Chapter 3 Otero
Chapter 3 Otero
Chapter 3 Otero
LEARNING OBJECTIVES
1.Describe what audit universe is, and illustrate example.
2.Define control objectives for information and related technology and explain why
they are useful for organizations and auditors.
3.Explain what a risk assessment is and its significance to the audit function.
Illustrate an example of a risk assessment following the National Institute of
Standards and Technology methodology.
4.Describe an audit plan and its components. Illustrate examples of IT audit
documentation supporting a financial statement audit.
5.Define the audit process and describe the phases of an IT audit engagement.
6.Discuss other types of audits conducted in IT.
Audit Universe
One of the best practices for an audit function is to have an audit universe. The
audit universe is aninventory of all the potential audit areas within an
organization. Basic functional audit areas within an organization include sales,
marketing, customer service, operations, research and development, finance, human
resource, information technology, and legal. An audit universe documents the key
business processes and risks of an organization. Documenting processes and,
particularly, risks have proved to be a best practice for organizations. The IIA’s
Performance Standard 2010 encoutages the establishment of risk-based plans to
determine the priorities for internal audit activity.
An audit universe includes the basic functional audit area, organization
objectives, key business processes that support those organization objectives,
specific audit objectives, risks of not achieving those objectives, and controls
that mitigate the risks. Tying the audit universe to organizational objectives
links the entire audit process to business objectives and risks, making it easier
to communicate the impact of control deficiencies. Exhibit 3.1 shows an example of
an audit universe related to the IT area of an organization.
59
COBIT
COBIT is an authoritative, international set of generally accepted IT practices or
control objectives that help employees, managers, executives, and auditors in:
understanding IT systems, discharging fiduciary responsibilities, and deciding
adequate levels of security and controls.
COBIT supports the need to research, develop, publicize, and promote up-to-
date internationally accepted IT control objectives. The primary emphasis of the
COBIT framework issued by Information Systems Audit and Control Foundation in 1996
is to ensure that technology provides businesses with relevant, timely, and quality
information for decision-making purposes. The COBIT framework, now on its fifth
edition (COBIT 5), has evolved over the years and each time there are major changes
to the framework, the framework is numbered to its current version.
The benefit of a standard framework for IT controls, such as COBIT, is that it
allows management to benchmark its environment and compare it to other
organizations. IT auditors can also use COBIT to substantiate their internal
control assessments and opinions. Because the framework is comprehensive, it
provides assurances that IT security and controls exist.
COBIT 5, which can be downloaded from www.isaca.org, helps organizations
create optimal value from IT by maintaining a balance between realizing benefits
and optimizing risk levels and resource use. COBIT 5 is based on five principles
(see Exhibit 3.2). COBIT 5 considers the I'T needs of internal and external
stakeholders (Principle 1), while fully covering the organization’s governance and
management of information and related technology (Principle 2). COBIT 5 provides an
integrated framework that aligns and integrates easily with other frameworks (e.g.,
Committee of
Sponsoring Organizations of the Treadway Commission-Enterprise Risk Management
(COSO-
ERM), etc), standards, and best practices used (Principle 3). COBIT 5 enables IT to
be governed and managed in a holistic manner for the entire organization (Principle
4) through:
The next step in the planning process is to perform a risk assessment for each
universe item from Exhibit 3.1. The risk assessment will analyze exposures and help
prioritize “high risk” audit projects.
Risk Assessment
Risk assessments are considered the foundation of the audit function as they assist
in developing
the process for planning individual audits. Specifically, risk assessments:
improve the quality, quantity, and accessibility of planning data, such as risk
areas, past audits and results, and budget information;
examine potential audit projects in the audit universe and choose those that have
the greatest risk exposure to be performed first; and
provide a framework for allocating audit resources to achieve maximum benefits.
Given the high number of potential audits that can be performed and often the
limited
amount of audit resources, it is important to focus on the right audits. The risk
assessment approach provides explicit criteria for systematically evaluating and
selecting these audits.
In today’s environment, it is difficult to keep pace with organization and
regulatory changes to provide timely information on internal controls. Change
increases the audit universe, the number of business partners (i.e., vendors), and
the number of projects where an objective and independent perspective is needed. An
effective risk assessment planning process allows auditing to be more flexible and
efficient to meet the needs of a changing organization, such as:
Audit areas can be evaluated using a weighted scoring mechanism. However, audit
management must evaluate the results using their knowledge of the organization
objectives and environment to make sure the priorities reflect reality. Audit areas
may also be grouped to improve audit efficiency when reviewing similar processes.
The auditing function is cyclical in that it uses historical and current
information for risk assessment, evaluates controls, communicates results, and
incorporates those results back into the risk assessment.
In an IT risk assessment, for instance, financial applications are common
audits/projects to be ranked. Their risks can be identified, assessed, and
prioritized. Controls (safeguards) are also identified to be put in place to
address and mitigate such risks. IT risks surrounding financial applications can be
identified through:
Audits, reviews, inspections
Reading flowcharts of operations
Using risk analysis questionnaires
Analyzing financial statement trends
Completing insurance policy checklists
It is up to the organization to determine how to deal with the risks they have
identified: take a chance and live with them or take action to protect their
assets. At the same time, they must consider the costs associated with implementing
controls, their impact on users, the manpower required to implement and manage
them, and the scope of the action. Exhibit 3.3 shows an example of an IT risk
assessment performed to identify and prioritize risks within financial
applications. Risk assessment is covered in more detail in a later chapter.
Audit Plan
The audit function should formulate both long-range and annual plans. Planning is a
basic function necessary to describe what must be accomplished, include budgets of
time and costs, and state priorities according to organizational goals and
policies. The objective of audit planning is to optimize the use of audit
resources. To effectively allocate audit resources, internal audit departments must
obtain a comprehensive understanding of the audit universe and the risks associated
with each universe item. Failure to select appropriate items can result in missed
opportunities to enhance controls and operational efficiencies. Internal audit
departments that develop and maintain audit universe files provide themselves with
a solid framework for audit planning.
The intent of the audit plan is to provide an overall approach within which
audit engagements can be conducted. It provides the guidance for auditing the
organizations integral processes.
Exhibit 3.3 Risk Assessment Example for the IT Functional Audit Area
Impact
Financial IT Area / Likelihood | Probability | Magnitude | Level Risk Recommended
Action
Application Vulnerability | Threat-Source Level Assigned of Impact | Value Risk
Rating? Control Priority
disaster. according to
established
reporting
requirements.
(Continued)
Exhibit 3.3 (Continued) Risk Assessment Example for the IT Functional Audit Area
Financial
Application
IT Area /
Vulnerability
Threat-Source
Likelihood Determination
Impact
Likelihood
Level
Probability
Assigned
Magnitude
of Impact
Impact
Level
Value
Risk
Risk
Rating?
Action
Priority
Recommended
Control
Financial
Application
#2 (FA2)
Information
Security / FA2
owners do not
periodically
review user
access
privileges.
Unauthorized
users
(hackers,
terminated
employees,
and insiders)
Very High
1.00
High
75
Users possess
privileges that
are not
consistent with
their job
functions,
allowing
unauthorized
or incorrect
modifications
to FA2's data,
which could
cause
management
decisions
based upon
misleading
information.
75
User access
privileges within
FA2 are
periodically
reviewed by
application
owners to verify
access privileges
remain
appropriate and
consistent with
job requirements.
Very
High
Information
Security /
Terminated
user accounts
are not
removed from
FA2.
Unauthorized
users
(terminated
employees)
Very High
1.00
High
75
Terminated
users can gain
access to FA2
and view or
modify its
financial
information.
75
The security
administrator is
notified of
employees who
have been
terminated. Access
privileges of such
employees are
immediately
changed to reflect
their new status.
Very
High
(Continued)
Exhibit 3.3 (Continued) Risk Assessment Example for the IT Functional Audit Area
IT Area /
Vulnerability
Likelihood
Level
Financial
Application
Probability
Assigned
Magnitude
Threat-Source of Impact
Impact
Level
Value
Risk
Risk
Rating?
Recommended
Control
Action
Priority
Change Control
Management /
Test results for
FA2 upgrades
are not
approved by
management,
prior to their
implementation
into
production.
application
changes and
modifications
18.75
tested and
approved by
management prior
to their
implementation in
production in
accordance with
test plans and
results.
Low
2 Computed by multiplying the “Probability Assigned” and the “Impact Level Value.”
The organization and its management must participate in and support this effort
fully. Commitment can be gained if participants recognize that a good plan can help
pinpoint problems in a highly dynamic, automated IT environment, for instance.
Thus, it should be the responsibility of all participants not only to help pinpoint
such problems, but also to assist in the measurement and quantification of
problems.
Identifying, measuring, and quantifying problems in the IT area are difficult.
The IT field is technologically complex and has a language of its own. Participants
in the formulation of an IT audit plan, and particularly the IT auditors
themselves, must have sufficient experience and training in technical matters to be
able to grasp key concepts and abstractions about application systems. For example,
abstractions about IT might include significant aspects that are susceptible to
naming, counting, or conceptualizing. Understanding the systems at this level can
lead to the identification of major problem areas. Audit concentration, then, may
be directed to the major problem areas most likely to yield significant results.
Based on this identification of problems, the IT auditor determines what
additional data might be required to reach evaluation decisions. The audit process,
therefore, must be flexible enough to combine skilled personnel, new technology,
and audit techniques in new ways to suit each situation. However, this flexibility
of approach requires documentation in planned, directed steps. Systems that are
understood poorly (or that have been designed without adequate controls) can result
in lost revenues, increased costs, and perhaps disaster or fraud.
During the audit planning phase, the IT audit manager should meet with the
chief information officer (CIO) and senior members of IT management to gain their
input and concurrence with the risk assessment of the I'T processes in the audit
universe. If there is an IT steering committee, the audit universe should be
reviewed with it as well. This will help ensure alignment between IT, business, and
audit on the key risk areas. The meeting with the CIO and IT managers must also
introduce the audit staff and communicate the scope, objectives, schedule, budget,
and communication process to be used throughout the engagement. This is also an
opportunity for an open discussion of IT management's perception of risk areas,
significant changes in the area under review, and identification of appropriate
contacts in IT.
An IT audit plan partitions the audit into discrete segments that describe
application systems as a series of manageable audit engagements and steps. At the
detailed planning or engagement level, these segments will have objectives that are
custom-tailored to implement organizational goals and objectives within the
circumstances of the audit. Thus, IT auditing does not call for “canned”
approaches. There is no single series of detailed steps that can be outlined once
and then repeated in every audit. The audit plan, therefore, is an attempt to
provide an orderly approach within which flexibility can be exercised. At a
minimum, an IT audit plan, after gathering a comprehensive understanding of the
audit universe and the risks associated with each universe item, should:
Company Name
IT Budget
Audit Professional
Staff/ Total
Audit Area Senior | Manager Partner Hours
Planning
Review work papers from the prior 3.0 1.0 0.0 4.0
year, if applicable; prepare IT budget;
conduct planning meetings; prepare
planning memo; prepare initial
request of information and send to
company personnel, etc.
Fieldwork
Document/update understanding of
the organization's IT environment and
perform tests of IT controls (per
General Control IT area).
(Continued)
72m [nformation Technology Control and Audit
Company Name
IT Budget
Audit Professional
Staff/ Total
Audit Area Senior | Manager Partner Hours
Review, Reporting, and Conclusion
Review and document action(s) taken 2.0 0.0 0.0 2.0
by company’s Management to correct
last year’s IT audit findings/
deficiencies.
Document IT audit findings/ 3.0 0.0 0.0 3.0
deficiencies and opportunities to
improve existing controls.
Assess and classify identified IT audit 1.0 0.0 0.0 1.0
findings/deficiencies.
Draft IT Management letter listing all IT 0.0 1.0 1.0 2.0
audit findings/deficiencies and
opportunities to improve existing
controls. Forward letter to IT
Management for review.
Conduct status meetings, internally or 1.0 0.0 0.0 1.0
with IT personnel.
Review work papers evidencing 0.0 9.0 4.0 13.0
IT audit work performed.
Exit meeting with IT personnel to 0.0 1.0 0.0 1.0
discuss audit and results.
Address and clear review notes from 11.0 2.0 0.0 13.0
audit management (Manager and
Partner) and conclude audit.
Subtotal 18.0 13.0 5.0 36.0 | 36%
Grand Total 78.0 16.0 6.0 100.0 | 100%
Staff/Senior 78.0 78%
Manager 160 | 16%
Partner 6.0 6%
Company Name
Application
Brief
Description
Processing
Environment
(Operating
System
Where the
Application
Is Installed
On)
Physical
Hosting
Location—
Application
and Database
Database
Management
Software
Fixed
Revenue | Assets
1(SAP
Includes the
general
ledger,
expenditures,
inventory
management,
and revenue
accounting
modules.
[location]
oN
Infinium
Manages the
payroll.
[location]
(Continued)
Company Name
H*
Application
Brief
Description
Processing
Environment
(Operating
System
Where the
Application
Is Installed
On)
Physical
Hosting
Location—
Application
and Database
Database
Management
Software
Fixed
Revenue | Assets
3|APS/2
Manages
investments.
[location]
Timberline
Manages long
term and
fixed assets.
[location]
Exhibit 3.5b Example of Scoping for General Computer Control Objectives and
Activities
Company Name
1 [Information [ISO 1.00 - IT operations 1SO 1.01 - Batch and/or online processing
is
Systems support adequate defined, timely executed, and monitored
Operations scheduling, execution, for successful completion.
monitoring, and continuity | 1SO 1.02 - Exceptions identified on batch
of systems, programs, and and/or online processing are timely
processes to ensure the reviewed and corrected to ensure
complete, accurate, and valid | accurate, complete, and authorized
processing and recording of | processing of financial information.
financial transactions.
2 |Information [ISO 2.00 - The storage of 1SO 2.02 - Automated backup tools have
Systems financial information is been implemented to manage retention
Operations appropriately managed, data plans and schedules.
4 |Information |ISEC 1.00 - Security ISEC 1.02 - Formal policies and procedures
Security configuration of define the organization's information
(Continued)
Company Name
access and modifications of | ISEC 2.04 - Users who have changed roles or
systems and information, tasks within the organization, or that have
which may result in the been transferred, or terminated are
processing or recording of | immediately informed to the security
incomplete, inaccurate, or department for user account access
thoroughly documented to
adequate.
7 | Change CCM 2.00 - Changes CCM 2.01 - System changes are tested
Control implemented in before implementation into the
Management | applications, databases, production environment consistent with
systems (altogether referred | CCM 2.02 - Test plans and cases involving
to as “system changes”) are | complete and representative test data
appropriately tested. Tests (instead of production data) are approved
are performed by a group by application owners and development
other than the group management.
Company Name
managed to reduce
disruptions, unauthorized
of financial information.
approved to support
recording of financial
information.
Managers perform detailed reviews of the work papers and ensure the audit
objectives have been achieved. Managers meet frequently with audit clients, and
provide them with audit status, preliminary findings identified, hours incurred and
left to finish,etc. Managers also provide frequent status of the audit work to the
PPD assigned, to which they report directly. Lastly, the PPD performs a high-level
review of the work (as provided by managers), focusing on high-risk areas, controls
in place that are not adequately designed nor operating effectively, findings
identified and their impact to the overall audit, etc. PPDs tend to rely on the
detailed reviews performed by managers or senior managers, and also ensure the
overall objectives of the audit have been achieved.
Deadlines are a critical component of an audit plan. They should be reviewed
and agreed with
the client organization from the start of the audit so that they comply with
requirements established by third parties (e.g., banks, financial institutions,
etc.) and regulators (e.g., government,private organizations, etc.). Deadlines
should be well-thought of taking into account the information and resources that
must be available to perform the audit work within the established requirements.
An audit planning memo (“planning memo”) is part of the auditor working papers
and documents the sections just described. The planning memo is typically prepared
by the audit engagement senior, and reviewed by the manager before submitting it to
the PPD for approval.Appendix 1 shows the format of a typical IT planning memo,
including the procedures which may be performed by an IT auditor in connection with
an audit engagement. The planning memo may be tailored for the specific facts and
circumstances of the audit engagement. This includes removing sections which are
not applicable. The memo in Appendix 1 includes some wording in italics that is
either enclosed within brackets or parentheses. This format is used to indicate
information to be replaced as applicable, or that guides the completion of the
memo.
Audit Process
Statement on Auditing Standards (SAS No. 1) has the effect of mandating a uniform,
process-oriented approach to audit engagements. The approach depicted is a true
process technique. That is, audits follow a series of logical, orderly steps, each
designed to accomplish specific end results.
This is also the case for an IT audit. The difference in an I'T audit is the
specialized approach to the audit work and the skills needed to understand
technology and the IT control environment. The phases of auditing activities
typically ovetlap and involve some reassessment and retracing of procedures
performed earlier. Common phases of an audit engagement are shown in Exhibit 3.6.
The first two phases, Risk Assessment and Audit Plan, have been explained above.
Following are
explanations of the remaining phases related to an IT audit.
Preliminary Review
In this phase, the auditor should obtain and review summary-level information and
evaluate it in relation to the audit objectives. The purpose of the preliminary
review phase of an IT audit engagement is to gather an understanding of the I'T
environment, including the controls in place that are essential to meet the overall
audit objectives. The IT auditor conducts this preliminary
review at a general level, without examining details of individual applications and
the processes
involved. Instead, the IT auditor interviews key personnel to determine policies
and practices, and prepares supplemental audit information as required. Preliminary
review information serves as a basis for supporting the information included in the
IT audit plan.
78 ® [nformation Technology Control and Audit
1. Risk assessment
5. Test controls
Policies and procedures that the organization implements and the IT infrastructure
and application software that it uses to support business operations and achieve
business strategies.
Narratives or overview flowcharts of the financial applications, including server
names, make and model, supporting operating systems, databases, and physical
locations, among others.
Whether the financial applications are in-house developed, purchased with little
or no customization, purchased with significant customization, or proprietary
provided by a service organization.
Whether service organizations host financial applications and if so, what are
these applications and which relevant services they perform.
Controls in place supporting the area of information systems operations, such as
those supporting job scheduling, data and restoration, backups, and offsite
storage.
Controls in place supporting the area of information security, such as those
supporting authentication techniques (i.e., passwords), new access or termination
procedures, use of firewalls and how are they configured, physical security, etc.
Controls in place supporting the area of change control management, such as those
supporting the implementation of changes into applications, operating systems, and
databases; testing whether access of programmers is adequate; etc.
An adequate audit trail so that transactions can be traced forward and backward
through the financial application
The documentation and existence of controls over the accounting for all data
(e.g., transac- tions, etc.) entered into the application and controls to ensure
the integrity of those transactions throughout the computerized segment of the
application
Handling exceptions to, and rejections from, the financial application
Unit and integrated testing, with controls in place to determine whether the
applications perform as stated
Controls over changes to the application to determine whether the proper
authorization has been given and documented
Authorization procedures for application system overrides and documentation of
those processes
Determining whether organization and government policies and procedures are
adhered to in system implementation
Training user personnel in the operation of the financial application
Developing detailed evaluation criteria so that it is possible to determine
whether the implemented application has met predetermined specifications
Adequate controls between interconnected application systems
Adequate security procedures to protect the user's data
Backup and recovery procedures for the operation of the application and assurance
of business continuity
Ensuring technology provided by different vendors (i.e., operational platforms) is
compatible and controlled
Adequately designed and controlled databases to ensure that common definitions of
data are used throughout the organization, redundancy is eliminated or controlled,
and data existing in multiple databases is updated concurrently
This list affirms that the IT auditor is primarily concerned with adequate controls
to safeguard the organization’s assets.
Test Controls
The IT auditor executes several procedures in order to test controls, processes,
and apparent exposures. These audit procedures may include examining documentary
evidence, as well as performing corroborating interviews, inspections, and personal
observations.
Documentary evidence may consist of a variety of forms of documentation on the
application system under review. Examples include notes from meetings on subject
system, programmer notes, systems documentation, screenshots, user manuals, and
change control documentation from any system or operation changes since inception,
and a copy of the contract if third parties involved. Examining such documentary
evidence may require the I'T auditor to ask questions of the user, developer and
managers to help him or her establish the appropriate test criteria to be used. It
also helps in identifying the critical application and processes to be tested.
Corroborating interviews are also part of the testing process, and may include
procedures such as:
Asking different personnel the same question and comparing their answers
Asking the same question in different ways at different times
Comparing answers to supporting documentation, work papers, programs, tests, or
other verifiable results
Comparing answers to observations and actual system results
= 29 Account Policies
2]
[#+/__] Administrative Templates
cm
Scripts (Startup/Shutdown)
[=H Security Settings
3 Account Policies
4 Password Policy
Account Loc
SA
Substantive Testing
Where controls are determined not to be effective, substantive testing may be
required to determine whether there is a material issue with the resulting
financial information. In an IT audit, substantive testing is used to determine the
accuracy and completeness of information being generated by a process or
application. Contrary to compliance testing where the auditor’s goal is to confirm
whether the organization is adhering to applicable policies, procedures, rules, and
regulations. An example of a compliance test procedure would be verifying that a
change or upgrade in a financial application was adequately tested, approved, and
documented prior to its implementation.
Logical Setting
Network /
System / Enforce Minimum Minimum
Financial Password Password Password Password Account
# Application History Age Length Complexity | Lockout
Per Company Policy | 5 passwords 90 days 6 characters | Enabled 3 invalid
[working paper remembered login
(wip) ##] {1} attempts
Actual Testing Performed
Local Area 0 passwords 0 days 4 characters | Disabled 0 invalid
Network remembered {a} {a} {a} login
(LAN) / {a} attempts
Windows {a}
1 | Financial {b} {b} {b} {b} {b}
Application X
2 | Financial Option not 90 days 6 characters | Enabled 3 invalid
Application Y available— {c} {c} {c} login
Application attempts
limitation {c}
{dd}
Note: The password values above were obtained through observation, and with the
assistance
of [name of Information Security Administrator].
Tickmarks (explanations):
{1}—Password settings obtained from company policy. Copy of the company policy
supporting these settings is documented in w/p [##].
{a}—The Enforce Password History, Minimum Password Age, Minimum Password Length,
Password Complexity, and Account Lockout settings are not configured consistent
with company policy, and therefore, do not promote an acceptable level of security.
The value configured for Password Complexity has also been set to “Disabled.”
Password complexity requirements establish minimum password parameters not easily
compromised that users must follow in establishing their passwords, particularly at
the LAN/Windows level, which serves as the first layer of authentication.
Exceptions noted. Refer to w/p [##], where these exceptions have been listed.
{b}—Password security settings are controlled through the Windows operating system.
Therefore, the configuration of the LAN/Windows password settings covers this
application. Refer to the LAN/Windows row above.
{c}—Password security settings such as Minimum Password Age, Minimum Password
Length, Password Complexity, and Account Lockout have been configured consistent
with the company policy, promoting an adequate level of security. No exceptions
noted.
{d}—Application functionality limitations do not allow the enforcement of password
history.
Exceptions noted. Refer to w/p [##], where this exception has been listed.
Substantive audit tests are designed and conducted to verify the functional
accuracy, efficiency, and control of the audit subject. During the audit of a
financial application, for example, the IT auditor would build and process test
data to verify the processing steps of such an application.
Auditing-through-the-computer is a term that involves steps in addition to
those mentioned previously. Programs are executed on the computer to test and
authenticate application programs that are run in normal processing. Usually, the
financial audit team will select one of the many Generalized Audit Software
packages such as SAS, SPSS, Computer-Assisted Audit Techniques (CAATS), or CA-
Easytrieve(T) and determine what changes are necessary to run the software at the
installation. Financial auditors use this specific software wo do sampling, data
extraction, exception reporting, summarize and foot totals, and other tasks. They
also use packages such as Microsoft Access, Excel, IDEA, or ACL because of their
in-depth analyses and reporting capabilities.
CAATS, for example, use auditor-supplied specifications to generate a program
that performs audit functions, such as evaluating application controls, selecting
and analyzing computerized data for substantive audit tests, etc. In essence, CAATs
automate and simplify the audit process, and this is why audit teams (external and
internal) are increasingly using them. In fact, many organizations have Generalized
Audit Software already installed for their internal auditors to allow them to
gather information and conduct the planned audit tests. The appropriate selection
and effective use of these audit tools are essential not only to perform adequate
audit testing but also to document results.
Document Results
The next phase of an audit involves documenting results of the work performed, as
well as reporting on the findings. Audit results should include a description of
audit findings, conclusions, and recommendations.
Audit Findings
The terms finding, exception, deficiency, deviation, problem, and issue are
basically synonymous in the audit world, and mean the auditor identified a
situation where controls, procedures, or efficiencies can be improved. Findings
identify and describe inaccurate, inefficient, or inadequately controlled audit
subjects. An example of an IT audit finding would be a change implemented into a
financial application that did not include proper management authorization. Another
example would include the IT auditor discovering that the organization's procedures
manual does not require management's permission before implementing changes into
applications.
Audit findings should be individually documented and should at least include
the following:
Name of the IT environment (operating system hosting the relevant financial
application(s) evaluated
IT area affected (IS operations, information security, change control management)
Working paper test reference where the finding was identified
General control objective(s) and activity(ies) that failed
Brief description of the finding
Where is the finding formally communicated to management (this should reference
the Management Letter within the Auditor Report)
The individual classification of the finding per audit standard AU 325,
Communications About Control Deficiencies in an Audit of Financial Statements, as
either a deficiency, significant deficiency, or a material weakness”
Evaluation of the finding, specifically whether it was identified at the design
level (i.e.,there is no general control in place) or at the operational level
(i.e., the general control was in place,but did not test effectively)
Whether the finding represents or not a pervasive or entity-level risk
Whether the finding can be mitigated by other compensating general controls, and
if so, include reference to where these controls have been tested successfully
An audit finding form (e.g., General Computer Controls Findings Form, etc.) can be
used to review the control issues identified with the responsible IT manager in
order to agree on corrective action. This information can then be used to prepare
the formal Management Letter that will accompany the Audit Report and the
corrective action follow-ups. Taking corrective action could result in enhanced
productivity; the deterrence of fraud; or the prevention of monetary loss, personal
injury, or environmental damage. Exhibit 3.8 shows an example of a worksheet that
may be used to summarize the individual findings identified during an IT audit.
Communication
The value of an audit depends, in large part, on how efficiently and effectively
its results are communicated. At the conclusion of audit tests, it is best to
discuss the identified findings with IT management to gain their agreement and
begin any necessary corrective action. Findings, risks as a result of those
findings, and audit recommendations are usually documented on the Management Letter
(in a separate section of the Audit Report). Refer to Exhibit 3.9 for an example of
the format of a Management Letter from an IT audit.
* http://pcaobus.org/Standards/Auditing/Pages/AU325.aspx.
Company Name
GCC Findings
No/IT
Environment—IT
Area/W/P
Reference #
Where Finding
Was Identified
Control Objective
Failed Control
Activity
Classification of Finding as a
Deficiency (Design or
Operating), Significant
Deficiency, or Material
Weakness
Finding Mitigated
By Other
Compensating
General Controls?
(If So, List Control.)
1/Windows—
Information
Security/W/P
Reference #
ISEC 2.00 -
Adequate
security is
implemented to
protect against
unauthorized
access and
modifications of
systems and
information,
which may result
in the processing
or recording of
incomplete,
inaccurate, or
invalid financial
information.
who have
changed roles or
tasks within the
organization, or
that have been
transferred, or
terminated are
immediately
informed to the
security
department for
user account
access revision
in order to
reflect the new
and/or revised
status.
Operating Deficiency.
Deficiency does not
represent a material
weakness (i.e., will not
prevent, or detect and correct
material misstatements in the
financial statements). The
deficiency is also not severe
enough to merit the attention
of those charged with
governance (i.e, significant
deficiency). Simply, the
operation of the existing
control does not allow
management or employees,
in the normal course of
performing their assigned
functions, to prevent, detect,
and/or correct misstatements
on a timely basis.
(Continued)
Company Name
GCC Findings
No/IT
Environment—IT
Area/W/P
Reference #
Where Finding
Was Identified
Control Objective
Failed Control
Activity
Classification of Finding as a
Deficiency (Design or
Operating), Significant
Deficiency, or Material
Weakness
Finding Mitigated
By Other
Compensating
General Controls?
2/UNIX—
Information
Security/W/P
Reference #
ISEC 2.00 -
Adequate
security is
implemented to
protect against
unauthorized
access and
modifications of
systems and
information,
resulting in the
processing or
recording of
incomplete,
inaccurate, or
invalid
information.
Same as above.
controls identified
(and successfully
tested) that can
mitigate or
compensate the
finding.]
(Continued)
Company Name
GCC Findings
No/IT
Environment—IT
Area/W/P
Reference #
Where Finding
Was Identified
Control Objective
Failed Control
Activity
Classification of Finding as a
Deficiency (Design or
Operating), Significant
Deficiency, or Material
Finding Mitigated
By Other
Compensating
General Controls?
(If So, List Control.)
3/Linux—
Information
Security/W/P
Reference #
configuration of
applications,
databases,
networks, and
operating
systems is
adequately
managed to
protect against
unauthorized
changes to
programs and
data that may
resultin
incomplete,
inaccurate, or
invalid
processing or
recording of
financial
information.
ISEC 1.07 -
Passwords must
promote
acceptable levels
of security
(consistent with
policies and/or
best industry
practices) by
enforcing
confidentiality
and a strong
password
format.
[Financial Application 1, 2,
etc.] requires users to first
authenticate at the network
level, there were application-
level logical security settings
identified which were not in
accordance with the
company’s local password
policy, and may therefore
not promote optimal
security.
Same as above.
Company Name
Management Letter—IT Audit
Year Ended December 31, 20XX
The findings below have been prioritized in order of significance and discussed
with [name
and title of company personnel responsible for IT], on [date when meeting took
place].
Findings marked with an asterisk (*) are repeated from prior years.
FINDING
[Detailed description of the finding.
[EXAMPLE: During the fiscal year ended June 30, 20XX, the Company converted its
core
financial application from [Application #1] to [Application #2]. We noted that the
Company
had no established or documented formal policies and procedures regarding the
change
management process as it related to conversion of data from old to new systems,
applications, and databases.)
IT RISK
[Description of the IT risk related to the finding above.]
RECOMMENDATION
[Auditor recommendation is documented here.]
[EXAMPLE: The Company should formally document a change control policy to establish
procedures over each change's life cycle, including controls on data conversions.
Newly
developed policies should also be formally approved, communicated, and distributed
to end
users.]
MANAGEMENT RESPONSE
On receipt of the Management Letter, I'T management and affected staff should
review the document immediately. Those items not already completed should be
handled and followed-up. Within a relatively short time, the fact that all
discrepancies have been corrected should be transmitted to the audit staff in a
formal manner. These actions are noted in the audit files, and such cooperation
reflects favorably in future audits.
I. Risk assessment
Vulnerabilities
and threats
identification
Likelihood Risk
determination determination
System assets
characterization
Test
Preliminary
review and
Aen Evaluate
audit controls?
Substantive
procedures i
testing
To summarize the audit process explained in this chapter, refer to Exhibit 3.10.
Enterprise Architecture
IT management must develop organizational procedures to ensure a controlled and
efficient architecture for information processing. These procedures should also
specify the computers and peripheral equipment required to support all functions in
an economic and timely manner. With enterprise systems being very critical to
medium-size and large businesses today, the need to monitor and validate
operational integrity of an enterprise resource planning system is an important
process. IT audit plays an important role in maintaining, validating, and
monitoring the entetprise architecture.
Systems Development
An IT audit related to systems development would make certain that applications and
systems under development meet the objectives of the organization, satisfy uset
requirements, and provide efficient, accurate, and cost-effective applications and
systems. This type of audit ensures that applications and systems are written,
tested, and installed in accordance with generally accepted standards for systems
development.
* www.sans.org/reading-room/whitepapers/recovery/introduction-business-continuity-
planning-559.
* http://searchdisasterrecovery.techtarget.com/definition/business-continuity-plan-
audit.
Conclusion
Over decades, the computer has been used to support daily operations in business
environments. Most companies find that they must use computer technology
effectively to remain competitive. The nature of technology, however, continues to
change rapidly. As a result, companies continue to integrate their
accounting/financial systems and operations. The audit profession has made these
adjustments as well. Worldwide, professional organizations have issued useful
guidance and instruction to assist managers and the audit professionals.
Whether the IT audit reviews information systems operations, information
security, or applications, the controls applied in those areas must be verified.
The IT auditor’s function (whether internal or external) provides reasonable
assurance that system assets are safeguarded, information is timely and reliable,
and errors and deficiencies are discovered and corrected promptly. Equally
important objectives of this function are effective controls, complete audit
trails, and compliance with organizational policies.
The nature of auditing will undoubtedly continue to undergo substantial change
as the level of technology improves. Full automation from project initiation to the
final reporting stage will enable auditors to make more efficient use of available
resources and enhance the credibility of the audit performed. Effective use of
computer technology can also empower auditors to better understand the design of
the client's computer system, as well as conduct successful audits in today’s
highly automated environments.
Review Questions
Exercises
1.As the IT audit senior of the engagement, you are presenting to the IT manager
and partner (as part of the planning meeting) the results of the risk assessment
performed in Exhibit 3.3. Based on such results (look at Exhibit 3.3, under the
“Risk Rating” and “Action Priority” columns), it seems clear that the audit should
focus on Financial Application #2 (FA2). Nevertheless, the IT manager and partner,
based on previous relevant experience, believe that the audit should be performed
on Financial Application #1 (FA1). The planning meeting is over, and you still feel
doubtful on the decision just made. Your task: Prepare a two-page memo to the audit
manager (copying the partner) stating your reasons why FA2 should be audited first.
In order to convince the audit manager and partner, you are to think “outside the
box.” In other words, think of additional information not necessarily documented in
the risk assessment shown in Exhibit 3.3, and document in your memo information
related to:
a.Any additional vulnerabilities or weaknesses that may currently be in place
affecting FA2
b.Any additional threat-sources that can trigger the vulnerabilities or weaknesses
you just identified for FA2
c.Any additional risks or situations involving exposure to loss for the financial
information in FA2
d.Any additional controls or procedures that should be implemented to mitigate the
risks just identified
2.Use the following information to prepare an IT Planning Memo similar to the one
in Appendix 1.
a.You are the I'T audit senior (or I'T auditor representative) assigned. Your audit
firm has several branches, but you are working this particular client from the
Melbourne, FL office.
b.The IT audit will support the financial statement audit of Company XYZ, with a
fiscal year ending on December 31, 20XX.
c.Discussions with the financial audit Director regarding IT audit involvement have
already taken place, and are documented in work paper (w/p) 1000.1. IT auditors
have not been involved in previous audits for this client.
d.Your team is composed of: IT Partner P, IT Manager M, and IT Audit Staff AS. You
are the IT audit Senior S.
e.The audit timing includes: Planning will be performed during the sixth month of
the year under audit; Interim audit procedures will take place during 2 months
before the end of the fiscal year; Year-end procedures are scheduled for January
through March of the year following the end of the fiscal year; and all work papers
and audit documentation will be due by and signed off on April 30th of the year
following the end of the fiscal year.
f.The IT audit is estimated to take 100 hours. Hours will be charged to client
code: Company XYZ-0000.
g.An understanding of Company XYZ’s IT environment is documented in w/p 1540.
h.The three relevant applications for the IT audit include are:
i.All Accounting Application (AAA)—used to capture and processing accounting-
related transactions. AAA is installed on a UNIX platform (or operating system),and
uses Oracle database. AAA can be accessed via a Windows network.
ii.Financial Document Generator Application (FDGA)—used to produce all types of
financial reports and documentation. FDGA is installed on a Windows operating
system, and uses Oracle as its database. FDGA is accessed via a Windows network.
iii.Human Resources and Payroll Application (HRPA)—used to manage the company’s
human resources and process payroll. This application is hosted outside of the
company, at a third-party organization called HRP-For-All.
Further Reading
1.AICPA. Audit analytics and continuous audit—Looking toward the future,
www.aicpa.org/InterestAreas/FRC/AssuranceAdvisoryServices/DownloadableDocuments/
AuditAnalytics_LookingTowardFuture.pdf (accessed August 2017).
2.Benson, J. (August 2007). The Importance of Monitoring. Internal Auditor.
Institute of Internal Auditors, Altamonte Springs, FL.
3.Berry, L. (October 2007). A Kinder, Gentler Audit. Internal Auditor. Institute of
Internal Auditors, Altamonte Springs, FL.
4.Bodin, L., Gordon, L., and Loeb, M. (2008). Information security and risk
management. Commun, ACM, 51(1), 64—68.
5.Casas, E. (October 2007). Tell It Like It Is. Internal Auditor. Institute of
Internal Auditors, Altamonte Springs, FL.
6.Cavusoglu, H., Mishra, B., and Raghunathan, S. (2004). A model for evaluating IT
security investments. Commun. ACM, 47(1), 87-92.
7.Chaney, C. and Gene, K. (August 2007). The Integrated Auditor. Internal Auditor.
Institute of Internal Auditors, Altamonte Springs, FL.
8.Deloitte LLP. (2014). IT Audit Planning Work Papers. Unpublished internal
document.
9.EY’s ten key IT considerations for internal audic—Effective IT risk assessment
and audit planning. (February 2013). Insights on governance, risk and compliance,
www.ey.com/Publication/vwLUAssets/Ten_key IT
_considerations_for_internal_audit/$FILE/Ten_key_IT_considerations_for_internal_aud
it.pdf
10.Flipek, R. (June 2007). IT Audit Skills Found Lacking. Internal Auditor.
Institute of Internal Auditors,Altamonte Springs, FL.
11.Gallegos, F. (2002). The audit report and follow up: Methods and techniques for
communicating audit findings and recommendations. Inf Syst. Control J., 4, 17-20.
12.Gallegos, F. and Preiser-Houy, L. (2001). Reviewing Focus Database Applications,
EDP Auditing Series, 74-10-23, Auerbach Publishers, Boca Raton, FL, pp. 1-24.
13.Hyde, G. (August 2007). Enhanced Audit Testing. Internal Auditor. Institute of
Internal Auditors,Altamonte Springs, FL.
14.Information Systems Audit and Control Foundation. COBIT, 5th Edition,
Information Systems Audit and Control Foundation, Rolling Meadows, IL,
www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx (accessed June 2012).
15.IS Audit Basics. The Process of Auditing Information Systems,
www.isaca.org/knowledge-center/itaf-is-assurance-audit-/pages/is-audit-basics.aspx
(accessed July 2017).
16.Manson, D. and Gallegos, F. (September 2002). Auditing DBMS Recovery Procedures,
EDP Auditing Series, 75-20-45, Auerbach Publishers, Boca Raton, FL, pp. 1-20.
17.McAfee Labs 2017 threats predictions, report issued on November 2016,
www.mcafee.com/au/resources/reports/rp-threats-predictions-2017.pdf (accessed
October 2017).
18.McAfee Labs threats report—December 2016,
www.mcafee.com/ca/resources/reports/rp-quarterly-threats-dec-2016.pdf (accessed
October 2017).
19.McCafferty, J. (2016). Five Steps to Planning an Effective IT Audit Program, MIS
Training Institute, http://misti.com/internal-audit-insights/five-steps-to-
planning-an-effective-it-audit-program
20.Menkus, B. and Gallegos, F. (2002). Introduction to IT Auditing, #71-10-10.1,
Auerbach Publishers,Boca Raton, FL, pp. 1-20.
21.National Vulnerability Database. National Institute of Standards and Technology,
https://nvd.nist.gov/vuln/search (accessed August 2017).
22.Otero, A. R. (2015). An information security control assessment methodology for
organizations’financial information. Ins. J. Acc. Inform. Syst., 18(1), 26-45.
23.Otero, A. R. (2015). Impact of IT auditors’ involvement in financial audits. nz.
J. Res. Bus. Technol.,6(3), 841-849.
24.Otero, A. R., Tejay, G., Otero, L. D., and Ruiz, A. (2012). A fuzzy logic-based
information security control assessment for organizations, IEEE Conference on Open
Systems, Kuala Lumpur, Malaysia.
25.Otero, A. R., Otero, C. E., and Qureshi, A. (2010). A multi-criteria evaluation
of information security controls using Boolean features. Int. J. Network Secur.
Appl., 2(4), 1-11.
26.Pareek, M. (2006). Optimizing controls to test as part of a risk-based audit
strategy. Inf Sysz. Audit Control Assoc. J., 2, 39-42.
27.Romney, M. B. and Steinbart, P. J. (2015). Accounting Information Systems, 13th
Edition, Pearson Education, Upper Saddle River, NJ.
28.Richardson, V. J., Chang, C. J., and Smith, R. (2014). Accounting Information
Systems, McGraw Hill,New York.
29.SANS’ Information Security Policy Templates,
www.sans.org/security-resources/policies/general(accessed October 2016).
30.Sarbanes-Oxley-101. Section 404: Management Assessment of Internal Controls,
www.sarbanes-oxley-101.com/SOX-404.htm (accessed August 2016).
31.Senft, S., Gallegos, F., and Davis, A. (2012). Information Technology Control
and Audit, CRC Press/Taylor & Francis, Boca Raton, FL.
32.Singleton, T. (2003). The ramifications of the Sarbanes—Oxley Act. Inf Syst.
Control J, 3, 11-16.
33.U.S. General Accounting Office, Assessing the Reliability of Computer Processed
Data Reliability, https://digital.library.unt.edu/ark:/67531/metadc302511/
(accessed November 2016).
34.U.S. General Accounting Office, Government Auditing Standards 2017 Exposure
Draft, www.gao.gov/yellowbook (accessed May 2017).
35.U.S. General Accounting Office, Standards for Internal Control in the Federal
Government, September 2014, GAO/AIMD 00-21.3.1.