Module 6 BAS Audit
Module 6 BAS Audit
Business Application
Software Audit
Introduction ............................................................................................................................20
1.4.1 Auditing Standards ......................................................................................................20
ISACA Standards .............................................................................................................20
ICAI Standards .................................................................................................................20
Internal Audit Standards ..................................................................................................21
1.4.2 Risk assessment for a business application used by organisation ..........................21
1.5 Case Study ..........................................................................................................................22
Case for participants .................................................................................................................24
Part 2: Business Application Software as per Enterprises Business Model .....................25
Learning Objectives ...................................................................................................................25
Introduction ................................................................................................................................25
2.1 Business Application Software: Parameters of selection..................................................25
2.2 Types ...................................................................................................................................26
2.3 Key features and controls for business applications .........................................................27
Part 3: Case Studies ....................................................................................................................29
Case for participants ........................................................................................................31
2.4 Questions .............................................................................................................................32
2.5 Answers and Explanations .................................................................................................33
Chapter 2: Application Control ..................................................................................................35
Part 1: Application controls review ...........................................................................................35
Learning Objective.....................................................................................................................35
1.1 Introduction ..........................................................................................................................35
1.1.1 Application controls .....................................................................................................35
1.1.2 Internal controls ...........................................................................................................35
1.2 Objectives of application control and key business information requirements ................36
1.2.1 Objectives ....................................................................................................................36
1.2.2 Information Criteria ......................................................................................................36
1.2.3 Application controls objectives....................................................................................37
2
SECTION 1: OVERVIEW
MODULE 6: BUSINESS APPLICATION
SOFTWARE AUDIT (12%)
Objective:
Provide assurance or consulting services to validate whether required controls have been
designed, configured and implemented in the application software as per enterprise and
regulatory requirements and provide recommendations for mitigating control weaknesses
as required.
Learning Objectives
Task Statements
6.1 Assess the enterprise business models by performing preliminary review of effectiveness of
the entitys business processes and embedded controls
6.2 Assess business processes - risks assessment and control evaluation in the context of
business strategy, impact of business application software on Business processes/controls
6.3 Assess Business processes by performing preliminary review of adequacy of controls
6.4 Identify and document information technology environment and platforms, technology
architecture, network, system software and application environment to assess control architecture.
6.5 Identify application controls in Data warehouse, Data Mart, DSS, ESS, AI, EFT, etc.
6.6 Identify various types of Business Applications like ERP, Banking, Accounting
6.7 Prepare audit program for planning and perform review of application software
6.8 Identify information systems that are used to process and accumulate transactional data, as
well as provide monitoring and financial reporting information and assess the controls.
6.9 Review enterprise security policy relating to the identification, authentication and restriction of
users to authorized functions and data.
6.10 Assess procedures to manage changes to business processes and impact on controls
6.11 Review database structure and tables, user creation, access levels and user management.
6.12 Evaluate application software configuration and user management features such as user
rights and administration and map them with enterprise policies relating to segregation of duties by
reviewing user rights granted to specific roles and responsibilities.
Module 6
6.13 Evaluate internal control systems in application software relating to system design, data
creation/input, data processing, data flow, data transmission and data storage.
6.14 Use reporting, query and SQL features as required for reviewing controls.
6.15 Audit specific application software users; assess business system functionality, user rights
and segregation of duties levels of authorization, and data security by performing analytical
procedures review, compliance testing and substantive testing.
6.16 Assess application software controls and identify areas of weaknesses in controls and advise
remedial measures
6.17 Communicate/Report findings in specific format using standards/best practices as required.
6.18 Performing review of application controls as relevant for assurance or compliance
assignments.
Knowledge Statements
6.1 Enterprise business models
6.2 Key features and functionalities of application software
6.3 Business processes controls, Analytical procedures, compliance testing and substantive
testing
6.4 Risk assessment and control evaluation in the context of business strategy
6.5 Impact of Business application software on Business processes/controls
6.6 Information systems and financial reporting and regulatory requirements for controls.
6.7 structure, roles and responsibilities
6.8 Application controls in Data warehouse, Data Mart, DSS, ESS, AI, EFT, EDI, etc.
6.9 Various types of Business Applications like ERP, Banking, Accounting, etc.
6.10 Procedures to manage changes to business processes and impact on controls
6.11 Audit program for planning and perform review of application software
6.12 Application system software environment at different levels
6.13 Database architecture: database structure and tables, user creation and administration,
reporting, query and SQL Features
6.14 Key business system users, key functionality, user rights and segregation of duties levels of
authorization, and data security
6.15 Controls at different levels, areas of control weaknesses, risk rating and remedial measures
6.16 Report findings in specific format using standards/best practices as required.
6.17 Application controls review as relevant for assurance or compliance assignments.
Section 1
Task Statement
6.1 Assess the enterprise business models by
performing preliminary review of effectiveness
of the organisations business processes and
embedded controls.
Knowledge Statement
1 Enterprise business models
Key features and functionalities of
application software
11
Module 6
6.11 Evaluate application software
configuration and user management features
such as user rights and administration and
map them with enterprise policies relating to
segregation of duties by reviewing user rights
granted to specific roles and responsibilities.
6.12 Evaluate internal control systems in
application software relating to system
design, data creation/input, data processing,
data flow, data transmission and data
storage.
6.13 Review database structure and tables,
user creation, access levels and user
management.
12
Chapter
Part
Para
Section 1
1.2
1.2
1.3
1.4
2.1
2.1
Topic Heading
1 Enterprise business models
13
1
1
2.2
1.6
6.1
6.2
6.3
2.1
2.2
2.3
Module 6
11 Organisation structure, roles and responsibilities
Principles to follow while granting user rights
Creating users for different level of use
Creating users for different level of use
12 Procedures to manage changes to business processes
and impact on controls
13 Key business system users, key functionality, user
rights and segregation of duties levels of authorization,
and data security
Review of business application controls through use of audit
procedures
14 Controls at different levels, areas of control
weaknesses, risk rating and remedial measures
Business Application software: Parameters of selection
Compliance Testing
Substantive Testing
Relationship between compliance and substantive testing
15 Database architecture: database structure and tables,
user creation and administration, reporting, query and
SQL Features
Key features of database
Database security and control
User creations in database
Structured Query Language
SQL commands for reporting
16 Application controls review as relevant for assurance
or compliance assignments.
Compliance Testing
Substantive Testing
Relationship between compliance and substantive testing
17 Report findings in specific format using standards/best
practices as required.
Nature of compliances
Who is responsible for accuracy and authenticity of reports?
Validation of statutory reports from business application
software
14
4.1
4.2
4.3
2.2
2
3
2
2
2.1
2.1
2.2
2.3
5.1
5.2
5.3
5.4
5.5
2.1
2.2
2.3
6.1
6.2
6.3
Section 1
Part
Para
Case Study
Sl. No
Chapter
The scope of Module 6 is Business Application Software Audit. There are a number of cases
(practical case studies) which have been discussed in the module. A chapter wise mapping of the
cases is given.
1.5
1.5
CHAPTER 1
1
3
4
2
2
2
3
3
3
10
11
12
15
Module 6
13
14
15
16
17
18
19
20
21
22
23
16
3
3
3, 1
1
1
1 /1
3
3
3
3
3
3
3
6
6
7
1.1
SECTION 2: CONTENTS
This module has been written with an objective to help participants learn about the business
application software, and audit of these business applications. Application software is most critical
component of any IT infrastructure used in organisations as this processes the business
transactions for all types of organisations. Hence, it is imperative for an IS Auditor to learn the
process of performing a business application audit.
This module has three chapters.
Chapter 1: Deals with business application softwares, business processes and business
models. The chapter elaborates the nature of business applications that may be used by
entities.
Chapter 2: Deals with application controls in business application software. It further
elaborates relevance of application controls in business operations of an organisation.
Chapter 3: Deals with audit of the business application software. This chapter discusses
database controls and user controls. It also provides guidance on how to prepare IS audit
reports.
Definition:
Business application software audit module is focused on providing practical guidance to members
of ICAI. The module is written with an objective to provide hands on training to members. A DISA
should be able to understand how to perform a business application software audit after going
through this module.
Learning Objective
This module discussed the various business models used by an organisation for their business
purposes. There is a direct co-relation between the business model adopted by an organisation
and the goals of the organisation. The same co-relation extends to the nature of controls that are
put in place by the organisation to achieve its business objectives. The primary objective of this
module is to provide understanding about business processes, business application software and
controls implemented in business application software. This will enable IS Auditors to provide
assurance or consulting services in the critical area of business application audit.
Module 6
Business Model
Business Process
Business
Application
19
Module 6
Obtain an understanding of the activity being audited. The extent of the knowledge
required should be determined by the nature of the enterprise, its environment, areas of
risk, and the objectives of the engagement.
Consider subject matter guidance or direction, as afforded through legislation,
regulations, rules, directives and guidelines issued by government or industry.
Perform a risk assessment to provide reasonable assurance that all material items will be
adequately covered during the engagement. Audit strategies, materiality levels and
resource requirements can then be developed.
Develop the engagement project plan using appropriate project management
methodologies to ensure that activities remain on track and within budget.
ICAI Standards
SA 200 Overall Objectives of the Independent Auditor and the conduct of an audit in accordance
with standards on Auditing, Issued by ICAI, requires an auditor to plan an audit and get following
information: The auditor should plan his work to enable him to conduct an effective audit in an
efficient and timely manner. Plans should be based on knowledge of the clients business. Plans
should be made to cover, among other things:
a. Acquiring knowledge of the clients accounting system, policies and internal control
procedures;
b. Establishing the expected degree of reliance to be placed on internal control;
c. Determining and programming the nature, timing, and extent of the audit procedures to
be performed; and
d. Coordinating the work to be performed.
20
Module 6
Description
22
Sl. No.
Description
Accounting Application
[TALLY]
b. establishing the
expected degree of
reliance to be placed on
internal control;
ERP Application
[SAP]
Auditor may need to
apply compliance
testing, to check
whether the related
control is working
properly or not.
Compliance testing can
be through CAATs, as
discussed in Module 2.
c. determining and
programming the nature,
timing, and extent of the
audit procedures to be
performed;
Additional procedures to be
adopted by auditor.
Module 6
user to define range of
item to display.
2. Option: Use report from
accounting application
and audit the same to
generate requisite details.
Conclusion:
The above case outlines the method, steps and procedure IS auditor needs to undertake for risk
assessment of a business application. This helps understand the nature; timing of the additional
audit procedures to be taken by IS auditor based on results of risk assessments. This case is
referred again in chapter 3 part 1. 5 under heading CAAT: Embedded Audit Tools
24
Introduction
Business applications are the tool to achieve management goals and objectives. The nature of
business enterprise model is a guide to the business application software selects. Each
organisation selects the software as per its business goals and needs. The software selection is
an important decision for top management to take. Selection of correct application software is quite
often most essential as it contributes to success of business.
Module 6
b. The volume of transactions: As the transaction volume increases it is important for
organisation to go for business application software that can support business for the next
five years. This is again an important factor to consider, as improper selection can lead to
a situation where a customer wants organisation to grow but it cannot grow.
c. The regulatory structure at place of operation: As the number and nature of
compliances increase across the world, organisation shall prefer that software which is
capable to cater to the compliance requirements. A software company selling a product
that is SOX compliant is likely to find more buyers than others.
2.2 Types
Business applications can be classified based on processing type (batch, online, real-time) or
source (in-house, bought-in) or based on function covered. The most critical way for management
is based in function it performs. The discussion is restricted to business applications based on
function they perform.
a. Accounting Applications:
Applications like TALLY, TATA EX, UDYOG, used by business entities for purpose of
accounting for day to day transactions, generation of financial information like balance
sheet, profit and loss account, cash flow statements, are classified as accounting
applications.
b. Banking Application:
Today all public sector banks, private sector banks, and including regional rural banks
have shifted to core banking business applications (referred to as CBS). Reserve
Bank of India guidelines mandating all co-operative banks also to shift to core banking
applications by December 013, means 95% plus Indian banks use CBS. CBS used by
Indian banks include, FINACLE (by Infosys Technologies Ltd.), FLEXCUBE (By Oracle
Financial Services Software Limited, formerly called i-flex Solutions Limited), TCS
BaNCS (By TCS Limited), and many more CBS.
c. ERP Application:
These have been created a separate category of business application systems, due to
their importance for an organisation. These software called as enterprise resource
planning software are used by entities to manage resources optimally and to maximize
E^3 i.e. economy, efficiency and effectiveness of business operations.
d. Payroll Application:
Many companies across the world are outsourcing these activities to professionals. In
India also many CA firms are doing good job on payroll outsourcing. TALLY has a payroll
application built into it. ICAI, has made available for its members a payroll application.
e. Other Business Applications
i.
Office Management Software:
ii.
Compliance Applications:
iii.
Customer relationship management Software:
iv.
Management Support Software:
26
The applications detailed above are those which constitute major audit areas for a CA.
27
Description
As per SA 200: Overall Objectives of the Independent Auditor and the conduct of
an audit in accordance with standards on Auditing Issued by ICAI, requires an
auditor to plan an audit.
Audit shall plan include the following steps: acquiring knowledge of the clients
accounting system, policies and internal control procedures.
Steps
Applicable laws
As client is a bank,
guideline as specified
by Reserve Bank of
India (referred to as
RBI) shall be
applicable. All
accounting system
needs to be in
compliance with the
guidelines of RBI.
Audit Process
Step 1
a.
IRAC Norms
Module 6
borrower has been marked as NPA all facility extended to
the borrower are classified as NPA.
b.
ALM
c.
Investment Guidelines
d.
Step
Requirement
No further interest
on NPA account.
a.
b.
Income
Recognition
and Asset
Classificatio
n
Asset
Liability
Managemen
t
Investment
Guidelines
Classification of
investment
30
Investment as per
RBI specified limits.
RBI, guidelines to
maintain CRR and
SLR investment.
d.
CRR and
SLR.
Step 3
Step 3
Answers to the above checklist will help IS Auditor assess whether the
CBS selected is appropriate to meet the business requirements of the
organisation.
Where the IS auditor reaches a conclusion that many of the requirements
are not being met he/she may give any of the following recommendations.
First option: Modify the system to meet requirements of law.
Second option: Change the system.
In case the management response to option 1 is that system cannot be
modified than auditor reaches second option automatically.
Any modifications made are to be validated as per regression testing.
Module 6
Audit program for planning and performing audit of business application software
is given in Appendix 1: Checklist for application control review.
2.4 Questions
1. Initial adoption of Business Model adopted by an organisation is dependent upon:
A.
B.
C.
D.
Business Applications
Business Objective
Controls in business applications
Business Laws
Business Application
Business Controls
Business Model
Business Laws
A, B, C, D
D, A, B, C
D, C, B, A
B, C, D, A
4. ISACA ITAF 1202, states IS auditor needs the following for an enterprise:
A.
B.
C.
D.
33
1.1 Introduction
Over the last several years, organizations around the world have spent billions of dollars upgrading
or installing new business application systems for reasons ranging from tactical goals, such as year
000 compliance, to strategic activities, such as using technology to establish company
differentiation in the marketplace. An application or application system is software that enables
users to perform tasks by employing a computers capabilities directly. These applications
represent the interface between the user and business functions. For example, a counter clerk at
a bank is required to perform various business activities as part of his job and assigned
responsibilities. From the point of view of users, it is the application that drives the business logic.
Application controls pertain to individual business processes or application systems, including data
edits, separation of business functions, balancing of processing totals, transaction logging, and
error reporting. From an organizational perspective, it is important that application controls:
Safeguard assets
Maintain data integrity
Achieve organisational goals effectively and efficiently
Module 6
management and other personnel, designed to provide reasonable assurance regarding the
achievement of objectives in the following categories:
COSO defines control activities as the policies and procedures that help ensure management
directives are carried out.
Completeness: The application processes all transactions and the resulting information
is complete.
Accuracy: All transactions are processed accurately and as intended and the resulting
information is accurate.
Validity: Only valid transactions are processed and the resulting information is valid.
Authorisation: Only appropriately authorised transactions have been processed.
Segregation of duties: The application provides for and supports appropriate
segregation of duties and responsibilities as defined by management.
2.
Source Data Preparation and Authorisation: Ensure that source documents are
prepared by authorised and qualified personnel following established procedures,
taking into account adequate segregation of duties regarding the origination and
approval of these documents. Errors and omissions can be minimised through good
input form design. Detect errors and irregularities so they can be reported and
corrected.
Source Data Collection and Entry: Ensure that data input is performed in a timely
manner by authorised and qualified staff. Correction and resubmission of data that
were erroneously input should be performed without compromising original
transaction authorisation levels. Where appropriate for reconstruction, retain original
source documents for the appropriate amount of time.
Module 6
detection and correction of the accuracy of output occur; and information provided in the
output is used.
4. Transaction Authentication and Integrity: Before passing transaction data between
internal applications and business/operational functions (within or outside the enterprise),
check the data for proper addressing, authenticity of origin and integrity of content.
Maintain authenticity and integrity during transmission or transport
ii.
iii.
iv.
v.
vi.
Design source documents in a way that they increase accuracy with which data can
be recorded, control the workflow and facilitate subsequent reference checking.
Where appropriate, include completeness controls in the design of the source
documents.
Create and document procedures for preparing source data entry, and ensure that
they are effectively and properly communicated to appropriate and qualified
personnel. These procedures should establish and communicate required
authorisation levels (input, editing, authorising, accepting and rejecting source
documents). The procedures should also identify the acceptable source media for
each type of transaction.
Ensure that the function responsible for data entry maintains a list of authorised
personnel, including their signatures.
Ensure that all source documents include standard components, contain proper
documentation (e.g., timeliness, predetermined input codes, default values) and are
authorised by management.
Automatically assign a unique and sequential identifier (e.g., index, date and time) to
every transaction.
Return documents that are not properly authorised or are incomplete to the
submitting originators for correction, and log the fact that they have been returned.
Review logs periodically to verify that corrected documents are returned by
originators in a timely fashion, and to enable pattern analysis and root cause review.
38
ii.
iii.
iv.
v.
vi.
vii.
Define and communicate criteria for timeliness, completeness and accuracy of source
documents. Establish mechanisms to ensure that data input is performed in accordance
with the timeliness, accuracy and completeness criteria.
Use only pre-numbered source documents for critical transactions. If proper sequence is
a transaction requirement, identify and correct out-of-sequence source documents. If
completeness is an application requirement, identify and account for missing source
documents.
Define and communicate who can input, edit, authorise, accept and reject transactions,
and override errors. Implement access controls and record supporting evidence to
establish accountability in line with role and responsibility definitions.
Define procedures to correct errors, override errors and handle out-of-balance conditions,
as well as to follow up, correct, approve and resubmit source documents and transactions
in a timely manner. These procedures should consider things such as error message
descriptions, override mechanisms and escalation levels.
Generate error messages in a timely manner as close to the point of origin as possible.
The transactions should not be processed unless errors are corrected or appropriately
overridden or bypassed. Errors that cannot be corrected immediately should be logged in
an automated suspense log, and valid transaction processing should continue. Error logs
should be reviewed and acted upon within a specified and reasonable period of time.
Ensure that errors and out-of-balance reports are reviewed by appropriate personnel,
followed up and corrected within a reasonable period of time, and, where necessary,
incidents are raised for more senior-level attention. Automated monitoring tools should be
used to identify, monitor and manage errors.
Ensure that source documents are safe-stored (either by the business or by IT) for a
sufficient period of time in line with legal, regulatory or business requirements.
ii.
Ensure that transaction data are verified as close to the data entry point as possible and
interactively during online sessions. Ensure that transaction data, whether peoplegenerated, system-generated or interfaced inputs, are subject to a variety of controls to
check for accuracy, completeness and validity. Wherever possible, do not stop transaction
validation after the first error is found. Provide understandable error messages
immediately to enable efficient remediation.
Implement controls to ensure accuracy, completeness, validity and compliance to
regulatory requirements of data input. Controls may include sequence, limit, range,
validity, reasonableness, table look-ups, existence, key verification, check digit,
completeness (e.g., total monetary amount, total items, total documents, hash totals),
duplicate and logical relationship checks, and time edits. Validation criteria and
parameters should be subject to periodic reviews and confirmation.
39
Module 6
iii.
iv.
v.
vi.
Establish access control and role and responsibility mechanisms so that only authorised
persons input, modify and authorise data.
Define requirements for segregation of duties for entry, modification and authorisation of
transaction data as well as for validation rules. Implement automated controls and role
and responsibility requirements.
Report transactions failing validation and post them to a suspense file. Report all errors
in a timely fashion and do not delay processing of valid transactions.
Ensure that transactions failing edit and validation routines are subject to appropriate
follow-up until errors are remediated. Ensure that information on processing failures is
maintained to allow for root cause analysis and help adjust procedures and automated
controls.
iii.
iv.
v.
vi.
vii.
viii.
Ensure that adjustments, overrides and high-value transactions are reviewed promptly in
detail for appropriateness by a supervisor who does not perform data entry.
Reconcile file totals. For example, a parallel control file that records transaction counts or
monetary value as data should be processed and then compared to master file data once
transactions are posted. Identify report and act upon out-of-balance conditions.
x.
When handling and retaining output from IT applications, follow defined procedures and
consider privacy and security requirements. Define, communicate and follow procedures
for the distribution of output.
At appropriate intervals, take a physical inventory of all sensitive output, such as
negotiable instruments, and compare it with inventory records. Create procedures with
audit trails to account for all exceptions and rejections of sensitive output documents.
Match control totals in the header and/or trailer records of the output to balance with the
control totals produced by the system at data entry to ensure completeness and accuracy
of processing. If out-of-balance control totals exist, report them to the appropriate level of
management.
Validate completeness and accuracy of processing before other operations are
performed. If electronic output is reused, ensure that validation has occurred prior to
subsequent uses.
Define and implement procedures to ensure that the business owners review the final
output for reasonableness, accuracy and completeness, and output is handled in line with
the applicable confidentiality classification. Report potential errors; log them in an
automated, centralised logging facility; and address errors in a timely manner.
If the application produces sensitive output, define who can receive it, label the output so
it is recognisable by people and machines, and implement distribution accordingly. Where
necessary, send it to special access-controlled output devices.
ii.
iii.
iv.
v.
vi.
ii.
iii.
Module 6
1
2
Control Objective
5
6
P=
Primary
Reliability
Compliance
Availability
Integrity
Source Data
Preparation and
Authorisation
Source Data
Collection and
Entry
Accuracy,
Completeness
and Authenticity
Checks
Processing
Integrity and
Validity
Output Review,
Reconciliation
and Error
Handling
Transaction
Authentication
and Integrity
Confidentialit
y
APPLICATION AND
CONTROL OBJECTIVES
AND INFORMATION
CRITERIA
Efficiency
Effectiveness
Information Criteria
S = Secondary
Table to the relationship between the information criteria and how achievement of those criteria
can be enabled by various application control objectives. Primary and secondary are the relative
importance of the information criteria.
42
Module 6
controls.
ii.
iii.
Being able to 'converse' with computers in human languages is the goal of research in this area.
Interactive voice response and natural programming languages, closer to human conversation, are
some of the applications. Virtual reality is another important application that can be classified under
natural interfaces.
44
IS Auditor's Role
IS auditor has to be conversant with the controls relevant to these systems when used as the
integral part of the organizations business process or critical functions and the level of experience
or intelligence used as a basis for developing software. The errors produced by such systems
would be more critical as compared to the errors produced by the traditional system.
IS Auditor's Role
IS Auditor should consider the following while auditing data warehouse:
1.
2.
3.
4.
5.
6.
Module 6
1.
2.
3.
Comparative sales figures between two consecutive months for different products
with percentage variation to total sales.
Revenue and Cost projections on the basis of a product mix.
Evaluation of different alternatives, leading to the selection of the best one.
IS Auditors role
As the system shall be used for decision making purpose of the management,
1.
2.
3.
4.
5.
ii.
IS Auditors role
The major concern shall be:
1.
2.
3.
4.
Authorisation of payment.
Validation of receivers details, for correctness and completeness.
Verifying the payment made.
Getting acknowledgement from the receiver, or alternatively from bank about the payment
made.
5. Checking whether the obligation against which the payment was made has been fulfilled.
46
2.3.5 E-commerce
Other than buying and selling goods on the Internet, E Commerce (Electronic Commerce) involves
information sharing, payment, fulfilment and service and support.
Risks of E-commerce
1.
2.
3.
4.
5.
Confidentiality of message
Id of organisation of the sender
Integrity of the message
Non Acceptance of confidentiality by receiver
Non Repudiation by sender of having sent the message
IS Auditors role
IS Auditors responsibility shall be to see whether the transactions have:
1. Authorisation
2. Authentication
3. Confirmation
IS Auditors role
1. In case there is batch processing, the IS auditor should evaluate the batch controls
implemented by the organization.
2. Check if they are in operation,
3. Review exceptional transaction logs.
4. Whether the internal control system is sufficient to ensure the accuracy and completeness
of the transaction batch before updating?
5. The relevance of controls is more In the case of online updating system, the IS auditor
will have to evaluate the controls for accuracy and completeness of transactions.
6. RBI guidelines regarding Cash withdrawal at Point of Sale (POS) - Prepaid Payment
Instruments issued by banks: need to be validated in case such transactions are taking
place.
47
Module 6
IS Auditor's Role
The following are the guidelines for internal controls of ATM system which the auditor shall have
to evaluate and report:
a. Only authorized individuals have been granted access to the system.
b. The exception reports show all attempts to exceed the limits and reports are reviewed
by the management.
c. The bank has ATM liability coverage for onsite and offsite machines
d. Controls on proper storage of unused ATM cards, Controls on their issue only against
valid application form from a customer, Control over custody of unissued ATM cards,
Return of old/ unclaimed ATM cards, Control over activation of PINs
e. Controls on unused PINs, Procedure for issue of PINs, Return of PINs of
returned ATM cards.
f. Controls to ensure that PINs do not appear in printed form with the customers account
number.
g. Access control over retrieval or display of PINs via terminals
h. Mail cards to customers in envelops with a return address that do not identify the Bank.
Mail cards and PINs separately with sufficient period of time (usually three days)
between mailings.
As on date, there are more than 1,50,000 ATM machines installations in India. Government of India
has already indicated that it wants to further enhance the usage of ATM in India, as this allows
bank to reach remote corners without being physically present. This creates a scope to the IS
Auditor for a separate ATM Audit. RBI has issued detailed set of instructions for bank to follow.
Based on those a separate ATM audit program and checklist is being attached. Please see
Appendix: Checklist for ATM audit to understand different areas of an ATM audit.
48
1111
Level: Tick
SUBJECT:
Date
Cheque
Details
Name of
Bank
Ch.
Number
Cash
details
Date
100X
50X
20X
10X
1000X
500X
Total
Student signature
Receiver
Signature
Based on the slip filled above, the cashier used to enter data in TALLY.
Problem: It was found, that one of the subjects in CA and CS has same name Direct Tax Law
(DTL). Many students who paid fees for CA DTL got accounted in CS DTL. The result was that at
the end of period when all payoffs were cleared TALLY data was used and calculations done.
Module 6
The fees paid by many CA students were credited of CS students. This resulted in payment dispute
and CA Final faculty for PE left the institute in a grudge. The faculty was a respected person; this
affected reputation of the Institute.
Action taken: PE management was worried about the development and sought help from an IS
Auditor. IS Auditors mandate was to look for problem and provide a solution.
IS Auditors Report:
The IS auditor went through the whole fees collection process, the people involved and the present
problem. He/she gave a two-step solution to organisation.
First Step: Modify pay-in-slip, to include the stream (CA/CS/CWA) as another field.
Second Step: Appoint an Internal Auditor to check whether the payments of fees made by the
students have been properly accounted.
Suggested Pay-in-Slip
Receipt No.
Cash
/
Cheque
Name
of
student
Stream:
Tick
Level: Tick
SUBJECT:
1111
Date
CA / CS /
ICWA
CPT/ FOUNDATION/ IPCC/ FINAL/
EXECUTIVE / PROFESSIONAL
Cheque
Details
Name of
Bank
Ch.
Number
Cash
details
Date
100X
50X
20X
10X
1000X
500X
Total
Student signature
Receiver
Signature
Benefit to PE:
1. A big problem was set right with a simple solution i.e. proper design of source
document.
50
How to generate the report? The command on GATEWAY OF TALLY: DISPLAY AND
EXCEPTION REPORTS:
What items are displayed? The screen shot lists items that are reported as exception in TALLY.
These include
-
Negative Stock
Negative Ledger and more.
What is the meaning of negative ledger? The word negative ledger means that the ledger
account is not its correct domain. Correct domain means, for example the domain for CASH is
debit, but if is it credit, the system shall show it as negative ledger. The same is true for a
debtors ledger with credit balance or creditors ledger with debit balance.
51
Module 6
Action Taken: After so much of embarrassment company decides to appoint an IS Auditor to find
the problem and solution.
53
Module 6
Report of IS Auditor:
After studying the system and the problem faced IS auditor suggested the following:
1. System needs to be updated / modified so that it does not allow underage employee
updates.
2. An internal system to validate each new addition to employee payroll.
Exercise:
Q.1 the best way to define the error is:
a.
b.
c.
d.
Input error
Process error
Output error
Design error
54
himself.
Errors:
1. Lack of reasonableness check: The system must have been created to ensure that
such a PO must not be released. It could be having a check on say:
a. Maximum quantity that could be entered for purchase, or
b. Maximum value a PO could be made.
c. Maximum quantity PO that could be sent to a vendor, or
d. A better definition by management.
2. Purchase Managers poor work.
3. No cross check system built in.
Exercise:
Q.1 Reasonableness verification control is a control at which part of application process?
a.
b.
c.
d.
Input
Process
Output
None of above
Module 6
Errors:
1. Lack of user controls. Data entry operator can create ledger.
2. Lack of duplicate check.
3. Lack of internal controls, to see how duplicate entries are in system.
Exercise: Q.1 What is the best solution to the problem?
56
57
Module 6
3.9 Questions
1. Application controls shall include all except
A.
B.
C.
D.
2. As per Income Tax Act, 1961 and banking norms, all fixed deposit holders of bank need to submit
their PAN or form 60/61(a form as per Income Tax Act/Rules). Bank in its account opening form,
has not updated the need for form 60/61 in case PAN is not there. This defines which control lapse
as per COBIT.
A. Source Data Preparation and Authorisation:
B. Source Data Collection and Entry
58
3. In a public sector bank while updating master data for advances given, the bank employee does
not update INSURANCE DATA. This includes details of Insurance Policy, Amount Insured, Expiry
Date of Insurance and other related information. This defines which control lapse as per COBIT.
A.
B.
C.
D.
4. Emailed purchase order for 500 units was received as 5000 units.
This defines which control lapse as per COBIT.
A.
B.
C.
D.
5. An IS Auditor, processes a dummy transaction to check whether the system is allowing cash
payments in excess of Rs.20,000/-. This check by auditor represents which of the following
evidence collection technique?
A.
B.
C.
D.
6. While auditing e-commerce transactions, auditors key concern includes all except:
A.
B.
C.
D.
Authorisation
Authentication
Author
Confirmation
7. RBI instructed banks to stop cash retraction in all ATMs across India from April 1, 013. This was
result of few ATM frauds detected. This action by RBI can be best classified as:
59
Module 6
A.
B.
C.
D.
Creation
Rectification
Repair
None of above
9. Companys billing system does not allow billing to those dealers who have not paid advance
amount against proforma invoice. This check is best called as:
A.
B.
C.
D.
Limit Check
Dependency Check
Range Check
Duplicate Check
10. While posting message on FACEBOOK, if user posts the same message again, FACEBOOK
gives a warning. The warning indicates which control.
A.
B.
C.
D.
Limit Check
Dependency Check
Range Check
Duplicate Check
4. D. is the correct answer. As per COBIT, where transactions are exchanged electronically,
establish an agreed-upon standard of communication and mechanisms necessary for mutual
authentication, including how transactions will be represented, the responsibilities of both parties
and how exception conditions will be handled.
5. D. IS Auditor may process test data on application controls to see how it responds.
6. C. Is correct. Others are key concerns of an IS auditor while auditing e-commerce
transactions.
7. B. is the right answer. A, is not an answer as action by RBI is based on fraud detection. Repair
is done to rectify an error which has occurred in a working system.
8. D. is the correct answer. The other options are related to non-repudiation. A, is definition of
word. B, digital signatures create non-repudiation. E-commerce transactions need it (nonrepudiation) for execution of contract.
9. B. Dependency check is one where value of one field is related to that of another.
10. D. is the answer as this is a duplicate check.
61
1.1 Introduction
The role of information System audit has become a critical mechanism for ensuring the integrity of
information and the reporting of organization finances to avoid and hopefully prevent future
financial fiascos such as Satyam in recent years. Electronic infrastructure and commerce are
integrated in business process around the globe. There is a need to control and audit using IS to
avoid such kind of scam in near future. Today the business processes are tightly integrated to
systems. In few organisations the level of integration is that when systems are off business if off.
In such a scenario it is important to ensure that systems are working properly and nothing is there
to affect the working of system. The way businesses are integrated to system, any audit shall be
preceded by system audit, as proper working of system is necessary to proper working of
business. It shall be great risk being taken by a pure financial auditor to submit his/her report
without going through the system audit report of the organisation for which financial audit is being
done.
Module 6
Specific Point: Provision to be made for sub-standard assets, where the advance as per nature
is unsecured. The guidelines state that a provision of @25% has to be made of total out-standing.
This is an exception to general rule of provision @15%. The exception is created as the advance
is basically unsecured in nature. For example: Credit Card o/s turning sub-standard. This
advance is unsecured in nature.
Point to remember: The provision is on total o/s, not on the amount of outstanding. As the advance
is an unsecured advance.
Auditor observation:
Auditor observed that for credit card outstanding of Rs.1, 00,000/- the branch had made a
provision @15% of out-standing amount, as reflected from system generated Non-PerformingAsset statement. The issue was brought to notice of branch manager. The interaction between the
bank employees and the action taken by auditor is shown in the matrix below.
Sl. No.
Auditor Action
65
Module 6
As per ISACA ITAF 1007 Assertions, IS Audit and Assurance professional shall review the
assertions against which the subject matter will be assessed to determine that such assertions are
capable of being audited and that the assertions are sufficient, valid and relevant.
Information Systems Audit is often misunderstood as a mere technical audit and a domain of
Information Technology professionals. On the contrary, Information Systems Audit involves
evaluating the adequacy and efficiency of internal controls in business processes that are either
partly or fully computerized. Hence, Audit and control professionals who have expertise in
understanding of business processes and internal controls with exposure to information technology
risks and controls are considered the most appropriate professionals to conduct information
systems audits. Therefore, depending on the audit environment, objectives and scope, the audit
could involve the audit of entire business processes, partially or fully automated, or audit of
specified application, technology and related controls.
ii.
iii.
Module 6
iv.
v.
vi.
vii.
audit staff for whom they have supervisory responsibility, to accomplish audit objectives
and meet applicable professional audit standards. IS audit and assurance professionals
shall accept only tasks that are within their knowledge and skills or for which they have a
reasonable expectation of either acquiring the skills during the engagement or achieving
the task under supervision. IS audit and assurance professionals shall obtain sufficient
and appropriate evidence to achieve the audit objectives. The audit findings and
conclusions shall be supported by appropriate analysis and interpretation of this evidence.
IS audit and assurance professionals shall document the audit process, describing the
audit work and the audit evidence that supports findings and conclusions. IS audit and
assurance professionals shall identify and conclude on findings.
Materiality: IS audit and assurance professionals shall consider potential weaknesses or
absences of controls while planning an engagement, and whether such weaknesses or
absences of controls could result in a significant deficiency or a material weakness.
IS audit and assurance professionals shall consider materiality and its
relationship to audit risk while determining the nature, timing and extent of audit
procedures. IS audit and assurance professionals shall consider the cumulative effect of
minor control deficiencies or weaknesses and whether the absence of controls translates
into a significant deficiency or a material weakness.
Evidence: IS audit and assurance professionals shall obtain sufficient and appropriate
evidence to draw reasonable conclusions on which to base the engagement results. IS
audit and assurance professionals shall evaluate the sufficiency of evidence obtained to
support conclusions and achieve engagement objectives.
Using the Work of Other Experts: IS audit and assurance professionals shall consider
using the work of other experts for the engagement, where appropriate. IS audit and
assurance professionals shall assess and approve the adequacy of the other experts
professional qualifications, competencies, relevant experience, resources, independence
and quality-control processes prior to the engagement. IS audit and assurance
professionals shall assess, review and evaluate the work of other experts as part of the
engagement, and document the conclusion on the extent of use and reliance on their
work.
Irregularity and Illegal Acts: IS audit and assurance professionals shall consider the risk
of irregularities and illegal acts during the engagement. IS audit and assurance
professionals shall maintain an attitude of professional scepticism during the
engagement. IS audit and assurance professionals shall document and communicate any
material irregularities or illegal act to the appropriate party in a timely manner.
Knowledge of
business and industry
Prior years audit results
Recent financial information
Regulatory statutes
Inherent risk assessments
Control environment
Control procedures
Detection risk assessment
Analytical procedures
Other
substantive audit
Detailed tests of account
procedures
balances
Conclude the Audit
Create recommendations.
Perform tests on
reliability, risk prevention and
adherence to organization
policies and procedures.
Perform Substantive Tests
Module 6
systems having different hardware and software environments, different data structure, record
formats, processing functions, etc., it is almost impossible for the auditors to collect evidence and
analyse the records without a software tool. Owing to resource constraints and the ever changing
audit objectives, it is almost impossible to quickly develop audit capabilities, without using audit
software like CAATs.
The ICAI Guidance note on CAAT describes CAATs as important tools for the auditor in performing
audits. CAATs may be used in performing various auditing procedures including the following:
a. Tests of details of transactions and balances, for example, the use of audit software for
recalculated interest or the extraction of invoices over a certain value from the computer
records.
b. Analytical procedures, for example, identifying inconsistencies or significant
fluctuations.
c. Tests of general controls, for example testing the setup or configurations of the
operating system or access procedures to the program libraries or by using code
comparison software to check that the version of the program in use is the version
approved by management.
d. Sampling programs to extract data for audit testing
e. Tests of application controls, for example, testing the functionality of a
programmed control
f. Re-performing calculations performed by the organisations accounting system.
The first two options require the auditor to be technically competent in programming and its
methodology, which may not be his area of expertise. Computer audit software also known as
Generalised Audit Programs (GAS) is readily available off-the-shelf software with specific features
useful for data interrogation and analysis. The auditor do not require much expertise knowledge
to be able to use for auditing purpose
The various types of CAATs can be categorized as follows:
1. Generalised Audit Software
2. Specialised Audit Software
70
3. Utility Software
Utility software or utilities though not developed or sold specifically for audit are often extremely
useful and handy for conducting audits. These utilities usually come as part of office automation
71
Module 6
software, operating systems, and database management systems or may even come separately.
Utilities are useful in performing specific system command sequences and are also useful in
performing common data analysis functions such as searching, sorting, appending, joining,
analysis etc. Utilities are extensively used in design, development, testing and auditing of
application software, operating systems parameters, security software parameters, security
testing, debugging etc.
a.
b.
File comparison: A current version of a file for example, is compared with the
previous years version, or an input file is compared with a processed file.
Production of circularisation letters.
Module 6
withdrawal. Hence the error in code/ instruction can be pinpointed and identified by the snapshot
software.
Snapshots are employed in the following:
They are used for analysing and tracking down the flow of data in an application
program, so as to know the underlying logic of the data processing software.
For documenting the logic, input/output controls (or conditions) of the application
program and the sequence of processing.
Snapshots are generally deployed for tracking down the reasons for any disruption in the
functioning of application or system software like operating system or database system.
Case at the end of this part: SNAPSHOT for payroll process.
reference material which includes the publication: Data analysis for an auditor
which has detailed case studies on using CAATs. Please also refer to Module-2
which has explanation on CAATs.
Module 6
Facts: Company using TALLY has selected manual invoice numbering as an option in TALLY. The
option is available when user creates / configures Vouchers.
Problem: Management action of selecting manual invoice numbers, for data entry purpose raises
the following risks:
-
Duplicate
Missing invoice number.
IS Auditors concern: To identify a mechanism to track the missing / duplicate invoice number.
Using Audit tools to achieve the above audit objectives:
a. Through use of Excel: Discussed here
b. Through use of IDEA, the generalized audit tool: Part of online demo in PT.
iv.
v.
vi.
vii.
1
2
A
Invoice
number
10001
B
Inserted
column
=A3-A2
76
C
Result of
command
1.00
10002
10003
10005
10006
10006
10007
10008
=A3-A4
=A4-A5
=A5-A6
=A6-A7
=A7-A8
=A8-A9
=A9-A10
1.00
2.00
1.00
0.00
1.00
1.00
Reading the above: Where the value of column C is other than 1, it means there is a
problem with invoice numbering. Above is one way of doing the same in excel, there could
be multiple ways of getting the audit conclusions in excel.
viii.
Maintain security of files and output until the tests have been fully checked out: Important to
ix.
Check the test results and draw audit conclusions. Based on above results auditor can
draw conclusions.
Interface the test results with whatever subsequent manual audit work to be done.
x.
remember.
Calculate basic salary: Based on basic input data, like attendance and master data is
used here
Calculate Allowance: Based on basic salary calculated allowances like House Rent
Allowances, calculated.
Calculate deductions: Once Basic Salary and Allowances calculated deductions like TDS,
PF etc. made.
Calculate the net salary: Same based on above calculation.
Audit objective: Management has appointed a system auditor to check whether the payroll system
is working properly.
Auditors use of SNAPSHOT as a technique:
1. This technique allows auditor to capture images of transactions as the same is processed
in system.
77
Module 6
2. Auditor identifies the transactions for which snapshot shall be taken.
3. Based on the snapshot auditor is able to come to a conclusion about the nature and
location or error in payroll process if any.
order.
Objective: Company appoints an IS Auditor to check whether the same system is working properly
or not.
IS Audit process: IS auditor uses the technique of ITF.
IS Audit Steps:
1. Create a dummy organisation. In the given case the dummy organisation is an issue
slip. The objective is to reduce an items balance below re-order level.
2. Once the dummy organisation is processed in system, auditor checks whether the system
triggers a purchase order.
3. If the answer is yes, it means the system is working properly.
Points to remember:
1. Items selected for the above test shall be material.
2. Effect of dummy organisation need to be reversed.
78
2.1.1 Purpose
Compliance tests are used to help determine the extent of substantive testing to be performed, as
stated in Statement of Auditing Standards. Such tests are necessary if the prescribed procedures
are to be relied upon in determining the nature, time or extent of substantive tests of particular
classes of transactions or balances. Once the key control points are identified, the auditor seeks
to develop a preliminary understanding of the controls to ensure their existence and effectiveness.
It is achieved through compliance testing. Compliance testing helps an auditor determine that
Module 6
The controls are applied in a manner that complies with policies and procedures.
2.2.1 Purpose
Substantive testing procedures focus on broadly two types of tests:
i.
ii.
Tests of details of transactions and balance such as recalculating interest to ensure the
accuracy of process and effectiveness of controls over the process of the calculation of
interest.
Analysis of significant ratios and trends including the resulting enquiry of unusual
fluctuations and items in exceptions e.g. debit balance in deposit accounts, pending items
to ensure the controls to prevent or detect such transactions or balances are in place.
80
Module 6
i. Park of entry: This step is used to enter and store (park) incomplete documents in the SAP
System without carrying out extensive entry checks.
ii. Posting of entry: Parked documents can be completed, checked, and then posted at a later
date - if necessary by a different accounting clerk.
This ensures that same accounting clerk does not receive the cash and also update the records.
82
Module 6
a. Well defined management structures with employee roles and responsibility.
b. Capability of the business application to allow user rights creation
The job of user rights creation, modification and deletion is a critical from internal control
perspective.
84
Case Studies
1. User rights review Audit
An Internal Auditor asked the company to make available user rights lists as provided by the
company in accounting software. Internal Auditor also asked the HR department to make available
the hierarchy chart and job profile of the individuals. On comparison of the two documents auditor
found the following: There were 50 employees in the company. Details of two employees are:
85
Display
Delete
Name of Document /
Master
Alter
Stores Clerk
Prepare
Material
Receipt Note
after validation
with PO for
quantity, rate,
and other
terms.
Create
Designation
HR department
profile
Major
responsibility as
defined by
company
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Module 6
Manager
Accounts
Timely and
accurate
accounting,
statutory
compliances,
timely
preparation of
financial
statements,
timely
submission of
MIS to
management.
Vouchers
Account Masters,
including debtors and
creditors master.
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Exercise for participants: What are the risks and what are the remedies?
86
(ii)
(iii)
External or user view: It is at the highest level of the database abstraction. It includes
only that portion of database or application programs which is of concern to the users.
It is defined by the users or written by the programmers. It is described by the external
schema.
Conceptual or global view: This is reflection of a database is viewed by database
administrator. Single view represents the entire database. It describes all records,
relationships and constraints or boundaries. Data description to render it independent
of the physical representation. It is defined by the conceptual schema,
Physical or internal view: It is at the lowest level of database abstraction. It is closest
to the physical storage method. It indicates how data will be stored, describes data
structure, and the access methods. It is expressed by internal schema.
Segregation of duties
Roles & Permissions allow control of operations that a user can perform on database,
Module 6
3. Views: Views enable data access limitations. A view is a content or context dependent subset
of one or more tables. E.g. A view might be created to allow a sales manager to view only the
information in a customer table that is relevant to customers of his own territory Restrict user views
of the database.
4. Stored Procedures: Database servers offer developers the ability to create & reuse SQL code
through the use of objects called as Stored Procedures (Group of SQL statements). This is
discussed later.
Application programmers
Sophisticated users
Specialized users
Naive users
88
Data base Administrator will then grant access rights or privileges to user as shown below.
89
Module 6
90
d.
e.
Action
Target
Select
Columns
From
Tables
Where
Group by
Summarize
Order By
Options to specify
i. Specific columns by name
ii. All columns through wildcard
Lists qualified table name
i. Optional
ii. Conditions that limit the records to be
displayed
i. Optional
ii. Sorts the query results
ASC - ascending order
DESC - descending order
Order Results
The above can be used to generate specified reports directly from database. These are covered
in more detail through practical examples in the hands on training of this module.
91
i. Taxation related: TDS, TCS, Excise Duty, Service Tax, VAT, PF, etc.
ii. Control Related: Those specified in:
-
CARO, 2003 (As amended in 2004), has many clauses where statutory auditor
needs to comment upon the internal controls.
SOX compliance: Financial transaction analysis, for example aging analysis for
debtors and inventory, capability to drill down un-usual financial transactions.
iii. XBRL compliance: Looking to the growth of XBRL compliance in India and governments
intention to slowly increase the coverage area of eligible entities, XBRL compliance shall increase
in India. Many business application vendors have already started making their software capable of
generating XBRL reporting.
iv. Accounting Standard related: Accounting standards prescribing the accounting guidance to
transactions. It is important that the business applications used are in compliance with the
applicable accounting standards.
v. Compliances as specified in the newly notified Companies act, 2013:
Module 6
- Constitution of National Financial Reporting Authority (NFRA). This body has been
entrusted with task of framing auditing and accounting standards. (Section 132)
vi. Compliances requirements from industry specific statutes
-
i.
ii.
iii.
The prime responsibility for accuracy of report generated from the business applications
lies with the management.
The role of internal auditor is to see whether established controls ensure the accuracy of
reports.
Where statutory auditor wishes to use the above reports for his/her documentation, or
forms and opinion based on such reports.
SA 580 on Written Representations, issued by ICAI, state that auditor when decides to obtain
written representations as assertions, and to respond appropriately to written representations
94
95
Module 6
96
97
Module 6
98
99
iv.
v.
vi.
vii.
Title:
Addressee
Description of the scope of the audit, the name of the organisation or component of
the organisation to which the subject matter relates, including:
a. Identification or description of the area of activity.
b. Criteria used as a basis for the IS audit and assurance professionals
conclusion.
c. The point in time or period of time to which the work, evaluation or
measure of the subject matter relates.
d. A statement that the maintenance of an effective internal control
structure, including control procedures for the area of activity, is the
responsibility of management.
A statement that the IT audit and assurance professional has conducted the
engagement to express an opinion on the effectiveness of control procedures.
Identification of the purpose for which the IT audit and assurance professionals report
has been prepared and of those entitled to rely on it, and a disclaimer of liability for its
use for any other purpose or by any other person.
Description of the criteria or disclosure of the source of the criteria.
Statement that the audit has been conducted in accordance with specified IT Audit
and Assurance Standards or other applicable professional standards.
Module 6
viii.
ix.
x.
xi.
xii.
A paragraph stating that because of the inherent limitations of any internal control,
misstatements due to errors or fraud may occur and go undetected.
An expression of opinion about whether, in all material respects, the design and
operation of control procedures in relation to the area of activity were effective.
IT audit and assurance professionals signature.
IT audit and assurance professionals address.
Date of the IT audit and assurance professionals report. In most instances, the dating
of the report is based upon applicable professional standards. In other instances, the
date of the report should be based on the conclusion of the fieldwork.
policy.
Facts: Password Management Policy has been framed as a part of main security policy of the
company.
Policy details:
1. Policy Name: Password Management Policy. The objective is to ensure that the company has
no loss due to password mismanagement.
2. Policy Guidelines:
3. Policy design and implementation: Management informed its system developers to implement
the above policy as a part of system design.
4. Policy monitoring: Manager (PW) appointed by the company in HR department, having access
to password log of system reports to System Administrator. At the end of year management
appointed an IS Auditor with the following scope:
1. To review policy compliance.
2. To suggest:
i.
Modification in policy
ii.
Any other aspect for better implementation.
102
ii.
iii.
iv.
B. IS Auditors Findings: Based on the audit done auditor came across the following.
1. There were 200 employee data available. Of these 175 are working and 5 have left.
2. The password of employee who had left had not been disabled.
3. 20 Employees did not change their password every 30 days, as defined in policy. 5 were
repeat offenders.
4. 50 instances of employee passwords being used when they were absent have been
observed.
Please refer to Appendix 6: System Audit Report.
7.2 Questions
1. The best way to define the purpose for an IS Audit in one word:
A.
B.
C.
D.
Assurance
Activity
Review
Performance
knowledge.
life-cycle.
user-request
risk assessment.
3. Which of the following audit tools is MOST useful to an IS auditor when an audit trail is required?
A. Integrated test facility (ITF)
B. Continuous and intermittent simulation (CIS)
103
Module 6
C. Audit hooks
D. Snapshots
4. Which of the following is the first step in compliance testing? To review:
A.
B.
C.
D.
5. The cashier of a company has rights to create bank master in TALLY. This error is a reflection
of poor definition for which type of control:
A.
B.
C.
D.
User Controls
Application Control
Input Control
Output Control
8. Common features in ISACA ITAF 401, SA 700 and NFRA (National Financial Reporting
Authority) is.
A.
B.
C.
D.
Reporting
Auditing
Accounting
Standard
105
SECTION 3: APPENDIX
APPENDIX 1: CHECKLIST FOR APPLICATION
CONTROLS
Date of review:
Segregation of
Duties
Authorisation
Validity
Ref
Accuracy
Information Objective
Completeness
Module 6
108
Section 3
109
Module 6
110
Section 3
d
e
Module 6
transmission; that verification, detection and correction of the accuracy of output occurs;
and that information provided in the output is used.
112
Date
Name:
Department / Designation
Name of Security Level:
Days allowed for Back Dated Entry:
Cut- off Date for back Dated Vouchers:
Put Y /N only
Reports / Items to ALLOW / DISALLOW
ACCOUNTING STANDARDS
ACCOUNT MASTERS
ANNEXURE TO AUDIT REPORT
CARO
ATTENDANCE VOUCHERS
AUDITING AND ASSURANCE
STANDARDS
AUDIT JOURNALS
AUDIT LISTINGS
Remark
Module 6
AUDIT PROGRAMS
AUDIT WORKING PAPERS
BACK DATED VOUCHERS
BALANCE SHEET
BANK BOOKS
BANK RECONCILIATION
BATCH GOWDOWN SUMMARY
BATCH SUMMARY
CASH FLOW
CHEQUE PRINTING
CHEQUE REGISTER
CLIENT/ SERVER RULE
COMMODITY WISE PURCHASE
COMMODITY WISE SALES
COMPANY FEATURES
CONNECT COMPANY
COST CENTER DETAILS
CST PURCHASE REGISTER
CST REPORTS
CST SALES REGISTER
DAY BOOK
DEALER EXCISE REPORTS
DEPOSIT SLIP
EMPLOYEE VOUCHERS
EXCISE COMPUTATION
EXCISE ER-1 REPORT
EXCISE REPORTS
FBT REPORTS
FORM 3CA
FORM 3CB
FORM 3CD
FUNDS FLOW
GROUP MONTHLY SUMMARY
GROUP OUTSTANDING
114
Section 3
GROUP SUMMARY
GROUP VOUCHER DETAILS
IMPORT DATA
INTEREST CALCULATIONS
INVENTORY MASTERS
INVOICE CONFIGURATION
JOB WORK ANALYSIS
JOB WORK ORDER DETAILS
JOB WORK REGISTERS
JOB WORK STOCK
LEDGER MONTHLY SUMMARY
LEDGER OUTSTANDING
LEDGER VOUCHER DETAILS
LOCATION-WISE SUMMARY
MCA REPORTS
NOTE SUMMARY
ORDER DETAILS
OUTSTANDINGS
OVERRIDE INVOICE CLASS
OVERRIDE INVOICE DEFAULTS
PAYMENT ADVICE
PAYROLL MASTERS
PAYROLL REPORTS
PAYROLL VOUCHERS
PRICE LIST
PROFIT & LOSS A/C
PURCHASE REGISTER
QUICK SETUP
RECEIPTS & PAYMENTS
SALES REGISTER
SCHEDULE VI
SERVICE TAX REPORTS
STATUTORY AUDIT
STOCK CATEGORY OUTSTANDING
115
Module 6
STOCK CATEGORY SUMMARY
STOCK GROUP OUTSTANDING
STOCK ITEM MONTHLY DETAILS
STOCK ITEM OUTSTANDING
STOCK QUERY
STOCK SUMMARY
STOCK VOUCHER DETAILS
SYNCHRONISATION
SYNC REPORTS
TALLY.NET FEATURES
TAX AUDIT
TCS REPORTS
TDS REPORTS
TRACKING NUMBER DETAILS
TRIAL BALANCE
VAT COMPUTATION
VAT PURCHASE REGISTER
VAT SALES REGISTER
VOUCHER REGISTER
VOUCHERS
VOUCHING DONE
Prepared by:
Checked By:
Approved By:
Date of Approval
116
Section 3
1
2
3
4
5
Authorisation
Validity
Accuracy
Ref
Completeness
Segregation of Duties
For all items labelled as Y, IS auditor needs to check how the issue has been addressed.
117
Module 6
Title:
Addressee
Report
Description
REPORT ON PASSWORD
MANAGEMENT SYSTEM
CHIEF INFORMATION OFFICER, XYZ
LTD.
Scope: System Audit of the Password
Management Policy.
User rights department in HR
department.
Password Management Policy:
Implementation and Compliance
The mandate of management to comment
on compliance, suggest methods to
improve compliance
Audit period starts from April 1st, 013 and
ends on December 31st, 013.
The responsibility of implementing proper
and effective internal controls in general
and specifically in terms of the policy
under audit lies with the management.
The IS Audit method and approach is to
express an opinion on existence,
effectiveness and continuity of internal
controls put in place by the management.
118
Section 3
119
Module 6
ii. The attendance system of the
organisation needs to be joined to the
password system. This is necessary to
ensure that a password of absent
employee is not misused.
iii. Employee training is a must, for proper
understanding and implementation of
policy.
Basis of our recommendation as findings
during the audit. Findings are enclosed as
an annexure to the report.
10
11
12
ABC
ICAI BHAWAN, NEW DELHI
01-Jan-14
Sl.
No.
There were 200 employee data available. Of these 175 are working and 5
have left.
The password of employee who had left had not been disabled.
3
4
5
6
Section 3
01-Jan-14
121