IT Audit at UBS - a Fully Integrated Approach



Similar documents
Solutions. Expertly addressing your software needs.

Prof. Dr. Nick Gehrke Alexander Rühle

HYBRID CLOUD Why is it important & how do you manage it?

AGILE SOFTWARE TESTING

Equinix Cloud Exchange Datacenter Forum. Stephane Buchs, IMS 17 th September 2014

Predictive Metrics for B2B Trade Credit

Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology

Frontier International

Designing NetSuite ERP Application Security Leveraging Fastpath Assure Access Monitoring Solutions

Audit of the Policy on Internal Control Implementation

AVANTGARD Hosting and Managed Services

SFC proposes amendments to regulation of automated trading services guidelines

Dallas IIA Chapter / ISACA N. Texas Chapter. January 7, 2010

The supporting information for audit/engagement procedures is part of the required Audit/Engagement Documentation (See Section ).

RSA ARCHER AUDIT MANAGEMENT

AMBIT ISLAMIC BANKING. Ambit Risk Management & Compliance

Sony Internal Audit Presentation to ISACA Tokyo Chapter

Business Continuity Management

Imperative. Tim Mohn Industry Principal Sparta Systems

J.P. Morgan Global Liquidity. Managed Reserves Fund Operation Services Guide. JPM Managed Reserves Fund

AVANTGARD Private Cloud and Managed Services

Market Data Feed. Go with the flow.

CONSULTING SERVICES Business & technology consulting and managed services

Department of Audit and Compliance. Quality Self-Assessment

Moving Forward with IT Governance and COBIT

Introducing a Capacity Management Maturity Model

END-TO-END BANKING SOLUTIONS

Organizing for Sourcing Excellence Insights for impact on profitability and revenue.

Applying Risk Assessment to Your Audit Plan Break-out Session T3, Tuesday, October 26 2:00-2:50pm

METRICS TO HELP IMPROVE YOUR WORKFORCE PRODUCTIVITY

Module 2 IS Assurance Services

Linarch. April Sample Report - Global Ethernet Exchange Services Market

Internal Financial Controls

COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG

The Lawson Customer Relationship Management Solution

Continuous Controls Monitoring ISACA, Houston Chapter. August 17, 2006

Domain 1 The Process of Auditing Information Systems

Changing data needs from a life cycle perspective in the context of ISO 55000

2014 Global Asset Management Survey

Open Source Business Rules Management System Enables Active Decisions

THE VALUE OF TRUSTED DATA. How Asset Managers Use Technology To Turn Data Into Actionable Insight

Basware Invoice Automation Demonstration

Implementing Good Corporate Governance in Banks

Enterprise Level Change Control: A Life Science Business Imperative. Presented by: Carl Ning Solutions Delivery Manager Sparta Systems

A NEW GENERATION OF REFERENCE DATA SERVICES. From Interactive Data, The Reference Data Powerhouse

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015

Assessing & Managing IT Risks: Using ISACA's CobiT & Risk IT Frameworks

EXPERTISE NEEDED EXPERTISE FOUND

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Cloud PPM for Project-centric Service Organizations

SRM How to maximize vendor value and opportunity

opinion piece IT Security and Compliance: They can Live Happily Ever After

StruxureWare. How to reconcile efficiency and availability in a virtualized data center. for data centers

Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions

Fast, scalable and CAPEX-free servers in Pacnet's advanced data centers PACNET HARDWARE-AS-A-SERVICE

Strategic Workforce Planning

Planning an ERP Implementation Small and Medium Enterprises

Preparing for the Convergence of Risk Management & Business Continuity

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Guide to Chinese Share Classes v1.1

Market leading multi-bank/multi-asset trading platform, independent from market maker banks

AVANTGARD RECEIVABLES. Predictive Metrics for Healthcare / Hospitals

RMBC s Governance Framework for Significant Partnerships

A BearingPoint Accelerator

Munich Re s growth strategy in emerging markets

Template K Implementation Requirements Instructions for RFP Response RFP #

Building a Global Business Architecture Function Global Life Business Division, Zurich Insurance Services

Introduction. What is ITIL? Automation Centre. Tracker Suite and ITIL

Q3 FY16 Total Revenue up by 24% YoY to Rs 672 million

Business Continuity Management Planning Methodology

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN

Continuous Monitoring?

mêéëéåíéê=_áçöê~éüó= Jack Gray Adjunct Professor Centre for Capital Market Dysfunctionality University of Technology, Sydney=

RPO ASIA RECRUITMENT PROCESS OUTSOURCING. Baker s Dozen. Customer Satisfaction Ratings RPO PROVIDERS 2010 Winner

Aberdeen University: Back on campus event

Mastering entity data with the LEM

EMERGING TRENDS IN HR AND RECRUITMENT SERVICES Martin Nicholls

Information Technology Engineers Examination. Systems Auditor Examination. (Level 4) Syllabus

Best Practice Strategies for Managing and Mitigating Key Cyber Risks. Brendan Saunders, Principal Security Consultant - November 2015

LSEG Information Services Division. Investor and Analyst presentation. Mark Makepeace Group Director of Information Services, CEO of FTSE

ABOUT THE REPORT. Prepared by Bloomberg Audience Insights 2

Introduction to PRINCE2

Pictet Asset Management

MSCI Global Minimum Volatility Indices Methodology

Transcription:

ISACA CH After Hour Seminary Public IT Audit at UBS - a Fully Integrated Approach Gerd Lierhaus Group Internal Audit, IT WM&SB January 2011

Table of Contents 1. UBS Group Internal Audit 2. Former IT Audit Approach 3. UBS Group Internal Audit Process 4. Integrated IT Audit Approach Example 1: Change Management Example 2: Access Control 5. Benefits and challenges 6. Questions & Answers 1

Section 1 UBS Group Internal Audit

Locations of Group Internal Audit Located in nine countries Stamford New York Weehawken London Luxembourg Frankfurt Switzerland (5 locations) Tokyo Hong Kong Singapore Sydney Americas 26% Asia Pacific 13% Headcount as of 1 March 2010: 301.65 FTE / 308 people Europe CH 23% 38% 3

Audit involvement of IT WM&SB in 2011 (planning) IT led audits Board of Directors (BoD): 10 of 13 in total; 1 lead Cycle audits: 6 of 28; 4 leads Business led audits WM&SB:12 EMEA: 9 Corcorate Center: 6 4

Section 2 Former IT Audit Approach

Overview Pure IT audits Focused on IT infrastructure Very few IT process audits in the application area Integrated audits: covered IT Control Areas 1. IT Strategy and Management 2. System Processing and Business Processes 3. System Security 4. IT System Operations 5. Business Contingency Planning 6

Characteristics of this approach Relatively independent planning of the major IT part Difficult scoping for the general IT controls (GITC) Relatively independent fieldwork conduction No interconnection for the GITC part IT owned working paper Resulting in relatively independent IT issues on general IT controls In case of issues with a general IT process Risk of the issue not necessarily in the (business) focus of the audit Addressees somewhere in the IT, maybe not even informed beforehand Weaknesses Less acceptance by the business audit as 'added value' was not very high Producing 'always' the same type of IT issues, e.g. on access control Additional IT review cycles extending reporting periods Shift of scope from business to IT Conflicts in the rating of issues respectively with the overall audit rating 7

Former Approach - Audit Process Business Begins IT presents flow and testing at the end of WBS Planning + Discussion Opportunity Walkthrough / WBS Opportunity Whiteboard IT Ends IT Begins Testing Opportunity Reporting Opportunity Business Ends IT Reviews IT RCMs Workpaper Opportunity Biz Reviews Biz RCMs 8

Section 3 UBS Group Internal Audit Process

Risk-based audit execution with the "Thin Red Line" concept The "Thin Red Line" is a concept of maintaining focus on the most important risks Clearly determined and communicated audit objectives 10

Risk-based audit testing approach 11

Section 4 Integrated IT Audit Approach

Integrated Approach - Audit Process Business and IT begins Begin research in advance of fieldwork - start to prepare for future meetings (proactive vs. reactive) Attend initial kick off meetings with Business Manager (RA) Attend relevant business walkthroughs to understand the F2B flow (IT impact) Demo and obtain QA access to the applications of focus At WBS, IT presents F2B flow and testing approach via business objective Whiteboard Enhanced AF & Data Testing Engage with the RA and draft MLs in relation to their business context with clear impact / risk statements. Work with the RA to provide IT relevant context for the ES and Supplementary Business Information (SBI). Business / IT Ends Business Reviews Business & IT RCMs (and Work papers as necessary) 13

The IT integrated audit approach - principles of operation IT audit scope driven by the key audit objectives, whether these are business or technology related. Planning for integrated audits is done jointly, with IT and business auditors attending meetings with key business and Group Technology management. Walkthroughs are performed jointly to understand all aspects of the business and process flow. Whiteboards based on common process flow charts that reflect business and technology risks, aligned with the key audit objectives. IT fieldwork driven by key audit risks and focus on automated application controls and functionality assess fit for purpose. Enhanced application functionality testing - CAATS, real system test scenarios, and review of logic (system, reporting, or exception handing) IT work papers and RCM components included under the business RCM sections: no separate IT application working papers Joint assessment of issues to reflect impact holistically: IT involvement in materiality assessment and drafting of the audit report. 14

Example 1: Change Management in an IT process audit Assess the control effectiveness of the whole process Determine Key Risks in the process Evaluate the design of Key Controls Assess the operational effectiveness of these key controls in a sample testing Sample within the IT function Sample of IT projects providing business functionality Test conduction RSO UAT PSO Requirements engineering Make or buy the software Integration testing Deploy software into production Rollback procedures Test approach Test data management Test Plan Code management Segregation of duties 15

Example 1: Change Management in an integrated audit Assess the operational effectiveness of business related Key Controls 1. Requirements Sign-off (RSO): Involvement of business as a key stakeholder 2. Production Sign-off (PSO): Approval provided by the business representative IT audit: including appropriate other necessary stakeholders 3. Suitable Test Plan covering all business risks IT audit: including necessary IT specific tests 4. Effective User Acceptance Testing (UAT) Integrated approach All four key controls require business understanding Effective audit testing only with a close cooperation between IT and business audit Business audit knows the responsibilities and business requirements and expected results IT audit knows the process and tools; and IT specific responsibilities and requirements 16

Example 2: Access Control in an IT process audit Assess the control effectiveness of the whole process Determine Key Risks in the process Evaluate the design of Key Controls Assess the operational effectiveness of these key controls in a sample testing Sample within the IT function Sample of Business applications 17

Example 2: Access Control in an integrated audit Assess the operational effectiveness of business related Key Controls 1. Request assessment and approval: Appropriateness of approver chain 2. Periodical review: Actually conducted 3. Authorization concept: a) Reflecting business needs b) IT audit, in the management system: Access rights for administration roles c) IT audit, on application level: Actual implementation Integrated approach All three key controls require business understanding Controls 1, 2 and 3a can be conducted by business without IT Control 3: parts b) and especially c) require IT audit know-how and skills but a control weakness here has a direct business impact 18

Section 5 Benefits and challenges

Benefits IT general controls mostly covered in themed reviews where there is more opportunity to assess holistically at the entity level and determine materiality Reduced IT general controls testing during integrated audits in order to maximize the application functionality testing approach allow flexibility to test IT general controls if part of key audit objectives and risks. More communication between teams so that audit scope, objectives and responsibilities are transparent to the entire audit team involved in an integrated audit. Focus on the business process risks to determine application and IT testing Increased joint testing and facilitate improved understanding of the processing flows, whether business or IT. Increased use of CAATS, data mining and automated testing techniques. Ideally: no IT issues but business issues on underlying IT controls 20

Challenges IT issue is NOT a weakness of operational effectiveness of the respective application but a design issue 1. In the related IT process; or 2. In a broader business context Examples A PSO is not only not effectively conducted but the respective unit is not using the (audited) standard Change Management process No effectively designed PSO; e.g. in a small international unit Access rights are not only not effectively assigned for the application in scope but the authorization concept for a whole bunch of related applications is not effectively designed Consequences Assessment of a process necessary which is not in the scope of the audit Decision to be made whether Scope needs to be extended to address the full issue Broader issue is handled separately 21

Audit Planning Activities Instrument to deal with "Emerging risks": Anticipatory Auditing Targeted review New (unplanned) audit 22

Questions & Answers