Auditing Applications. ISACA Seminar: February 10, 2012



Similar documents
Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014

Internal Control Deliverables. For. System Development Projects

IT Governance and Control: An Analysis of CobIT 4.1. Prepared by: Mark Longo

Internal Audit Testing and Sampling Techniques. Chartered Institute of Internal Auditors May 2014

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Fraud and Role of Information Technology. September 2008

The Information Systems Audit

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

Data Warehouse / MIS Testing: Corporate Information Factory

Internal Audit Report ITS CHANGE MANAGEMENT PROCESS. Report No. SC-11-11

OBSERVATIONS FROM 2010 INSPECTIONS OF DOMESTIC ANNUALLY INSPECTED FIRMS REGARDING DEFICIENCIES IN AUDITS OF INTERNAL CONTROL OVER FINANCIAL REPORTING

Office of Contracting & Procurement and Support Service Center Desk Reference

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

Internal Controls And Good Utility Practices. Ruchi Ankleshwaria Manager, Compliance Risk Analysis

4 Testing General and Automated Controls

Welcome to Metafile. Solving document issues for over 30 years. Matt Akin x 301

Why is Internal Audit so Hard?

Effectively Assessing IT General Controls

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young

Facts to Value. Transforming data into added value. Compact_ IT Advisory 3. Introduction

TECHNOLOGY RISK ASSURANCE DATA ANALYTICS/DATA MINING IN RETAIL. By Graham Ward

Conference Room Pilot. Cash Management

Improve Business Efficiency by Automating Intercompany Transactions

The top ten reasons your organization needs Snow Optimizer for SAP Software. Snow optimizer for SAP software

Connecting the dots: IT to Business

SUGGESTED CONTROLS TO MITIGATE THE POTENTIAL RISK (Internal Audit)

Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6

Information Technology General Controls (ITGCs) 101

Case Study Top-Down, Risk-Based Approach Purchase to Pay Process

1/21/2014. Agenda. Audit Testing. The Basics of Internal Auditing January 23-24, 2014

Application Testing: Not Just for IT Auditors. Insert Logo Here

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Defining, building, and making use cases work

Internal Controls, Fraud Detection and ERP

for Sage 100 ERP Work Order Overview Document

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

Corporate Property Automated Information System CPAIS. Privacy Impact Assessment

Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution

Leverage T echnology: Move Your Business Forward

Service Asset & Configuration Management PinkVERIFY

Atlanta OAUG. Internet Expenses Key to speedy processing. Chetan Manjarekar

IT Enabled System : Opportunities & Challenges for Assurance Professionals

How To Audit A Company

Chapter 7: Solutions. Multiple Choice Questions From CPA Examinations a. (2) b. (1) c. (4) d. (4) 7-28 a. (3) b. (3) c. (4) d.

Using data analytics and continuous auditing for effective risk management

Chapter 10 Overall Audit Plan and Audit Program

The following options under the Financial area will be available on the Web as of the February 2016 Release.

HP Service Manager. Process Designer Content Pack Processes and Best Practices Guide

Audit of NSERC Award Management Information System

Accounting 408 Test 3b Section Row

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

Auditing E-Business: Challenges and Opportunities

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act*

Asset management guidelines

IDS for SAP. Application Based IDS Reporting in the ERP system SAP R/3

Stages of the Audit Process

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Audit of Milwaukee Fire Department Fixed Assets Controls

Risk Management Advisory Services, LLC Capital markets audit and control

How To Find Out If A Company Misstatement Is True

Data Quality Assessment. Approach

PMS 288 Blue or CMYK = C100-M85-Y0-C43 PMS 1255 Ochre / Yellow or CMYK = C0-M35-Y85-C30. Tax Technology

Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows

Feature. Multiagent Model for System User Access Rights Audit

A Presentation to the IIA Jacksonville Chapter May 16, 2014

ISACA PROFESSIONAL RESOURCES

RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd.

Implementing a CMS. First Steps. A Case Study by. Raymond Sneddon, National Australia Group September Version: 1.

ETPL Extract, Transform, Predict and Load

Prof. Dr. Nick Gehrke Alexander Rühle

Fraud Prevention and Detection in a Manufacturing Environment

Data Management Policies. Sage ERP Online

Process Control Optimisation with SAP

Accounts Payable. Best Practices: Existing Control: Control Gap: Controls Evaluation and Gap Analysis. Purchasing

How To Audit A Financial Statement

Automated Controls Strategy, Implementation & Practical Examples. By Danny Miller, CGEIT, CISA, ITIL

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

Using Data Analytics to Detect Fraud

Material Transfers and Material Management and Accounting System (MMAS)

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

PwC The Path Forward for Data Analysis and Continuous Auditing May 2011

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS

Section 1 Project Management, Project Communication/Process Design, Mgmt, Documentation, Definition & Scope /CRO-Sponsor Partnership

Dynamics GP 50 Tips in 50 Minutes

Article: Control Systems and Controls Testing: General Review

THE EXPENDITURE CYCLE Part I

An Introduction to Continuous Controls Monitoring

Strategic Asset Management Program Controls Design Is Generally Sound, But Improvements Can Be Made. Final Audit Report No

COMMONWEALTH OF PENNSYLVANIA GOVERNOR'S OFFICE. Month-end Closing Processes

Chapter 15: Accounts Payable and Purchases

Transcription:

Auditing Applications ISACA Seminar: February 10, 2012

Planning Objectives Mapping Controls Functionality Tests Complications Financial Assertions Tools Reporting AGENDA 2

PLANNING Consideration / understanding of the control environment Consideration of how audit arose From audit plan? Ad hoc? What is driving the need for THIS audit? 3

PLANNING Key risks should be defined in planning and monitored with adjustments throughout. Which risks were identified through audit source? Where are controls likely strong and weak? What is the relationship of the audit objectives, scope and procedures? 4

PLANNING Pre-implementation or post-implementation? Pre-implementation audits tend to be proprietary What is in scope? Interfaces Source systems Target systems Infrastructure / component Risk Scope of Systems Invalid, inaccurate, and/or XYZ Oracle Database incomplete data may cause errors in reporting or in XYZ ETL Software accounting. Unauthorized or unintended XYZ Oracle database changes to systems may cause errors in reporting or in XYZ ETL Software accounting. XYZ Job Scheduler Unauthorized access may lead Input: Source File Network Drive(s) to unauthorized changes to systems and data, causing Processing: XYZ Oracle Database, errors in reporting or in XYZ ETL Software, XYZ Job Scheduler accounting. Output: Extracts Network Drives Invalid, inaccurate, and/or incomplete systems processing may cause errors in reporting or in accounting. Evaluate team for sufficient expertise to perform the audit Documentation: All In-Scope Systems Processing / Errors: XYZ ETL Software and XYZ Job Scheduler 5

Efficiency Effectiveness (information requirements) Compliance Alerts (if necessary) Financial reporting Proprietary OBJECTIVES 6

MAPPING Tool for thorough understanding and adequate considerations for audit procedures throughout the steps from planning to reporting Relevant IT Components/Description Business Owners & System Administrators Change Management Process/Owner Security Administration Process/Owner 7

CONTROLS Custom-Built Systems Use inquiry to discover Are they properly documented? Vendor / Off the Shelf Systems Use walkthrough to discover Gain a general understanding Especially first time an application is used Need to establish a baseline understanding of controls and configuration for apps like SAP, Oracle, etc. Determine vendor s responsibility Vendor management practices Vendor monitoring 8

CONTROLS Control evaluation requires understanding of the business process and data flow. 9

CONTROLS Controls can be simply identified and categorized as input, processing, and output controls. 10

CONTROLS Application Input Controls: Access security Data validation Coding controls Input error correction Batch controls (where applicable) 11

CONTROLS Application Processing Controls Level of automation (from fully manual to fully automated) Job scheduler dependencies and monitoring Auto calculations Auto reconciliations Auto notifications 12

CONTROLS Application Output Controls: Reconciliations Reviews Approvals Error reports/lists Control over physical reports 13

CONTROLS Analysis of defined risks, scope, and controls will point to areas of focus. 14

FUNCTIONALITY Verify functionality against requirements Verify end-user acceptance for newly installed Special considerations: Security Operational controls Financial controls 15

FUNCTIONALITY What is the purpose of the application? What various scenarios should be considered to understand/test functionality? For example: Use a broad scope of scenarios to test security Use system model in analysis and testing 16

TESTS Internal tests within the application Interface tests between systems Tests of data used by the application 17

COMPLICATIONS Proprietary Apps Inherent risks Data Warehouse Inherently prone to data errors due to nature of sourcing across the enterprise Inherently needs strong change management controls due to the number of persons and systems complexity 18

COMPLICATIONS Data Warehouse Data integrity That is, processing did what it should have done, successfully Data quality Data entered and processed was valid, accurate, and complete 19

FINANCIAL ASSERTIONS Do application controls address the primary assertions of the account or cycle? Test the application against the specific financial assertion related to the account or cycle: Accuracy Data entry validation controls Auto calculations Existence Application data entry validation controls Database data value requirements Completeness Job/Batch processing controls Reconciliations 20

TOOLS CAATs Data mining Data analysis ETL Use to look for flawed data that is a result of a flawed application or process 21

Examples: TOOLS Possible tests of controls Reconciling (e.g., customer id in transaction file to master file) Recalculating (e.g., extend inventory) Duplicates (source documents, fraud, error) Gaps (source documents, errors) Benford s Law (fraud, statistical assurance) Use CAAT to re-perform auto calculations and reconciliations 22

TOOLS Examples: Data mining to support audit objectives Code analysis -- Group codes to ensure data integrity (i.e., make sure a nonexisting code wasn t entered in error and the app allowed it) Purchase order threshold -- Proper authorization of purchases over a threshold Match expenditures to purchase orders for amounts => than threshold That is, app allows expenditures over P.O. threshold Credit card threshold -- Classify expenses by vendor to see if threshold is being manipulated 23

TOOLS Examples: Data mining to support audit objectives Credit memos Classify by rep to see if normal distribution, and proper authorization (person entering the C/M has authority to approve or key C/M) app or interface exercising proper authorization controls Stratify by amount for normal distribution (i.e. data integrity) Benford s Law, same purpose Inventory anomalies -- Check receiving reports for negative amounts received Check file maintenance changes to ensure inventory prices and quantity on hand is not being manipulated prior to physical counts) 24

REPORTING Usually self-evident Audit objective Tests conducted Results Recommendations 25

REFERENCES: Guide to Audit of IT Applications: http://www.isaca.ch/files/do2_isaca/thk_vorgehensmodell_e.pdf Auditing Application Control Oracle http://www.auditnet.org/docs/auditing_application_controls.pdf The Application Audit Process http://www.sans.org/reading_room/whitepapers/auditing/application-auditprocess-guide-information-security-professionals_1534 ISACA Journal 2012 volume 3 (Forthcoming) Tommie Singleton, Ph.D., CISA, CGEIT singleton_tommie@columbusstate.edu