Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014



Similar documents
Application controls testing in an integrated audit

How To Audit A Company

The Information Systems Audit

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

Inspection Observations Related to PCAOB "Risk Assessment" Auditing Standards (No. 8 through No.15)

OBSERVATIONS FROM 2010 INSPECTIONS OF DOMESTIC ANNUALLY INSPECTED FIRMS REGARDING DEFICIENCIES IN AUDITS OF INTERNAL CONTROL OVER FINANCIAL REPORTING

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Risikobaseret tilgang til revision

Auditing Applications. ISACA Seminar: February 10, 2012

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT CONTENTS

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS

Audit Evidence. AU Section 326. Introduction. Concept of Audit Evidence AU

Webinar: PCAOB Inspections of Small Firm Broker-Dealer Auditors. January 15, 2015

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 315

Case Tiger Pride Enterprises

THE AUDITOR S RESPONSES TO ASSESSED RISKS

Chapter 15: Accounts Payable and Purchases

How To Audit A Company

COSO s 2013 Internal Control Framework in Depth: Implementing the Enhanced Guidance for Internal Control over External Financial Reporting

Part II. Audit process by phase 3. Testing and evidence

INFORMATION TECHNOLOGY CONTROLS

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Sarbanes-Oxley Section 404: Management s Assessment Process

Connecting the dots: IT to Business

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

Report on Inspection of PricewaterhouseCoopers LLP (Headquartered in New York, New York) Public Company Accounting Oversight Board

New Audit Standards: How Will They Impact the Audit

Ethics, Fraud, and Internal Control

Information Technology General Controls (ITGCs) 101

Accounting 408 Test 3b Section Row

Report on Inspection of PricewaterhouseCoopers LLP. Public Company Accounting Oversight Board

Auditing Derivative Instruments, Hedging Activities, and Investments in Securities 1

A Publication of the Center for Audit Quality

Chapter 15 Auditing the Expenditure Cycle

Fraud and Role of Information Technology. September 2008

The Importance of IT Controls to Sarbanes-Oxley Compliance

Internal Controls. A short presentation from Your Internal Audit Department

Implementation Tool for Auditors

auditing in a computer-based

Communicating Internal Control Related Matters Identified in an Audit

Impact of New Internal Control Frameworks

RELEVANT TO FOUNDATION LEVEL PAPER FAU / ACCA QUALIFICATION PAPER F8

How To Audit A Financial Statement

Audit Evidence and Documentation AN AUDIT: SUMMARY CHAPTER PCAOB ONE-UP S THE AICPA MANAGEMENT S ASSERTIONS

INTERNATIONAL STANDARD ON AUDITING 520 ANALYTICAL PROCEDURES CONTENTS

Shared Service System Audits: What User Management and Auditors Need to Know

Analytical Procedures

Analytical Procedures

4 Testing General and Automated Controls

Identifying and Assessing. Understanding the Entity

Chapter 7--Accepting the Engagement and Planning the Audit

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 520 ANALYTICAL PROCEDURES CONTENTS

Article: Control Systems and Controls Testing: General Review

1/21/2014. Agenda. Audit Testing. The Basics of Internal Auditing January 23-24, 2014

Management s Discussion and Analysis

Comparison of ISA 330 with AS-402 Objectives and Requirements Only

Auditing Standard 5- Effective and Efficient SOX Compliance

CHAPTER 8 SPECIALIZED AUDIT TOOLS: SAMPLING AND GENERALIZED AUDIT SOFTWARE

1. FPO. Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Second Edition

Audit Program for Accounts Payable and Purchases

Case Study Top-Down, Risk-Based Approach Purchase to Pay Process

Risk and Controls 101

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

Special Considerations Audits of Group Financial Statements (Including the Work of Component Auditors)

Control Matters. Computer Auditing. (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising)

Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

Managing the Auditor/Client Relationship

Dr. Thomas Nösberger. A short overview

Risk Assessment Standards

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Internal Controls Best Practices By Jennifer Downs, CPA Benefit Audit Group, LLC

Communicating Internal Control Related Matters Identified in an Audit

Audit Quality Thematic Review

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act*

10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 540

Audit Phases. Phase 1: Planning and Risk Identification

) ) ) ) ) ) ) ) ) ) ) )

Auditing Accounting Estimates, Including Fair Value Accounting Estimates, and Related Disclosures

Application Testing: Not Just for IT Auditors. Insert Logo Here

CHAPTER 12 AUDITING LONG-LIVED ASSETS: ACQUISITION, USE, IMPAIRMENT, AND DISPOSAL

HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015

Guide to Internal Control Over Financial Reporting

Internal Controls over Financial Reporting. Integrating in Business Processes & Key Lessons learned

Internal Control Systems

Solihull Metropolitan Borough Council. IT Audit Findings Report September 2015

Fundamentals Level Skills Module, Paper F8. Section A

IT Application Controls Questionnaire

Auditing Standard ASA 330 The Auditor's Responses to Assessed Risks

An Examination of an Entity s Internal Control Over Financial Reporting That Is Integrated With an Audit of Its Financial Statements

Special Considerations Audits of Group Financial Statements (Including the Work of Component Auditors)

IT Governance and Control: An Analysis of CobIT 4.1. Prepared by: Mark Longo

Karen K.W. Li, School of Accountancy, The Chinese University of Hong Kong

Analytical Procedures

Transcription:

Electronic Audit Evidence (EAE) and Application Controls Tulsa ISACA Chapter December 11, 2014

Agenda Recent IT-related PCAOB inspection themes: Internal control over financial reporting Multi-location scoping Consideration of IT systems, including related EAE Range in substantive areas including revenues, inventory, internal use software, intangible assets, loans and ALL Additional impact as to significant risks, including fraud risk, procedures and EQR Electronic Audit Evidence (EAE) Application Controls Questions Slide 2

Electronic Audit Evidence (EAE) Slide 3

What constitutes EAE Definition: Electronic audit evidence (EAE) is data generated or processed through an IT application, and/or end user computing solution (e.g., Excel, data warehouse tools, slide decks), be it in electronic or printed form, used to support audit procedures Types: Data supporting the performance of internal controls, including key performance indicators Data that represents substantive audit evidence to support assertions for significant accounts Other data provided by the entity The majority of the audit evidence we receive to support the execution of our tests of controls and substantive procedures is considered EAE. Slide 4

Data supporting the performance of internal controls, including key performance indicators Represents data and reports used by management to: Identify and investigate transactions or occurrences that do not meet business requirements or thresholds Review the appropriateness of recorded transactions Reconcile balances between sub-ledgers and the general ledger Assess and support the validity and accuracy of inputs used in calculations Monitor the company s overall performance Review controls over estimates and non-routine areas typically rely on data or reports that would be considered EAE Examples Slide 5

Data that represents substantive audit evidence to support assertions for significant accounts Data or reports used in our substantive testing procedures Consists of both financial and non-financial data that we use to: Perform substantive analytics Substantiate and support account balances and variance explanations Evaluate estimates and forecasts Examples Slide 6

Other data provided by the entity Data or reports used to select our samples for tests of controls and substantive testing (e.g., population listings) Examples Slide 7

Other key considerations EAE is relevant to all professionals who support the audit Our responsibilities for identifying and evaluating EAE is applicable to all EAE used in our audit procedures, including those related to accounts not affected by significant risks EAE can be applicable for both our tests of controls and substantive procedures. Since the requirements for evaluating EAE may differ (e.g., integrated audit vs. non-integrated audit), it is critical that we appropriately understand the use of the EAE in our audit procedures Slide 8

Requirements over evaluating EAE Slide 9

EAE strategy Use of EAE Integrated audit Non-integrated audit Test of controls (Data and reports used by management in the performance of controls) Evaluate and test controls over the completeness and accuracy of data and reports One of the following for each piece of EAE: Substantive testing One of the following for each piece of EAE: Directly Testing EAE Tests of Direct Controls Benchmarking Directly testing EAE Tests of direct controls Benchmarking Slide 10

EAE Strategy (cont.) Integrated audit When using information produced by the company as audit evidence, the auditor should evaluate whether the information is sufficient and appropriate for purposes of the audit by performing procedures to: Test the accuracy and completeness of the information, or test the controls over the accuracy and completeness of that information; and Evaluate whether the information is sufficiently precise and detailed for purposes of the audit (PCAOB AS 15.10) Non-integrated audit When using information produced by the entity, the auditor should evaluate whether the information is sufficiently reliable for the auditor s purposes, including, as necessary, in the following circumstances: Obtaining audit evidence about the accuracy and completeness of the information Evaluating whether the information is sufficiently precise and detailed for the auditor s purposes (AICPA AU-C 500.09) the effectiveness of a control cannot be inferred from the absence of misstatements detected by substantive procedures (PCAOB AS 5 B9) Slide 11

End-user computing solutions End-user computing solutions likely are not subject to ITgeneral controls Excel files Access databases Dynamic data warehouse reporting tools System-generated data in slide decks Need to better consider issuer controls over end-user computing solutions Input control the company reconciles data back to source documents. Access controls Access is restricted to authorized personnel and is password protected Version control Standard naming conventions are in place so only current and approved versions are used Page 12

Application Controls Page 13

Classification of controls The diagram below illustrates the automated aspect of controls in an IT environment There are two categories of automated aspects of controls: IT-dependent manual controls and application controls Page 14

What are application controls? Automated functionality within the system that affects the processing of transactions Can be characterized as either embedded or configurable Embedded functionality is programmed within the application code Configurable functionality depends on key settings and fields within the application Often more effective than manual controls Test of one strategy (of each scenario) may be sufficient with effective IT general controls Page 15

Application control categories Application controls are commonly grouped into five categories Type Description Examples Edit Checks Validations Limit risk of inappropriate input, processing or output of data due to field format. Limit risk of inappropriate input, processing, or output of data due to the confirmation of a condition. Required fields 3-way match Tolerance limits Calculations Ensure that a computation is occurring accurately Accounts receivable aging Pricing calculations Interfaces Limit risk of inappropriate input, processing, or output of data being exchanged from one application to another Duplicate record checks Error reporting during batch runs Authorizations Limit the risk of inappropriate input, processing, or output of key financial data due to unauthorized access to key financial functions or data; includes: Segregation of incompatible duties Authorization checks, limits and hierarchies. Approval to post journal entries Page 16

Embedded Application Controls An Embedded control is programmed within application logic and can be modified only through code changes Such changes are subject to change management controls As a result, the following should be performed for embedded controls: Obtain evidence and document on the leadsheet that the control is embedded and not configurable Sources may include user manual, training material or other documentation If documentation does not exist, then inquiry is sufficient and documentation should include the name(s) of the person inquired of Perform a walkthrough/test of one of the control including both positive and negative test scenarios Page 17

Configurable Application Controls A configurable control functions according to key application settings that can be modified by certain users Such changes are not typically subject to change management controls and should be tested as follows: Obtain evidence and document that the control is configurable and the system is properly configured to support execution of the control (e.g., screen prints of the configuration) Obtain system-generated evidence of users who have access to modify the setting and validate for appropriateness Where possible, obtain evidence showing the last time the configurable setting was modified Perform a walkthrough/test of one of the control including both positive and negative test scenarios Page 18

Other application control testing considerations Test all potential outcomes/scenarios of the application control, including both positive and negative testing procedures. Inquire and document whether an override of the application control is possible. When overrides are possible, we consider how management monitors transactions that bypass the control. Perform application control testing in the production environment when possible. If this is not possible, we consider and document whether the non-production environment closely resembles production. When using the test of one approach strategy for application controls across multiple in-scope locations, we should document the sufficiency of evidence on how we confirmed consistency of the information systems across locations (ITGCs). Page 19

Questions? Page 20