CISA - Domain 3 - IS Acquisition, Development and Implementation
CISA - Domain 3 - IS Acquisition, Development and Implementation
CISA - Domain 3 - IS Acquisition, Development and Implementation
After completing ● Understand and provide assurance that the practices for the acquisition,
this domain, you
development, testing and implementation of information systems meet
will be able to:
enterprise strategies and objectives
● Discuss project management control frameworks
● Detail configuration and release management
● Understand system migration and infrastructure deployment practices
● List project success criteria and risks
● Understand post-implementation review objectives and practices
Organizations need proper processes and methodologies to create and change application
systems and infrastructure components. This is called information systems lifecycle management.
Information systems lifecycle management requires thinking from end-to-end, encompassing:
● planning acquisition,
● acquisition,
● use, including maintenance, and
● retiring of,
information systems.
The CISA candidate must understand the various concepts and be able to identify which elements
may represent the greatest risk and which controls are the most effective at mitigating this risk.
Knowledge of benefits realization practices (e.g. feasibility studies, business cases, TCO, ROI)
Explanation:
● The objective of IT projects is to realize tangible benefits.
● Managing these benefits is essential to the success of projects.
● A cost benefit analysis should be prepared prior to beginning a project.
● This should estimate all costs and benefits throughout the life of a new system.
! The IS Auditor should ensure that when a cost benefit analysis is being prepared for a project under consideration, the
risks associated with the project have been assessed and the cost factor includes the cost of necessary controls.
Benefits realization is the process by which an organization evaluates technology solutions to business
problems. Factors in benefits realization include:
● cost;
● quality;
● development/time delivery;
● reliability; and
● dependability.
In the Benefits Realization Technique, also called Benefits Management, the organization considers
total benefits and total costs throughout the life of the new system.
The post-implementation review, involving documentation of lessons learnt, can be done between six
to eighteen months after implementation of the system.
A business case is normally derived from the feasibility study, and contains information for the
decision-making process on whether a project should be undertaken.
A feasibility study scopes the problem, outlines possible solutions, and makes a recommendation on
what action to take. A business case of sufficient detail for each solution should be developed in order
to allow a comparison of costs and business benefits.
● be a key element of the decision process throughout the life cycle of any project.
● be reapproved through departmental planning and approval process, if the business case changes
during the project.
Traditional SDLC or the waterfall model is based on a systematic, sequential approach to software
development (largely of business applications). It is the oldest and most widely used methodology for
developing systems.
SDLC phases are as follows:
● Feasibility study – defining the problem and developing the business case justification
● Requirements definition — defining the functional and quality requirements of the desired
solution.
● Design – developing baseline system specifications including security plans
● Development – of programming and testing
● Implementation – of deploying the new system, user acceptance testing, and commissioning
The only advantage of traditional SDLC is that it provides a template for capturing requirements.
Software Baseline
● sets a cut-off point beyond which changes require strict formal approval;
● guards against scope creep; and
● introduces software configuration management.
Change control processes
● ensure new requirements or changes are subject to the same formal review and approval
procedures; and
● prevent uncontrolled entry of new requirements.
● Interface/integration testing:
o connection of two or more components that pass information
● Regression testing: rerunning tests to ensure changes or corrections have not introduced errors
data used should be the same as data used in original system;
● Parallel testing: feeding test data into two systems and comparing results;
o test data generators are used to systematically generate random test data;
o interactive debugging aids and code logic analyzers are available to assist in testing activities.
● The new system is put into operation, and involves final acceptance testing.
o testing is completed;
Data Migration/Porting:
● what data to convert programmatically and what to convert manually;
● any necessary data cleansing;
● methods to verify conversion, For example; file comparisons, balance comparisons;
● parameters for successful conversion, e.g. percentage consistency;
● scheduling and sequencing of conversion tasks;
● documentation of audit trails e.g. data mapping;
● exception reports to capture items not converted automatically;
● responsibility for verifying and signing off conversion steps;
● testing conversion programs; and Carry out conversion “dress rehearsals”.
● Control of outsourcing conversion process ensuring nondisclosure, data privacy/destruction and
other
24 Copyright 2012-2014, Simplilearn, All rights reserved.
SDLC— Data Migration
Proper processes and building tools should be required to extract data from legacy system to
target system
Explanation:
● Strong project governance is essential for successful project implementation.
● Effective and efficient deployment of project resources is enhanced by having adequate project
governance mechanisms.
● The more complex the project, the more elaborate the governance structures and mechanisms.
The IS Auditor should be aware of the available business structures that should support and manage a project and the
! essential constituents of these structures, i.e., who should lead the various committees, who should be members, roles
and responsibilities, etc.
A program is a group of projects and time-bound task that are closely linked together through:
● common objectives,
● a common budget, and
● intertwined schedules and strategies.
Like projects, programs have a limited time frame (start and end date) and organizational boundaries.
Portfolio and Program Management is the application of knowledge, skills, tools and techniques
towards a stated objective.
● Network Infrastructure Upgrade (e.g. creating a wide area network (WAN) to link branches in
different countries, states or cities)
● Training of staff to understand the new processes and change in their roles
33 Copyright 2012-2014, Simplilearn, All rights reserved.
Portfolio and Program Management (contd.)
Portfolio or Program management basically involves controlling time and resources: It:
● covers software size estimation, scheduling, allocating resources and measuring productivity.
The following diagram shows the different organizational stakeholders involved in a project.
Senior Management
Project Sponsor
Steering Committee
User Management
Quality Assurance
Project Manager
Systems
Technical
Development User Project Team Security Officer
Infrastructure Team
Project Team
Explanation:
● The project manager’s skill set should be commensurate with the project at hand.
● To manage all the relevant parameters of a large project, project management practices, tools and
control frameworks are required.
● Projects need to be managed on hard, soft, and environmental factors
The IS Auditor should be aware of the available business structures that should support and manage a project and the
! essential constituents of these structures, i.e., who should lead the various committees, who should be members, roles
and responsibilities, etc.
● One-on-one meetings – facilitate two-way communication between project team members and
the project manager.
● Kick off meetings – used by project manager to inform team of what of what has to be done for
the project
● Project start workshops – ensure communication is open and clear, allow buy-in from stakeholders
Project Culture represents the norms and rules of engagement of the project. It is the common
understanding or the orientation expected of the team.
Project culture development /influencing method includes:
● establishment of a project mission statement,
● project name and logo,
● project office or meeting place,
● project intranet,
● project team meeting rules and communication protocols, and
● project specific social events.
Project Management practices refer to the application of knowledge, skills, tools and techniques to a
broad range of activities to achieve a stated objective such as meeting the defined user requirements,
budgets and deadlines for an IS project.
Project management processes include:
● Initiating;
● Planning;
● Executing;
● Controlling; and
● Closing the project.
Projects have three key intertwining elements called Deliverables, duration and budget (these should
have positive correlation).
The project is initiated by a project manager or a sponsor gathering all information required to gain
project approval in the Project Charter. The Project Charter or Terms of Reference contains:
● Objective of the project,
● Stakeholders of the expected, and
● Project manager and sponsor.
Approval of the Project Initiation Document (PID) or a Project Request Document (PRD) is
authorization of the project to begin
Software Size Estimation methods are used to determine the relative physical size of the application
software to be developed. These methods:
● guide allocation of resources, and estimation of time and cost required in order to compare the
total effort required by the resources
● traditionally done with single-point estimations (i.e. based on a single parameter) such as Source
Lines of Code (SLOC)
● now done using multiple point estimation, a good example being the Function point analysis (FPA)
One of the methods of software size estimation is Function Point Analysis (FPA):
● FPA is an indirect measure of the size of an information system (software size) based on number
and complexity of inputs, outputs, files, external interfaces and queries.
● Complexity adjustments (i.e. rating factors) are used based on analysis of reliability, criticality,
complexity, reusability, changeability and portability, etc.
Software Cost estimation is a consequence of software size estimation and involves estimation of
programs at each phase. Automated techniques for cost estimation of projects can be used at each
phase of system development. Some of the components to consider when using these techniques
include:
● source code language
● execution time constraints
● main and data storage constraints
● computer access and target machine used for development
● security environment
● staff experience
Scheduling involves establishing the sequential relationships among tasks: logically, with allowance
for parallel tasks, while taking into account allocation of resources.
Budgeting involves estimating the amount of effort required in human hours and machine hours.
The schedule can be graphically represented using various techniques such as Gantt charts, Critical
Path Method (CPM), Program Evaluation Review Technique (PERT) diagrams. These tools should be
revisited to verify compliance and identify variances. Variances and variance analysis including cause
and corrective action should be reported to management on a timely basis.
In the Critical path methodology (CPM) a project can be represented as a network where activities are
shown as branches connected at nodes immediately preceding and immediately following activities.
! Any delay on the critical path will translate to a delay in the whole project.
Program evaluation review technique (PERT) is used for planning and control, estimation of time and
resources required, and detailed scheduling (timing and sequence).
Timebox management is a project management technique for defining and deploying software
deliverables within a relatively short and fixed period of time, and with predetermined specific
resources. Timebox management:
● involves balancing software quality and meet the delivery requirements within the timebox or
time window.
● is well suited for prototyping or rapid application development.
● is aimed at preventing cost overruns and schedule delays (the main advantage of this technique)
● may result in quality being compromised for time.
● may include interfaces for future integrations in key features
The controlling activities of a project includes management of scope, resource usage and risk. New
requirements should be documented and, if approved, allocated the appropriate resources.
Changes to scope will always lead to changes in activities hence impacting deadline and budget and
therefore need to be handled formally in a Change Management Process.
1 2 3 4 5
The process Change request The Change If accepted the The project
starts with a is submitted to Advisory Board project manager sponsor after
formal change the project then evaluates updates the evaluating the
request manager (copies the change project plan to new plan may
containing a stored in project request (on reflect the accept or reject
clear description file) behalf of the requested the
of the requested sponsor) and change recommendatio
change and decides whether ns of the Change
reasons for to recommend advisory board
change the change
Resource usage is the process by which the project budget is being spent.
● It checks if actual spending is in line with planned spending, resource usage must be measured and
reported.
● Every budget and project plan presupposes a certain "productivity" of resources and delivers the
expected quality of the outcome/deliverable.
● Earned Value Analysis (EVA) technique can be used to check this. It involves comparing the
following continuously:
o budget to date
o actual spending to date
For an example on Resource Usage Management, please refer to the e-learning material.
Risks are the possible negative events or conditions that would disrupt relevant aspects of the
project.
There are two main categories of project risk:
● Those that impact the project itself. The project manager is responsible for mitigating this risk
(risks within the project).
● Those that impact the business benefits and therefore endanger the reasons for the project's very
existence. The project sponsor is responsible for mitigating this risk (business risk of the project).
A project should be finite and at some point be closed with the new or modified system handed over
to the users and/or system support staff.
● The project sponsor should be satisfied that the system produced is acceptable and ready for
delivery.
● Custody of contracts may need to be assigned, and documentation archived or passed on to those
who will need it.
● Survey the project team, development team, users and other stakeholders to identify any lessons
learned that can be applied to future projects
In this, lessons learned and an assessment of project management processes used are documented.
These are referenced in the future by other project managers or users working on projects of similar
size and scope.
Project management practice descriptions and related concepts and theories behind best practices
! have been brought together in "body of knowledge" reference libraries (BoKs). Certification schemes
have subsequently been based upon such BoKs.
To learn about Process Improvement Practices, please refer to the e-learning material.
“It is a set of interrelated work activities characterized by specific inputs and value-added tasks that
produce specific customer focused outputs. Business processes consist of horizontal work flows that
cut across several departments or functions."
-(Seth, Vikram; William King; Organizational Transformation through
Business Process Reengineering, Prentice Hall, USA, 1998)
Business Process Reengineering (BPR):
● is a response to competitive and economic pressures, and customer demands,
● involves automating processes to reduce manual intervention and manual controls,
● needs to suit business requirements for benefits to be realized.
The Capability Maturity Model (CMM) for Software is a process maturity model or framework that
helps organizations improve their software lifecycle processes. CMM helps organisations by:
● Improving their software life-cycle processes; and
● Preventing excessive Program schedule delays and cost overruns.
● Guiding software organisations in selecting process improvement strategies by determining
current process maturity, and identifying most critical issues to quality and improvement.
● Defining five maturity levels: Initial; Optimised, Repeatable, Defined;
Capability Maturity Model Integration (CMMI) was conceived as a means of combining the various
models into an integrated set. CMMI also describes five levels of maturity, although the descriptions
of what constitutes each level differ from those used in the original CMM.
! ISO 15504 is also known as SPICE (Software Process Improvement and Capability Determination). It is
based on CMM and is similar to CMMI.
Explanation:
● Proper risk management is required in order to minimize the consequences and the likelihood that
the project fails to achieve its goals.
● Major issues include: scope/deliverables, quality, budget and time.
● Risk management is a continuous process, not a one-time activity, since risk profiles will change
over time.
! As a “controls expert”, the IS Auditor will be expected to ensure that business risk is considered by the project during all
phases of development.
Explanation:
● Enterprise Architectures describe an organization’s structure, including business processes,
information systems, human resources and organizational units.
● Enterprise Architectures are supported or served by IT Architectures e.g., n-tier, client-server, web-
based and distributed components.
Main Area of Coverage: Components of enterprise architecture
! The IS Auditor must understand the role of these components and how control objectives are met across all
components to determine whether risk is sufficiently mitigated by these controls.
To learn about Business Application Systems, please refer to the e-learning material.
72 Copyright 2012-2014, Simplilearn, All rights reserved.
Electronic Commerce (E—commerce)
E-Commerce refers to buying and selling online, usually via the internet, using technology to enhance
the processes of commercial transactions.
E-Commerce models include:
● business-to-customer (B-to-C);
● business-to-business (B-to-B);
● business-to-employee (B-to-E);
● business-to-government (B-to-G);
● customer-to-government (C-to-E); and
● exchange-to-exchange (X-to-X).
Application server provide services such as data management, security & transaction management.
The major risk is transaction authorization i.e. matters of legal liability between partners may be put
in a trading partner agreement.
Other Risks of E-commerce include:
● Loss of business continuity;
● Unauthorized access to electronic transactions;
● matters of legal liability between partners may be put in a trading partner agreement;
● deletion or manipulation of transactions prior to or after establishment of application controls;
● loss or duplication of EDI transmissions; and
● improper distribution of EDI transactions while in the possession of third parties.
● Virus protection
● Continuity planning
● Digital Signatures
● Firewalls mechanisms
● Recognition of breaches–IDS
EDI is an electronic means for transmitting business documents between organizations in a standard
machine recognizable format. It is used to transmit business transactions between organizations with
dissimilar computer systems.
Benefits of EDI are:
● Less paperwork
● Fewer errors during information exchange
● Improved information flow
● No unnecessary re-key of data
● Fewer delays in communication
● Improved invoicing and payment processes
● Traditional, or
● web-based.
Moving data in a batch transmission process through the traditional EDI involves three functions
within each trading partner’s computer system:
● Communications handler that transmits and receives electronic documents between trading
partners
● EDI interface manipulates and routes data between the application system and the
communications handler
o EDI translator: Translates data between the standard ANSI format and a trader’s proprietary format.
o Application interface: Moves electronic transactions to and from application systems, and performs data
mapping.
● Application system processes the data to be sent to or received from the trading partner
Explanation:
● Use of vendors can speed a project and potentially reduce total costs.
● However, use of vendors add risks, especially if the vendor is single or sole-source provider .
● Proper vendor management can reduce/ prevent problems caused by picking a vendor that is
unable to achieve the required solution or timescale and by ensuring that contracts address
business needs and do not expose the business to unnecessary risk.
The IS Auditor must understand: the importance of requirements specification that forms the request for proposal
(RFP); the need for required security and other controls to be specified, the essential elements of vendor selection to
! ensure that a reliable and professional vendor is chosen and the essential contents of the contract – most notably,
the need, as appropriate, for an escrow agreement to be in place. The right to audit must also be addressed in the
contract.
Selection of a computer hardware and software environment frequently requires the preparation of
specifications for distribution to hardware/software (HW/SW) vendors and criteria for evaluating
vendor proposals.
The specifications are sometimes presented to vendors in the form of an invitation to tender (ITT),
also known as a request for proposal (RFP).
When purchasing (acquiring) hardware and software from a vendor, consideration should be given to
the following:
● Testimonials or visits with other users
● Provisions for competitive bidding
● Analysis of bids against requirements
● Comparison of bids against each other using predefined evaluation criteria
● Analysis of the vendor's financial condition
● Analysis of the vendor's capability to provide maintenance and support (including training)
● Review of delivery schedules against requirements
When selecting new system software, the business and technical issues considered include:
● Business, functional and technical needs and specifications
● Cost and benefits
● Compatibility with existing systems
● Security
● Demands of existing staff
● Training and hiring requirements
● Future growth needs
● Impact on system and network performance
● Open source code vs. proprietary code
Items Description
Product vs. systems The chosen vendor product should come as close as possible to meeting the
requirements defined requirements of the system.
Customer references Project management should check vendor-supplied references to validate the
vendor’s claims of product performance and completion of work done by the
vendor
Vendor The vendor should be reputable and should be able to provide evidence for
viability/financial financial stability.
viability
Availability of complete The vendor should provide a complete set of system documentation for review
and reliable prior to acquisition.
documentation
Items Description
Vendor support The vendor should make available a complete line of support products for the software.
Source code availability If not received from the vendor initially, there should be provisions for acquiring the source
code in the event that the vendor goes out of business. To avoid this risk, the clauses should
be part of the proprietary agreement in which a third party holds the software in escrow
should such an event occur . This escrow agreement should include product updates and
program fixes.
Number of years More years indicate stability and familiarity with the business the product supports.
experience
in offering the product
Number of clients sites A larger number suggests wide acceptance of the product in the market place.
using the product with a
list of current users.
Acceptance testing of the This is important in ensuring that the product really satisfies your
product system requirements. This is allowed before a purchasing
commitment must be made.
Explanation:
● Tracking and monitoring requirements ensure that project resources are focused on the correct
tasks.
● Requirements gathering is one of the most critical and difficult activities of the development life
cycle.
● Requirements should be prudent; feasible; cost-effective; and above all, aligned with business
strategy, plans and policies.
● Requirements should be documented to facilitate the understanding of the developers and
formally approved and frozen (baselined) to prevent scope creep.
Requirements Analysis involves identifying and specifying requirements of the system chosen
Decisions on Requirement Analysis are made on:
● system processes;
● user requirements and interaction;
● information criteria (effectiveness, efficiency, confidentiality, integrity, availability,compliance,
reliability); and
● system operating environment (that is, operating system).
An important tool for creation of a general preliminary design is an Entity Relationship Diagram (ERD).
To learn about the Entity Relationship Diagram (ERD), please refer to the e-learning material.
Explanation:
● Each project has unique success criteria based on the expectations of its stakeholders.
● The project sponsor is a key stakeholder who defines such success criteria.
● One technique to describe success criteria and deliverables is called the object breakdown
structure.
● Success criteria allow the project manager to focus on those risks that are most important for the
successful completion of the project.
● A risk in any software development project is that the final Architectura System
l Design Testing
outcome may not meet all requirements.
Component Integration
Design Testing
● The V-model approach ensures that potential mistakes are
corrected early and not solely during final acceptance Code
Unit Testing
Generation
testing.
Executable software
To learn about Object Breakdown Structure (OBS), please refer to the e-learning material.
104 Copyright 2012-2014, Simplilearn, All rights reserved.
IS Acquisition, Development, and Implementation
Knowledge Statement 3.9
The IS Auditor must be aware of the need for controls to ensure the authorization, accuracy and completeness of data
! input to, processing by and output from computer applications. He/she must also know what types of control
techniques are available at each level and how each may be evidenced in the form of reports, logs and audit trails.
Data Files Controls ensure that only authorized processing occurs to stored data. Categories of data
files and database tables are as follows:
● System control parameters
● Standing data
● Master/balance data
● File updating, maintenance authorization
● Before and after image reporting
● Maintenance error reporting and handling
● Source documentation retention
Output controls ensure that processed data is delivered to users in an consistent and secure manner.
They include the following:
● Logging and storage of negotiable, sensitive and critical forms in a secure place
● Computer generation of negotiable instruments, forms and signatures
● Output error handling
● Report distribution and control over print spools
● Balancing and reconciling
Agile development uses small time-boxed sub-programs/projects or iterations. After each iteration:
● the next iteration is planned; and
● the Program is re-evaluated: re-prioritizing and identifying new requirements.
There is greater reliance on people’s knowledge and small focused teams.
RAD enables strategically important systems to be developed quickly while maintaining quality.
● It supports analysis, design, development and implementation of individual applications.
● It does not support planning/analysis of information needs of major business areas or the whole
organization.
RAD involves:
● small well-trained development teams;
● evolutionary prototypes;
● tools that support modelling, prototyping and component reusability;
● central repository;
● interactive requirements and design workshops; and
● rigid limits on time frames.
116 Copyright 2012-2014, Simplilearn, All rights reserved.
Development Methods – Object Oriented Systems Development
Object Oriented systems development contrasts from traditional approaches that treat data and
procedures separately. Data and procedures are grouped into an entity called an “object”:
Objects are organized into an aggregation hierarchy, with descriptions which show how services are
used. Object classes may inherit attributes and services from other object (parent) classes. Major
advantages of this method are as follows:
● Permits analysts, programmers, developers to consider larger logical chunks of a system
● Ability to manage unrestricted variety of data types
● Allows modelling of complex relationships
Web-based application development facilitates and standardizes code module and program
integration across platforms.
● Achieves easier and effective integration of modules within & between enterprises.
● It avoids the need for redundant computing tasks and redundant code; e.g. updating addresses
across different databases.
Re-engineering is updating an existing system by extracting and reusing design and program
components. Reverse engineering involves taking apart a system to see how it functions, and using
the information to develop similar systems. It involves:
● de-compiling executable code into source code, and
● using reverse-engineering tools to unveil functionality using black-box test data.
! The IS Auditor should be familiar with QA concepts and methods and be able to test the compliance of the processes
and products with the methodology and standards adopted.
Testing involves analyzing computer application programs, testing computer application controls, and
monitoring data process transactions.
Test data/deck and parallel simulation are common for testing in a batch processing environment.
Data integrity testing is testing the accuracy, completeness, consistency and authorization of data
held in systems. It indicate failures in input or processing controls. Types of data integrity is as follows:
● Relational integrity is enforced through data validation routines or input conditions and tests are
performed at data and record level.
● Referential integrity is ensuring that all references to a primary key from another file actually exist
in the original file.
Explanation:
● Configuration and release management provide systematic, consistent and unambiguous control
on attributes of IT components comprising the system.
● Changes to IT systems must be carefully assessed, planned, tested, approved, documented and
communicated to minimize any undesirable consequences to the business processes.
! The IS Auditor should be aware of the tools available for managing configuration, change and release management and
of the controls in place to ensure segregation of duties between development staff and the production environment.
The change management process begins with authorizing changes which involves prioritizing and
approving change requests. This must involve:
● user and system staff;
● formal correspondence on change requests to system management; and
● a process of tracking status of requests, ensure requests are timely addressed.
Requests should be part of the systems permanent documentation.
Deploying changes with user acceptance tests; and user management approval to deploy.
Documentation facilitates future system maintenance.
● It should include system and user/operations documentation.
● Office copies for disaster recovery are also required
Emergency changes are common when errors occur on system that are used in critical production job
processing. Procedures must ensure changes do not compromise system integrity.
Controls include:
● special logons for temporary programmer access;
● careful logging and monitoring of activities; and
● normal change controls applied retrospectively and documentation.
As part of the software configuration management task, the maintainer performs the following task
steps:
● Develop the configuration management plan
● Baseline the code and associated documents
● Analyze and report on the results of configuration control
● Develop the reports that provide configuration status information
● Develop release procedures
● Perform configuration control activities such as identification and recording of the request
● Update the configuration status accounting database
Computer-aided software engineering (CASE) is the use of automated tools to aid in the software
development process. They aid in reducing effort in translating requirements and design information
into program logic for subsequent testing and implementation. Three categories of CASE are:
● Upper CASE: describe and document business requirements;
● Middle CASE: develop detailed designs; and
● Lower CASE: generate program code and database definitions.
IS auditor considerations:
● CASE tools do not ensure requirements are met;
● CASE tools do not replace application development methodology;
● application changes must be reflected in stored CASE product data – change management;
● application controls need to be incorporated; and
● CASE repository needs to be secured.
Knowledge of post implementation review objectives and practices (e.g., project closure, control
implementation, benefits realization, performance measurement).
Explanation:
● Post implementation review is typically carried out in several weeks or months after project
completion, when the major benefits and shortcomings of the solution implemented will be
realized.
● Projects should be formally closed to: provide accurate information on project results, improve
future projects and allow an orderly release of project resources.
● The closure process should: determine whether project objectives were met or excused and
identify lessons learned to avoid mistakes and encourage repetition of good practices.
Main Area of Coverage: Post implementation Review
Post-implementation review verifies that the system was designed and developed properly and
proper controls were built into the system.
The objectives of post-implementation are:
● Assessing system adequacy:
o Were user requirements and management objectives met?
o Were access controls adequately defined and implemented?
● Reviewing program cost/benefit (ROI) requirements
● Providing recommendations for system inadequacies/deficiencies
● Providing implementation plans for recommendations
● Can be done internally by the Program development team and selected end-users
b. After early planning has been completed, but before work has begun
c. Throughout the work stages, based on risks and exposures
d. Only after risks and exposures have been identified and the IS auditor
has recommended appropriate controls
b. After early planning has been completed, but before work has begun
c. Throughout the work stages, based on risks and exposures
d. Only after risks and exposures have been identified and the IS auditor
has recommended appropriate controls
Answer: a.
It is extremely important that the project be planned properly and that the specific phases
and deliverables be identified during the early stages of the project.
Copyright 2012-2014,Simplilearn,All rights reserved
Answer: d.
By evaluating the organization's development projects against the CMM, an IS auditor determines whether the development
organization follows a stable, predictable software process. Although the likelihood of success should increase as the software
processes mature toward the optimizing level, mature processes do not guarantee a reliable product. CMM does not evaluate
technical processes such as programming nor does it evaluate security requirements or other application controls.
Copyright 2012-2014,Simplilearn,All rights reserved
a. operating system (OS) being used is compatible with the existing hardware platform.
a. operating system (OS) being used is compatible with the existing hardware platform.
Answer: d.
In reviewing the proposed application the auditor should ensure that the products to be purchased are compatible with the current or planned
OS. Regarding choice a, if the OS is currently being used, it is compatible with the existing hardware platform, because if it is not it would not
operate properly. In choice b, the planned OS updates should be scheduled to minimize negative impacts on the organization. For choice c, the
installed OS should be equipped with the most recent versions and updates (with sufficient history and stability).
Copyright 2012-2014,Simplilearn,All rights reserved
d. It ensures that functions or extras are not added to the intended system.
d. It ensures that functions or extras are not added to the intended system.
Answer: b.
Prototype systems can provide significant time and cost savings; however, they also have several
disadvantages. They often have poor internal controls, change control becomes much more complicated,
and it often leads to functions or extras being added to the system that were not originally intended.
Copyright 2012-2014,Simplilearn,All rights reserved
Here is a quick • Protection of information assets includes the key components that ensure
recap of what we
confidentiality, integrity and availability (CIA) of information assets.
have learned in this
domain: • The evaluation design, implementation and monitoring of logical and
physical access controls to ensure CIA.