IT General Controls
IT General Controls
IT General Controls
Stay up to Date • Subscribe to one or more Forums on the • Discounts and special offers from
Connect ACUA to obtain feedback and ACUA's Strategic Partners
share your insights on topics of concern • Utilize Kick Starters
• The College and University to higher education internal auditors. • Risk Dictionary
Auditor is ACUA's official • Mentorship program
journal. Current and past • Search the Membership Directory to • NCAA Guides
issues are posted on the connect with your peers. • Resource Library
• Internal Audit Awareness Tool
ACUA website. • Share, Like, Tweet & Connect on social • Governmental Affairs Updates
media. • Survey Results
• News relevant to Higher Ed • Career Center......and much more.
internal audit is posted on the Get Involved
Get Educated
front page. Articles are also
• The latest Volunteer openings are posted
archived for your reference on the front page of the website. • Take advantage of the several FREE
under the Resources/ACUA webinars held throughout the year.
• Visit the listing of Committee Chairs to
• Attend one of our upcoming
News. learn about the various areas where you
conferences:
might participate.
• Nominate one of your colleagues for an
AuditCon
ACUA annual award.
September 15-19, 2019
• Submit a conference proposal. Baltimore Marriott Waterfront,
• Present a webinar. Baltimore, MD
www.ACUA.org • Write an article for the C&U Auditor.
• Become a Mentor. • Contact ACUA Faculty for training
• Write a Kick Starter. needs.
WEBINAR MODERATOR
▪ Don’t forget to
connect with us on
social media!
7
Agenda
8
9
WHAT ARE ITGCS?
10
What are IT General Controls?
11
Primary Areas of ITGCs
• ITGC Framework
• Change Management
• Computer Operations
• Systems Development
12
ITGC – Types of Controls
Preventive – Detective – Corrective
Preventive – prevent problems from occurring (Proactive)
• Segregation of Duties
• Monitoring
• Adequate Documentation
• Physical safeguards
Detective – identify problems after occurrence (Reactive)
• Logging and Monitoring
• Reviews
Corrective – prevent recurrence of problems
• Change controls as needed to eliminate error in future
13
How big is your audit shop:
1) 1 to 3 people
2) 4 to 6 people
3) 6 to 10 people
4) > 10 people
14
WHY PERFORM ITGC AUDIT?
15
Why perform ITGC audits?
16
Why perform ITGC audits?
• IT systems support many of the University’s business processes,
such as:
➢ Student Records
➢ Grading
➢ Admissions
➢ Finance
➢ Purchasing
➢ Human Resources
➢ Research
We cannot rely on IT systems without effective IT General
Controls
17
Example of FSU’S IT Environment
This is an example of IT environment at a major University
18
HOW TO PERFORM ITGC AUDITS?
20
ITGC – Audit Approach
• Understand and identify the IT Environment and systems to be
reviewed
➢ IT governance
➢ Policies, procedures, guidelines
• Perform interviews, walkthroughs, and review documentation to
gain an understanding on processes
➢ Who performs what function
➢ How something is done and documented
22
Does your organization have IT Security Policy?
1) Yes
2) No
3) Do not know
23
AUDITING IT GOVERNANCE AND
FRAMEWORK
24
Why do we need to audit IT Governance and Framework?
• Obtain an understanding of IT Framework –
➢ IT Security Policy, procedure, guidelines
• Determine if controls over University’s IT structure are
reasonable and oversight is adequate
➢ IT reports and log
• Determine if IT operations are in-line with the University’s
strategies and objectives
➢ IT reports and log
25
Example of Policy Objective
(FSU)
4-OP-A-9 Internal Controls
Objective
The purpose of this policy is to provide guidance to help ensure the internal
control objectives of the University are met. It is the responsibility of all University
employees to ensure protection of University assets and resources. Administrators
at all levels are responsible for establishing a strong control environment, setting
the appropriate tone at the top, and displaying the proper attitude toward
complying with these established controls
26
AUDITING ACCESS MANAGEMENT
CONTROLS – COMMON TERMINOLOGIES
27
Access to Data
Data can be accessed via:
• Applications that create, edit, maintain and report data
• The network (Network domain administrators)
➢ Data ‘In Transit’, ‘In Process’
• Primary servers (Server administrators)
➢ Data ‘In Transit’, ‘In Process’
• Databases (Database administrators)
➢ Data ‘At Rest’, ‘In Transit’, ‘In Process’
28
Access to Programs
29
Authentication
Authentication Controls
More powerful in terms of mitigating risk.
Authentication verifies that the login (ID/password) belongs to the
person who is attempting to gain the access, i.e., users are who they
say they are.
• Single Sign-on
• Multifactor Authentication
30
Authorization
Authorization controls
Act of checking to see if a user has the proper permission to access a
particular file or perform a particular action, assuming that user has
successfully authenticated.
• Credential focused
• Dependent on specific rules and access control lists preset by the
network administrator(s) or data owner(s)
31
Physical Access Controls
Physical Access Controls
Limit access to buildings, rooms, areas, and IT assets.
• ID at the entrance
• Closing off access to laptops, desktops, and servers
• Safe structure for datacenter
➢ Natural disasters – tornadoes, earthquakes, floods, and
tsunamis.
32
Logical Access Controls
33
Does your organization require periodic review of user access rights?
1) Yes
2) No
3) Do not know
34
AUDITING ACCESS MANAGEMENT
CONTROLS
35
Why do we need to audit controls over User Access Management?
• To ensure:
36
Why do we need to audit controls over User Access Management?
• To ensure:
37
Why do we need to audit controls over User Access Management?
(Continued)
• To ensure:
38
Why do we need to audit controls over User Authentication and
Authorization?
• To ensure:
39
AUDITING CHANGE MANAGEMENT
CONTROLS
40
Change Management
41
Critical Points of Control in Change
Management
• Evaluating Changes
• Authorizing Changes
• Testing Proposed Changes
• Moving Approved Changes into Production Environment
42
Why do we need to audit controls over the Change Management
Process?
• To determine:
43
AUDITING COMPUTER OPERATIONAL
CONTROLS
44
Computer Operations
45
Why do we need to audit controls over Computer Operations?
• To determine if:
46
Why do we need to audit controls over Computer Operations?
(continued)
• To determine if:
47
AUDITING SYSTEMS DEVELOPMENT
CONTROLS
48
Systems Development
49
Systems Development Life Cycle
The primary phases in the development or acquisition of a software
system are:
➢ feasibility study,
➢ requirements study,
➢ detailed design,
➢ programming,
➢ testing,
➢ Installation, and
➢ post-implementation review
50
Why do we need to audit controls over System Development?
• To determine if:
51
Controls over Outsourced Services
52
Why do we need to audit controls over Outsourcing?
• To determine if:
53
COMMON DEFICIENCIES AND
POTENTIAL RECOMMENDATIONS
54
Does your audit shop perform standalone IT audits?
1) Yes
2) No
3) Do not know
55
Deficiencies
• Terminated employees are still active in systems and the network
• There is a lack of segregation of duties over the development and
production environments
• There is not a list of critical applications – no knowledge of
vulnerabilities
• External penetration testing and internal vulnerability scanning are
not conducted
• Shared and/or generic administrator accounts are not monitored
• System password parameters are not strong
• Disaster recovery plan is outdated and not tested
• Data backup is not tested
• There is no policy for portable device security
56
Potential Recommendations
• Entity IT security controls related to account management need
improvement
• Some access privileges did not promote an appropriate separation
of duties
• The entity did not perform comprehensive periodic reviews of
access privileges for the application/server/database/network
accounts
• The business continuity and disaster recovery plans continue to
need improvement to ensure that critical operations continue in the
event of a disaster or other interruption of service
57
ITGC Controls Currently Being Reviewed by FSU’s
IT Office
• Change Management
• Emergency Change Management
• IT Governance
• Vulnerability Management – ERP and Infrastructure
• Software Development Life Cycle Review
• User Provisioning
• User Terminations and Transfers
• Oracle DBA Entitlement Review
• Windows Domain Administrator Entitlement Review
• Security Awareness Training
• Disaster Recovery Plan Updates
• Policy Review - Security, Privacy, Acceptable Use
• Review of ITS access to SSN/Protected Information
58
ITGC Audit Program
A detailed list of audit objectives and methodologies and common
findings are provided in the handout:
59
STANDARDS GUIDELINES AND BEST
PRACTICES
60
61
ITGC – Resources
https://na.theiia.org/standards-guidance/Member%20Documents/GTAG-1-
2nd-Edition.pdf
https://www.iia.org.uk/resources/auditing-business-functions/supply-
chains/outsourced-services/?downloadPdf=true
http://www.isaca.org/Knowledge-
Center/Research/ResearchDeliverables/Pages/Change-Management-Audit-
Assurance-Program.aspx
https://www.cisecurity.org/controls/cis-controls-list/
62
Thank you!
63
Upcoming ACUA Events
October 3, 2019
Using the ACUA Kick Starter to Audit IT System Access Controls
65