AUDCIS
AUDCIS
AUDCIS
The need for improved control over IT, especially in commerce, has been advanced over
the years in earlier and continuing studies by many national and international
organizations. Essentially, technology has impacted various significant areas of the
business environment, including the use and processing of information, the control
process, and the auditing profession.
• Technology has improved the ability to capture, store, analyze, and process
tremendous amounts of data and information, expanding the empowerment
of the business decision maker. It has also become a primary enabler to
production and service processes. There is a residual effect in that the
increased use of technology has resulted in increased budgets, increased
successes and failures, and better awareness of the need for control.
• Technology has significantly impacted the control process around systems.
Although control objectives have generally remained constant, except for
some that are technology specific, technology has altered the way in which
systems should be controlled. Safeguarding assets, as a control objective,
remains the same whether it is done manually or is automated. However, the
manner by which the control objective is met is certainly impacted.
• Technology has impacted the auditing profession in terms of how audits are
performed (information capture and analysis, control concerns) and the
knowledge required to draw conclusions regarding operational or system
effectiveness, efficiency, and reporting integrity. Initially, the impact was
focused on dealing with a changed processing environment. As the need
for auditors with specialized technology skills grew, so did the IT auditing
profession.
Some of the primary ERP suppliers today include SAP, FIS Global, Oracle, Fiserv, Intuit,
Inc., Cerner Corporation, Microsoft, Ericsson, Infor, and McKesson.
Despite the many advantages of ERPs, they are not much different than purchased or
packaged systems and may therefore require extensive modifications to new or existing
business processes. ERP modifications (i.e., software releases) require considerable
programming to retrofit all of the organization-specific code. Because packaged systems
are generic by nature, organizations may need to modify their business operations to
match the vendor’s method of processing, for instance. Changes in business operations
may not fit well into the organization’s culture or other processes and may also be costly
due to training. Additionally, as ERPs are offered by a single vendor, risks associated with
having a single supplier apply (e.g., depending on a single supplier for maintenance and
support, specific hardware, or software requirements, etc.).
Cloud Computing
Cloud computing continues to have an increasing impact on the IT environment.
According to ISACA (formerly known as the Information Systems Audit and Control
Association), the cloud computing’s exponential growth should no longer be considered
an emerging technology. Cloud computing has shaped business across the globe, with
some organizations utilizing it to perform business critical processes. Based on the July
2015’s ISACA Innovation Insights report, cloud computing is considered one of the key
trends driving business strategy. The International Data Corporation, in its 2015
publication, also predicts that cloud computing will grow at 19.4% annually over the next
5 years. Moreover, Deloitte’s 2016 Perspective’s Cloud Computing report (report)
indicates that for private companies, cloud computing will continue to be a dominant
factor.
Cloud computing, as defined by PC Magazine, refers to the use of the Internet (versus
one’s computer’s hard drive) to store and access data and programs. In a more formal
way, the National Institute of Standards and Technology (NIST) defines cloud computing
as a “model for enabling ubiquitous, convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks, servers, storage, applications,
and services) that can be rapidly provisioned and released with minimal management
effort or service provider interaction.” NIST also stress that availability is significantly
promoted by this particular (cloud) model.
The highly flexible services that can be managed in the virtual environment makes cloud
computing very attractive for business organizations. Nonetheless, organizations do not
yet feel fully comfortable when storing their information and applications on systems
residing outside of their on-site premises. Migrating information into a shared
infrastructure (such as a cloud environment) exposes organizations’ sensitive/critical
information to risks of potential unauthorized access and exposure, among others.
Deloitte, one of the major global accounting and auditing firms, also supports the
significance of security and privacy above, and added, based in its report, that cloud-
stored information related to patient data, banking details, and personnel records, to
name a few, is vulnerable and susceptible to misuse if fallen into the wrong hands.
Mobile Device Management (MDM)
MDM, also known as Enterprise Mobility Management, is a relatively new term, but
already shaping the IT environment in organizations. MDM is responsible for managing
and administering mobile devices (e.g., smartphones, laptops, tablets, mobile printers,
etc.) provided to employees as part of their work responsibilities. Specifically, and
according to PC Magazine, MDM ensures these mobile devices:
• integrate well within the organization and are implemented to comply with
organization policies and procedures
• protect corporate information (e.g., emails, corporate documents, etc.) and
configuration settings for all mobile devices within the organization
Mobile devices are also used by employees for personal reasons. That is, employees
bring their own mobile (personal) device to the organization (also referred to as bring-
your-own-device or BYOD) to perform their work. Allowing employees to use
organization-provided mobile devices for work and personal reasons has proved to
appeal to the average employee. Nevertheless, organizations should monitor and control
the tasks performed by employees when using mobile devices, and ensure employees
remain focused and productive. It does represent a risk to the organization’s security and
a distraction to employees when mobile devices are used for personal and work
purposes. Additionally, allowing direct access to corporate information always represents
an ongoing risk, as well as raises security and compliance concerns to the organization.
Other Technology Systems Impacting the IT Environment
The Internet of Things (IoT) has a potential transformational effect on IT environments,
data centers, technology providers, etc. Gartner, Inc. estimates that by the year 2020,
IoT will include 26 billion units installed and revenues will exceed $300 billion generated
mostly by IoT product and service suppliers.
IoT, as defined by Gartner, Inc., is a system that allows remote assets from “things” (e.g.,
devices, sensors, objects, etc.) to interact and communicate among them and with other
network systems. Assets, for example, communicate information on their actual status,
location, and functionality, among others. This information not only provides a more
accurate understanding of the assets, but also maximizes their utilization and
productivity, resulting in an enhanced decision-making process. The huge volumes of
raw data or data sets (also referred to as Big Data) generated as a result of these massive
interactions between devices and systems need to be processed and analyzed effectively
in order to generate information that is meaningful and useful in the decision-making
process.
Big Data, as defined by the TechAmerica Foundation’s Federal Big Data Commission
(2012), “describes large volumes of high velocity, complex and variable data that require
advanced techniques and technologies to enable the capture, storage, distribution,
management, and analysis of the information.” Gartner, Inc. further defines it as “… high-
volume, high-velocity and/or high-variety information assets that demand cost-effective,
innovative forms of information processing that enable enhanced insight, decision
making, and process automation.”
Even though accurate Big Data may lead to more confident decision-making process,
and better decisions often result in greater operational efficiency, cost reduction, and
reduced risk, many challenges currently exist and must be addressed.
Challenges of Big Data include, for instance, analysis, capture, data curation, search,
sharing, storage, transfer, visualization, querying, as well as updating. Ernst & Young, on
its EY Center for Board Matters’ September 2015 publication, states that challenges for
auditors include the limited access to audit relevant data, the scarcity of available and
qualified personnel to process and analyze such particular data, and the timely
integration of analytics into the audit. The IoT also delivers fast-moving data from
sensors and devices around the world, and therefore results in similar challenges for
many organizations when making sense of all that data.
Other recent technologies listed on the Gartner’s 2015 Hype Cycle for Emerging
Technologies Report that are currently impacting IT environments include wearables
(e.g., smartwatches, etc.), autonomous vehicles, cryptocurrencies, consumer 3D printing,
and speech-to-speech translation, among others.
IT Environment as Part of the Organization Strategy
In today’s environment, organizations must integrate their IT with business strategies to
attain their overall objectives, get the most value out of their information, and capitalize
on the technologies available to them. Where IT was formerly viewed as an enabler of an
organization’s strategy, it is now regarded as an integral part of that strategy to attain
profitability and service. At the same time, issues such as IT governance, international
information infrastructure, security, and privacy and control of public and organization
information have driven the need for self-review and self-assurance.
For the IT manager, the words “audit” and “auditor” send chills up and down the spine.
Yes, the auditor or the audit has been considered an evil that has to be dealt with by all
managers. In the IT field, auditors in the past had to be trained or provided orientation in
system concepts and operations to evaluate IT practices and applications. IT managers
cringe at the auditor’s ability to evaluate the complexities and grasp the issues
effectively and efficiently. Nowadays, IT auditors are expected to be well aware of the
organization’s IT infrastructure, policies, and operations before embarking in their
reviews and examinations. More importantly, IT auditors must be capable of determining
whether the IT controls in place by the organization ensure data protection and
adequately align with the overall organization goals.
Professional associations and organizations such as ISACA, the American Institute of
Certified Public Accountants (AICPA), the Canadian Institute of Chartered Accountants
(CICA), Institute of Internal Auditors (IIA), Association of Certified Fraud Examiners
(ACFE), and others have issued guidance, instructions, and supported studies and
research in audit areas.
What Is IT Auditing?
Before defining what IT auditing is, let us explain the difference between IS and IT. An IS,
represented by three components (i.e., people, process, and IT), is the combination of
strategic, managerial, and operational activities involved in managing information. The IT
component of an IS involves the hardware, software, communication, and other facilities
necessary to manage (i.e., input, store, process, transmit, and output) such information.
Refer to Exhibit 1.2.
The term audit, according to ISACA, refers to the formal inspection and verification to
check whether a standard or set of guidelines is being followed, records are accurate, or
efficiency and effectiveness targets are being met. In combining both definitions above,
IT auditing can be defined as the formal, independent, and objective examination of an
organization’s IT infrastructure to determine whether the activities (e.g., procedures, controls,
etc.) involved in gathering, processing, storing, distributing, and using information comply with
guidelines, safeguard assets, maintain data integrity, and operate effectively and efficiently to
achieve the organization’s objectives. IT auditing provides reasonable assurance (never
absolute) that the information generated by applications within the organization is
accurate, complete, and supports effective decision making consistent with the nature
and scope of the engagement previously agreed.
IT auditing is needed to evaluate the adequacy of application systems to meet
processing needs, evaluate the adequacy of internal controls, and ensure that assets
controlled by those systems are adequately safeguarded. As for the IT auditors of today,
their advanced knowledge and skills will progress in two ways. One direction is
continued growth and skill in this profession, leading the way in computer audit research
and development and progressing up the external and internal audit career paths. The
other direction involves capitalizing on a thorough knowledge of organizational systems
and moving into more responsible career areas in general management. Today, even in
these economic times, the demand for qualified IT auditors exceeds the supply. IT
governance has created vast opportunities for the IT auditor.
Learning new ways of auditing is always a priority of internal and external IT auditors.
Most auditors want tools or audit methodologies that will aid them in accomplishing
their task faster and easier. Almost every large organization or company has some sort of
IT audit function or shop that involves an internal audit department. Today, the “Big
Four” firms have designated special groups that specialize in the IT audit field. They all
have staff that perform these external IT audits. Most of these IT auditors assist the
financial auditors in establishing the correctness of financial statements for the
companies in which they audit. Others focus on special projects such as Internet security
dealing with penetration studies, firewall evaluations, bridges, routers, and gateway
configurations, among others.
There are two broad groupings of IT audits, both of which are essential to ensure the
continued proper operation of IS. These are as follows:
Refer to Exhibit 1.3 for an illustration of general and application controls, and how they
should be in place in order to mitigate risks and safeguard applications. Notice in the
exhibit that the application system is constantly surrounded by risks. Risks are
represented in the exhibit by explosion symbols. These risks could be in the form of
unauthorized access, loss or theft or equipment and information, system shutdown, etc.
The general controls, shown in the hexagon symbols, also surround the application and
provide a “protective shield” against the risks. Lastly, there are the application or
automated controls which reside inside the application and provide first-hand protection
over the input, processing, and output of the information.
The theory and methodologies of IT auditing are integrated from five areas: a
fundamental understanding of business, traditional auditing, IT management, behavioral
science, and IT sciences. Business understanding and knowledge are the cornerstones of
the audit process. Traditional auditing contributes knowledge of internal control
practices and overall control philosophy within a business enterprise. IT management
provides methodologies necessary to achieve successful design and implementation of
systems. Behavioral science indicates when and why IT are likely to fail because of
people’s problems. IT sciences contribute to knowledge about control theory and the
formal models that underlie hardware and software designs as a basis for maintaining
data integrity.
Ever since the ISACA was formed there has been a growing demand for well-trained and
skilled IT audit professionals. The publication The EDP Auditors Association: The First
Twenty-Five Years documents the early struggles of the association and evolution of IT
audit practices in this field.
The area of information assurance has also grown and evolved. The United States in its
passage of the Cyber Security Research and Development Act has pledged almost a
billion dollars for the development of curriculum, research, and skills for future
professionals needed in this field.
Information Assurance
Organizations increasingly rely on critical digital electronic information capabilities to
store, process, and move essential data in planning, directing, coordinating, and
executing operations. Powerful and sophisticated threats can exploit security
weaknesses in many of these systems. Outsourcing technological development to
countries that could have terrorists on their development staff causes speculation that
the potential exists for code to be implanted that would cause disruption, havoc,
embezzlement, theft, and so on. These and other weaknesses that can be exploited
become vulnerabilities that can jeopardize the most sensitive components of information
capabilities. However, we can employ deep, layered defenses to reduce vulnerabilities
and deter, defeat, and recover from a wide range of threats. From an information
assurance perspective, the capabilities that we must defend can be viewed broadly in
terms of four major elements: local computing environments, their boundaries, networks
that link them together, and their supporting infrastructure. The U.S. National Strategy
for Securing Cyberspace is one of those initiatives.
The term “information assurance” is defined as information integrity (the level of
confidence and trust that can be placed on the information) and service availability. In all
contexts, whether business or government, it means safeguarding the collection, storage,
transmission, and use of information. The ultimate goal of information assurance is to
protect users, business units, and enterprises from the negative effects of corruption of
information or denial of services. The Department of Homeland Security and Supporting
Organizations such as the National Security Agency (NSA), Federal Bureau of
Investigation (FBI), and Central Intelligence Agency (CIA) have all worked toward
supporting this goal.
As the nation’s IS and their critical infrastructures are being tied together (government
and business), the points of entry and exposure increase, and thus, risks increase. The
technological advancement toward higher bandwidth communication and advanced
switching systems. has reduced the number of communications lines and further
centralized the switching functions. Survey data indicates that the increased risk from
these changes is not widely recognized. Since 9/11, more coordinated efforts have been
made by U.S. defense organizations such as the Defense Information Systems Agency to
promulgate standards for the Defense Information Infrastructure and the Global
Information Grid, which should have a positive impact on information assurance that will
extend beyond the U.S. Department of Defense and impact all segments of the national
economy. The NSA has drafted and produced standards for IT security personnel that
not only impact federal agencies but also corporate entities who contract IT services in
support of the federal government. NIST, for example, has generated security guidance
for Health Insurance Portability and Accountability Act compliance that impacts the
medical profession and all corporations/business servicing the health field who handle
medical information. A similar example includes the Payment Card Industry Data
Security Standards (PCI DSS), maintained, managed, and promoted by the PCI Security
Standards Council (Council) worldwide. The Council was founded in 2006 by major
credit card companies, such as, American Express, Discover, JCB International,
MasterCard, and Visa, Inc. These companies share equally in governance, execution, and
compliance of the Council’s work. PCI DSS refer to technical and operational
requirements applicable specifically to entities that store, process, or transmit cardholder
data, with the intention of protecting such data in order to reduce credit card fraud.
Initially, IT auditing (formerly called electronic data processing [EDP], computer
information systems [CIS], and IS auditing) evolved as an extension of traditional
auditing. At that time, the need for an IT audit came from several directions:
• Auditors realized that computers had impacted their ability to perform the
attestation function.
• Corporate and information processing management recognized that
computers were key resources for competing in the business environment and
similar to other valuable business resource within the organization, and
therefore, the need for control and auditability were critical.
• Professional associations and organizations, and government entities
recognized the need for IT control and auditability.
The early components of IT auditing were drawn from several areas. First, traditional
auditing contributes knowledge of internal control practices and the overall control
philosophy. Another contributor was IS management, which provides methodologies
necessary to achieve successful design and implementation of systems. The field of
behavioral science provided such questions and analysis to when and why IS are likely to
fail because of people problems. Finally, the field of computer science contributes
knowledge about control concepts, discipline, theory, and the formal models that
underlie hardware and software design as a basis for maintaining data validity, reliability,
and integrity.
IT auditing became an integral part of the audit function because it supports the
auditor’s judgment on the quality of the information processed by computer systems.
Auditors with IT audit skills were viewed as the technological resource for the audit staff.
The audit staff often looked to them for technical assistance. The IT auditor’s role
evolved to provide assurance that adequate and appropriate controls are in place. Of
course, the responsibility for ensuring that
adequate internal controls are in place rests with management. The audit’s primary role,
except in areas of management advisory services, is to provide a statement of assurance
as to whether adequate and reliable internal controls are in place and are operating in an
efficient and effective manner. Management’s role is to ensure and the auditors’ role is
to assure. There are several types of needs within IT auditing, including organizational IT
audits (management control over IT), technical IT audits (infrastructure, data centers,
data communication), and application IT audits (business/financial/operational). There
are also development/implementation IT audits (specification/requirements, design,
development, and post-implementation phases), and compliance IT audits involving
national or international standards.
When auditing IT, the breadth and depth of knowledge required are extensive. For
instance, auditing IT involves:
The auditing of IT and communications protocols typically involves the Internet, intranet,
extranet, electronic data interchange, client servers, local and wide area networks, data
communications, telecommunications, wireless technology, integrated voice/data/video
systems, and the software and hardware that support these processes and functions.
Some of the top reasons to initiate an IT audit include the increased dependence on
information by organizations, the rapidly changing technology with new risks associated
with such technology, and the support needed for financial statement audits.
SOX also requires the assessment of internal controls and makes it mandatory for SEC
registrants. As part of the process for assessing the effectiveness of internal controls
over financial reporting, management needs to consider controls related to the IS
(including technologies) that support relevant business and financial processes. These
controls are referred to as ITGCs (or IT general controls). As mentioned earlier, ITGCs are
IT processes, activities, and/or procedures that are performed within the IT environment
and relate to how the applications and systems are developed, maintained, managed,
secured, accessed, and operated. Exhibit 1.4 illustrates other top reasons to have IT
audits.
IT Governance
There have been many changes in the way enterprises address IT issues, resulting in a
renewed focus on the concepts of IT governance. CEOs, Chief Financial Officers, Chief
Operating Officers, Chief Technology Officers, and Chief Information Officers agree on
the founding principles of IT governance, which focus on strategic alignment between IT
and enterprise objectives. This, in turn, creates changes to tactical and day-to-day
operational management of IT in the organization.
IT governance is the process by which an enterprise’s IT is directed and controlled. As
defined earlier, IT refers to the hardware, software, communication, and other facilities
used to input, store, process, transmit, and output data in whatever form. Effective IT
governance helps ensure that IT supports business goals, maximizes business investment
in IT, and appropriately manages IT-related risks. IT governance also helps ensure
achievement of critical success factors by efficiently and effectively deploying secure,
reliable information, and applied technology.
Because IT impacts the operation of an entire organization, everyone within the
organization should have an interest and role in governing its use and application. This
growing awareness has led organizations to recognize that, if they are to make the most
of their IT investment and protect that investment, they need a formal process to govern
it. Reasons for implementing an IT governance program include:
As long as these factors remain a part of business, there will be a need for effective,
interdependent systems of enterprise and IT governance.
An open-standard IT governance tool that helps nontechnical and technical managers
and auditors understand and manage risks associated with information and related IT is
COBIT, developed by the IT Governance Institute and the Information Systems Audit
and Control Foundation. COBIT is a comprehensive framework of control objectives that
helps IT auditors, managers, and executives discharge fiduciary responsibilities,
understand the IT systems, and decide what level of security and control is adequate.
COBIT provides an authoritative, international set of generally accepted IT practices for
business managers and auditors. COBIT is discussed in later chapters.
The auditor evaluating today’s complex systems must have highly developed technical
skills to understand the evolving methods of information processing. Contemporary
systems carry risks such as non-compatible platforms, new methods to penetrate
security through communication networks (e.g., the Internet), and the rapid
decentralization of information processing with the resulting loss of centralized controls.
As the use of IT in organizations continues to grow, auditing computerized systems must
be accomplished without many of the guidelines established for the traditional auditing
effort. In addition, new uses of IT introduce new risks, which in turn require new
controls. IT auditors are in a unique position to evaluate the relevance of a particular
system to the enterprise as a whole. Because of this, the IT auditor often plays a role in
senior management decision making.
The role of IT auditor can be examined through the process of IT governance and the
existing standards of professional practice for this profession. As mentioned earlier, IT
governance is an organizational involvement in the management and review of the use
of IT in attaining the goals and objectives set by the organization.
IT Auditor as Counselor
In the past, users have abdicated responsibility for controlling computer systems, mostly
because of the psychological barriers that surround the computer. As a result, there are
few checks and balances, except for the IT auditor. IT auditors must take an active role in
assisting organizations in developing policies, procedures, standards, and/or best
practices on safeguarding of the information, auditability, control, testing, etc. A good
information security policy, for instance, may include:
The SANS Institute provides general information security policy templates on its
Website, which can be downloaded and be a great starting point for any organization. A
good computer security policy will differ for each organization, corporation, or individual
depending on security needs. An information security policy will not guarantee a
system’s security or make the network completely safe from possible attacks from
cyberspace. Nevertheless, a security policy, helped by effective security products and a
plan for recovery, may help targeting potential losses to levels considered “acceptable,”
and minimize the leaking of private information. The IT auditor is part of an institutional
team that helps create shared governance over the use, application, and assurance over
IT within the organization.
An IT audit staff in a large corporation can make a major contribution to computer
system control by persuading user groups to insist on a policy of comprehensive testing
for all new systems and all changes to existing systems. By reviewing base-case results,
user groups can control the accuracy of new or changed systems by actually performing
a complete control function. Auditors must convince users and IT personnel of the need
for a controlled IT environment. Insisting that all new systems be reviewed at predefined
checkpoints throughout the system’s development life cycle can also enhance control of
IT. The prospect of audit review should prompt both user and systems groups to define
their objectives and assumptions more carefully. Here, too, IT auditors can subtly extend
their influence.
IT Auditor as Partner of Senior Management
Although the IT auditor’s roles of counselor and skilled technician are vital to successful
company operation, they may be irrelevant if the auditor fails to view auditing in relation
to the organization as a whole. A system that appears well controlled may be
inconsistent with the operation of a business. Decisions concerning the need for a
system traditionally belonged to management, but because of a combination of factors
(mostly the complex technology of the computer), computer system audits were not
successfully performed. When allocating funds for new systems, management has had to
rely on the judgment of computer personnel. Although their choices of new and more
effective computer systems cannot be faulted, computer personnel have often failed to
meet the true business needs of the organization.
Management needs the support of a skilled computer staff that understands the
organization’s requirements, and IT auditors are in such a position to provide that
information. They can provide management with an independent assessment of the
effect of IT decisions on the business. In addition, the IT auditor can verify that all
alternatives for a given project have been considered, all risks have been accurately
assessed, the technical hardware and software solutions are correct, business needs will
be satisfied, and costs are reasonable.
IT Auditor as Investigator
As a result of increased legislation and the use of computer evidence within the courts,
the ability to capture and document computer-generated information related to criminal
activity is critical for purposes of prosecution. The awareness and use of computer-
assisted tools and techniques in performing forensic support work have provided new
opportunities for the IT auditor, IT security personnel, and those within law enforcement
and investigation. For the IT audit professional, computer forensics is an exciting,
developing field. The IT auditor can work in the field of computer forensics or work side
by side with a computer forensics specialist, supplying insight into a particular system or
network. The specialists can ask the IT audit professionals questions pertaining to the
system and get responses faster than having to do research and figure everything out on
their own. Although the specialist is highly trained and can adapt to almost any system or
platform, collaboration can make the jobs of the forensic specialist and the IT
professional easier and more efficient.
Since its birth in the early 1970s, computer forensics has continuously evolved into what
is now a very large field. New technologies and enhancements in protocols are allowing
engineers and developers to create more stable and robust hardware, software, and
tools for the specialist to use in computer-related criminal investigations. As computers
become more advanced and more abundant, so do criminal activities. Therefore, the
computer forensics niche is also in constant progression along with the technological
advancements of computers.
With the passage of the Homeland Security Act, the Patriot Act, and SOX, the role of the
auditor (internal and external) is more critical to the verification and validation of the
financial infrastructure. The profession of IT auditing can provide a person with exposure
to the way information flows within an organization and give its members the ability to
assess its validity, reliability, and security. IT auditing involves people, technology,
operations, and systems. It is a dynamic and challenging profession with a future that
brings growth into new areas such as IT security and computer forensics, to name a few.
Today, IT auditors interact with managers, users, and technicians from all areas of most
organizations. They must have interpersonal skills to interact with multiple levels of
personnel and technical skills to understand the variety of technology used in
information processing activity— especially technology used in generating and/or
processing the company’s financial information (e.g., financial statements, etc.). The IT
auditor must also gain an understanding of and be familiarized with the operational
environment to assess the effectiveness of the internal control structure. Finally, the IT
auditor must understand the technological complexities of existing and future systems
and the impact they have on operations and decisions at all levels.
IT auditing is a relatively new profession, and employment opportunities are present in
all sectors of private industry, public accounting, and government worldwide. A
profession is more than just an occupation. A profession has certain special
characteristics, including a common body of knowledge, certification, continuing
education, professional associations and ethical standards, and educational curriculum.
A Common Body of Knowledge
Since 1975, there have been various studies identifying a common body of knowledge
for the IT audit profession. A common body of knowledge consists of clearly identified
areas in which a person must attain a specific level of understanding and competency
necessary to successfully practice within the profession. These areas are categorized into
core areas. Organizations such as ISACA, AICPA, IIA, CICA, ISSA, InfoSec, and others
around the world have issued major studies and papers on the topic of the knowledge,
skills, and abilities needed to audit computer systems. Students, especially the ones with
business and computer majors, receive a degree of base-level training in (1) auditing
concepts and practices; (2) management concepts and practices; (3) computer systems,
telecommunications, operations, and software; (4) computer information processing
techniques; and (5) understanding of business on local and international scales. These are
some of the major core areas of competency identified by the various independent
studies for the individual who enters the IT audit, control, and security field.
Certification
Certification is a vital component of a profession. As you prepare for entry into your
profession, whether it is accounting, IS, or other business fields, certification will be the
measure of your level of knowledge, skills, and abilities in the profession. For example,
attainment of the CPA designation is an important career milestone for the practicing
accountant. In IT auditing, the Certified Information Systems Auditor (CISA) is one of the
main levels of recognition and attainment. There are certain requirements for candidates
to become CISA certified, such as:
The CISA examination covers areas (or domains) within the process of auditing IS;
governance and management of IT; IS acquisition, development and implementation; IS
operations, maintenance and service management; and the protection of information
assets. Thus, university education plays an important part in providing the groundwork
toward the certification process.
Other licenses and certifications relevant to the IT auditor include the following: CPA,
Certified Chartered Accountant (CA), Certified Internal Auditor (CIA), Certified Computer
Professional (CCP), Certified Government Financial Manager (CGFM), Certified
Information Systems Security Professional (CISSP), Certified Information Security
Manager (CISM), Certified in Risk and Information Systems Control (CRISC), AICPA’s
Certified Information Technology Professional (CITP), and Certified Fraud Examiner
(CFE).
Certification is important and a measure of skill attainment within the profession.
Attainment of more than one certification will enhance your knowledge, skills, and
abilities within the audit domain. Proficiency in skill application comes from experience
and continuing education. The dynamic changes in business (commerce), IT, and world
events continue to shape the future for this exciting profession.
Continuing Education
Certification requires continuing education so that those who are certified maintain a
level of proficiency and continue their certification. Continuing education is an important
element for career growth. As graduates enter their profession, they will find that their
academic education is the foundation for continued development of career-enhancing
knowledge, skills, and abilities. A continuing education requirement exists to support the
CISA program. The IT auditor of the future will constantly face change with regard to
existing systems and the dynamics of the environment (i.e., reorganization, new
technology, operational change, and changing requirements).
The breadth and depth of knowledge required to audit IT is extensive. For example, IT
auditing involves the application of risk-oriented audit approaches; the use of computer-
assisted audit tools and techniques (e.g., EnCase, CaseWare, Idea, ACL, Guardant, eTrust,
CA-Examine, etc.); the application of national or international standards (i.e., ISO 9000/3,
ISO 17799, ISO 27000, and related amendments to improve and implement quality
systems in software development); the auditing of systems under development involving
complex SDLC or new development techniques (e.g., prototyping, end-user computing,
rapid systems development, etc.); and the auditing of complex technologies involving
electronic data interchange, client servers, local and wide area networks, data
communications, telecommunications, and integrated voice/data/video systems.
Because the organizational environment in which the IT auditor operates is a dynamic
one, it is important that new developments in the profession be understood so that they
may be appropriately applied. Thus, the continuing education requirement helps the
CISA attain new knowledge and skills to provide the most informed professional opinion.
Training courses and programs are offered by a wide variety of associations and
organizations to assist in maintaining the necessary skills that they need to continue to
improve and evolve. Methods for receiving such training may even be global with video
teleconferencing and telecommuting and with the Internet playing a major role in
training delivery.
Professional Associations and Ethical Standards
As a manager at any level, one must remember that auditors, whether internal or
external, have standards of practice that they must follow. Like IT professionals, auditors
may belong to one or more professional associations and have code of ethics and
professional standards of practices and guidance that help them in performing their
reviews and audits. If they are seen not performing their work to “standards of practice”
for their profession, they know they could be open to a potential lawsuit or even
“decertified.” Some of the organizations that produced such standards of practice are the
AICPA, IIA, IFAC, CICA, GAO, and ISACA.
ISACA, created in 1969, is the leading IT governance, assurance, as well as security and
control professional association today. ISACA:
To act as an auditor, one must have a high standard of moral ethics. The term auditor is
Latin for one that hears complaints and makes decisions or acts like a judge. To act as a
judge, one definitely must be morally ethical or it defeats the purpose. Ethics are a very
important basis for our culture as a whole. If the auditor loses favor in this area, it is
almost impossible to regain the trust the auditor once had with audit management and
auditees. Whether an auditor is ethical in the beginning or not, they should all start off
with the same amount of trust and good favor from the client or auditee. If the bond is
not broken, the auditor establishes a good name as someone who can be trusted with
sensitive material.
In today’s world economy, trust is an unheard-of word. No one can trust anyone these
days and for this reason it is imperative that high ethics are at the top of the manager’s
list of topics to cover with new audit teams. Times are changing and so are the clients
requesting audit services. Most managers will state that they cherish this aspect called
ethics because it distinguishes them from others without it.
For example, say a budget calls for numerous hours. It is unethical to put down hours not
worked. It is also unethical to overlook something during the audit because the client
says it is not important. A fine line exists between what is ethical and what is legal.
Something can be ethically wrong but still legal. However, with that being said, some
things initially thought to be unethical become illegal over time. If there is a large enough
population opposed to something ethically incorrect, you will see legislation introduced
to make it illegal. When IT auditors attain their CISA certification, they also subscribe to
a Code of Professional Ethics. This code applies to not only the professional conduct but
also the personal conduct of IT auditors. The code is actually not in conflict with codes
of ethics from other audit/assurance related domains (e.g., IIA, AICPA, etc.). It requires
that the ISACA standards are adhered to, confidentiality is maintained, any illegal or
improper activities are reported, the auditor’s competency is maintained, due care is
used in the course of the audit, the results of audit work are communicated, and high
standards of conduct and character are maintained.
Career Opportunities
There are a number of career opportunities available to the individual seeking an
opportunity in IT audit. For the college graduate with the appropriate entry-level
knowledge, skills, and abilities, this career provides many paths for growth and
development. Further, as a career develops and progresses, IT audit can provide mobility
into other areas as well. Today’s IT auditors are employed by public accounting firms,
private industries, management consulting firms, and the government.
Public Accounting Firms
Public accounting firms offer individuals an opportunity to enter the IT auditing field.
Although these firms may require such individuals to begin their careers in financial
audits to gain experience in understanding the organization’s audit methodologies, after
initial audit experience the individual who expresses interest in a particular specialization
(e.g., forensics, security, etc.) will be transferred to such specialty for further training and
career development. Many who have taken this career path have been successful, and
several have become partners, principals, or directors within the firm. The primary
sources for most public accounting firms are college recruitment and development
within. However, it is not uncommon for a firm to hire from outside for specialized
expertise (e.g., computer forensics, telecommunication, database systems, etc.).
Private Industry
Like public accounting firms, private industry offers entry-level IT audit professional
positions. In addition, IT auditors gain expertise in more specialized areas (i.e.,
telecommunications, systems software, and systems design), which can make them
candidates for IT operations, IT forensics, and IT security positions. Many CEOs view
audit experience as a management training function. The IT auditor has particular
strengths of educational background, practical experience with corporate IS, and
understanding of executive decision making. Some companies have made a distinction
between IT auditors and operational and financial auditors. Others require all internal
auditors to be capable of auditing IT systems. Sources for persons to staff the IT audit
function within a company generally may come from college recruitment, internal
transfers, promotions, and/or outside hiring.
Management Consulting Firms
Another area of opportunity for IT audit personnel is management consulting. This
career area is usually available to IT auditors with a number of years’ experience. Many
management consulting practices, especially those that provide services in the computer
IS environment, hire experienced IT auditors. This career path allows these candidates to
use their particular knowledge, skills, and abilities in diagnosing an array of computer and
management information issues and then assist the organization in implementing the
solutions. The usual resources for such positions are experienced personnel from public
accounting CPA firms, private industries, and the government. IT forensics is another
growing area in management consulting services.
Government
The government offers another avenue for one to gain IT audit experience. In the United
States, federal, state, county, and city governments employ personnel to conduct IT
audit-related responsibilities. Federal organizations such as the NSA, FBI, Department of
Justice, and the CIA employ personnel who have IT audit experience, computer security
experience, and IT forensics experience. Governments worldwide also employ personnel
to conduct IT audits.
Government positions offer training and experience to personnel responsible for
performing IT audit functions. Sources for government IT auditors are college recruits
and employees seeking internal promotion or transfer. There are occasions when
experienced resources may be hired from the outside as well.
MODULE 2
In today's digital age, information technology (IT) has become an integral part of
businesses, and its effective governance has become essential. IT governance involves
the management of IT resources in a manner that aligns with the organization's goals and
objectives, while also ensuring that IT investments generate business value and mitigate
IT-related risks. It involves the development of a set of processes, structures, and
communication channels that ensure that IT operations are in line with the organization's
overall strategies. The objective of this chapter is to provide an overview of IT
governance, its significance, and its frameworks relevant to IT auditing.
Definition of IT Governance
IT governance refers to the processes and structures in place to manage and control IT
resources within an organization. It involves defining the policies, procedures, and
guidelines that guide decision-making and ensure that IT investments and operations are
aligned with business objectives.
IT governance is critical to the success of organizations as it helps ensure that IT
resources are utilized effectively and efficiently. Effective IT governance provides a
framework for managing IT investments, risks, and performance, while ensuring that IT
supports the organization's objectives and meets the needs of stakeholders.
IT governance also plays a critical role in managing IT-related risks and compliance
requirements. Effective IT governance helps organizations identify and manage risks
related to the use of IT resources, such as data breaches, system failures, and non-
compliance with laws and regulations.
The significance of aligning IT with business objectives lies in the fact that technology
has become an integral part of modern business operations. IT is no longer viewed as a
mere support function, but as an essential enabler of business strategies and objectives.
The alignment of IT with business objectives ensures that technology investments are
focused on meeting the needs of the business, and that IT projects and initiatives are
closely linked to business objectives.
IT Governance Frameworks
IT Governance Frameworks refer to a set of guidelines and practices that provide a
structure for aligning IT activities with business objectives. These frameworks are
designed to help organizations manage and control their IT processes and systems, and
to ensure that IT investments are aligned with business goals. The use of IT governance
frameworks has become increasingly important due to the rapid growth of technology
and its impact on organizations. IT governance frameworks provide a comprehensive
approach to managing IT risks, compliance, and performance, and help organizations
achieve their strategic objectives.
In this section, we will discuss some of the commonly used IT governance frameworks
and their key features.
COBIT (Control Objectives for Information and Related Technology): This framework
was developed by ISACA (Information Systems Audit and Control Association) to provide
a comprehensive set of guidelines for IT governance and management. COBIT helps
organizations to identify and manage IT-related risks, ensure compliance with relevant
laws and regulations, and optimize IT investments. COBIT is widely used in many
industries and is recognized as a leading framework for IT governance.
ISO/IEC 27001: This standard was also developed by the International Organization for
Standardization (ISO). ISO 27001 is an IT governance framework that focuses on
information security management. The key features of ISO 27001 include a risk
management approach, a process-based approach to implementing an information
security management system (ISMS), and a strong emphasis on continual improvement.
The framework includes a set of controls that can be used to address information
security risks and can be customized to meet the needs of different organizations. ISO
27001 also emphasizes the importance of monitoring, reviewing, and improving the
ISMS to ensure it remains effective over time. It is a widely recognized standard and can
help organizations demonstrate their commitment to information security to
stakeholders.
NIST Cybersecurity Framework: This framework was developed by the National Institute
of Standards and Technology (NIST) to provide a set of guidelines for managing and
reducing cybersecurity risks. The framework helps organizations to identify, assess, and
manage cybersecurity risks, and to develop and implement effective cybersecurity
policies and procedures.
Each of these frameworks has its own unique features and benefits. However, they all
share a common goal of improving IT governance and management practices, and
aligning IT activities with the needs of the organization.
The Act mandates that public companies establish and maintain an adequate system of
internal controls to ensure the accuracy and integrity of their financial statements, and to
comply with SEC rules and regulations. The Act also requires public companies to have
an independent external auditor review their internal control over financial reporting and
to attest to the effectiveness of those controls.
SOX has a number of provisions that impact IT auditors, including sections 302, 404, and
409.
Section 302 requires that company management certify the accuracy and completeness
of financial reports, including the effectiveness of internal controls over financial
reporting. This means that IT auditors must ensure that the company's financial reporting
systems are secure, reliable, and accurate.
Section 404 of SOX requires that companies implement and maintain an internal control
framework and that they test and report on the effectiveness of those controls. This
includes controls related to information technology systems and processes, such as
access controls, change management, and data security. IT auditors play a key role in
testing and reporting on the effectiveness of these controls.
Section 409 of SOX requires that companies disclose material changes in their financial
condition or operations on a real-time basis. IT auditors must ensure that the company's
systems are capable of providing real-time financial reporting, and that they are reliable
and accurate.
Other sections of SOX that impact IT auditors include section 906, which imposes
criminal penalties for false statements made in financial reports, and section 802, which
increases the penalties for document destruction and provides protection for
whistleblowers who report accounting fraud.
In addition to these requirements, SOX also established the Public Company Accounting
Oversight Board (PCAOB), which is responsible for overseeing the audits of public
companies, registering public accounting firms, and enforcing compliance with SOX
requirements. The Act also imposes severe penalties, including fines and imprisonment,
for individuals and companies that violate its provisions.
The Sarbanes-Oxley Act of 2002 has had a significant impact on corporate governance
and financial reporting practices, and it continues to be an important consideration for IT
auditors who are involved in assessing the effectiveness of internal controls over
financial reporting.
In the United States, one of the most significant pieces of privacy legislation is the
Health Insurance Portability and Accountability Act (HIPAA) of 1996. HIPAA was
enacted in 1996 in the United States to protect the privacy and security of patients'
personal health information (PHI) and establish standards for the electronic exchange of
PHI. It applies to covered entities, which include healthcare providers, health plans, and
healthcare clearinghouses. IT auditors need to ensure that covered entities comply with
HIPAA's security and privacy rules by conducting regular audits, risk assessments, and
implementing appropriate technical, physical, and administrative safeguards.
Another essential legislation in the US is the Children's Online Privacy Protection Act
(COPPA), which provides specific guidelines for websites or online services that collect
information from children under 13 years of age.
In addition to these significant legislations, many other countries have their own laws
regarding privacy and data protection, such as Canada's Personal Information Protection
and Electronic Documents Act (PIPEDA) and Japan's Act on the Protection of Personal
Information (APPI).
IT auditors need to stay informed and updated on changes to these privacy and data
protection laws to ensure that organizations comply with these regulations and protect
sensitive information. Failure to comply with these laws can lead to significant fines,
legal penalties, and reputational damage for organizations.
The Cybercrime Prevention Act, also known as Republic Act 10175, is a law that aims to
prevent and combat cybercrime in the Philippines. The law covers a range of
cybercrimes, including cybersex, cyber-bullying, and hacking. The law also provides for
the creation of a Cybercrime Investigation and Coordinating Center (CICC) to coordinate
the investigation and prosecution of cybercrimes in the country.
The Electronic Commerce Act (ECA), also known as Republic Act 8792, is a law that
provides a legal framework for electronic commerce in the Philippines. The law aims to
facilitate electronic transactions, promote the use of electronic data messages, and
provide for the recognition of electronic documents in legal proceedings.
It is important for IT auditors to be familiar with these laws and regulations in order to
assess an organization's compliance with them. Failure to comply with these laws can
result in significant legal and financial consequences for organizations, including fines,
imprisonment, and damage to their reputation.
Furthermore, adherence to ethical practices helps to maintain the trust and confidence
of stakeholders in the IT audit profession. The IT auditor’s role requires them to be
independent, objective, and impartial, and the adherence to ethical standards helps to
ensure that they are fulfilling these requirements. An IT auditor who breaches ethical
standards risks damaging their reputation and the reputation of the profession as a
whole.
In addition to the above, ethical standards play a role in ensuring that the IT auditor is
conducting their work within legal and regulatory frameworks. This is because some
regulations require that auditors adhere to certain ethical standards, and as such, the IT
auditor must be familiar with these regulations and ensure that their practices are in
compliance with them. In summary, ethics play a vital role in ensuring the effectiveness
and credibility of IT auditing.
The Code of Professional Ethics and Conduct for ISACA members consists of four parts:
1. Introduction and Applicability – This section outlines the purpose of the code
of ethics and explains how it applies to ISACA members.
1. Code of Ethics – This section sets out the ethical principles and standards that
ISACA members are expected to uphold.
The principles that underpin the Code of Ethics for IT Auditors are as follows:
Integrity: IT auditors are expected to be honest and straightforward in all their dealings
and to maintain their professional independence and objectivity at all times. They should
avoid conflicts of interest and refrain from engaging in any activities that might impair
their professional judgment.
Objectivity: IT auditors should remain impartial and free from bias when performing their
work. They should ensure that their opinions and recommendations are based on sound
and objective analysis of the facts, and not influenced by personal or external factors.
Competence: IT auditors should possess the knowledge, skills, and experience necessary
to perform their work competently and professionally. They should maintain their
professional knowledge and skills through continuing education and professional
development.
Professional behavior: IT auditors should act in a manner that reflects positively on the
profession and maintains the public's trust and confidence in the integrity of the
profession. They should be aware of and comply with all applicable laws, regulations, and
professional standards.
These principles are intended to guide the behavior and actions of IT auditors, and to
ensure that they uphold the highest standards of professional conduct in their work.
1. Rules of Conduct – This section outlines specific rules of conduct that ISACA
members must follow. These rules cover areas such as professional
competence, due care, confidentiality, and conflicts of interest.
Objectivity means that the IT auditor must approach the audit with an open mind, free
from any biases, personal interests, or conflicts of interest. The IT auditor must evaluate
the evidence objectively and report the findings truthfully and accurately, without fear
or favor.
Independence, on the other hand, means that the IT auditor must be free from any
influences or pressures that may compromise their judgment or the audit results. This
includes both actual independence (being free from any financial or personal
relationships that could affect their judgment) and perceived independence (the
appearance of being free from such relationships). The IT auditor must also be
independent of the audited entity and any management or other parties involved in the
audited area.
MODULE 3
One of the best practices for an audit function is to have an audit universe. The audit
universe is an inventory of all the potential audit areas within an organization. Basic
functional audit areas within an organization include sales, marketing, customer service,
operations, research and development, finance, human resource, information
technology, and legal. An audit universe documents the key business processes and risks
of an organization. Documenting processes and, particularly, risks have proved to be a
best practice for organizations. The IIA’s Performance Standard 2010 encourages the
establishment of risk-based plans to determine the priorities for internal audit activity.
An audit universe includes the basic functional audit area, organization objectives, key
business processes that support those organization objectives, specific audit objectives,
risks of not achieving those objectives, and controls that mitigate the risks. Tying the
audit universe to organizational objectives links the entire audit process to business
objectives and risks, making it easier to communicate the impact of control
deficiencies. Exhibit 1Links to an external site. shows an example of an audit universe
related to the IT area of an organization.
The audit universe is also an essential building block to a properly risk-based internal
audit process. Typically, internal audit groups prepare annual audit schedules to
determine the number of hours available and the number of audits that can be
performed. The audit universe is an ongoing process; as an organization changes, new
risks arise or existing risks change, and new regulations are introduced. Organizations
can either remove lower-priority audits from the schedule or hire external auditors to
supplement internal staff.IT audits, for example, have specific IT processes to include in
the audit universe. Control Objectives for Information and Related Technology (COBIT)
provides a comprehensive list of critical IT processes, which can be used as a starting
point.
• Management plans, builds, runs and monitors activities, in alignment with the
direction set by the governance body, to achieve the enterprise objectives.
COBIT 5’s framework is valuable for all size types organizations, including commercial,
not-for-profit, or in the public sector. The comprehensive framework provides a set of
control objectives that not only helps IT management and governance professionals
manage their IT operations, but also IT auditors in their quests for examining those
objectives.
The COBIT processes can be customized to the organization’s environment. IT auditors
can help audit management identify the applications associated with the critical business
and financial processes, as well as controls that are necessary to make the area being
audited free from
significant exposures to risk. This objective also encompasses validating adherence of
the application systems under examination to appropriate standards (e.g., financial
accounting should conform to GAAP, etc.).
The next step in the planning process is to perform a risk assessment for each universe
item from Exhibit 1. The risk assessment will analyze exposures and help prioritize “high
risk” audit projects.
Risk assessments are considered the foundation of the audit function as they assist in
developing the process for planning individual audits. Specifically, risk assessment:
• improve the quality, quantity, and accessibility of planning data, such as risk
areas, past audits and results, and budget information
• examine potential audit projects in the audit universe and choose those that
have the greatest risk exposure to be performed first; and
• provide a framework for allocating audit resources to achieve maximum
benefits.
Given the high number of potential audits that can be performed and often the limited
amount of audit resources, it is important to focus on the right audits. The risk
assessment
approach provides explicit criteria for systematically evaluating and selecting these
audits.
In today’s environment, it is difficult to keep pace with organization and regulatory
changes to provide timely information on internal controls. Change increases the audit
universe, the number of business partners (i.e., vendors), and the number of projects
where an objective and independent perspective is needed. An effective risk assessment
planning process allows auditing to be more flexible and efficient to meet the needs of a
changing organization, such as:
• identifying new risk areas
• identifying changes in existing risk areas
• accessing current regulatory and legal information
• taking advantage of information gathered during the audit process to improve
risk assessment
Audit areas can be evaluated using a weighted scoring mechanism. However, audit
management must evaluate the results using their knowledge of the organization
objectives and environment to make sure the priorities reflect reality. Audit areas may
also be grouped to improve audit efficiency when reviewing similar processes. The
auditing function is cyclical in that it uses historical and current information for risk
assessment, evaluates controls, communicates results, and incorporates those results
back into the risk assessment.
In an IT risk assessment, for instance, financial applications are common audits/projects
to be ranked. Their risks can be identified, assessed, and prioritized. Controls
(safeguards) are also identified to be put in place to address and mitigate such risks. IT
risks surrounding financial applications can be identified through:
It is up to the organization to determine how to deal with the risks they have identified:
take a chance and live with them or take action to protect their assets. At the same time,
they must consider the costs associated with implementing controls, their impact on
users, the manpower required to implement and manage them, and the scope of the
action. Exhibit 3Links to an external site. shows an example of an IT risk assessment
performed to identify and prioritize risks within financial applications. Risk assessment is
covered in more detail in a later chapter.
The audit function should formulate both long-range and annual plans. Planning is a
basic function necessary to describe what must be accomplished, include budgets of
time and costs, and state priorities according to organizational goals and policies. The
objective of audit planning is to optimize the use of audit resources. To effectively
allocate audit resources, internal audit departments must obtain a comprehensive
understanding of the audit universe and the risks associated with each universe item.
Failure to select appropriate items can result in missed opportunities to enhance controls
and operational efficiencies. Internal audit departments that develop and maintain audit
universe files provide themselves with a solid framework for audit planning.
The intent of the audit plan is to provide an overall approach within which audit
engagements can be conducted. It provides the guidance for auditing the organization’s
integral processes.
The organization and its management must participate in and support this effort fully.
Commitment can be gained if participants recognize that a good plan can help pinpoint
problems in a highly dynamic, automated IT environment, for instance. Thus, it should be
the responsibility of all participants not only to help pinpoint such problems, but also to
assist in the measurement and quantification of problems.
Identifying, measuring, and quantifying problems in the IT area are difficult. The IT field
is technologically complex and has a language of its own. Participants in the formulation
of an IT audit plan, and particularly the IT auditors themselves, must have sufficient
experience and training in technical matters to be able to grasp key concepts and
abstractions about application systems. For example, abstractions about IT might include
significant aspects that are susceptible to naming, counting, or conceptualizing.
Understanding the systems at this level can lead to the identification of major problem
areas. Audit concentration, then, may be directed to the major problem areas most likely
to yield significant results.
Based on this identification of problems, the IT auditor determines what additional data
might be required to reach evaluation decisions. The audit process, therefore, must be
flexible enough to combine skilled personnel, new technology, and audit techniques in
new ways to suit each situation. However, this flexibility of approach requires
documentation in planned, directed steps. Systems that are understood poorly (or that
have been designed without adequate controls) can result in lost revenues, increased
costs, and perhaps disaster or fraud.
During the audit planning phase, the IT audit manager should meet with the chief
information officer (CIO) and senior members of IT management to gain their input and
concurrence with the risk assessment of the IT processes in the audit universe. If there is
an IT steering committee, the audit universe should be reviewed with it as well. This will
help ensure alignment between IT, business, and audit on the key risk areas. The meeting
with the CIO and IT managers must also introduce the audit staff and communicate the
scope, objectives, schedule, budget, and communication process to be used throughout
the engagement. This is also an opportunity for an open discussion of IT management’s
perception of risk areas, significant changes in the area under review, and identification
of appropriate contacts in IT.
An IT audit plan partitions the audit into discrete segments that describe application
systems as a series of manageable audit engagements and steps. At the detailed planning
or engagement level, these segments will have objectives that are custom-tailored to
implement organizational goals and objectives within the circumstances of the audit.
Thus, IT auditing does not call for “canned” approaches. There is no single series of
detailed steps that can be outlined once and then repeated in every audit. The audit plan,
therefore, is an attempt to provide an orderly approach within which flexibility can be
exercised. At a minimum, an IT audit plan, after gathering a comprehensive
understanding of the audit universe and the risks associated with each universe item,
should:
This list affirms that the IT auditor is primarily concerned with adequate controls to
safeguard the organization’s assets.
Test Controls
The IT auditor executes several procedures in order to test controls, processes, and
apparent exposures. These audit procedures may include examining documentary
evidence, as well as performing corroborating interviews, inspections, and personal
observations. Documentary evidence may consist of a variety of forms of documentation
on the application system under review. Examples include notes from meetings on
subject system, programmer notes, systems documentation, screenshots, user manuals,
and change control documentation from any system or operation changes since
inception, and a copy of the contract if third parties involved. Examining such
documentary evidence may require the IT auditor to ask questions of the user, developer
and managers to help him or her establish the appropriate test criteria to be used. It also
helps in identifying the critical application and processes to be tested. Corroborating
interviews are also part of the testing process, and may include procedures such as:
• Asking different personnel the same question and comparing their answers
• Asking the same question in different ways at different times
• Comparing answers to supporting documentation, work papers, programs,
tests, or other verifiable results
• Comparing answers to observations and actual system results
An audit finding form (e.g., General Computer Controls Findings Form, etc.) can be used
to review the control issues identified with the responsible IT manager in order to agree
on corrective action. This information can then be used to prepare the formal
Management Letter that will accompany the Audit Report and the corrective action
follow-ups. Taking corrective action could
result in enhanced productivity; the deterrence of fraud; or the prevention of monetary
loss, personal injury, or environmental damage. Exhibit 8Links to an external site. shows
an example of a worksheet that may be used to summarize the individual findings
identified during an IT audit.
Conclusions and Recommendations
Conclusions are auditor opinions, based on documented evidence, that determine
whether an audit subject area meets the audit objective. All conclusions must be based
on factual data obtained and documented by the auditor as a result of audit activity. The
degree to which the conclusions are supported by the evidence is a function of the
amount of evidence secured by the auditor. Conclusions are documented in the audit
working papers and should support the audit procedures performed. Working papers are
the formal collection of pertinent writings, documents, flowcharts, correspondence,
results of observations, plans and results of tests, the audit plan, minutes of meetings,
computerized records, data files or application results, and evaluations that document
the auditor activity for the entire audit period. A complete, well-organized, cross-
referenced, and legible set of working papers is essential to support the findings,
conclusions, and recommendations as stated in the Audit Report. Typically, a copy of the
final Audit Report is filed in the working papers.
Recommendations are formal statements that describe a course of action that should be
implemented by the company’s management to restore or provide accuracy, efficiency,
or adequate control of audit subjects. A recommendation should be provided by the
auditor for each audit finding for the report to be useful to management.
Communication
The value of an audit depends, in large part, on how efficiently and effectively its results
are communicated. At the conclusion of audit tests, it is best to discuss the identified
findings with IT management to gain their agreement and begin any necessary corrective
action. Findings, risks as a result of those findings, and audit recommendations are
usually documented on the Management Letter (in a separate section of the Audit
Report). Refer to Exhibit 9Links to an external site. for an example of the format of a
Management Letter from an IT audit.
On receipt of the Management Letter, IT management and affected staff should review
the document immediately. Those items not already completed should be handled and
followed-up. Within a relatively short time, the fact that all discrepancies have been
corrected should be transmitted to the audit staff in a formal manner. These actions are
noted in the audit files, and such cooperation reflects favorably in future audits.
It is important to track corrective action to verify that findings have been remediated.
This requires a formal process to track corrective actions, target dates, and status for
reporting to IT management, the audit committee, and the board.
At the close of the audit, a draft Audit Report is issued for review by all impacted parties.
The review process will go much faster if findings have already been agreed with
management during the testing and conclusion phase. After the Audit Report has been
finalized, it is a good practice to schedule an exit meeting involving both, IT and financial
sides. Typically, invitations to the exit meeting are sent to the CIO and the Chief
Financial Officer (CFO) (or Controller if the CFO is not available) to discuss the audit, as
well as to review the audit objectives and ask for feedback on the performance of the
audit team. This meeting will provide valuable information into the performance of the
audit staff and lessons learned for improving future engagements.
To summarize the audit process explained in this chapter, refer to Exhibit 10.
Besides supporting financial statement audits, there are other highly-demanded audit
areas conducted in IT. These are briefly described next.
Enterprise Architecture
IT management must develop organizational procedures to ensure a controlled and
efficient architecture for information processing. These procedures should also specify
the computers and peripheral equipment required to support all functions in an
economic and timely manner. With enterprise systems being very critical to medium-size
and large businesses today, the need to monitor and validate operational integrity of an
enterprise resource planning system is an important process. IT audit plays an important
role in maintaining, validating, and monitoring the enterprise architecture.
Computerized Systems and Applications
A computerized systems and applications type of audit verifies that the organization’s
systems and applications (operational and non-financial in nature) are: