Final Audit Report. Audit of Data Integrity MCCS Feeder System Interfacing with SAP
|
|
|
- Megan Joanna Henderson
- 10 years ago
- Views:
Transcription
1 Final Audit Report Audit of Data Integrity MCCS Feeder System Interfacing with SAP April 2008
2 Table of Contents Executive Summary... ii Introduction Background... 1 Audit Objectives... 1 Scope and Approach... 2 Findings, Recommendations and... 2 Completeness and Accuracy of Data...2 Output Balancing and Reconciliation... 2 General Controls Environment...3 Management Review of User Accounts... 3 User Access Rights... 4 Data Integrity Provisions... 5 Off-site Backup Storage... 6 Systems Development Life Cycle Procedures... 7 Health Canada Page i
3 Executive Summary The Management of Contracts and Contributions System (MCCS) was introduced in all regions of the Health Canada First Nations Inuit Health Branch (FNIHB) in December 2001, with full implementation in April MCCS is an electronic system implemented nationally to enhance the Branch's ability to report, monitor, and audit its contracts and contribution agreements (CCA's). Health Canada s Framework for Integrated Resource Management System (FIRMS) uses SAP version R/3 for entering transactions, interfacing with various internal systems. MCCS is one of these feeder systems that provide data to SAP. MCCS processed approximately $827 million dollars of grant and contributions in Fiscal Year The two objectives of the audit were to: determine the quality of the data, in terms of completeness and accuracy, of systems that interface with FIRMS/SAP; and provide an overall assessment of the internal control environment around MCCS. The review was conducted by the in accordance with the Government of Canada s Policy on Internal Audit Based on results from detailed testing of both MCCS and SAP, it was determined that the data being interfaced with SAP is accurate. The completeness of the data that is being interfaced with SAP could not be determined because MCCS does not generate control totals to compare input and output with SAP. This is a necessary control required to balance the data that is being interfaced from MCCS to SAP. There is a risk of not knowing if all of the data has been interfaced with SAP. At the time the audit was conducted, FNIHB was in the process of adding this functionality to MCCS. The general controls environment overall is operating satisfactorily, however, there needs to improved monitoring of super user access as well as improvements to the documentation regarding operating procedures. Health Canada Page ii
4 Introduction Background The Management of Contracts and Contributions System (MCCS) was introduced in all regions of Health Canada First Nations Inuit Health Branch (FNIHB) in December 2001, with full implementation in April MCCS is an electronic system implemented nationally to enhance the Branch's ability to report, monitor, and track information related to its contracts and contribution agreements (CCA's) Health Canada s Framework for Integrated Resource Management System (FIRMS) uses SAP for entering transactions, interfacing with various internal systems such as the Management of Contributions & Contracts (MCCS). The data within SAP is used to generate financial and management reports which provide management with information to effectively manage the Department s financial resources. The audit was undertaken by the in accordance with the Health Canada Risk-Based Audit Plan, for the period to , which was approved by the Departmental Audit and Evaluation Committee on October 4, The audit was conducted in accordance with the Government of Canada s Policy on Internal Audit Audit Objectives The two objectives of this audit were to: determine the quality of the data, in terms of completeness and accuracy, of systems that interface with FIRMS/SAP; and provide an overall assessment of the internal control environment around MCCS. The lines of enquiry for the audit included: automated field edits in the MCCS system; controls to ensure that all data was successfully interfaced; transaction controls; error processing; segregation of responsibilities; access controls; and problem management. Health Canada Page 1 of 8
5 Scope and Approach The scope of the audit focused on the integrity of data in MCCS which is interfaces with SAP. The audit also included an assessment of the internal control environment around MCCS. For the period April 1, 2005 to March 31, 2006, we have been able to identify the total value of all G&Cs interfaced from MCCS to FIRMS as approximately $827 million. The audit of the MCCS interface was conducted in the National Capital Region. The audit consisted mainly of interviews with departmental officials of Health Canada, a review of relevant documentation and tests of the general computer controls and application controls associated with the MCCS to SAP interface. As the audit was conducted early in 2007, complete fiscal year data did not exist. Accordingly, a decision was made to examine the interface files from January 1 to December 31, Evidence gathered and analysed consisted of the actual data files transferred from MCCS to SAP during the calendar year Specific tests were conducted in the Ontario Region. The interface files were verified to the information reported in the actual Program/Finance files. The project was conducted in accordance with the Government of Canada s Policy on Internal Audit. The audit was conducted using ISACA s COBIT (Control Objectives for Information and Related Technology) which is an IT governance model A general controls review was conducted to gain an overall impression of the controls that are present in the MCCS environment. The application controls review included validation of various data inputs, logical access control and authorization and exception handling and logging. Findings, Recommendations and Completeness and Accuracy of Data Output Balancing and Reconciliation Procedures should exist to ensure output is routinely balanced to the relevant control totals. Audit trails should exist and facilitate the tracing of transaction processing and the reconciliation of disrupted data. We attempted to select a sample of interface files to generate a control total for each file. We then attempted to verify the calculated control total with the actual SAP interface control total for the dates of the interfaces. This reconciliation could not be accomplished because neither the MCCS system nor the SAP system is programmed to generate any control totals for the interface. Health Canada Page 2 of 8
6 Without control totals, management is at risk of not knowing whether all the information from MCCS was actually interfaced into SAP. However, the compensating control is that a recipient will likely notify the department if they have not received the correct payment within the appropriate time frame. Recommendation No. 1 (BPMD), First Nations Inuit Health Branch (FNIHB), develop a SAP/MCCS reconciliation process. Accept. Management is aware of this situation and is currently developing an automated SAP/MCCS reconciliation process. This has been implemented as of October 26, General Controls Environment Management Review of User Accounts Management should have a control process in place to review and confirm access rights periodically. A periodic comparison of resources with recorded accountability should be made to help reduce the risk of errors, fraud, misuse or unauthorized alteration. We found no policy enforcing formal standard operating procedures for Database Administrators (DBAs) and Super User access reviews: formal procedures for the management review of DBA and Operating System level Super User access is not available or documented; and 11 out of 17 user account change requests did not identify the reason for the change. Only the job function related to the user privilege was identified. Since no policy for access review is documented, the department is exposed to the risk that certain access privileges that are no longer required, are still in effect with the potential for misuse. Management is also at risk of not knowing the reason for granting access privileges or changing privileges. Health Canada Page 3 of 8
7 Recommendation No. 2 (BPMD), First Nations Inuit Health Branch (FNIHB): a) request that the Chief Information Officer (CIO) establish and document standard operating procedures for monitoring the activities of the MCCS DBA and Super Users with access to the operating system; and b) ensure that the MCCS User Access Request Form is enhanced to capture the reason for modifying privileges on an existing MCCS account. a) Accept. The Director General, BPMD has consulted the CIO of Health Canada who will provide standard operating procedures for monitoring the activities of the MCCS DBA and Super Users. b) Accept. The MCCS account request form will be enhanced to capture the reason for privilege modification. User Access Rights User access rights to systems should be centrally managed and based on defined and documented business needs and job requirements. User access rights are requested/approved by user management and implemented by MCCS account administrator (and partially by a Health Canada Novell LAN administrator). Procedures should also exist to ensure that only authorized staff members perform data input. User access rights to the MCCS system are centrally managed by the MCCS Support Team of Business Planning and Management Directorate (BPMD) of FNIHB. User access rights are based on defined and documented business needs, job requirements. They are requested/approved by user management and implemented by the MCCS Support Team. Every six months the MCCS Support Team produces a report identifying current users of MCCS. This report is sent to regional managers for review. We reviewed the report for the Ontario region and found that 14 of the 27 Ontario users had not logged onto MCCS since In addition, no formal procedures were found for granting and approving privileges for the DBAs or for Super User Access to the operating system. DBA accounts are administered by the CIO, not BPMD, and are not subject to the same level of supervision as MCCS user accounts. The difference in the level of supervision is because the DBA requires direct access to the MCCS Oracle database whereas MCCS users do not have access to the MCCS Oracle database. The department is exposed to the risk that a member of the DBA team or a Super User may perform tasks that are not detected and are not within the expectations of the MCCS management team. There is also a risk of unauthorized access to the MCCS database. Health Canada Page 4 of 8
8 Recommendation No. 3 (BPMD), First Nations Inuit Health Branch (FNIHB): a) request that the CIO implement and document standard DBA operating procedures for approving privileges for DBAs and Super User Access to the operating system; and b) instruct all regions to carefully review the date of last access of users and deactivate user accounts for users not accessing MCCS over a predetermined number of months. a) Accept. The Director General, BPMD has consulted the CIO and they will take responsibility for implementing and documenting of standard operating procedures for approving privileges for DBAs and Super Users. b) Accept. Regional account managers will continue to perform the six month review of all accounts in their region with emphasis on the date of last access. Data Integrity Provisions Procedures should exist to ensure that, where applicable, application programs contain provisions which routinely verify the tasks performed by the software to help ensure data integrity, and to provide the restoration of the integrity through rollback (a database management software feature that reverses the current transaction out of the database, returning the data to its former state). A rollback is performed when transaction processing fails at some point, and it is necessary to start over. Routine procedures that help to ensure data integrity should be documented. Procedures for maintaining data integrity are not documented because the department has no policy enforcing the documentation of standard DBA operating procedures. There is a risk that if the DBA or their backup are not available, a replacement DBA may have to spend considerable time investigating which database maintenance procedures are required and how to perform the maintenance procedures. This may cause delays in database recovery. Health Canada Page 5 of 8
9 Recommendation No. 4 (BPMD), First Nations Inuit Health Branch (FNIHB), request that the CIO document all the procedures for ensuring data integrity and correcting database problems. Accept. The Director General, BPMD has consulted the CIO and they will prepare procedures for ensuring data integrity and correcting database problems. Off-site Backup Storage Off-site storage of critical backup media, documentation and other IT resources should be established to support recovery and business continuity plans. Formalized standard operating procedures for off-site backup storage do not exist. We interviewed the Oracle DBA for MCCS and also interviewed staff in the Network Systems Services Centre (NSSC) server group. We learned that backup tapes are created and rotated daily, weekly, monthly and annually. The daily and weekly rotations are kept on site at the data centre. The monthly and annual tapes are kept off-site. NSSC tracks the tapes that were recalled or shipped between the data centre and the off-site storage location. We found no evidence of reports or logs created to ensure that successful backups were actually performed. The lack of reports or logs is due to the lack of requirement to document backup procedures. There is a risk that specific data archives may not be at the off-site facility or available for restore purposes when needed. Recommendation No. 5 (BPMD), First Nations Inuit Health Branch (FNIHB) request that the CIO document backup and off-site storage procedures. These procedures should include at least: instructions for performing the backups; instructions for verifying that the backup worked properly; instructions for verifying that the backup file device can be used to successfully restore the database(s); instructions for properly labeling the backup file device; instructions for shipping the backup file device for the off-site storage instructions for receiving the backup file device back from off-site storage; retention periods for the backup storage device; and Health Canada Page 6 of 8
10 instructions for monitoring the backup process and transmission of backup media between the data centre and the off-site storage facility. Accept. The Director General, BPMD has consulted the CIO, and they will provide documentation for database backup and off-site storage procedures. Systems Development Life Cycle Procedures Health Canada s System Development Life Cycle (SDLC) methodology requires that: adequate mechanisms for defining and documenting the input requirements for any application or system development or modification project; all external and internal interfaces are properly specified, designed and documented; and adequate mechanisms exist for defining and documenting the output requirements for any application or system development or modification project. There is no formal documented SDLC methodology. Mechanisms for defining and documenting input requirements or input changes are done via the MCCS tracking database. MCCS is a Commercial Off The Shelf (COTS) application originally customized to meet the needs of FNIHB. Any source code changes and table changes must be performed by the vendor. The MCCS support team can only make limited changes to the values of certain editable data fields. No input or output field level changes can be performed since SAP required input fields cannot be changed and MCCS output file formats are hard coded in MCCS and can only be changed by the vendor of MCCS. Although the external interface formats to SAP have been predetermined and implemented, there are no general guidelines or methodology to specify how external and internal MCCS interfaces are to be specified, designed or documented in the future. Also, there are no mechanisms for defining and documenting the MCCS output requirements to SAP. Without a documented SDLC there is a risk that in a MCCS development or maintenance project business requirements and functionality for data interfaces may be missed or implemented incorrectly. Recommendation No. 6 (BPMD), First Nations Inuit Health Branch (FNIHB), use an SDLC methodology to document the MCCS-SAP interface. Health Canada Page 7 of 8
11 Accept. A document will be prepared to identify and describe the current MCCS-SAP interface process. Health Canada Page 8 of 8
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
Internal Control Deliverables. For. System Development Projects
DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
General IT Controls Audit Program
Contributed February 5, 2002 by Paul P Shotter General IT Controls Audit Program Purpose / Scope Perform a General Controls review of Information Technology (IT). The reviews
DETAIL AUDIT PROGRAM Information Systems General Controls Review
Contributed 4/23/99 by Steve_Parker/TBE/[email protected] DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
FairWarning Mapping to PCI DSS 3.0, Requirement 10
FairWarning Mapping to PCI DSS 3.0, Requirement 10 Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are
Oregon Employment Department: Computer Programs for Unemployment Tax Returns and Claims Need Attention
Secretary of State Audit Report Jeanne P. Atkins, Secretary of State Gary Blackmer, Director, Audits Division Oregon Employment Department: Computer Programs for Unemployment Tax Returns and Claims Need
PART 10 COMPUTER SYSTEMS
PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
Audit of NSERC Award Management Information System
Internal Audit Audit Report Audit of NSERC Award Management Information System TABLE OF CONTENTS 1. EXECUTIVE SUMMARY... 2 2. INTRODUCTION... 3 3. AUDIT FINDINGS- BUSINESS PROCESS CONTROLS... 5 4. AUDIT
San Francisco Chapter. Information Systems Operations
Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Business Continuity Planning
Information Systems Audit and Control Association www.isaca.org Business Continuity Planning AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE The Information Systems Audit and Control Association With more
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Department of Public Utilities Customer Information System (BANNER)
REPORT # 2010-06 AUDIT of the Customer Information System (BANNER) January 2010 TABLE OF CONTENTS Executive Summary..... i Comprehensive List of Recommendations. iii Introduction, Objective, Methodology
April 2010. promoting efficient & effective local government
Department of Public Works and Environmental Services Department of Information Technology Fairfax Inspections Database Online (FIDO) Application Audit Final Report April 2010 promoting efficient & effective
2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.
3 Audit Trail Files Data generated during the creation of a master file or database, used to validate a master file or database during a processing cycle. GS 14020 Retain for 3 backup cycles Computer Run
Audit of Policy on Internal Control Information Technology General Controls (ITGCs) Audit
D.2.1D Audit of Policy on Internal Control Information Technology General Controls (ITGCs) Audit Office of the Chief Audit Executive Audit and Assurance Services Directorate March 2015 Cette publication
Information Systems and Technology
As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons
IT Sr. Systems Administrator
IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Information Technology Auditing for Non-IT Specialist
Information Technology Auditing for Non-IT Specialist IIA Pittsburgh Chapter October 4, 2010 Agenda Introductions What are General Computer Controls? Auditing IT processes controls Understanding and evaluating
Internal Audit Department NeighborWorks America. Audit Review of Database Administration and Controls
Department NeighborWorks America Audit Review of Database Administration and Controls Project Number: IM.DATADMN.2013 Audit Review of Database Administration and Controls Table of Contents Project Completion
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
LIVINGSTON COUNTY CREDIT CARD PROCEDURES
LIVINGSTON COUNTY CREDIT CARD PROCEDURES INTRODUCTION Livingston County is introducing an alternative approach to purchasing products and services through the use of credit cards. A credit card purchase
3.11 System Administration
3.11 The functional area is intended to contribute to the overall flexibility, efficiency, and security required for operating and maintaining the system. Depending on the architecture of the system, system
OIG. Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center. Audit Report OFFICE OF INSPECTOR GENERAL
OIG OFFICE OF INSPECTOR GENERAL Catalyst for Improving the Environment Audit Report Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center Report No. 2003-P-00011 May
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02
Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02 BACKGROUND OBJECTIVES, SCOPE, AND METHODOLOGY FINDINGS INFORMATION SECURITY PROGRAM AUDIT FOLLOW-UP CATS SECURITY PROGRAM PLANNING
15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
How To Use A Court Record Electronically In Idaho
Idaho Judicial Branch Scanning and Imaging Guidelines DRAFT - October 25, 2013 A. Introduction Many of Idaho s courts have considered or implemented the use of digital imaging systems to scan court documents
Circular to All Licensed Corporations on Information Technology Management
Circular 16 March 2010 Circular to All Licensed Corporations on Information Technology Management In the course of our supervision, it has recently come to our attention that certain deficiencies in information
General Computer Controls
1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems
White Paper. Regulatory Compliance and Database Management
White Paper Regulatory Compliance and Database Management March 2006 Introduction Top of mind in business executives today is how to meet new regulatory compliance and corporate governance. New laws are
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
COMPUTER OPERATIONS - BACKUP AND RESTORATION
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES COMPUTER OPERATIONS - BACKUP AND RESTORATION FINAL AUDIT REPORT Chief of Audits: Julie Nieminski, CPA, CIA, CFE, CISA, MPA
Oracle Database Review Security Controls and Other Issues Toronto Public Library Management Response
Oracle Database Review Security Controls and Other Issues Toronto Public Library Management Response Recommendation City Management Response TPL Management Response Status and Timeline for implementation
ACCOUNTING POLICIES AND PROCEDURES
Unit: Subject: Sarbanes-Oxley Act Review - Financial Reporting Title: Risk & Control Identification Year end: ACCOUNTING POLICIES AND PROCEDURES Management should define and communicate accounting principles.
FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference
FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS Workpaper Reference Date(s) Completed Organization and Staffing procedures used to define the organization of the IT Department. 2. Review the organization
Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls
Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.
U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
MANAGEMENT AUDIT REPORT DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION
MANAGEMENT AUDIT REPORT OF DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION REPORT NO. 13-101 City of Albuquerque Office of Internal Audit
DATABASE ANALYST I DATABASE ANALYST II
CITY OF ROSEVILLE DATABASE ANALYST I DATABASE ANALYST II DEFINITION To perform professional level work in designing, installing, managing, updating, and securing a variety of database systems, including
Auditing in an Automated Environment: Appendix C: Computer Operations
Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations
Introduction to Change
Introduction to Management and SDLC Steve Owyoung Sr. Manager KPMG LLP, IT Advisory Doug Mohrland Audit Manager Oracle Corporation Discussiontopics o significance o o s o o o o Software (SDLC) s Organization
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
Master Document Audit Program
Activity Code 11510 B-1 Planning Considerations Information Technology General System Controls Audit Specific Independence Determination Members of the audit team and internal specialists consulting on
FINANCIAL ADMINISTRATION MANUAL
Issue Date: September 2009 Effective Date: Immediate Chapter: Accounting for Expenditures Responsible Agency: Office of the Comptroller General Directive No: 706-3 Directive Title: ACCOUNTING CONTROLS
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
IT Application Controls Questionnaire
IT Application Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks A1.a. MULTIPLE USER PROCESSING INPUT CONTROLS Input controls are the procedures and methods utilized by
OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia,
This policy is not designed to use systems backup for the following purposes:
Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa
The Bureau of the Fiscal Service. Privacy Impact Assessment
The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal
Audit of the Financial Management Control Framework - Revenue
N A T I O N A L R E S E A R C H C O U N C I L C A N A D A Audit of the Financial Management Control Framework - Revenue I n t e r n a l A u d i t, N R C N O V E M B E R 2011 1.0 Executive Summary and
SAS 70 Questionnaire
227 Oil Well Road Telephone: (731) 427-8571 Jackson, TN 38305 Fax: (731) 424-5701 Members of: American Institute of Certified Public Accountants Governmental Audit Quality Center AICPA Tennessee Society
PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE. EIIP Volume VI
Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT APPENDIX E PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 This page is intentionally left blank.
Information Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
July 12, 2013 Page 1 of 5 BellHawk Systems Corporation
BellHawk Compliance with CFR 21 Part 11 Introduction This document details the compliance of the BellHawk software with CFR 21 Part 11 (Part 11) dated March 20, 1997 and the document General Principles
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Privacy Impact Assessment for TRUFONE Inmate Telephone System
Federal Bureau of Prisons Privacy Impact Assessment for TRUFONE Inmate Telephone System Issued by: Sonya D. Thompson Reviewed by: Approved by: Vance E. Hitch, Chief Information Officer, Department of Justice
NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation
This document has been archived and replaced by piaauthentx1207..0 National Science Foundation NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment Version: 1.1 Date: 12/04/2006 Table
Office of the City Auditor. Audit Report. AUDIT OF ACCOUNTS PAYABLE APPLICATION CONTROLS (Report No. A10-003) October 2, 2009.
CITY OF DALLAS Dallas City Council Office of the City Auditor Audit Report Mayor Tom Leppert Mayor Pro Tem Dwaine Caraway Deputy Mayor Pro Tem Pauline Medrano Council Members Jerry R. Allen Tennell Atkins
TOSM Server Backup Service
TOSM Server Backup Service Memorandum of Understanding The department of Technology Operations and Systems Management (TOSM) provides its customers with various IT-related services, including backups.
SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures
1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities
Information System Audit Report Office Of The State Comptroller
STATE OF CONNECTICUT Information System Audit Report Office Of The State Comptroller AUDITORS OF PUBLIC ACCOUNTS KEVIN P. JOHNSTON ROBERT G. JAEKLE TABLE OF CONTENTS EXECUTIVE SUMMARY...1 AUDIT OBJECTIVES,
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Audit of IT Asset Management Report
Audit of IT Asset Management Report Recommended by the Departmental Audit Committee for approval by the President on Approved by the President on September 4, 2012 e-doc : 3854899 1 Table of Contents EXECUTIVE
