of practitioners Holders of the Certified Information Systems Auditor (CISA ) designation of requirements. Failure to comply with these standards may result in an investigation into the CISA holder's conduct by the ISACA Board of Directors or appropriate ISACA committee and, ultimately, in disciplinary action. Guidelines provide guidance in applying IS Auditing Standards. The IS auditor should consider them in determining how to achieve implementation of the standards, use professional judgement in their application and be prepared to justify any departure. The objective of the IS Auditing Guidelines is to provide further information on how to comply with the IS Auditing Standards. Procedures provide examples of procedures an IS auditor might follow in an audit engagement. The procedure documents provide information on how to meet the standards when performing IS auditing work, but do not set requirements. The objective of the IS Auditing Procedures is to provide further information on how to comply with the IS Auditing Standards. Control Objectives for Information and related Technology (COBIT ) is published by the IT Governance Institute (ITGI ). It is an IT governance framework and supporting tool set that allows managers to bridge the gaps amongst control requirements, technical issues and business risks. COBIT enables clear policy development and good practice for IT control throughout organisations. It emphasises regulatory compliance, helps organisations increase the value attained from IT, enables alignment and simplifies implementation of the COBIT framework s concepts. COBIT is intended for use by business and IT management as well as IS auditors; therefore, its usage enables the understanding of business objectives and communication of good practices and recommendations to be made around a commonly understood and well-respected framework. COBIT is available for download on the ISACA web site, As defined in the COBIT framework, each of the following related products and/or elements is organised by IT management process: Control objectives Generic statements of minimum good control in relation to IT processes Management guidelines Guidance on how to assess and improve IT process performance, using maturity models; Responsible, Accountable, Consulted and/or Informed (RACI) charts; goals; and metrics. They provide a management-oriented framework for continuous and proactive control self-assessment specifically focused on: Performance measurement IT control profiling Awareness Benchmarking COBIT Control Practices Risk and value statements and how to implement guidance for the control objectives IT Assurance Guide Guidance for each control area on how to obtain an understanding, evaluate each control, assess compliance and substantiate the risk of controls not being met A glossary of terms can be found on the ISACA web site at The words audit and review are used interchangeably in the IS Auditing Standards, Guidelines and Procedures. Disclaimer: ISACA has designed this guidance as the minimum level of acceptable performance required to meet the professional responsibilities set out in the ISACA Code of Professional Ethics. ISACA makes no claim that use of this product will assure a successful outcome. The publication should not be considered inclusive of all proper procedures and tests or exclusive of other procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific procedure or test, the controls professional should apply his/her own professional judgement to the specific control circumstances presented by the particular systems or IT environment. The ISACA Standards Board is committed to wide consultation in the preparation of the IS Auditing Standards, Guidelines and Procedures. Prior to issuing any documents, the Standards Board issues exposure drafts internationally for general public comment. The Standards Board also seeks out those with a special expertise or interest in the topic under consideration for consultation where necessary. The Standards Board has an ongoing development programme and welcomes the input of ISACA members and other interested parties to identify emerging issues requiring new standards. Any suggestions should be ed ([email protected]), faxed ( ) or mailed (address at the end of document) to ISACA International Headquarters, for the attention of the director of research, standards and academic relations. This material was issued on 1 July 2008.
2 1. BACKGROUND 1.1 Linkage to Standards Standard S6 Performance of Audit Work states: During the course of the audit, the IS auditor should obtain sufficient, reliable and relevant evidence to achieve the audit objectives. The audit findings and conclusions are to be supported by appropriate analysis and interpretation of this evidence. 1.2 Linkage to COBIT Selection of the most relevant material in COBIT applicable to the scope of the particular audit is based on the choice of specific COBIT IT processes and consideration of COBIT s control objectives and associated management practices. To meet the audit requirement of IS auditors, the processes in COBIT most likely to be relevant, selected and adapted are classified here as primary and secondary as follows Primary references: PO4 Define IT processes, organisation and relationships AI4 Enable operation and use AI6 Manage changes AI7 Install and accredit solutions and changes Secondary references: DS3 Manage performance and change DS5 Ensure system security ME2 Monitor and evaluate internal control The information criteria most relevant are: Primary: Effectiveness, efficiency and integrity Secondary: Confidentiality, availability, compliance and reliability 1.3 Need for Guideline The management and monitoring of any organisation, department or function has an affect on the way in which that organisation, department or function behaves, including the way in which it applies controls. This principle applies as much to the use of IS as it does to a manufacturing organisation, an accounts payable department or a treasury function The effectiveness of the detailed IS controls operated within an organisation is limited by the effectiveness of the management and monitoring of the use of information systems in the organisation as a whole. This is often recognised in guidelines for financial audits, where the effect of general controls in the IS environment on application controls in the financial systems is acknowledged The IT Governance Institute s COBIT framework can assist the IS auditor in differentiating between: The detailed IS controls that are directly relevant to the IS audit scope The features of IS management and monitoring that contribute to the assurance and may be obtained by an IS auditor in relation to those detailed IS controls The general/application control split was designed specifically to apply to audits whose objective is to form an opinion on data processing integrity, system availability to business users and business information confidentiality When internal auditors and independent consultants perform IS audits, the audit objective and scope are ordinarily different from those for business processes including financial audits. The systems in use are a combination of manual and computer processes, and the control objectives must be for the entire process, which may be either wider or narrower than business processes including accounting information records. Therefore, the controls framework used for business process audits may not be appropriate for some IS audits To form an opinion on the effectiveness of the detailed controls being audited, the IS auditor should consider the need to assess the effectiveness of management and monitoring of information systems, even where such matters are outside the agreed-upon scope for the audit. The outcome of such considerations may range from an extension of the agreed scope to an appropriately qualified report The total population of management and monitoring controls is broad, and some of these controls may not be relevant to the specific audit objective. To assess the audit risk and determine the G11 Effect of Pervasive IS Controls 1998, 2008 ISACA. All rights reserved. Page 2
3 appropriate audit approach, the IS auditor needs a structured method of determining: Those management and monitoring controls that are relevant to the audit scope and objectives Those management and monitoring controls that should be tested The effect of the relevant management and monitoring controls on the audit opinion This may be achieved using a framework of controls specific to the use of IS and related technology, which may help the IS auditor to focus on the key controls that affect the information systems and operations being audited The IS auditor should consider it in determining how to achieve implementation of the above standard, use professional judgement in its application and be prepared to justify any departure. 2. CONTROLS FRAMEWORK 2.1 Overview COBIT defines control as The policies, procedures, practices and organisational structures, designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected. For each IS audit, the IS auditor should differentiate between those general controls which affect all information systems and operations (pervasive IS controls) and those general and application controls that operate at a more specific level (detailed IS controls) to focus audit effort on the risk areas relevant to the IS audit objective. The purpose of the controls framework described in this section is to assist the IS auditor in achieving this focus. 2.2 Pervasive IS Controls The term pervasive IS controls is defined in the ISACA glossary at Pervasive IS controls are a subset of general controls; they are those general controls that focus on the management and monitoring of IS The effect of pervasive IS controls on the IS auditor s work is not limited to the reliability of application controls in the business process systems. Pervasive IS controls also affect the reliability of the detailed IS controls over, for example: Application program development System implementation Security administration Backup procedures Weak management and monitoring of IS (i.e., weak pervasive IS controls) should alert the IS auditor to the possibility of a high risk that the controls designed to operate at the detailed level may be ineffective Pervasive controls are most effectively determined via a risk assessment where crucial processes and controls are identified. For example, depending upon the organisation, the risk assessment may result in rating the controls (i.e., segregation of duties) around the evaluation of program changes from the testing environment into the production processing environment. Specifically, controls that segregate the program development and change environment from the production process environment may be considered pervasive controls. The means and method of accomplishing this control objective ensures that the elevation of new or modified programs is performed by those individuals typically assigned to the production processing environment. Accordingly, pervasive controls are essential to the reliance placed upon other detailed controls. 2.3 Detailed IS Controls The term detailed IS controls is defined in the ISACA glossary at They are made up of application controls plus those general controls not included in pervasive IS controls. In the COBIT framework, detailed IS controls are the controls over the acquisition, implementation, delivery and support of IS systems and services. Examples include controls over: Implementation of software packages System security parameters Disaster recovery planning Data input validation Exception report production G11 Effect of Pervasive IS Controls 1998, 2008 ISACA. All rights reserved. Page 3
4 User accounts Application controls are a subset of detailed IS controls. Data input validation, for example, is both a detailed IS control and an application control. AI7 Install and accredit solutions and changes is an IS control, but not an application control The relationships amongst IS controls are shown in the following outline: IS Controls General controls - Pervasive IS controls - Detailed IS controls Application controls In addition, the IS auditor should consider the effect of non-is controls on scope and audit procedures. 2.4 Interaction of Pervasive and Detailed IS Controls Pervasive controls should be analysed based upon the four domains in COBIT: Plan and Organise (PO) Acquire and Implement (AI) Deliver and Support (DS) Monitor and Evaluate (ME) Pervasive controls should be identified from the risks associated with the loss of system availability, data integrity and information confidentiality. For example, controls prohibiting unauthorised and consequential update, which will go undetected, to production data used in either financial or nonfinancial reporting of a publicly traded company may be construed as a pervasive control from a data-integrity perspective. The remaining parts of 2.4 further illustrate potential pervasive controls in each of the domains The effectiveness of the controls in the AI and DS domains is influenced by the effectiveness of the controls operated in the PO and ME domains. Inadequate planning, organisation and monitoring by management imply that controls over acquisition, implementation, and service delivery and support will be ineffective. Conversely, strong planning, organisation and monitoring can identify and correct ineffective controls over acquisition, implementation, and service delivery and support For example, detailed IS controls over the COBIT process AI2 Acquire and maintain application software include the following COBIT processes: PO1 Define a strategic IT plan PO8 Manage quality PO10 Manage projects ME1 Monitor and evaluate IT performance An audit of an application system acquisition should include the identification of the effect of the IS strategy, the project management approach, quality management and the approach to monitoring. Where, for example, project management is inadequate, the IS auditor should consider: Planning additional work to provide assurance that the specific project being audited is being effectively managed Reporting weaknesses in pervasive IS controls to management A further example is that effective detailed IS controls over the COBIT process DS5 Ensure systems security are affected by the adequacy of pervasive IS controls over processes including the following COBIT processes: PO4 Define the IT processes, organisation and relationships PO6 Communicate management aims and direction PO9 Assess and manage IT risks ME1 Monitor and evaluate IT performance An audit of the adequacy of security parameters in a system should include consideration of management s security policies (PO6), allocation of security responsibilities (PO4), risk assessment procedures (PO9) and procedures for monitoring compliance with its security policies (ME1). Even where the parameters do not comply with the IS auditor s view of best practice, they may be evaluated as adequate in light of the risks identified by management and the management policies G11 Effect of Pervasive IS Controls 1998, 2008 ISACA. All rights reserved. Page 4
5 that direct how such a level of risk should be addressed. Any audit recommendations for improvement, as well as the detailed parameters themselves, should then be directed to risk management. 3. PLANNING 3.1 Approach to Relevant Pervasive IS Controls The IS Auditing Guideline G15 Planning states that the IS auditor should perform a preliminary assessment of control over the function being audited. A risk assessment is essential in identifying and evaluating relevant pervasive IS controls. The testing of pervasive IS controls may take place on a different cycle to the specific IS audit being performed, since, by their nature, they cover many different aspects of IS usage. The IS auditor should, therefore, consider whether any previous audit work in this area could be relied upon to identify and evaluate these controls Where audit work indicates that pervasive IS controls are unsatisfactory, the IS auditor should consider the effect of this finding on the planned approach to achieving the audit objective: Strong pervasive IS controls can contribute to the assurance that may be obtained by an IS auditor in relation to detailed IS controls. Weak pervasive IS controls may undermine strong detailed IS controls or exacerbate weaknesses at the detailed level. 3.2 Sufficient Audit Procedures Where pervasive IS controls have a significant potential effect on the audit objective, it is not sufficient to plan to audit only the detailed controls. Where it is not possible or practical to audit the pervasive IS controls, this restriction of scope should be reported The IS auditor should plan to test the relevant pervasive IS controls, where this test will contribute to achieving the audit objective. 3.3 Relevant Controls Relevant pervasive IS controls are those that have an effect on the specific audit objectives for the assignment. For example, where the audit objective is to report on the controls around changes to a specific programme library, pervasive IS controls relating to security policies (PO6) will be relevant, but pervasive IS controls relating to determination of the technological direction (PO3) may not be relevant In planning the audit, the IS auditor should identify which of the total population of pervasive IS controls have an effect on the specific audit objectives, and should plan to include these in the audit scope. COBIT s control objectives for the PO and ME domains may help the IS auditor to identify relevant pervasive IS controls. 3.4 Audit Evidence The IS auditor should plan to obtain audit evidence that relevant controls are operating effectively. Potential tests are outlined in section 4, Performance of Audit Work. 3.5 Approach to Relevant Detailed IS Controls Where IS audit work indicates that pervasive IS controls are satisfactory, the IS auditor may consider reducing the level of testing planned for detailed IS controls, since the audit evidence of strong pervasive IS controls will contribute to the assurance that may be obtained by an IS auditor in relation to detailed IS controls Where IS audit work indicates that pervasive IS controls are not satisfactory, the IS auditor should carry out sufficient testing of detailed IS controls to provide audit evidence that they are working effectively in spite of weaknesses in the relevant pervasive IS controls. 4. PERFORMANCE OF AUDIT WORK 4.1. Testing Pervasive IS Controls The IS auditor should carry out sufficient testing to provide assurance that relevant pervasive IS controls were operating effectively in the audit period or at a specific point in time. Test procedures that may be appropriate include: Observation Corroborative inquiries G11 Effect of Pervasive IS Controls 1998, 2008 ISACA. All rights reserved. Page 5
6 Review of relevant documentation (e.g., policies, standards, meeting minutes) Reperformance (e.g., using CAATs) If the testing of the relevant pervasive IS controls indicates that they are satisfactory, the IS auditor should proceed with the planned audit of the detailed IS controls that are directly applicable to the audit objective. The level of such testing may be less than would be appropriate if the pervasive IS controls were not operating satisfactorily. 5. REPORTING 5.1 Pervasive IS Control Weaknesses Where the IS auditor has identified weaknesses in pervasive IS controls, these should be brought to the attention of management, even where consideration of such areas was not specifically identified in the agreed-upon scope of work. 5.2 Restrictions on Scope Where pervasive IS controls could have a significant potential effect on the effectiveness of detailed IS controls and the pervasive IS controls have not been audited, the IS auditor should bring this fact to the attention of management in the final report, together with a statement of the potential effect on the audit findings, conclusions and recommendations. For example, when an IS auditor is reporting on an audit of the acquisition of a package solution, but has not seen the organisation s IS strategy, the IS auditor should include in the report a statement that the IS strategy has not been made available or does not exist. Where relevant, the IS auditor should go on to report the potential effect on the audit findings, conclusions and recommendations, e.g., through a statement that it is not possible to say whether the acquisition of the package solution is consistent with the IS strategy and will support the future plans of the business. 6. EFFECTIVE DATE 6.1 This guideline is effective for all IS audits beginning on or after 1 March The guideline has been reviewed and updated effective 1 August ISACA Standards Board Chair, Ravi Muthukrishnan, CISA, CISM, FCA, ISCA Capco IT Services India Private Ltd., India Brad David Chin, CISA, CPA Google Inc., USA Sergio Fleginsky, CISA AKZO Nobel, Uruguay Maria Gonzalez, CISA, CISM Department of Defence, Spain John Ho Chi, CISA, CISM, CBCP, CFE Ernst & Young, Singapore Andrew J. MacLeod, CISA, FCPA, MACS, PCP, CIA Brisbane City Council, Australia John G. Ott, CISA, CPA AmerisourceBergen, USA Jason Thompson, CISA KPMG LLP, USA Meera Venkatesh, CISA, CISM, ACS, CISSP, CWA Microsoft Corp., USA ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL USA Telephone: Fax: [email protected] Web Site: G11 Effect of Pervasive IS Controls 1998, 2008 ISACA. All rights reserved. Page 6
G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING
IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply
IS Audit and Assurance Guideline 2202 Risk Assessment in Planning
IS Audit and Assurance Guideline 2202 Risk Assessment in Planning The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards
IS Standards, Guidelines and Procedures for Auditing and Control Professionals
IS Standards, Guidelines and Procedures for Auditing and Control Professionals Code of Professional Ethics IS Auditing Standards, Guidelines and Procedures IS Control Professionals Standards Current as
IS AUDITING PROCEDURE CONTROL RISK SELF-ASSESSMENT (CRSA) DOCUMENT P5
IS AUDITING PROCEDURE CONTROL RISK SELF-ASSESSMENT (CRSA) DOCUMENT P5 Introduction The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards
IS Audit and Assurance Guideline 2402 Follow-up Activities
IS Audit and Assurance Guideline 2402 Activities The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply
IS AUDITING GUIDELINE REVIEW OF VIRTUAL PRIVATE NETWORKS DOCUMENT #060.020.120
IS AUDITING GUIDELINE REVIEW OF VIRTUAL PRIVATE NETWORKS DOCUMENT #060.020.120 The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards
IS AUDITING GUIDELINE BUSINESS-TO-CONSUMER (B2C) E-COMMERCE REVIEWS DOCUMENT G22
IS AUDITING GUIDELINE BUSINESS-TO-CONSUMER (B2C) E-COMMERCE REVIEWS DOCUMENT G22 Introduction The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits
IS AUDITING GUIDELINE ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS REVIEW DOCUMENT G21
Introduction The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically to IS auditing. One of the goals of the
IS AUDITING PROCEDURE
IS AUDITING PROCEDURE VIRUSES AND OTHER MALICIOUS LOGIC DOCUMENT P4 Introduction The specialised nature of information systems (IS) auditing, and the skills necessary to perform such audits, require standards
IS AUDITING PROCEDURE INTRUSION DETECTION SYSTEM (IDS) REVIEW DOCUMENT P3
Introduction The specialised nature of information systems (IS) auditing, and the skills necessary to perform such audits, require standards that apply specifically to IS auditing. One of the goals of
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
Navigating the Standards for Information Technology Controls
Navigating the Standards for Information Technology Controls By Joseph B. O Donnell and Yigal Rechtman JULY 2005 - Pervasive use of computers, along with recent legislation such as the Sarbanes- Oxley
Auditors Need to Know June 13th, 2012. ISACA COBIT 5 for Assurance
COBIT 5 What s New, What Auditors Need to Know June 13th, 2012 Anthony Noble Viacom Inc. ISACA COBIT 5 for Assurance Task Force Chair Special thanks to Derek Oliver & ISACA for supplying material for this
Application for CISM Certification
Application for CISM Certification 4/2015 Requirements to Become a Certified Information Security Manager become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade
IT Governance Dr. Michael Shaw Term Project
IT Governance Dr. Michael Shaw Term Project IT Auditing Framework and Issues Dealing with Regulatory and Compliance Issues Submitted by: Gajin Tsai [email protected] May 3 rd, 2007 1 Table of Contents: Abstract...3
ISACA is responding to the PCAOB questions principally from an information technology (IT) perspective.
3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 17 December 2007 Office of the Secretary Public
Revised October 2013
Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience
Application for CISA Certification
Application for CISA Certification 4/2015 Requirements to Become a Certified Information Systems Auditor become a Certified Information Systems Auditor (CISA), an applicant must: 1. Score a passing grade
Enabling Information PREVIEW VERSION
Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a
Presented by. Denis Darveau CISM, CISA, CRISC, CISSP
Presented by Denis Darveau CISM, CISA, CRISC, CISSP Las Vegas ISACA Chapter, February 19, 2013 2 COBIT Definition Control Objectives for Information and Related Technology (COBIT) is an IT governance framework
the role of the head of internal audit in public service organisations 2010
the role of the head of internal audit in public service organisations 2010 CIPFA Statement on the role of the Head of Internal Audit in public service organisations The Head of Internal Audit in a public
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected]
Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA
Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International
Practice Guide COORDINATING RISK MANAGEMENT AND ASSURANCE
Practice Guide COORDINATING RISK MANAGEMENT AND ASSURANCE March 2012 Table of Contents Executive Summary... 1 Introduction... 1 Risk Management and Assurance (Assurance Services)... 1 Assurance Framework...
ow to use CobiT to assess the security & reliability of Digital Preservation
ow to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14-16 April 2004 Greet Volders Managing Consultant - VOQUALS N.V. Vice President & in charge of Education
for Information Security
for Information Security The following pages provide a preview of the information contained in COBIT 5 for Information Security. The publication provides guidance to help IT and Security professionals
Background. Audit Quality and Public Interest vs. Cost
Basis for Conclusions: ISA 600 (Revised and Redrafted), Special Considerations Audits of Group Financial Statements (Including the Work of Component Auditors) Prepared by the Staff of the International
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia MARIO SPREMIĆ, Ph.D., CGEIT, Full Professor Faculty of Economics and Business Zagreb, University of Zagreb
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Revised: October 2012 i Table of contents Attribute Standards... 3 1000 Purpose, Authority, and Responsibility...
S11 - Implementing IT Governance An Introduction Debra Mallette
S11 - Implementing IT Governance An Introduction Debra Mallette S11 - Introduction to IT Governance Implementation using COBIT and Val IT Speaker: Debra Mallette, CGEIT, CISA, CSSBB Session Objectives
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Introduction to the International Standards Internal auditing is conducted in diverse legal and cultural environments;
COBIT 4.1 TABLE OF CONTENTS
COBIT 4.1 TABLE OF CONTENTS Executive Overview....................................................................... 5 COBIT Framework.........................................................................
Director, IT Security District Office Kern Community College District JOB DESCRIPTION
Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,
INFORMATION TECHNOLOGY FLASH REPORT
INFORMATION TECHNOLOGY FLASH REPORT ISACA Releases COBIT 5: Updated Framework for the Governance and Management of IT May 18, 2012 In April, ISACA released COBIT 5 as a replacement for its current globally
Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.
Application for CRMP Certification (part 1) GRCSI is now offering the Certified Risk Management Professional (CRMP) certification to support and recognize professionals who have skills and experience in
Public Sector Internal Audit Standards. Applying the IIA International Standards to the UK Public Sector
Public Sector Internal Audit Standards Applying the IIA International Standards to the UK Public Sector Issued by the Relevant Internal Audit Standard Setters: In collaboration with: Public Sector Internal
Internal Audit Standards
Internal Audit Standards Department of Public Expenditure & Reform November 2012 Copyright in material supplied by third parties remains with the authors. This includes: - the Definition of Internal Auditing
BOARD OF EDUCATION OF BALTIMORE COUNTY OFFICE OF INTERNAL AUDIT - OPERATIONS MANUAL INTERNAL AUDIT OPERATIONS MANUAL
BOARD OF EDUCATION OF BALTIMORE COUNTY INTERNAL AUDIT OPERATIONS MANUAL BACKGROUND The Office of Internal Audit Operations Manual was developed to be used as a guide and resource for the Office of Internal
COBIT 5 Introduction. 28 February 2012
COBIT 5 Introduction 28 February 2012 COBIT 5 Executive Summary 2012 ISACA. All rights reserved. 2 Information! Information is a key resource for all enterprises. Information is created, used, retained,
Benchmark of controls over IT activities. 2011 Report. ABC Ltd
www.pwc.com/cy Benchmark of controls over IT activities 2011 Report ABC Ltd... 2012 Scope and approach We wish to provide you with our IT Benchmarking report over IT activities at ABC Ltd (the Company)
ISACA. Trust in, and value from, information systems. www.isaca.org
ISACA Trust in, and value from, information systems www.isaca.org 2011 CISM Review Course Introduction ISACA Facts Founded in 1969 as the EDP Auditors Association More than 86,000 members in over 160 countries
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
Reporting on Control Procedures at Outsourcing Entities
Auditing Guidance Statement AGS 1042 (July 2002) Reporting on Control Procedures at Outsourcing Entities Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation
Public Sector Internal Audit Standards
Public Sector Internal Audit Standards Table of Contents Section 1 Introduction 3 Section 2 Applicability 6 Section 3 Definition of Internal Auditing 8 Section 4 Code of Ethics 9 Section 5 Standards 12
Special Purpose Reports on the Effectiveness of Control Procedures
Auditing Standard AUS 810 (July 2002) Special Purpose Reports on the Effectiveness of Control Procedures Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation
IT Compliance 24.09.2007. After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM)
IT Compliance 24.09. AHS After Hours Seminar Zurich Improving IT Risk & Compliance Management (RCM) Bruno J. Wiederkehr Member of the Board ISACA Switzerland Chapter Agenda 1. Understanding the RCM Requirements
ITIL AND COBIT EXPLAINED
ITIL AND COBIT EXPLAINED 1 AGENDA Overview of Frameworks Similarities and Differences Details on COBIT Framework (based on version 4.1) Details on ITIL Framework, focused mainly on version.2. Comparison
Comparison of ISA 330 with AS-402 Objectives and Requirements Only
Comparison of ISA 330 with AS-402 Objectives and Requirements Only International Standard on Auditing 330 (Redrafted): The Auditor s INTRODUCTION Scope of this ISA 1. This International Standard on Auditing
Chayuth Singtongthumrongkul
IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional
Quality Assurance Checklist
Internal Audit Foundations Standards 1000, 1010, 1100, 1110, 1111, 1120, 1130, 1300, 1310, 1320, 1321, 1322, 2000, 2040 There is an Internal Audit Charter in place Internal Audit Charter is in place The
Best Value toolkit: Information management
Best Value toolkit: Information management Prepared by Audit Scotland July 2010 Contents Introduction 2 The Audit of Best Value 2 The Best Value toolkits 4 Using the toolkits 4 Auditors evaluations 5 Best
CONSULTATION PAPER ON RISK MANAGEMENT AND INTERNAL CONTROL: REVIEW OF THE CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT
CONSULTATION PAPER ON RISK MANAGEMENT AND INTERNAL CONTROL: REVIEW OF THE CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT June 2014 CONTENTS Page No. CONTENTS... 1 EXECUTIVE SUMMARY... 1 CHAPTER
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Public Sector Internal Audit Standards. Applying the IIA International Standards to the UK Public Sector
Public Sector Internal Audit Standards Applying the IIA International Standards to the UK Public Sector Issued by the Relevant Internal Audit Standard Setters: In collaboration with: Public Sector Internal
Internal Auditing Guidelines
Internal Auditing Guidelines Recommendations on Internal Auditing for Lottery Operators Issued by the WLA Security and Risk Management Committee V1.0, March 2007 The WLA Internal Auditing Guidelines may
Audit, Risk Management and Compliance Committee Charter
Audit, Risk Management and Compliance Committee Charter Woolworths Limited Adopted by the Board on 27 August 2013 page 1 1 Introduction This Charter sets out the responsibilities, structure and composition
All about CPEs. David Gittens CISA CISM CISSP CRISC HISP
All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and
NHS DORSET CLINICAL COMMISSIONING GROUP GOVERNING BODY INFORMATION GOVERNANCE TOOLKIT REPORT
NHS DORSET CLINICAL COMMISSIONING GROUP GOVERNING BODY INFORMATION GOVERNANCE TOOLKIT REPORT 9.7 Date of the meeting 15/07/2015 Author Sponsoring Clinician Purpose of Report Recommendation J Green - Head
Accredited Body Report CPA Australia. For the period ended 30 June 2013
Accredited Body Report CPA Australia For the period ended 30 June 2013 Financial Markets Authority Website: www.fma.govt.nz Auckland Office Level 5, Ernst & Young Building 2 Takutai Square, Britomart PO
Achieve. Performance objectives
Achieve Performance objectives Performance objectives are benchmarks of effective performance that describe the types of work activities students and affiliates will be involved in as trainee accountants.
Candidate s Guide to the CISM Exam and Certification
2013 Candidate s Guide to the CISM Exam and Certification CISM Exams 2013 Important Date Information Exam Date 8 June 2013 Early registration deadline: 13 February 2013 Final registration deadline: 12
ITAG RESEARCH INSTITUTE
ITAG RESEARCH INSTITUTE Control and Governance Maturity Survey Establishing a reference benchmark and a self-assessment tool Erik Guldentops Wim Van Grembergen Steven De Haes Control and Governance Maturity
Guidance for audit committees. The internal audit function
Guidance for audit committees The internal audit function March 2004 The Combined Code on Corporate Governance July 2003 C.3 Audit Committee and Auditors Main Principle: The board should establish formal
OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia, CISA, CRISC Senior
Roles, Activities and Relationships
and in COBIT 5 Objective: Value Creation Benefits Realisation Risk Resource Enablers Scope Roles, Activities and Relationships Source: COBIT 5, figure 8 Key Roles, Activities and Relationships Roles, Activities
Nurse Practitioner Mentor Guideline NPAC-NZ
Nurse Practitioner Mentor Guideline NPAC-NZ Purpose To provide a framework for the mentorship of registered nurses to prepare for Nurse Practitioner (NP) registration from the Nursing Council of New Zealand.
ITAF. 3 rd Edition. A Professional Practices Framework for IS Audit/Assurance
ITAF 3 rd Edition A Professional Practices Framework for IS Audit/Assurance About ISACA With more than 115,000 constituents in 180 countries, ISACA (www.isaca.org) helps business and IT leaders build trust
Chief Information Officer
Security manager Job description Job title Security manager Location Wellington Group Organisation Development Business unit / team IT Solutions Grade and salary range Pay Group 1, Pay Band 6 Reports to
INTERNATIONAL FRAMEWORK FOR ASSURANCE ENGAGEMENTS CONTENTS
INTERNATIONAL FOR ASSURANCE ENGAGEMENTS (Effective for assurance reports issued on or after January 1, 2005) CONTENTS Paragraph Introduction... 1 6 Definition and Objective of an Assurance Engagement...
Effective Internal Audit in the Financial. Services Sector. Non Executive Directors (NEDs) and the Management of Risk
Consultation document Effective Internal Audit in the Financial A survey of heads of internal audit Services Sector Non Executive Directors (NEDs) and the Management of Risk Draft recommendations to the
Strategic IT audit. Develop an IT Strategic IT Assurance Plan
Strategic IT audit Develop an IT Strategic IT Assurance Plan Speaker Biography Hans Henrik Berthing is Partner at Verifica and Senior Advisor & Associated Professor at Aalborg University. He is specialized
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
COSO s 2013 Internal Control Framework in Depth: Implementing the Enhanced Guidance for Internal Control over External Financial Reporting
in Depth: Implementing the Enhanced Guidance for Internal Control over External Financial Reporting Table of Contents EXECUTIVE SUMMARY... 3 BACKGROUND... 3 SIGNIFICANT CHANGES AFFECTING INTERNAL CONTROL
Internal Audit Manual
Internal Audit Manual Version 1.0 AUDIT AND EVALUATION SECTOR AUDIT AND ASSURANCE SERVICES BRANCH INDIAN AND NORTHERN AFFAIRS CANADA April 25, 2008 #933907 Acknowledgements The Institute of Internal Auditors
Goodbye, SAS 70! Hello, SSAE 16!
Goodbye, SAS 70! Hello, SSAE 16! A Session to Provide Insight on the New Standard and What Service Providers and End-Users Need to Know January 3, 2012 Agenda Introduction Background on what was SAS 70
GOVERNMENT INTERNAL AUDIT COMPETENCY FRAMEWORK
GOVERNMENT INTERNAL AUDIT COMPETENCY FRAMEWORK March 2007 Government Internal Audit Profession This framework has been compiled by the Assurance, Control and Risk Team and the PSG Competency Framework
Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning
Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.
Informing the audit risk assessment for West Midlands Integrated Transport Authority Pension Fund
Informing the audit risk assessment for West Midlands Integrated Transport Authority Pension Fund Year ended 31 March 2015 February 2015 John Gregory Engagements Lead T 07880 456 107 E [email protected]
INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE
INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE CHARTERED INSTITUTE OF INTERNAL AUDIT DEFINITION OF INTERNAL AUDIT Internal auditing is an independent, objective assurance and consulting activity designed
Audit Quality Thematic Review
Thematic Review Professional discipline Financial Reporting Council December 2014 Audit Quality Thematic Review The audit of loan loss provisions and related IT controls in banks and building societies
Performance objectives
Performance objectives are benchmarks of effective performance that describe the types of work activities students and affiliates will be involved in as trainee accountants. They also outline the values
Terms of Reference for an IT Audit of
National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor
Exposure Draft: Improving the Structure of the Code of Ethics for Professional Accountants Phase 1
Ken Siong IESBA Technical Director IFAC 6 th Floor 529 Fifth Avenue New York 10017 USA 22 April 2016 Dear Mr Siong Exposure Draft: Improving the Structure of the Code of Ethics for Professional Accountants
Fundamental Principles of Public-Sector Auditing
ISSAI 100 The International Standards of Supreme Audit Institutions, or ISSAIs, are issued by INTOSAI, the International Organisation of Supreme Audit Institutions. For more information visit www.issai.org
WHITE PAPER. Sarbanes - Oxley Section 404: How BMC Software Solutions Address General IT Control Requirements
WHITE PAPER Sarbanes - Oxley Section 404: How BMC Software Solutions Address General IT Control Requirements TABLE OF CONTENTS Executive Summary 2 Sarbanes-Oxley Section 404 Internal Controls 3 IT Involvement
THE BOARD S ROLE AND RESPONSIBILITIES OVER THE CONTROL ENVIRONMENT. Session 4
THE BOARD S ROLE AND RESPONSIBILITIES OVER THE CONTROL ENVIRONMENT Session 4 Road Map of Presentation Review of the key responsibilities of the Board - the direct links to the IC System & IA function Analyze
Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3
Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Outline What is IT Service Management What is ISO 20000 Step by step implementation
Financial and Asset Management. Glossary of Terms and Abbreviations
Financial and Asset Management Glossary of Terms and Abbreviations ABP see Annual Business Plan Accrual accounting: An accounting approach by which expenses, revenue, assets and liabilities are recognised
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
SPG 223 Fraud Risk Management. June 2015
SPG 223 Fraud Risk Management June 2015 Disclaimer and copyright This prudential practice guide is not legal advice and users are encouraged to obtain professional advice about the application of any legislation
Objective...1 Scope...1 Rationale...2
Objective...1 Scope...1 Rationale...2 PART I: ORGANISATION OF INTERNAL AUDIT FUNCTION...4 1. OVERVIEW...4 2. AUDIT COMMITTEE...4 3. INDEPENDENCE AND OBJECTIVITY...5 4. PROFESSIONAL PROFICIENCY...7 5. RELATIONSHIP
Major Project Governance Assessment Toolkit
Major Project Governance Assessment Toolkit Mark Ritchie, University of Edinburgh Pauline Woods-Wilson, Lancaster University Project and Change Management Group Project and Change Management Group Established
