Day 3 Uittenboogaard It Audit 1 The Hague 130515
Day 3 Uittenboogaard It Audit 1 The Hague 130515
Day 3 Uittenboogaard It Audit 1 The Hague 130515
Information and
Technology Audit
Ferdinand Uittenbogaard
Content
Focus on theoretical backbone of
IT-audit:
• Methodology, fundamental
principles, types of controls;
Schedule:
Start - 10.00
Coffee-break -10.50
second session- 11.00
End - 11.50- 12:00
Introduction
• Who am I?
• LLM
• 10 years
• RE
• CISA
• CISSP
• CISM
4
About the Central
Government Audit Service
• Established May 1st 2012
• Combining/merging strengths
of the ministerial audit
departments.
5
Getting started
6
Learning objectives
7
Topic Overview
1) The world of IT
2) IT Control Environment
3) IT Dependent Manual Controls
4) Application Controls
5) IT General Controls
6) Program Changes
7) Computer Operations
8) ITGC Walk-Through and Testing
8
The world of IT
IT Governance
Projects and Programs
Processes and information systems
IT-service management
Infrastructure
Information security
9
10
Topic Overview
1. The world of IT
2. IT Control Environment
3. IT Dependent Manual Controls
4. Application Controls
5. IT General Controls
6. Program Changes
7. Computer Operations
8. ITGC Walk-Through and Testing
11
IT audit definition
12
IT audit definition
13
Objects
A process
Procedures
A system
A project
Milestone products
IT-governance, policy and plans
14
Information system
User organization ICT organization
Precondition
Segregation of
IT General Controls
Duties
(ITGC)
(SoD)
Business Process(es)
Process specific
User Application
Controls Controls
16
2nd,3rd en 4th
Four ‘Lines of Defense’ Line of Defense
Integrity
oversight
External
Control
Audit
1st
Line of Defense
KPI based
Effectiveness
Efficiency
Non-repudiation:
20
Why is it Important to Audit IT Controls?
21
Why is it Important to Audit IT Controls? (Cont.)
22
General IT Considerations
Purpose:
• Relationship between significant processes and
applications
• Relationship between applications and
infrastructure
23
The IT landscape
4. Organization (branch, governance, tasks)
3. Processes (HR, Finance, Procurement etc.)
2. Applications (SAP, Windows, project software
etc.)
1. Infrastructure (databases, firewall etc.)
24
IT Controls Objectives
IT controls are designed to meet control objectives related to
Information Security requirements. The core objectives, often referred
to as C-I-A, can be depicted as follows:
Confidentiality: Integrity:
Protects sensitive Protects the integrity of
information from being
I critical IT resources like:
viewed by unauthorized - Hardware
users. Examples include: - Software
- Financial Data - data repositories
- Credit Card Numbers
- Social Security Number
Note: This objective
directly relates to internal
and external Privacy
requirements. Availability:
Ensures that critical IT
resources (i.e.,
hardware, software,
C data) are available A
when needed.
25
But also
Information Security requirements have a negative correlation with
other requirements for computer programs.
Functionality:
The functions that are
Incorporated in
a computer program.
F
Ease of use:
The usability of a
Security computer program.
Level of security
measures taken in a
computer program
S E
26
IT Topology & Terminology
The IT architecture in organizations can differ based on particular
business needs. The following graph provides a simplified overview of
common key components and terminologies:
Networks and Network
Servers provide a
PCs are also referred to as communication platform to
Clients and either host exchange data across
applications on the hard-drive multiple IT resources (i.e.,
or access resources via a client, server, printer, etc.),
network (Intranet or Internet) control user access, and/or
monitor data traffic and use
27
IT Control Overview
28
Classification of Controls
Manual Automated
Controls Controls
IT General Controls
Entity-Level Controls
29
Topic Overview
1. The world of IT
2. IT Control Environment
3. IT Dependent Manual Controls
4. Application Controls
5. IT General Controls
6. Program Changes
7. Computer Operations
8. ITGC Walk-Through and Testing
30
Automated Vs Manual Controls
IT-Dependent
Manual
Manual Automated
31
Automated Vs Manual Controls (Cont.)
Control Technique Automated Component Manual Component
Authorisation: Approval of
transactions executed in
accordance with Online routing and Manual approval form with
management’s general or online evidence of approval manual signatures
specific policies and
procedures.
Exception/Edit Report:
Generation of a report to Automated output control
Review and timely resolution
monitor something; based on exception identified
of exceptions
the results are investigated during processing of data.
to resolution.
32
Automated Vs Manual Controls (Cont.)
Control Technique Automated Component Manual Component
Segregation of Duties:
Separation of the duties and
Job responsibilities
responsibilities for authorising System access in accordance
appropriately
transactions, recording with job responsibilities
segregated
transactions, and maintaining
custody.
33
IT-Dependent Manual Controls
Controls performed by a person, who rely upon
automated output;
34
IT-Dependent Manual Controls (Cont.)
Testing Considerations
• What is report used for?
• How used in control?
• Completeness, accuracy, integrity, and existence
• Re-performance of calculations
35
Topic Overview
1. The world of IT
2. IT Control Environment
3. IT Dependent Manual Controls
4. Application Controls
5. IT General Controls
6. Program Changes
7. Computer Operations
8. ITGC Walk-Through and Testing
36
Application Controls
Sample Process Flow – Administration
Application Controls are system-enabled controls of Accounts Payable – Vendor Master
within standard business processes, which are
intended to enforce specific work requirements. A/P ERP
Buyer A/P Clerk
Application Controls are usually preventive in Manager System
closed)
- Automated audit logs
- Automated calculations
37
Procurement Process Examples
38
Inadequate Application Control Design
Consider Improvement Recommendations:
39
Walk-Through of IT Application Controls
Purpose:
40
Application Controls Testing
We are concerned with the following components of
application controls:
41
Application Controls Testing (Cont.)
How to test application controls:
• Will vary based on type of application (i.e.
SAP, JD Edwards);
• Will vary depending on whether the
application is an off-the-shelf vs. customized.
42
Topic Overview
1. The world of IT
2. IT Control Environment
3. IT Dependent Manual Controls
4. Application Controls
5. IT General Controls
6. Program Changes
7. Computer Operations
8. ITGC Walk-Through and Testing
43
IT General Controls (ITGC) – Definition
44
IT General Controls Overview
IT General Controls (ITGC) are designed to preserve Confidentiality,
Integrity and Availability objectives. ITGCs are critical to support the
integrity of IT-enabled processes, data, and application functions and
are embedded within the following traditional IT management functions
/ processes. ITGCs can be manual or automated:
45
Testing IT General Controls
Testing an application control or IT-dependent manual
control normally gives assurance that the control operated
effectively at that (single)point in time;
46
Key IT General Controls
Access to programs and data
Program change
Computer operations
47
Topic Overview
1. The world of IT
2. IT Control Environment
3. IT Dependent Manual Controls
4. Application Controls
5. IT General Controls
6. Program Changes
7. Computer Operations
8. ITGC Walk-Through and Testing
48
Access to Programs and Data
Segregation of duties.
49
Access to Programs and Data—Security Control Mechanisms
50
Program Changes - Authorized Changes and
Relevant Procedures
Objective: Determine that controls are in place to ensure that
any changes to the systems/applications have been properly
authorized by an appropriate level of management.
51
Program Changes—Testing of Program Changes
Objective: Determine that controls are in place to ensure that changes to
applications and systems are tested, validated, and approved before being
placed into production.
52
Topic Overview
1. The world of IT
2. IT Control Environment
3. IT Dependent Manual Controls
4. Application Controls
5. IT General Controls
6. Program Changes
7. Computer Operations
8. ITGC Walk-Through and Testing
53
Methods of Testing Computer Operations
Backup/recovery;
Backup restoration testing;
Access to backup media and offsite storage;
Problem management.
54
Computer Operations—Backup/Recovery
Objective:
Determine that management has implemented appropriate
backup and recovery procedures so that data, transactions, and
programs can be recovered.
Key control elements and testing considerations:
Responsibility for performing backups is assigned to IT
operations personnel;
Backup schedule and program/data retention
requirements are formally defined and in place;
Backups are sent offsite to an environmentally and
physically secure location where they can be retrieved
timely if ever the need arises.
55
Computer Operations—Access to Backup
Media/Offsite Storage
Objective:
56
Computer Operations—Problem Management
Objective:
57
Topic Overview
1. The world of IT
2. IT Control Environment
3. IT Dependent Manual Controls
4. Application Controls
5. IT General Controls
6. Program Changes
7. Computer Operations
8. ITGC Walk-Through and Testing
58
ITGCs Testing
Objective: Evaluate the design and operating
effectiveness of controls.
Design effectiveness:
• Document IT general controls.
• Walk through IT general controls or inquiry and
observation.
• Evaluate any design deficiencies.
Operational effectiveness:
• Test controls.
• Evaluate any operational deficiencies.
59
Effective ITGC Controls
Do provide a basis for reliance that the systems are operating
consistently over time and should continue to operate going
forward
Do not provide the basis for reliance that data processing and
reports are correct
60
Physical and Environmental Controls (Cont.)
Threats and Vulnerabilities:
Environmental threats (earthquakes, fires, floods, terrorism,
vandalism etc.)
Failure of supporting utilities (electric power, air conditioning,
heating, communication lines etc.)
Unauthorized physical access
Theft of equipment, computer devices, physical and electronic
files, documents etc
Disclosure, modification and improper physical access to
information and data
Tampering electronic devices and vandalism
Human Errors
Hardware Errors
61
Physical and Environmental Controls (Cont.)
62
Logical Access Controls
Access is the ability to do something with a computer
resource (e.g., use, change, or view);
63
Logical Access Controls (Cont.)
Access Criteria (criteria for granting or denying
access)
Identity
Roles
Location
Time
Transaction
Common Access Modes
Read access
Write access
Execute access
64
Typical Tests of Logical Access Controls
Identify the population of new or current users and select
a sample;
65
Identification & Authentication
Identification is the means by which a user provides a claimed
identity to the system
66
Thank you for your attention!
67