Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

IT General Controls

Download as pdf or txt
Download as pdf or txt
You are on page 1of 65

New Kick Starter Available!

Athletic Ticket Operations


Download today in the members-only
section of www.ACUA.org
Connect with Colleagues Solve Problems

Stay up to Date • Subscribe to one or more Forums on the • Discounts and special offers from
Connect ACUA to obtain feedback and ACUA's Strategic Partners
share your insights on topics of concern • Utilize Kick Starters
• The College and University to higher education internal auditors. • Risk Dictionary
Auditor is ACUA's official • Mentorship program
journal. Current and past • Search the Membership Directory to • NCAA Guides
issues are posted on the connect with your peers. • Resource Library
• Internal Audit Awareness Tool
ACUA website. • Share, Like, Tweet & Connect on social • Governmental Affairs Updates
media. • Survey Results
• News relevant to Higher Ed • Career Center......and much more.
internal audit is posted on the Get Involved
Get Educated
front page. Articles are also
• The latest Volunteer openings are posted
archived for your reference on the front page of the website. • Take advantage of the several FREE
under the Resources/ACUA webinars held throughout the year.
• Visit the listing of Committee Chairs to
• Attend one of our upcoming
News. learn about the various areas where you
conferences:
might participate.
• Nominate one of your colleagues for an
AuditCon
ACUA annual award.
September 15-19, 2019
• Submit a conference proposal. Baltimore Marriott Waterfront,
• Present a webinar. Baltimore, MD
www.ACUA.org • Write an article for the C&U Auditor.
• Become a Mentor. • Contact ACUA Faculty for training
• Write a Kick Starter. needs.
WEBINAR MODERATOR

▪ Don’t forget to
connect with us on
social media!

ACUA Distance Learning Director


Amy L. Hughes
Director of Internal Audit
Michigan Technological University
Information Technology General Controls

Sudeshna Aich, MBA, CISA


Senior Information Technology Auditor
Office of Inspector General Services
Florida State University

7
Agenda

• What are Information Technology General Controls (ITGCs)?

• Why perform ITGC audits?

• How to Audit ITGC?

• What are the Common Deficiencies and Findings?

8
9
WHAT ARE ITGCS?

10
What are IT General Controls?

IT general controls (ITGCs) are the basic


controls that apply to all the system components
(such as applications, operating systems, databases),
data, processes and supporting IT infrastructure. The
objectives of ITGCs are to ensure the integrity of the
data and processes that the systems support.

11
Primary Areas of ITGCs

• ITGC Framework

• Access to Programs and Data

• Change Management

• Computer Operations

• Systems Development

12
ITGC – Types of Controls
Preventive – Detective – Corrective
Preventive – prevent problems from occurring (Proactive)
• Segregation of Duties
• Monitoring
• Adequate Documentation
• Physical safeguards
Detective – identify problems after occurrence (Reactive)
• Logging and Monitoring
• Reviews
Corrective – prevent recurrence of problems
• Change controls as needed to eliminate error in future

13
How big is your audit shop:

1) 1 to 3 people
2) 4 to 6 people
3) 6 to 10 people
4) > 10 people

14
WHY PERFORM ITGC AUDIT?

15
Why perform ITGC audits?

• Determine Effectiveness and Efficiency of ITGC Controls


• Ensure controls related to Confidentiality, Availability, and Integrity of
data and information are adequate
• Ensure Availability of mission-critical functions in a disaster situation
• Review Compliance with applicable polices, procedures, laws

16
Why perform ITGC audits?
• IT systems support many of the University’s business processes,
such as:
➢ Student Records
➢ Grading
➢ Admissions
➢ Finance
➢ Purchasing
➢ Human Resources
➢ Research
We cannot rely on IT systems without effective IT General
Controls

17
Example of FSU’S IT Environment
This is an example of IT environment at a major University

• 500 acres in Tallahassee


• 14,000 employees
• 41,000 students
• $1.7 Billion Operating Budget
• 40-50,000 Network Connections
• 4500 Wireless Access Points

18
HOW TO PERFORM ITGC AUDITS?

20
ITGC – Audit Approach
• Understand and identify the IT Environment and systems to be
reviewed
➢ IT governance
➢ Policies, procedures, guidelines
• Perform interviews, walkthroughs, and review documentation to
gain an understanding on processes
➢ Who performs what function
➢ How something is done and documented

“If it is not documented, you did not do it”


21
ITGC – Audit Approach (Continued)
• Validate existing controls to assess control operating effectiveness
➢ What are the major controls?
➢ Are the controls working as intended?
➢ Are the controls in-line with the University’s IT security
framework?
➢ Are these controls reviewed periodically?
➢ Who reviews these controls?

22
Does your organization have IT Security Policy?

1) Yes
2) No
3) Do not know

23
AUDITING IT GOVERNANCE AND
FRAMEWORK

24
Why do we need to audit IT Governance and Framework?
• Obtain an understanding of IT Framework –
➢ IT Security Policy, procedure, guidelines
• Determine if controls over University’s IT structure are
reasonable and oversight is adequate
➢ IT reports and log
• Determine if IT operations are in-line with the University’s
strategies and objectives
➢ IT reports and log

25
Example of Policy Objective
(FSU)
4-OP-A-9 Internal Controls
Objective
The purpose of this policy is to provide guidance to help ensure the internal
control objectives of the University are met. It is the responsibility of all University
employees to ensure protection of University assets and resources. Administrators
at all levels are responsible for establishing a strong control environment, setting
the appropriate tone at the top, and displaying the proper attitude toward
complying with these established controls

4-OP-H-5 Information Security Policy


Objective
The FSU Information Security Policy establishes a framework of minimum
standards and best practices for the security of data and Information Technology
(IT) resources at Florida State University

26
AUDITING ACCESS MANAGEMENT
CONTROLS – COMMON TERMINOLOGIES

27
Access to Data
Data can be accessed via:
• Applications that create, edit, maintain and report data
• The network (Network domain administrators)
➢ Data ‘In Transit’, ‘In Process’
• Primary servers (Server administrators)
➢ Data ‘In Transit’, ‘In Process’
• Databases (Database administrators)
➢ Data ‘At Rest’, ‘In Transit’, ‘In Process’

28
Access to Programs

User Access Management:


• User Access Provisioning
• Excessive Access
• Generic User ID and Privileged Access
• User Access Review
• User Access De-provisioning

29
Authentication
Authentication Controls
More powerful in terms of mitigating risk.
Authentication verifies that the login (ID/password) belongs to the
person who is attempting to gain the access, i.e., users are who they
say they are.
• Single Sign-on
• Multifactor Authentication

30
Authorization
Authorization controls
Act of checking to see if a user has the proper permission to access a
particular file or perform a particular action, assuming that user has
successfully authenticated.
• Credential focused
• Dependent on specific rules and access control lists preset by the
network administrator(s) or data owner(s)

31
Physical Access Controls
Physical Access Controls
Limit access to buildings, rooms, areas, and IT assets.
• ID at the entrance
• Closing off access to laptops, desktops, and servers
• Safe structure for datacenter
➢ Natural disasters – tornadoes, earthquakes, floods, and
tsunamis.

32
Logical Access Controls

Logical Access Controls


Limits connection to computer networks, system files, and data to
authorized individuals only and to the functions each individual can
perform on the system. Logical security controls enable the
organization to:
• Identify individual users of IT data and resources.
• Restrict access to specific data or resources.
• Produce audit trails of system and user activity.

33
Does your organization require periodic review of user access rights?

1) Yes
2) No
3) Do not know

34
AUDITING ACCESS MANAGEMENT
CONTROLS

35
Why do we need to audit controls over User Access Management?

• To ensure:

➢ IT Policies and procedures contain details about user


management controls
• Unique user IDs
• Modification of existing user rights due to transfers or
role changes
• Disable and/or remove user accounts for terminated and
transfer users
• Periodic review of user access for all the users

36
Why do we need to audit controls over User Access Management?

• To ensure:

➢ User access rights are appropriately requested, reviewed, and


approved
➢ User accounts are unique and not shared
➢ All users and their activities are identifiable using unique user IDs
➢ User access rights are in line with documented job requirement
➢ Least-privileged access and need-to-know access for applications,
databases, and servers is enforced

37
Why do we need to audit controls over User Access Management?
(Continued)

• To ensure:

➢ Only authorized users have access to confidential and sensitive


information
➢ Only authorized users have access to server room, datacenter
➢ All users and their activities are identifiable using unique user IDs
➢ Only authorized individuals have elevated privileges and their
activities are logged and monitored:
• System administrators
• Database administrators
• Network administrators

38
Why do we need to audit controls over User Authentication and
Authorization?

• To ensure:

➢ Authentication and authorization controls are addressed in detail


in IT policies and procedures
➢ Authentication mechanisms are enabled
• Single Sign On
• Multi-factor authentication
➢ Password parameters are enforced for length, characters user,
locking of computer screen when not used for certain time,
password requirement to unlock the computer screen etc.
➢ Vendor default passwords are modified

39
AUDITING CHANGE MANAGEMENT
CONTROLS

40
Change Management

Change management is the process that ensures that all changes


are processed in a controlled manner, including standard changes and
emergency maintenance relating to business processes, applications and
infrastructure.
The main purpose of change management is to enable fast and
reliable delivery of change to the business and mitigation of the risk of
negatively impacting the stability or integrity of the changed environment.

41
Critical Points of Control in Change
Management
• Evaluating Changes
• Authorizing Changes
• Testing Proposed Changes
• Moving Approved Changes into Production Environment

42
Why do we need to audit controls over the Change Management
Process?

• To determine:

➢ If a detailed change management policy and procedures exist


➢ If the changes are appropriately reviewed, authorized,
approved/rejected, and tested prior to implementing in
production
➢ If there is sign-off process, prior to a change moving into
production, which includes information and documentation
related to completion of quality assurance test, user
acceptance test, approval for production implementation
➢ If only approved changes are implemented
➢ If changes have been implemented as planned

43
AUDITING COMPUTER OPERATIONAL
CONTROLS

44
Computer Operations

Computer operations controls are designed to verify that the expected


level of services will be delivered, and that the IT systems are
functioning consistently, as planned.
• Monitoring the use of resources
• Monitoring the batch jobs
• Reviewing the job logs
• Monitoring the backup and recovery activities

45
Why do we need to audit controls over Computer Operations?

• To determine if:

➢ Computer operations controls are in place to ensure


systems and programs are available and operating as
intended
➢ Adequate physical safeguards, accounting practices, and
inventory management over sensitive IT resources are in
place
➢ The University has appropriate processes and controls in
place to continue its mission-critical functions with minimal
disruption in case of an emergency or a disaster

46
Why do we need to audit controls over Computer Operations?
(continued)

• To determine if:

➢ The University has a Continuity of Operations and Disaster


Recovery Plan
➢ The University has identified the mission-critical functions
for recover in disaster situation and the list is up-to-date
➢ The University has a geographically separated location for
backup and recovery

47
AUDITING SYSTEMS DEVELOPMENT
CONTROLS

48
Systems Development

• The process of defining, designing, testing and implementing a


new software application or program.
➢ Internal development of customized systems
➢ Creation of database systems or

➢ Acquisition of third-party software

49
Systems Development Life Cycle
The primary phases in the development or acquisition of a software
system are:
➢ feasibility study,
➢ requirements study,
➢ detailed design,
➢ programming,
➢ testing,
➢ Installation, and
➢ post-implementation review

50
Why do we need to audit controls over System Development?

• To determine if:

➢ Detailed polices and procedures have been established for


the systems to be developed, acquired or implemented, and
for systems maintenance
➢ Appropriate levels of authorization were obtained for each
phase of the Systems Development Life Cycle
➢ Adequate controls are in place for systems testing and the
promotion of systems to production environments

51
Controls over Outsourced Services

Outsourcing is the process of contracting out one or more elements of


operations to a supplier of services outside of the organization's
management structure. A contractual arrangement is entered into at
an agreed price with the supplier.

52
Why do we need to audit controls over Outsourcing?

• To determine if:

➢ The University has an effective third-party management


process
➢ The University has a valid contract and a comprehensive
service level agreement (SLA) with the third-party service
providers
➢ If the University is obtaining and reviewing service
organization independent audit reports
• SOC 2 audits under AICPA standards
• ISO27001, Information Security Management Systems
Requirements

53
COMMON DEFICIENCIES AND
POTENTIAL RECOMMENDATIONS

54
Does your audit shop perform standalone IT audits?

1) Yes
2) No
3) Do not know

55
Deficiencies
• Terminated employees are still active in systems and the network
• There is a lack of segregation of duties over the development and
production environments
• There is not a list of critical applications – no knowledge of
vulnerabilities
• External penetration testing and internal vulnerability scanning are
not conducted
• Shared and/or generic administrator accounts are not monitored
• System password parameters are not strong
• Disaster recovery plan is outdated and not tested
• Data backup is not tested
• There is no policy for portable device security

56
Potential Recommendations
• Entity IT security controls related to account management need
improvement
• Some access privileges did not promote an appropriate separation
of duties
• The entity did not perform comprehensive periodic reviews of
access privileges for the application/server/database/network
accounts
• The business continuity and disaster recovery plans continue to
need improvement to ensure that critical operations continue in the
event of a disaster or other interruption of service

57
ITGC Controls Currently Being Reviewed by FSU’s
IT Office
• Change Management
• Emergency Change Management
• IT Governance
• Vulnerability Management – ERP and Infrastructure
• Software Development Life Cycle Review
• User Provisioning
• User Terminations and Transfers
• Oracle DBA Entitlement Review
• Windows Domain Administrator Entitlement Review
• Security Awareness Training
• Disaster Recovery Plan Updates
• Policy Review - Security, Privacy, Acceptable Use
• Review of ITS access to SSN/Protected Information

58
ITGC Audit Program
A detailed list of audit objectives and methodologies and common
findings are provided in the handout:

• IT General Control Audit Program

59
STANDARDS GUIDELINES AND BEST
PRACTICES

60
61
ITGC – Resources

https://na.theiia.org/standards-guidance/Member%20Documents/GTAG-1-
2nd-Edition.pdf
https://www.iia.org.uk/resources/auditing-business-functions/supply-
chains/outsourced-services/?downloadPdf=true
http://www.isaca.org/Knowledge-
Center/Research/ResearchDeliverables/Pages/Change-Management-Audit-
Assurance-Program.aspx
https://www.cisecurity.org/controls/cis-controls-list/

62
Thank you!

63
Upcoming ACUA Events

September 15-19, 2019


AuditCon in Baltimore, MD - Registration is closed but you may still register on-site.
Visit the ACUA website for details.

October 3, 2019
Using the ACUA Kick Starter to Audit IT System Access Controls

October 17, 2019


Climbing the ranks: Best practices for preventing fraud and misreporting in admissions and
institutional data
65

65

You might also like