ITCi ITAC Change MGMT 0707
ITCi ITAC Change MGMT 0707
ITCi ITAC Change MGMT 0707
Change
Management
Practical guidance
for managers on
how to prepare for
successful audits
www.ITCinstitute.com
Research Sponsors
Solidcore
Tripwire
√I T AUDIT CHECKLIS T SERIES
Change Management
About the IT Compliance Institute
The IT Compliance Institute (ITCi) strives to be a Table of Contents
global authority on the role of technology in business
governance and regulatory compliance. Through 2 Executive Overview
comprehensive education, research, and analysis
3 Introduction to Change Management
related to emerging government statutes and affected
business and technology practices, we help organizations 4 What Is Change Management?
overcome the challenges posed by today’s regulatory
environment and find new ways to turn compliance 4 What Are the Benefits of Change Management?
efforts into capital opportunities.
6 The Auditor’s Perspective on Change Management
12 Audit Planning
All design elements, front matter, and content are copyright © 2007 IT Compliance 12 Audit Testing
Institute, a division of 1105 Media, Inc., unless otherwise noted. All rights are
reserved for all copyright holders.
13 Processes
No part of this publication may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise, except as permitted under § 107 or 108 of the 13 Steps
1976 United States Copyright Act, without the prior written permission of the
copyright holder.
14 Controls for Change Management
Limit of Liability/Disclaimer of Warranty: While the copyright holders, publishers,
and authors have used their best efforts in preparing this work, they make no
representations or warranties with respect to the accuracy or completeness of 30 Audit Reporting
the contents of this book and specifically disclaim any implied warranties of
merchantability or fitness for a particular purpose. No warranty may be created
or extended by sales representatives or written sales materials. The advice and 31 Preparing for an Audit
strategies contained herein may not be usable for your situation. You should consult
with a professional where appropriate. Neither the publishers nor authors shall be
liable for any loss of profit or any other commercial damages, including, but not 32 Communicating with Auditors
limited to, special, incidental, consequential, or other damages.
All trademarks cited herein are the property of their respective owners. 33 Appendix A—Change Management Resources
www.ITCinstitute.com 1
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Executive Overview
www.ITCinstitute.com 2
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Introduction to
Change Management
www.ITCinstitute.com 3
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
www.ITCinstitute.com 4
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
of IT and business errors. Thus, the scope of change • Demonstrable integrity of proprietary code; preserva-
management control objectives, policies, and procedures tion of intellectual property value
should encompass both mistakes and malice.
• Lower risk of negative impact on production systems
from unapproved changes
In general, change management can help an organiza-
tion reduce risks to a level acceptable to management. • Tighter management of staff resources, time spent on
Appropriate change management controls benefit not projects, and adherence to deadlines
only regulatory compliance, but information security,
• Necessary creation of stable application testing
operations, and risk management functions. Moreover,
environment, wherein functional variables can be
since the goal of change management is largely to ensure
carefully controlled
that changes are appropriate and don’t product negative
consequences, good change management controls can • Less cost and delay associated with reconciling appli-
actually support both IT and business agility. cations across inconsistent of development, test, and
production environments
Specific benefits of sound change management include:
Procurement
Project Management • Congruity between contracted work and actual scope
• Less opportunity for scope creep and of work
requirement changes
• Better oversight of change orders and change-related
• Stronger adherence to budgets, milestones, project costs
and deadlines
• Better alignment of planned and actual services—and
• Improved product and project transparency planned and actual risk levels—associated with exter-
during development process nally developed applications
www.ITCinstitute.com 5
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Why Audit?
• Faster identification of control deficiencies allowing Change management audits are opportunities for com-
unauthorized changes, based on change monitoring; panies to improve, based on auditor analysis and advice.
faster response to and remediation of security events To preserve the integrity and authority of audits, auditors
maintain a delicate balance between offering advice and
• Faster, more effective staff response to system crashes
making decisions.
due to software changes or other factors, such as
spontaneous hardware failure
For each organization, the scope of auditor responsibility
• Higher customer satisfaction and an improved should be documented in the company’s internal audit
perception of IT by management, based on improve- charter and be approved by the audit committee. Because
ments to information confidentiality, integrity, and each organization has different goals and objectives—
availability, as well as worker productivity and certainly different issues and challenges—there is
no one-size-fits-all audit process, nor one audit approach,
• Fewer business losses due to change-based failures
that fits all situations.
of production systems
www.ITCinstitute.com 6
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
the audit “terms of reference”). Planning for each audit since they are held accountable for protecting and
requires serious consideration of the organization’s many enhancing the value of the organization’s technolo-
risks and opportunities. Finally, in many companies, gies, applications, and systems. Managers must also
continuous auditing (ongoing audit evaluations) is being review and monitor change management controls to
implemented for key systems and/or key transactions. ensure they are appropriate, despite ever-changing
risks and business requirements. This is, in fact, a
Who Is Responsible for form of auditing.
www.ITCinstitute.com 7
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
businesses user who requested the change or even the To fulfill the audit’s potential, however, internal auditors
vice president of operations. And Change Manager need to:
might be an assigned IT title. Who has the roles is
1. Know what they are doing (have the skills to perform
less important than that change management policies
appropriate change management audits)
and procedures identify the roles and responsibilities,
and that job descriptions reflect these requirements.
2. Have a strong understanding of the technical and the
business environment and factors that might influ-
4. The internal audit function provides strategic, opera-
ence the effectiveness of change controls
tional, and tactical value to an organization. In relation
to change management, for example, internal audit:
3. Know what to ask for in assessing change manage-
ment programs
• Informs the board and management as to whether
business and IT units understand the importance
4. Complete regular and ongoing training to keep on
of change management and are adhering to poli-
top of new guidance and standards of practice
cies, whether key information assets and systems
are sufficiently protected, whether programs are
In addition, the auditing function should complement,
in place for continually updating and strengthen-
but never replace or overpower, management’s respon-
ing safeguards against unauthorized changes and
sibility to ensure that change management controls are
undue risk stemming from authorized changes,
existent and effective.
and whether existing policies are reasonable and
enforced. In brief, internal audits assess the state
of the change control environment and recom-
mend improvements.
www.ITCinstitute.com 8
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
www.ITCinstitute.com 9
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Accordingly, auditors and managers should work to A balance between short- and long-term focus, for
help each other reach common goals—auditors striving both objectives and results
to earnestly, honestly, and completely assess program
effectiveness, and management working to help auditors Managerial willingness to embrace new ideas
make valid assessments. In that vein, there are some
typical program characteristics and managerial processes Auditors Don’t Like ...
that auditors do and don’t like to see. As in all aspects of Managers who adopt the “letter” of change
audit and risk management programs, auditor likes and management requirements in order to satisfy audit
dislikes vary by company; however, the following list item- requirements, rather than embracing the “spirit” of
izes typical indicators of good and bad audits. the controls for the full risk mitigation they can offer
www.ITCinstitute.com 10
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
(Not) having administrative support where needed Allow ready access to all management and staff, if
required by the audit team to gain a clearer picture of
(Not) providing accurate documentation overall operations
(Not) having an audit charter for the internal Work with the audit team to draw up a staff
audit function interview schedule as part of the planning effort.
Update the schedule as necessary during the audit
fieldwork phase, if circumstances change.
1
The audit team is always expected to ensure all their interactions (with all staff) are
professional and result in a minimal disruption.
www.ITCinstitute.com 11
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Change Management
Audit Checklist
Your audit’s goals, scope, and purpose determine the Audit Testing
appropriate audit procedures and questions. An audit of Management has a responsibility to ensure that audit
change management controls should determine that key testing is productive. The audit team performs tests to
risks to the organization are being controlled, that key independently assess the performance of the change
controls are operating effectively and consistently, and management program. Although the audit team
that the relevant functional area management and staff ultimately determines the nature of these tests and the
have the ability to recognize and respond to new threats extent of testing (e.g., the sample sizes to use), manage-
and risks as they arise. ment should engage auditors in discussions about their
testing methods and goals.
The following checklist generally describes change
management audit steps that management might follow In tone, management should try to strike a balance,
in preparation for and during an audit. The list does not neither entirely deferring to the audit team nor micro-
attempt to itemize every possible change management managing the internal audit efforts. The key is to provide
objective, but rather to provide general guidance on productive input on the evaluation methodology before
defensible controls and a logical control hierarchy. audit management signs off on it.
Audit Planning As the testing phase winds up, the audit team prepares
summaries of its key findings. Change managers (or IT
The audit team develops an initial draft of the internal management responsible for interacting with auditors
audit plan on their behalf) should be prepared to provide feedback
and comments on audit summaries, prior to the more
Those change owner, change manager, and other final, formal audit report.
stakeholders meet with the audit team to review
audit program steps and define key players and Proactive communication, candor from all parties, and
necessary resources thorough documentation can prevent many surprises and
conflicts that might otherwise arise during the testing
Change management staff collects program phase; however, managers might still disagree from time
documentation in preparation for audit to time with audit results. Management should strive to
provide solid evidence—not just argument—that sup-
Management supports a preliminary survey of
ports its contrasting position. Facts are the most powerful
the change management program (by the internal
tool for swaying an adverse opinion before the audit
audit team)
report is finalized.
www.ITCinstitute.com 12
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
expectations to stakeholders
Auditors evaluate whether risk management controls
__ Impact of program efforts on are sufficiently preventive, detective and, if applicable,
corrective
organizational culture
__ Internal enforcement processes and consistency Auditors define tests to confirm the operational
effectiveness of change management activities. Tests
__ Ongoing improvement efforts might include management and staff interviews,
documentation and report review, data analysis, and
Managers support more detailed audit analysis of the result sampling for recent initiatives.
change management program
Managers provide requested data, documentation,
Auditors complete the evaluation of design adequacy and observations
Auditors complete the evaluation of Auditors identify and recommend opportunities for
control effectiveness improvement of change management activities
www.ITCinstitute.com 13
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Change management
Information security
Project
Development Procurement Testing IT operations
management
2 5
Information Systems Audit and Control Association (ISACA), “Control Objectives for NIST 800-53 and an additional publication, FIPS 199 (“Standards for Security
Information and related Technology (COBIT)”: http://www.isaca.org/cobit Categorization of Federal Information and Information Systems” <http://csrc.nist.
gov/publications/fips/fips199/FIPS-PUB-199-final.pdf>. February 2004.), provide
3
UK Office of Government Commerce Information Technology Infrastructure Library much more extensive guidance on information security controls than is reproduced
v3. June 2007. http://www.itil.co.uk in this paper. Of particular note is the three control impact ratings or “baselines”
4
defined in FIPS 199 and specified for individual controls in NIST 800-53. The
US NIST Special Publication (SP) 800-53, Recommended Security Controls for NIST guidelines do not simply assign each control a baseline; rather, they provide
Federal Information Systems. February 2005. http://csrc.nist.gov/publications/ guidance on how controls must be implemented to meet the criteria for increasingly
nistpubs/800-53/SP800-53.pdf stringent levels of control baselines.
www.ITCinstitute.com 14
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Management Controls
Management controls ensure a well-run and effective
change management program. In general, management
controls assess whether:
Description
Risk Assessment Policy and Procedures: The organization develops, disseminates, and periodically reviews/updates: 1) a
formal, documented risk assessment policy that addresses purpose, scope, roles, responsibilities, and compliance; and 2) formal,
documented procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls
System Risk Profile: The organization categorizes the IT system, processes, and services, including 1) business purpose,
2) impact on the business in terms of dollars (or other relevant goal units), 3) business owner, 4) data owner, 5) relationships
of various configuration items (for example: parent-child relationships) within systems and services, 6) security requirements,
and 7) other data relevant to the business
Risk Assessment: The organization conducts assessments of the risk and magnitude of harm that could result from the
unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that
support the operations and assets of the agency
Risk Assessment Update: The organization updates the risk assessment whenever there are significant changes to the
information system, the facilities where the system resides, or other conditions that may impact the security or accreditation
status of the system
www.ITCinstitute.com 15
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Management Controls
Description
Change Management Assessment Policies and Procedures: The organization develops, disseminates, and periodically
reviews/updates: 1) documented change management assessment and certification policies that address purpose, scope,
roles, responsibilities, and compliance; and 2) documented procedures to facilitate the implementation of the change man-
agement assessment and certification policies and associated assessment, certification controls
Change Management Assessment and Certification: The organization conducts an assessment of change management
controls to determine the extent to which the controls are functional and effective
Plan of Action and Milestones: The organization develops and updates a plan of action and milestones that documents
the organization’s planned, implemented, and evaluated remedial actions to correct any deficiencies noted during the
assessment of change management controls and to reduce or eliminate known vulnerabilities in the information system
Continuous Monitoring: The organization monitors change management through key performance indicators (KPIs),
including 1) number of changes authorized per week, 2) number of changes implemented per week, 3) number of unau-
thorized changes detected, 4) change success rate, 5) number of changes resulting in service affecting outages, 6) amount
of downtime in hours resulting from unauthorized changes, 7) cost of downtime associated with unauthorized changes, 8)
number of emergency changes, and 9) number of standard changes
Planning
In each area that requires change management, proper planning is vital to mitigate organizational risks and opti-
mize efficiency, effectiveness, economy, and compliance. Organizations must develop, document, periodically
update, and implement change management plans for organizational information systems that describe the change
management controls in place or planned.
Description
Change Management Plan: The organization develops, documents, and implements a change management plan that pro-
vides an overview of change management requirements for the services and a description of controls in place or planned for
meeting those requirements. The plan clearly identifies scope of coverage of change management policies and procedures
and identifies change management controls based on the specific characteristics and requirements of particular staff groups
or environments (e.g., production environments vs. development environments, onsite vs. offsite developers, internal vs.
contracted developers, etc). Designated officials within the organization review and approve the plan.
Change Management Plan Updates: The organization has a defined review period, reviews the change management
plan, and revises the plan to address system/organizational changes or problems identified during plan implementation or
security control assessments
www.ITCinstitute.com 16
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Management Controls
Planning (continued)
Description
Change Management Models: The organization develops a variety of change models and defines clear criteria for when
each model should be applied. Models indicate varied workflows and processes to accommodate variations in risk and
urgency associated with different scenarios and requirements. Common change management models include:
• Standard: Simplified policies and processes associated with low-risk changes—generally comprising a single review,
approval, and logging
• Significant: Policies and procedures associated with higher-risk changes, often requiring the involvement of a change
advisory board (CAB) to evaluate and accept or reject the proposed change
• Emergency: Polices that support abbreviated change management processes in the case of an urgent need. Emergency
procedures support rapid implementation of a change and forestall thorough testing and verification until after the
crisis has passed.
All change models reduce residual risk to a level acceptable by management. Each model defines testing protocols commen-
surate with associated risks.
Scheduling: In order minimize the disruptive impact of changes on the business and prevent change scheduling conflicts, the
organization: 1) defines maintenance windows for IT services, 2) manages change scheduling through a “forward schedule
of change,” 3) documents and any planned downtime beyond that defined in the negotiated maintenance windows in a
planned service availability (PSA) document, and 4) evaluates the success or failure of changes following implementation.
Changes that must be scheduled outside of planned maintenance windows follow a defined emergency change model that
defines: 1) criteria for allowing exceptions, 2) individuals and/or roles authorized to approve emergency changes, 3) protocols
for reviewing emergency changes to determine if they were truly emergencies and not attempts to circumvent normal change
management procedures, and 4) protocols for testing emergency changes to ensure related risks are properly managed.
Change Advisory Board: The organization establishes a change advisory board (CAB) that provides perspectives on
changes to the Change Manager. As an adjunct to the CAB, the organization establishes an emergency committee
(CAB/EC) that supports change management in urgent scenarios.
Service Development Life Cycle (SDLC): The organization defines and enforces standards around the creation of new
services and service updates. The SDLC covers: 1) the collection and documentation of requirements; 2) design of the new
system or update; 3) development procedures, including development standards; 4) testing protocols; 5) deployment into
production of new services and updates; 6) requirements for services in production; 7) requirements for service mainte-
nance; and 8) standards for decommissioning of services.
Rules of Behavior: The organization establishes and makes readily available to all relevant staff a set of rules that describes
their responsibilities and expected behavior with regard to change management. The organization receives signed acknowl-
edgement from users indicating that they have read, understand, and agree to abide by the rules of behavior, before
authorizing access to development and production systems.
Enforcement: The organization defines a disciplinary process for employees that flout change management controls. To
ensure change management policies are upheld by both internal employees and third parties, management defines disciplin-
ary procedures for: 1) employees, 2) contractors, and 3) vendors.
www.ITCinstitute.com 17
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Management Controls
Communications
Management actively oversees policies and processes related to IT product and service changes and related risks.
Description
Change Communication Plan: The organization develops, disseminates, and enforces a change communication plan to
inform staff stakeholders about the nature and impact of potential changes. The plan includes: 1) a formal, documented
communication policy that addresses communication purpose, scope, roles, responsibilities, schedules, and compliance; 2)
formal, documented procedures for communication; and 3) procedures for evaluating and responding to staff feedback
throughout the project process. Designated officials within the organization review and approve the plan.
Stakeholder Analysis: The organization: 1) identifies all staff who are involved in or stand to be impacted by a change or
project, 2) categorizes stakeholders into communication groups, and 3) analyzes stakeholder expectations for communication
Communication Approval: The organization specifies how communications should be generated and approved, including
allocation of approval authority only to personnel formally authorized by management
Communication Record Retention: The organization retains a record of all change-related communications
Description
System and Service Acquisition Policy and Procedures: The organization develops, disseminates, and periodically
reviews/updates polices and procedures for the procurement of IT products and services that addresses: 1) application of
change management policies and procedures to acquisitions, and 2) the need for an impact assessment to analyze the
ramifications of a requested change related to new or existing, software or services
Contract and Purchase Order Change Management: The organization develops, disseminates, and periodically reviews/
updates policies and procedures for making changes to existing purchase orders and contracts
System and Service Acquisition Approval: The organization specifies how purchase requests should be processed and
approved, including designation of purchase authority to personnel formally authorized by management
Notification to Vendors of Procurement Process Changes: Vendors are notified of changes to procurement policies; for
example, if the purchasing organization stops accepting verbal orders and begins requiring purchase orders
Procurement Training: Personnel receive formal training on procurement policies and procedures
6
According to the ITIL definition of service, configuration items can include hardware,
software, people, facilities, services, documentation, and other technical and non-
technical components that contribute to workable IT processes. System specifically
relates to hardware and software and is used here to clearly differentiate procure-
ment of IT products from procurement of services, such as outsourced application
hosting, etc.
www.ITCinstitute.com 18
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Operational Controls
Operational controls ensure the effective performance
of the change management program. In general, opera-
tional controls assess whether:
Description
Change Management Awareness and Training Policy and Procedures: The organization develops, disseminates, and
periodically reviews/updates: 1) a documented change management awareness and training policy that addresses purpose,
scope, roles, responsibilities, and compliance; and 2) procedures for the implementation of change management awareness
and training, as well as related security awareness and training controls
Change Management Awareness: The organization ensures that all employees (including managers and senior execu-
tives) are made aware of change management awareness materials before gaining access to information systems
Change Management Training: The organization identifies personnel whose job roles empower them to make significant
changes to IT systems and services, documents their roles and responsibilities, and provides appropriate information change
management training before authorizing access to information systems
Training Records: The organization documents change management training activities at the individual level
Training Change Management: The organization ensures that changes to training and awareness processes and programs
adhere to general change management policies
www.ITCinstitute.com 19
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Operational Controls
Change Management
Organizations The organization ensures that change requests are 1) registered, seen and approved by proper authori-
ties; and 2) supported to a degree that allows management to appropriately evaluate risk associated with the change.
Description
Change Request Template: The organization develops, disseminates, and periodically reviews/updates a change request
template that documents a description and status of the change request. The change request template should contain: 1)
date of request submission; 2) date of managerial review; 3) intended impact of the change; 4) potential risks associated
with the change; 5) disposition of the review (approved, rejected, etc.); and 6) current status of the change (also reflecting
the status of an associated project plan, if appropriate)
Change Request Log: The organization maintains a log of all change requests. The log records information required by the
change request template.
Review and Approval Process: All IT service, process, and product changes are submitted and reviewed in written format.
At least one appropriate manager, as defined by the organization, reviews every change request. The change approval
authority reviews requests with the change owner prior to approving any change. Approval authorities notify change
requestors of change acceptance or rejection.
Change Evaluation: Management reviews change requests for: 1) business justification (cost vs. benefit); 2) technical fea-
sibility; 3) project budget impact; 4) operating budge impact, both for the IT department and other affected departments;
5) project timeline impact; 6) information security impact; 7) compliance impact; 8) impact on other planned functionality
related to the project; 9) impact of any delay or expedition of the change; and 10) historical precedence (whether the
change has been previously attempted and the outcome of that effort)
Post-Implementation Reviews: Management defines a policy, procedures, a timeline, and roles for post-implementation
change reviews. The timeline for a change review is generally at least 30 days after the implementation of a change. The
goal of the review is to determine the success or failure of a change, specifically: 1) Whether the change delivered the
expected outcome, and 2) whether any incidents or problems occurred as a result of the change.
Periodic System, Product, and Service Audits: The organization periodically audits IT systems and services to identify
any deviations from approved conditions. If audits reveal unauthorized changes, the organization performs an investigation
to determine the root causes of the changes and takes steps to correct any staff issues or control deficiencies revealed by
the audit.
Segregation of Duties
Segregation of duties controls prevent IT staff from posting unauthorized changes to development, production, and
testing environments. In smaller IT environments, where staffing limitations prevent complete segregation of duties,
management should instill compensating controls that meet commensurate control objectives.
Description
Control of Changes to Source Code: In order to control source code changes, managers establish controls to prohibit
access to the source code repository by: 1) test engineers and test administrators, 2) database administrators, 3) system
administrators, 4) IT operations personnel
Role Prohibitions: Management establishes controls to prohibit developers from also acting as: 1) system administrators,
2) security administrators, 3) database administrators, and 4) test engineers and test administrators
Compensating Controls: If staff limitations prevent full segregation of duties, management defines compensating controls
that meet the goal of protecting development, testing, and production environments from unreviewed changes
www.ITCinstitute.com 20
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Operational Controls
Protection of Development Environments
Change control must be strictly enforced in development environments, where tight deadlines, complex projects,
and high pressures can facilitate mistakes and unauthorized changes. Organizations must protect the integrity of IT
services, retain information about application versions, and track all changes to source code.
Description
Integrity of the Development Environment: The development environment is separate from test and production environments
Access to Development Environments: The organization ensures that access to the source code repository is formally
controlled through documentation requiring relevant management approval
Version Control: The organization ensures that serial versions of software are tracked and noted by: 1) a check-in,
check-out procedure, and 2) incremental versions of software are denoted by unique names or version numbers, generally
assigned in increasing order
Source Code Audits: Procedures exist for auditing the source code control system to verify that all activity surrounding the
source code repository can be accounted for
Change Metadata: The organization retains metadata about every change, including: 1) date of change, 2) the individual who
implemented the change, 3) any new software version number associated with the change, and 4) the nature of the change
Third Party Code: The organization manages the impact of third-party development by: 1) ensuring that third-party devel-
opers follow standard access management protocol, including unique logins, 2) establishing a “quarantine” environment for
third-party code, and 3) separately testing third-party code for quality and security issues prior to releasing the code into
development or production environments
Description
Integrity of the Test Environment: The test environment is separate from development and production environments
Access to Test Environments: The organization ensures that access to test environments is formally controlled through
documentation requiring relevant management approval
Segregation of Duties: The organization enforces segregation of duties sufficient to protect the test environment.
Developers and production personnel cannot create or change access privileges to test environments
Change Management: The organization ensures that changes to test environments follow defined change management
procedures such that testing is performed on systems operating within known parameters
Test Environment Audits: Procedures exist for auditing the test systems to verify that they do match defined build criteria
Change Metadata: The organization retains metadata about every change, including: 1) date of change, 2) the individual
who implemented the change, 3) request for change identifiers, and 4) the nature of the change
www.ITCinstitute.com 21
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Operational Controls
Protection of Production Environments
Change control must be strictly enforced in production environments, where tight deadlines, complex projects, and
high pressures can facilitate mistakes and unauthorized changes. Organizations must be able to protect the confi-
dentiality, integrity and availability of production systems.
Description
Integrity of the Production Environment: The production environment is separate from test and production environments
Access to Production Environments: The organization ensures that access to test environments is formally controlled
through documentation requiring relevant management approval
Segregation of Duties: The organization enforces segregation of duties sufficient to protect the production environment.
Developers and test personnel cannot create or change access privileges to production environments.
Change Management: The organization ensures that changes to test environments follow defined change management
procedures such that testing is performed on systems operating within known parameters
Production Environment Audits: Procedures exist for auditing the production systems, in order to verify that they do
match defined build criteria
Change Metadata: The organization retains metadata about every change, including: 1) date of change, 2) the individual
who implemented the change, 3) request for change identifiers, and 4) the nature of the change.
Personnel Security
Compliance and risk management programs must consider not only how technology enables change management
controls, but how employees interact with technical controls, enact policies, and implement procedures.
Description
Personnel Screening: The organization screens prospective contractors and employees through interviews and performs
criminal and employment background checks prior to engagement
Personnel Termination: Management ensures that, upon any individual’s employment termination, voluntary or invol-
untary: 1) system administrators revoke the individual’s access to all systems, and 2) the individual cannot effect further
changes or participate in a change management process
Personnel Transfers: The organization promptly processes employee transfers to ensure that: 1) system access and prohibi-
tions reflect changes to job roles and responsibilities, and 2) change management roles and responsibilities reflect changes
to job roles and responsibilities
Job Descriptions: The organization formally documents staff responsibility for an effective control environment. Job
descriptions include: 1) a requirement to comply with change management policies and procedures, and 2) affirmation of
disciplinary action in cases of noncompliance with change management policies and procedures
Third Party Change Management Oversight: The organization contractually requires third parties to adhere to change
management controls. The organization has access to documentation demonstrating control adherence.
www.ITCinstitute.com 22
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Operational Controls
Physical and Environmental Protection
Environmental security—including physical access to machinery and changes to the physical environment that might
impact system performance—is a critical, but often-neglected, facet of change management. Organizations must
take steps to ensure that technical security and change management controls are not undermined by weak physical
security controls.
Description
Physical and Environmental Protection Policy and Procedures: The organization develops, disseminates, and periodi-
cally reviews/updates: 1) a formal, documented, physical and environmental protection policy that addresses purpose, scope,
roles, responsibilities, and compliance, and 2) formal, documented procedures to facilitate the implementation of the physi-
cal and environmental protection policy and associated physical and environmental protection controls.
Physical Access Authorizations: The organization develops and keeps current lists of personnel with authorized access
to facilities containing information systems (except for those areas within the facilities officially designated as publicly acces-
sible) and issues appropriate authorization credentials (e.g., badges, identification cards, smart cards). Designated officials
within the organization review and approve the access list and authorization credentials.
Physical Access Control: The organization controls all physical access points (including designated entry/exit points) to
facilities containing information systems (except for those areas within the facilities officially designated as publicly accessi-
ble) and verifies individual access authorizations before granting access to the facilities. The organization also controls access
to areas officially designated as publicly accessible, as appropriate, in accordance with the organization’s assessment of risk.
Access Control for Transmission Medium: The organization controls physical access to information system transmission
lines carrying unencrypted information to prevent eavesdropping, in-transit modification, disruption, or physical tampering
Monitoring Physical Access: The organization monitors physical access to information systems to detect and respond
to incidents
Visitor Control: The organization controls physical access to information systems by authenticating visitors before authoriz-
ing access to facilities or areas other than areas designated as publicly accessible
Access Logs: The organization maintains a visitor access log to facilities (except for those areas within the facilities officially
designated as publicly accessible) that includes: 1) name and organization of the person visiting, 2) signature of the visitor,
3) form of identification, 4) date of access, 5) time of entry and departure, 6) purpose of visit, and 7) name and organization
of person visited. Designated officials within the organization review the access logs after closeout.
Power Equipment and Power Cabling: The organization protects power equipment and power cabling for the informa-
tion system from damage and destruction
Delivery and Removal: The organization controls information system-related items (hardware, firmware, software)
entering and exiting the facility and maintains appropriate records of those items
Alternate Work Site: Individuals within the organization employ appropriate information physical security controls at
alternate work sites
Changes to Physical and Environmental Services: Changes to the physical and environmental protection services and
controls adhere to change management policies
www.ITCinstitute.com 23
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Operational Controls
Contingency Planning
A risk management approach to change management should facilitate not only successful changes, but mitigation
of risk in the event of change failure. In some cases, contingency plans include resources at remote sites. And in all
cases, plans should consider the potential impact of differences between primary and contingency technologies,
staff, and facilities on service operation and performance.
Description
Contingency Plan: The organization develops, documents, and implements a contingency plan that reduces the risks and
costs associated with failed change implementations. The plan identifies roles, responsibilities, policies, and procedures
associated with contingency responses. Designated officials within the organization review and approve the plan.
Rollback Plan: The organization develops a rollback plan and procedures that allow developers to revert to a previous
version of software if an update or new installation fails. Management periodically audits the rollback plan and procedures
to ensure that older software versions implicated in the rollback plan are compatible with existing systems.
Contingency and Rollback Plan Updates: The organization periodically reviews contingency and rollback plans and
revises them to address system/organizational changes or problems identified during previous plan implementation or IT
control assessments
Synchronization of IT Operations and Sites: The organization’s change management procedures ensure that the pro-
duction and contingency sites are managed such that the ability to fail over in the planned manner is not at risk
Changes to Contingency Plans: The organization’s contingency plans are governed by change management to ensure
that impacts are properly understood and addressed
Configuration Management
Management should consider how variables in application options, user access, and performance setting impact
IT service offerings. Even apparently minor configuration changes can have major (and sometimes unintended)
consequences.
Description
Configuration Change Management: The organization ensures that configuration changes adhere to general change
management policies. If configuration management services are automated, the software is configured to conform to orga-
nizational change management controls.
Configuration Authority: The organization limits authority for configuration changes to specific staff roles. All configura-
tion changes are performed by authorized staff.
Configuration Change Monitoring: Management reviews any configuration changes to assess impact on the broader
systems and control environment
Periodic Configuration Audits: The organization conducts audits to determine whether configurations have “drifted”
from their documented state; for example, in the event of unauthorized configuration changes. If audits reveal unauthorized
changes, the organization performs an investigation to determine the root causes of the changes and takes steps to correct
any staff issues or control deficiencies revealed by the audit.
www.ITCinstitute.com 24
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Operational Controls
Maintenance
Standard application maintenance often involves or indicates required changes. In some cases, however, application
updates and regular maintenance may fall to employees outside of the core development group; for example, if
business users are allowed to install updates issued from an application vendor’s servers. Management and auditors
should consider all sources and types of software maintenance when developing change management controls.
Description
Maintenance Change Management: The organization ensures that maintenance that results in configuration changes
adheres to general change management policies. If maintenance services are automated, the software is configured to
conform to organizational change management controls.
Description
Security and Protection Change Management: The organization ensures that information and system protection
processes adheres to general change management policies. If protective services and updates are automated, the software is
configured to conform to organizational change management controls.
Design of Change Management Controls: Change management policies and procedures are designed to mitigate risks
associated with both human error and malicious software code
Alignment of Information Integrity and Change Management: Organizations ensure that: 1) change management
policies and procedures align with other policies and procedures designed to protect system and information integrity, and
2) information protection processes do not undermine change management controls
Media Protection
In general, organizations should implement controls that 1) identify, report, and correct information and informa-
tion system flaws in a timely manner; 2) protect systems and data from malicious code; and 3) implement protec-
tion measures in response to security alerts and advisories. Although some protection measures, like patch updates
or antivirus software updates, might be implemented in an atmosphere of high pressure or anxiety, organizations
must balance the need for urgent action against the risk that an untested system update (for example) will nega-
tively impact system performance or business processes.
Description
Media Protection Change Management: The organization ensures that media protection processes adhere to general
change management policies. If protective services and updates are automated, the software is configured to conform to
organizational change management controls.
www.ITCinstitute.com 25
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Operational Controls
Incident Response
Incident response controls generally ensure that an organization establishes an operational incident handling capa-
bility for information systems that includes adequate preparation, detection, analysis, containment, recovery, and
user response activities; and that the organization tracks, documents, and reports incidents to appropriate orga-
nizational officials and/or authorities. Like information integrity processes, incident response can carry a sense of
urgency that tempts both staff and management to autonomously circumvent change management controls.
Description
Incident Response Change Management: The organization ensures that incident response processes adhere to general
change management policies
Emergency Change Management Procedure: The organization develops, documents, and implements an emergency
change management procedure designed to balance expediency and risks during incident response
Technical Controls
Technical controls ensure that change management enactment is effective and efficient. Technical controls include:
Access Control
Controlling access to information systems is a critical component of change management. Organizations must limit infor-
mation system access to authorized users, processes acting on behalf of authorized users, or devices (including other
information systems) and to the types of transactions and functions that authorized users are permitted to exercise.
Description
Access Control Policy and Procedures: The organization develops, disseminates, and periodically reviews/updates: 1)
a formal, documented, access control policy that addresses purpose, scope, roles, responsibilities, and compliance; and 2)
formal, documented procedures to facilitate the implementation of the access control policy and associated access controls
Account Management: The organization manages information system accounts, including establishing, activating, modify-
ing, reviewing, disabling, and removing accounts. The organization reviews information system accounts.
Information Flow Enforcement: The information system enforces assigned authorizations for controlling the flow of
information within the system and between interconnected systems in accordance with applicable policy
Separation of Duties: The information system enforces separation of duties through assigned access authorizations
Least Privilege: The information system enforces the most restrictive set of rights/privileges or accesses needed by users (or
processes acting on behalf of users) for the performance of specified tasks
Unsuccessful Login Attempts: The information system enforces a limit on consecutive invalid access attempts by a user
during a defined time period. If the limit is exceeded, the information system automatically locks out the user for a defined
period of time.
Previous Logon Notification: The information system notifies the user, upon successful logon, of the date and time of the
last logon, and the number of unsuccessful logon attempts since the last successful logon
Concurrent Session Control: The information system limits the number of concurrent sessions for any user to a defined
number of sessions
www.ITCinstitute.com 26
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Technical Controls
Access Control (continued)
Description
Session Lock: The information system prevents further access to the system by initiating a session lock that remains in
effect until the user reestablishes access using appropriate identification and authentication procedures
Session Termination: The information system automatically terminates a session after a defined period of inactivity
Supervision and Review: The organization supervises and reviews the activities of users with respect to the enforcement
and usage of information system access controls
Permitted Actions without Identification or Authentication: The organization identifies and documents specific user
actions that can be performed on the information system without identification or authentication
Automated Marking: The information system marks output using standard naming conventions to identify any special
dissemination, handling, or distribution instructions
Automated Labeling: The information system appropriately labels information in storage, in process, and in transmission
Remote Access: The organization documents, monitors, and controls all methods of remote access (e.g., dial-up, wireless,
Internet) to the information system. Appropriate organization officials authorize each remote access method for the informa-
tion system and authorize only the necessary users for each access method.
Wireless Access Restrictions: The organization: 1) establishes usage restrictions and implementation guidance on the use
of wireless technologies; and 2) documents, monitors, and controls wireless access to the information system. Appropriate
organizational officials authorize the use of wireless technologies.
Access Control For Portable And Mobile Devices: The organization: 1) establishes usage restrictions and implementa-
tion guidance for portable and mobile devices; and 2) documents, monitors, and controls device access to organizational
networks. Appropriate organizational officials authorize the use of portable and mobile devices.
Personally Owned Information Systems: The organization restricts the use of personally owned information systems for
official business involving the processing, storage, or transmission of federal information
Access Control Change Management: The organization ensures that access control processes adhere to general change
management policies and that automated services are configured to conform to organizational change management controls
Description
Identification and Authentication Policy and Procedures: The organization develops, disseminates, and periodically
reviews/updates: 1) a formal, documented, identification and authentication policy that addresses purpose, scope, roles,
responsibilities, and compliance; and 2) formal, documented procedures to facilitate the implementation of the identification
and authentication policy and associated identification and authentication controls
User Identification and Authentication: The information system uniquely identifies and authenticates users (or processes
acting on behalf of users)
www.ITCinstitute.com 27
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Technical Controls
Identification and Authentication (continued)
Description
Device Identification and Authentication: The information system identifies and authenticates specific devices before
establishing a connection
Identifier Management: The organization manages user identifiers by: 1) uniquely identifying each user, 2) verifying the
identity of each user, 3) receiving authorization to issue a user identifier from an appropriate organization official, 4) ensur-
ing that the user identifier is issued to the intended party, 5) disabling user identifier after a defined period of inactivity, and
6) archiving user identifiers
Authenticator Management: The organization manages information system authenticators (e.g., tokens, PKI certificates,
biometrics, passwords, key cards) by: 1) defining initial authenticator content; 2) establishing administrative procedures for
initial authenticator distribution, for lost/compromised, or damaged authenticators, and for revoking authenticators; and 3)
changing default authenticators upon information system installation
Authenticator Feedback: The information system provides feedback to a user during an attempted authentication and
that feedback does not compromise the authentication mechanism
Cryptographic Module Authentication: for authentication to a cryptographic module, the information system employs
authentication methods that meet standards adopted by the organization
Identification and Authentication Change Management: The organization ensures that access control processes
adhere to general change management policies and automated services are configured to conform to organizational change
management controls
Change Testing
The need for testing and approval of all code changes is a central tenet of change management. The primary purpose
of testing controls is to reduce the risk that changes to source code will adversely affect production systems.
Description
Testing Policy and Procedures: The organization develops, disseminates, and periodically reviews/updates: 1) a formal,
documented application testing policy that addresses purpose, scope, roles, responsibilities, and compliance; and 2) formal,
documented procedures to facilitate the implementation of the testing policy and associated controls
Testing Change Management: The organization ensures that testing processes adhere to general change management
policies and automated services are configured to conform to organizational change management controls
Alignment of Testing, Development, and Production Environments: The organization ensures that the testing
environment is congruent with production and development environments to a degree that applications perform similarly in
both testing and production environments
Coordination of Changes and Testing Schedules: The organization creates a Forward Schedule of Change (FSC) for the
test environment(s), so that changes do not adversely impact testing
www.ITCinstitute.com 28
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Technical Controls
Audit and Accountability
Organizations must: 1) create, protect, and retain information system audit records to the extent needed to enable
the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information sys-
tem activity; and 2) ensure that the actions of individual information system users can be uniquely traced to those
users so they can be held accountable for their actions.
Description
Audit and Accountability Policy and Procedures: The organization develops, disseminates, and periodically reviews/
updates: 1) a formal, documented, audit and accountability policy that addresses purpose, scope, roles, responsibilities, and
compliance; and 2) formal, documented procedures to facilitate the implementation of the audit and accountability policy
and associated audit and accountability controls
Auditable Events: Change management procedures are designed such that they are auditable
Audit Records Policy and Procedures: Audit policies and procedures specify: 1) what change management documenta-
tion is to be retained, 2) how long change management documentation must be retained, 3) methods of short-term storage
and space requirements, 4) method of long-term archiving and space requirements, 5) security considerations for audit
records, and 6) the proper method of destruction for change management records.
Content of Audit Records: The information system captures sufficient information in audit records to establish what
change events occurred, the sources of the events, and the outcomes of the events
Audit Storage Capacity: The organization allocates sufficient audit record storage capacity and configures auditing to
prevent such capacity being exceeded
Audit Processing: In the event of an audit failure or audit storage capacity being reached, the information system alerts
appropriate organizational officials and takes predetermined actions
Audit Monitoring, Analysis, and Reporting: The organization at least annually reviews/analyzes audit records for
indications of inappropriate or unusual activity, investigates suspicious activity or suspected violations, reports findings to
appropriate officials, and takes necessary actions
Audit Reduction and Report Generation: The information system provides an audit reduction and report
generation capability
Date and Time Stamps: The information system provides date and time stamps for use in audit record generation
Protection of Audit Information: The information system protects audit information and audit tools from unauthorized
access, modification, and deletion
Non-repudiation: The information system provides the capability to determine whether a given individual took a particular
action (e.g., instigated a configuration change or created information)
Audit Retention: The organization retains audit logs for a predetermined period to support after-the-fact investigations of
change incidents and to meet regulatory and organizational information retention requirements
Audit and Accountability Change Management: The organization ensures that audit and accountability processes
adhere to general change management policies and automated services are configured to conform to organizational change
management controls
www.ITCinstitute.com 29
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Audit Reporting
During the reporting phase, management and the board Auditors debrief management, formally discussing
of directors receive formal feedback from the audit team. significant audit findings and conclusions before they
This knowledge transfer should be an open and transpar- issue the final audit report
ent process.
Managers receive a written draft report from auditors
Almost every audit identifies opportunities for improve- __ The report communicates audit results clearly
ment. The primary goal of management and auditors and precisely
should be to address critical issues first, followed by impor-
tant issues. Both management and auditors should work to __ Results are presented in an unbiased tone,
ensure that, whatever action plans they agree to, the goals noting where management has taken actions
are achievable and beneficial to the organization. to correct deficiencies and acknowledging
good performance
During the reporting phase, management must deter-
Management and auditors discuss the draft report
mine which corrective actions it will implement and when,
based on audit findings. Mangers will provide oversight Management provides feedback on the draft report
and support to ensure the timely resolution of found
issues. Although the audit team may make recommenda- Auditors review managerial comments and
tions based on its assessments of risks and consequences, action plan(s)
it cannot make or dictate managerial decisions.
Auditors finalize and distribute the final audit report
The following are typical steps an audit team takes to Auditors close out the internal audit project and
confirm and release the audit results. plan any necessary follow-up efforts regarding
management’s action plans
www.ITCinstitute.com 30
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
A well-managed business unit or governance program In selecting documentation, management should not
includes robust plans, procedures, goals, objectives, try to overload the audit team with information, but to
trained staff, performance reporting, and ongoing provide genuine insight into how the change manage-
improvement efforts. The internal audit team looks ment program is run and how well it is doing. A change
for evidence that the business unit and governance management periodic risk assessment and organizational
program is well organized and well managed. The business impact analysis (BIA) are two key management
change management program must also specifically and efforts to share with auditors.
traceably mitigate risks related to key business objectives.
Managerial preparation should mainly be routine, day- Other steps management should take to prior to the audit:
to-day practices.
Learn early and contribute often to the internal audit
Management’s ultimate goal in the audit process is goals, objectives, purpose, approach, and procedures
not to make auditors happy, but rather to demonstrate (audit tests). In particular, setting an appropriate
that change management efforts meet the demands of purpose and the audit approach are the two most
the CEO, board of directors, regulators, and investors. important elements of every successful audit.
Likewise, auditors’ requests should be aligned with these
overarching needs; that is, to support responsible program Discuss with audit management the evaluation criteria
performance within a sound, ethical business environment. and standards and how the audit will actually be
conducted, in order to ensure that you’ll receive a
While the audit is in the planning phase, manage- quality audit. Ask whether they audit in accordance
ment should proactively work with the audit team and with international standards for the professional
“educate” the auditors. As a rule, managers should practice of internal auditing.
provide constructive input on the evaluation methodol-
Learn who is on the audit team and their
ogy before audit management approves it. Expectations
qualifications, talents, and motivations. The audit
are a two-way street: management must help auditors
team exists to help make your operations more
ensure that audit expectations are aligned and that par-
efficient and effective, but they are also individuals
ticipants understand each other.
with strengths and weaknesses common to many
employees. It pays to know the experience of your
Prior to the audit, managers should collect the informa-
auditors, whether they’re rookies or veterans (and
tion and documentation necessary to demonstrate
perhaps to push for the latter). Showing an interest
how well they manage their operations in concert with
in their work can also influence and increase the
the overall organizational business objectives. They
benefits from the audit—within reason. At the end
should be prepared to provide auditors with evidence of
of the day, auditors still need to be independent
well-managed change management efforts and results.
and objective.
This might include documentation of change manage-
ment plans, supporting budgets, policy and procedure Throughout its discussion with the audit team prior to
manuals, assignments of responsibilities (such as up- the audit, management should try to strike a balance
to-date job descriptions), results reporting and other between influence and deference. Managers should
trending information, and finally, any other relevant neither yield entirely to the audit team nor micromanage
guidance (to management and staff) that demonstrates a its efforts.
“well-run” and performing program.
www.ITCinstitute.com 31
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Communicating
with Auditors
www.ITCinstitute.com 32
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
APPENDIX A—
Change Management Resources
British Educational Communications and Technology
Agency (BECTA)Framework for ICT [information
and communications technology] Technical Support
http://www.becta.org.uk/tsas
www.ITCinstitute.com 33
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
Research Sponsors
Solidcore Tripwire
Solidcore is a leading provider of change control for critical Tripwire delivers immediate value to the business by assuring
systems. Organizations worldwide trust Solidcore to improve continuous operational, regulatory and security compliance
service availability and lower the costs of complying with across the dynamic data center. As the clear leader of the
Payment Card Industry (PCI) and Sarbanes-Oxley (SOX) configuration audit and control market, Tripwire ensures the
standards. Solidcore enables customers to automate the continuous control of configuration activity in real-time across
validation of controls and eliminate the expensive, time the IT infrastructure, automatically correlating configuration
consuming and error-prone manual processes that consume activity with policies and generating actionable reports.
IT resources.
• Continuous Compliance
As the industry’s first and only solution to automate the Tripwire provides a holistic and continuous view of security,
enforcement of change polices, Solidcore S3 Control allows risk and compliance across the IT infrastructure, so users
organizations to prevent and alert rather than detect and can take a proactive approach to assessing, controlling and
remediate. Solidcore uses real-time change detection reporting compliance.
capabilities along with automated, highly-accurate change
• Configuration Assessment
reconciliation to provide an automated way of validating
Only Tripwire integrates configuration assessment
changes against authorizations. Out-of-process changes, such
functionality with change management to automatically
as emergency fixes, can be automatically documented and
validate configuration settings against policy.
reconciled for easier audit-ability.
www.ITCinstitute.com 34
I T AU D I T C H E C K L I S T : C H A N G E M A N AG E M E N T
If you have ideas for improving ITCi’s IT Audit Checklists, please write editor@itcinstitute.com.
Legal Disclaimer
When assessing any legal matter, do not rely solely on materials published by third parties, including the content in this paper, without additionally seeking legal counsel familiar with your
situation and requirements. The information contained in this IT Audit Checklist is provided for informational and educational purposes and does not constitute legal or other professional advice.
Furthermore, any applicability of any legal principles discussed in this paper will depend on factors specific to your company, situation, and location. Consult your corporate legal staff or other
appropriate professionals for specific questions or concerns related to your corporate governance and compliance obligations.
ITCi makes every effort to ensure the correctness of the information we provide, to continually update our publications, and to emend errors and outdated facts as they come to our attention.
We cannot, however, guarantee the accuracy of the content in this site paper, since laws change rapidly and applicability varies by reader.
The information in this publication is provided on an “as is” basis without warranties of any kind, either expressed or implied. The IT Compliance Institute disclaims any and all liability that could
arise directly or indirectly from the reference, use, or application of information contained in this publication. ITCi specifically disclaims any liability, whether based in contract, tort, strict liability,
or otherwise, for any direct, indirect, incidental, consequential, punitive or special damages arising out of or in any way connected with access to or use of the information in this paper.
ITCi does not undertake continuous reviews of the Web sites and other resources referenced in this paper. We are not responsible for the content published by other organizations. Such
references are for your convenience only.
www.ITCinstitute.com