San Francisco Chapter. Information Systems Operations



Similar documents
Auditing in an Automated Environment: Appendix C: Computer Operations

This policy is not designed to use systems backup for the following purposes:

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference

INFORMATION TECHNOLOGY CONTROLS

Services Providers. Ivan Soto

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

Tailored Technologies LLC

Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015

Information Technology General Controls (ITGCs) 101

SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT IT Backup, Recovery and Disaster Recovery Planning

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

15 Organisation/ICT/02/01/15 Back- up

Education and Workforce Development Cabinet POLICY/PROCEDURE. Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

Domain 1 The Process of Auditing Information Systems

7Seven Things You Need to Know About Long-Term Document Storage and Compliance

Master Document Audit Program

DETAIL AUDIT PROGRAM Information Systems General Controls Review

2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.

IT Sr. Systems Administrator

Information Technology Division. Customer Service Support Center

1. Backup and Recovery Policy

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Call: Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

Gatekeeper PKI Framework. February Registration Authority Operations Manual Review Criteria

Backup Policy (ITP004) Information Technology Services Department

PART 10 COMPUTER SYSTEMS

PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE. EIIP Volume VI

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

Hong Kong Baptist University

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Final Audit Report. Audit of Data Integrity MCCS Feeder System Interfacing with SAP

CENTER FOR NUCLEAR WASTE REGULATORY ANALYSES

APPENDIX 2A.1 TO SCHEDULE 2A Revision 1

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exploiting the Virtual Tape System for Enhanced Vaulting & Disaster Recovery A White Paper by Rocket Software. Version 2.

Version: Page 1 of 5

Planning a Backup Strategy

Audit of NSERC Award Management Information System

2.1 To define the backup strategy for systems and data within the Cape Winelands District Municipality (CWDM).

Managed Security Services SLA Document. Response and Resolution Times

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

BACKUP POLICY Date: 04/12/2009

State of Alaska. Service Level Agreement. for. Enterprise Technology Services Infrastructure Services Hosting. June 25, 2012 VERSION 1.

Disaster Recovery Plan Documentation for Agencies Instructions

Information Shield Solution Matrix for CIP Security Standards

Certified Information Systems Auditor (CISA)

Attachment 4-E Service Tier Matrix

See all, manage all is the new mantra at the corporate workplace today.

UCS Level 2 Report Issued to

Technology Recovery Plan Instructions

Key Considerations for Documentation Management Technology. Learning from Local Experience

Disaster Recovery Plan Review Checklist. A High-Level Internal Planning Tool to Assist State Agencies with Their Disaster Recovery Plans

Information Technology Solutions. Managed IT Services

DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS

BACKUP SECURITY GUIDELINE

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1

How To Answer A Question About Your Organization'S History Of Esi

REMOTESTOR CLOUD BASED DATA REPLICATION

Cloud-based Managed Services for SAP. Service Catalogue

INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING

Assigning Severity Codes

COMMERCIALISM INTEGRITY STEWARDSHIP. Back-up Policy & Guidance

COMPUTER OPERATIONS - BACKUP AND RESTORATION

PAPER-6 PART-4 OF 5 CA A.RAFEQ, FCA

Protect, Share, and Distribute Healthcare Data with ehealth Managed Services

How To Backup At Qmul

jsecrm Corporate Edition

SECURE AUTOMATED RELIABLE

Planning for a Disaster Using Tivoli Storage Manager. Laura G. Buckley Storage Solutions Specialists, Inc.

6. FINDINGS AND SUGGESTIONS

STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009

Business Continuity Planning

Tivoli Storage Manager Explained

EXAM - E nterprise Backup Recovery Design Exam for Data Center Architects Exam.

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

FINAL May Guideline on Security Systems for Safeguarding Customer Information

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Protecting SQL Server Databases Software Pursuits, Inc.

How To Use A Court Record Electronically In Idaho

Remote Infrastructure Support Services & Managed IT Services

JOB DESCRIPTION CONTRACTUAL POSITION

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

Does it state the management commitment and set out the organizational approach to managing information security?

Transcription:

Information Systems Operations

Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with information systems operations Discussion topics that can assist in initial inquiries and detailed discussions for testing information systems operations 2

General Computer Controls A computer processing environment is a computer processing location that supports a computer hardware and operating system environment. GCCs are controls related to the computer processing environment within which application systems are developed, maintained and operated. Information Security IS Operations Change Management Application Databases Network Systems Software The objectives of GCCs are to ensure the proper development and implementation of applications, and to ensure the integrity of programming, data files and computer operations. 3

GCCs in Financial Reporting Significant Accounts in the Financial Statements Income Statement Balance Sheet SCFP SCFP Notes Notes Other Other Business Processes Treasury Fixed Assets Revenue Expenditure Payroll Inventory GCCs IS Operations Information Security Change Management Financial Accounting Financial Applications Application A Application B Application C IT Infrastructure Services Database Operating System Network Application Controls Validity Completeness Data Integrity Segregation of Duties 4

Key Areas of Focus Job Scheduling (sometimes referred to as Batch Jobs) Backup and Recovery Tape backup Offsite rotation of tapes Recovery Testing of Tapes Managing Problems & Incidents Helpdesk Trouble tickets Performance Monitoring 5

Operational Risks Inconsistent Monitoring Tools are available for scheduling but failed jobs are not consistently monitored Tools are available for performance monitoring but systems are not consistently monitored Unrestricted Access to Scheduling Tools No follow-up / Corrective Action Errors and irregularities are identified, but no action is taken to address them. Issues are recorded but never closed. 6

Operational Risks Backups are scheduled but not monitored. Backup tapes are not sent offsite No backup tape recovery performed Unsupportive management While errors and irregularities are identified, persons responsible for enforcement or correction do not have the necessary support to address them. Management does not acknowledge the errors and irregularities identified. Management does not recognize security as a part of support and operations of IT systems. 7

Job Scheduling Primary use is for time-dependent processes, such as interfaces, print jobs, backups, etc. On-line processing reduces the need for computer operations scheduling Schedule should consider job dependencies and job timing. Scheduling changes should be defined and controlled. 8

Job Scheduling Control Objectives All production programs needed to process batch and on-line transactions and prepare related reports are executed timely and to normal completion. Only valid production programs are executed. 9

Job Scheduling Control Activities examples Processing is monitored by management to ensure successful and timely completion, including a review and resolution of any exceptions. Automated scheduling tools have been implemented to ensure the authorization and completeness of the flow of processing. 10

Job Scheduling Interview Topics Automated job scheduling system Access to jobs scheduling Process of scheduling jobs Evaluating dependencies Job Monitoring 11

Job Scheduling Data Interfaces Need to test data interfaces Identify controls around interfaces Garbage In - Garbage Out phenomenon Environments may have multiple interfaces Identify key interfaces Evaluate materiality and risk 12

Backup and Recovery Primary purpose is to enable recovery of financial data in case of a disaster Types of Backup - incremental or full backups Frequency of backups per company policy Backup tapes should be stored onsite in secure location or a fire proof safe Backup tapes should be sent offsite Recovery of data from backup tapes 13

Backup and Recovery Control Objective Data is retained in accordance with laws, regulations, and company policy to enable retrieval when needed. 14

Backup and Recovery Control Activities examples Management and users plan and schedule backup and retention of data. Backups are archived off-site. On-going readability of backup and retained data is tested periodically through restoration or other methods. 15

Backup and Recovery Interview Topics Tools used for backups Backup Schedules Backup Monitoring Backup Storage Onsite and Offsite Backup Recovery Procedures 16

Managing Problems and Incidents Primary purpose is to help users with system issues Enable smooth processing of day to day system activities Help Desk tools enable logging, tracking and timely closing of incidents Facilitates identification of training issues 17

Managing Problems and Incidents Control Objective Users receive appropriate support to ensure that application systems function as intended. 18

Managing Problems and Incidents Control Activities examples The help desk function acts on user queries regarding systems. Problems are recorded in a centralized problem log. Help desk personnel monitor the log to ensure a timely resolution of all such user queries. Management monitors problem statistics and trends to identify and eliminate root causes of recurring problems. 19

Managing Problems and Incidents Interview Topics Help Desk Tool Responsibility for the help desk function Help Desk monitoring Issue Resolution Issues reporting Frequency of Trends analysis Actions taken to eliminate recurring issues 20

Performance Monitoring Primary purpose is to monitor system performance, including capacity utilization measurement. Management defines service levels expectations related: Availability of access to network System response time Holding IT responsible to the user service level agreements 21

Performance Monitoring Control Objective Computer processing environment service levels meet or exceed management s expectations. 22

Performance Monitoring Control Activities examples Performance and capacity utilization of the computer processing environment are measured, reported, and reviewed by management. Management defines service level metrics. Metrics are agreed to by the affected parties. 23

Performance Monitoring Interview Topics Tools used for performance monitoring Responsibility for Performance monitoring (internally or by external vendors) Reports reviewed and frequency of review Historic performance problems Service level Agreements 24

Topics Key to SOX Audit Job Scheduling Backup and Recovery Operational (Value Added) Performance Monitoring Managing problems and Incidents. 25

Questions?