Internal Control Using COBIT 5 WHP Eng 0316
Internal Control Using COBIT 5 WHP Eng 0316
Control Using
COBIT 5
Abstract
Internal controls are often not well understood in
business. They may even be shunned in enterprises
that perceive them as onerous rules that exist primarily
to make work more difficult or cumbersome. Instead,
they should be recognized as the policies, procedures,
practices and organizational structures that ensure
desirable positive outcomes and mitigate potential
negative consequences. In both cases, they contribute
to the enterprises ability to deliver value to stakeholders.
Like any significant business element, controls can be
complex. There are multiple types of controls addressing
What Is Control?
The concept of control, both in general and in business
terms, can sometimes be difficult for practitioners to
understand, usually due to inconsistencies in how the term
is applied across different industries. This is true within
professional discourse (i.e., one practitioner to another), in
publications and guidance, and sometimes in a regulatory
context. Therefore, when writing a guidance publication
about internal control, it is important to be very clear about
what is meant by the termand to differentiate from other
very specific usage as appropriate.
Generally, the term control refers to guidance, regulation,
restraint and oversight. Within a business context, the term
(earliest use by assurance and compliance practitioners)
usually refers to the mechanisms by which specific
business activities are monitored and directed. To operate
effectively, any given business unit or area must ensure that
it is following the optimal course of action, i.e., the course
of action that realizes the most business value, optimizes
risk (realizing the most value within a risk that is acceptable
to the organization and its stakeholders) and best supports
the mission of the organization. This can be challenging
because, without a holistic view, the goals of individual
business units might be at odds with one another. In the
absence of a mechanism for central oversight, decisions
made at the individual business-unit level might counteract
or adversely impact other areas. This is the essence of
internal control: specifically, to provide that oversight and (if
done well) the holistic viewpoint.
In this context, internal control is established by providing
visibility into what individual operational units are doing.
Why are they acting in a certain way? Why do they consider
those actions to be most efficient and effective? What
measures are they taking to prevent undesired outcomes?
While there are many ways to phrase the responses to
theseand otherquestions, and many subtle nuances
can be added along the way, addressing these issues is
what internal control is all about.
Control Systems
It is necessary to bring all of the controls and the control
activities together into a systematic structure that clearly
identifies the risk being managed and the objectives being
served. Having such a structure permits identification of
gaps in control objective coverage and facilitates internal
audit planning that supports the achievement of overall
enterprise objectives. This structure is called the internal
control environment.
American Institute of Certified Public Accountants (AICPA), Statements on Auditing Standards (SAS) No. 106, Audit Evidence, 2006
International Organization for Standardization (ISO), ISO Guide 73:2009 Risk ManagementVocabulary, 2009
5
6
ISACA, Relating the COSO Internal ControlIntegrated Framework and COBIT, USA, 2014, www.isaca.org/COSO-and-COBIT
COSO, Internal ControlIntegrated Framework, 2013, www.coso.org/IC.htm
Information Technology in
Internal Control
Technology is ubiquitous in enterprises, being used to
conduct every imaginable task, from data creation to
Figure 3RACI Chart for MEA02 Monitor, evaluate and assess the system of internal control
Control Selection
Practitioners should have an understanding of what internal
controls are and the value that they provide before selecting
the appropriate controls for their environment. It should be
noted that COBIT 5 provides an exhaustive description of
this process: how to select the controls that fit within the
goals of the organization, how to ensure that the controls tie
directly to business objectives and goals, etc. Therefore, for
more detailed guidance about control selection, the COBIT
5 framework and other publications, especially COBIT 5:
Enabling Processes, might be an ideal place to start and
would provide a more thorough reference.
At a high level, the process of control selection consists of
three phases:
10
11
12
13
Conclusion
Internal controls are the policies, procedures, practices and organizational structures that provide
central oversight so that individual business units can work together to follow optimal courses of action
to minimize risk and provide value to stakeholders. An internal control system should be designed
that includes control practice areas that are integral to the organizations success. This system should
identify risk, but it should not be used only as a risk management toolinternal controls can be
used to mitigate risk, but they also can be used to create value. Responsibility for internal controls is
owned by many different levels in an enterprise. Controls should be selected after identifying goals,
determining opportunities/gaps and defining coverage. Tools such as COSO, COBIT 5, and ISO/IEC
27001 can greatly assist in the selection. When a successful internal control system is in place, an
organization can gain reasonable assurance that business objectives will be achieved and risk will be
prevented or detected and corrected.
ISACA
Disclaimer
Provide feedback:
www.isaca.org/internal-controls
Participate in the ISACA
Knowledge Center:
www.isaca.org/knowledge-center
Follow ISACA on Twitter:
www.twitter.com/ISACANews
Join ISACA on LinkedIn:
www.linkd.in/ISACAOfficial
Like ISACA on Facebook:
www.facebook.com/ISACAHQ
14
ACKNOWLEDGMENTS
Development Team
Board of Directors
Jimmy Heschl
CISA, CISM, CGEIT,
Red Bull, Austria
Christos K. Dimitriadis
Ph.D., CISA, CISM, CRISC,
INTRALOT S.A., Greece,
Chair
Gregory T. Grocholski
CISA,
SABIC, Saudi Arabia,
Past Chair
Expert Reviewers
Rosemary M. Amato
CISA, CMA, CPA,
Deloitte Touche Tohmatsu Ltd.,
The Netherlands, Director
Tony Hayes
CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA,
Queensland Government, Australia,
Past Chair
Sushil Chatterji
CGEIT,
Edutech Enterprises, Singapore
Garry J. Barnes
CISA, CISM, CGEIT, CRISC, MAICD,
Vital Interacts, Australia, Director
Robert E Stroud
CGEIT, CRISC,
USA, Past Chair
Nancy A. Cohen
CPA, CIPP/US,
ISACA, USA
Robert A. Clyde
CISM,
Clyde Consulting LLC, USA,
Director
Zubin Chagpar
CISA, CISM, PMP,
Amazon Web Services, UK, Director
Peter Tessin
CISA, CRISC, CGEIT,
ISACA, USA
Theresa Grafenstine
CISA, CGEIT, CRISC, CPA,
CIA, CGAP, CGMA,
US House of Representatives,
USA, Director
Leonard Ong
CISA, CISM, CGEIT, CRISC, CPP,
CFE, PMP, CIPM,CIPT, CISSP
ISSMP-ISSAP, CSSLP, CITBCM,
GCIA,GCIH, GSNA, GCFA,
Merck & Co., Singapore, Director
Matt Loeb
CGEIT, CAE,
ISACA, USA, Director
Rajaramiyer Venketaramani Raghu
CISA, CRISC,
Versatilist Consulting India, Pvt., Ltd.,
India, Director
Jo Stewart-Rattray
CISA, CISM, CGEIT, CRISC, FACS CP,
BRM Holdich, Australia, Director
Andre Pitkowski
CGEIT, CRISC, OCTAVE,
CRMA, ISO27kLA, ISO31kLA,
APIT Consultoria de Informatica Ltd.,
Brazil, Director
Eddie Schwartz
CISA, CISM, CISSP-ISSEP, PMP,
WhiteOps, USA, Director