CISA Student Handout Domain3
CISA Student Handout Domain3
Domain 3
©Copyright 2016 ISACA. All rights reserved. 2 © Copyright 2016 ISACA. All rights reserved.
3 © Copyright 2016 ISACA. All rights reserved. 4 © Copyright 2016 ISACA. All rights reserved.
5 © Copyright 2016 ISACA. All rights reserved. 6 © Copyright 2016 ISACA. All rights reserved.
3.4 Conduct reviews to determine whether a project is 3.6 Evaluate the readiness of information systems for
progressing in accordance with project plans, is implementation and migration into production to
adequately supported by documentation, and has timely determine whether project deliverables, controls and the
and accurate status reporting. requirements are met.
3.5 Evaluate controls for information systems during the 3.7 Conduct post-implementation reviews of systems to
requirements, acquisition, development and testing determine whether project deliverables, controls and the
requirements are met.
standards, procedures and applicable external
requirements.
7 © Copyright 2016 ISACA. All rights reserved. 8 © Copyright 2016 ISACA. All rights reserved.
9 © Copyright 2016 ISACA. All rights reserved. 10 © Copyright 2016 ISACA. All rights reserved.
11 © Copyright 2016 ISACA. All rights reserved. 12 © Copyright 2016 ISACA. All rights reserved.
How does Task 3.1 relate to each of the following How does Task 3.1 relate to each of the following
knowledge statements? knowledge statements?
Knowledge Statement Connection Knowledge Statement Connection
K3.7 Knowledge of enterprise architecture Enterprise architectures are supported or K3.13 Knowledge of project success The IS auditor needs to understand the
related to data, applications and technology served by IT architectures (e.g., n-tier, criteria and project risk specific success criteria for the
(e.g., web-based applications, web client-server, web-based and distributed system/software programs and respective
services, n-tier applications, cloud services, components). The IS auditor must projects and how management is
virtualization) understand the role of these components evaluating progress toward meeting these
and how control objectives are met across criteria along with addressing deficiencies
all components to determine whether risk is that put the program and respective
sufficiently mitigated by these controls. projects at risk.
13 © Copyright 2016 ISACA. All rights reserved. 14 © Copyright 2016 ISACA. All rights reserved.
15 © Copyright 2016 ISACA. All rights reserved. 16 © Copyright 2016 ISACA. All rights reserved.
17 © Copyright 2016 ISACA. All rights reserved. 18 © Copyright 2016 ISACA. All rights reserved.
project.
Report: Actual versus
the planned results Plan: Based upon It is often the first step in a project and normally derives
from a feasibility study.
are reported to senior Understand phase, a
management and plan is developed to
Provide accountability achieve the objectives
for the performance of and outcomes.
the program.
Realize: Progress
toward achieving the
goals is monitored.
Deviations can be
discovered, and
corrective action can
be taken. The plan Source: New South Wales Government
and the business case
Department of Finance & Services,
should be updated
and maintained as Benefits Realisation Guideline, Version 1.2,
changes occur. Australia, 2011
19 © Copyright 2016 ISACA. All rights reserved. 20 © Copyright 2016 ISACA. All rights reserved.
Feasibility Study
Define the project scope. During the feasibility study, the IS auditor should perform
the following:
o Review the documentation for the phase to ensure
Conduct a current analysis.
that it is reasonable.
o Determine whether all cost justifications/benefits are
Identify requirements based on stakeholder needs. verifiable and that they show the anticipated costs
and expected benefits.
Provide a recommended approach. o Identify and determine the criticality of the need.
o Determine if a solution can be achieved with systems
Evaluate the cost-effectiveness of the approach. already in place. If not, review the evaluation of
alternative solutions for reasonableness.
Conduct a formal review with stakeholders.
o Determine the suitability of the chosen solution.
21 © Copyright 2016 ISACA. All rights reserved. 22 © Copyright 2016 ISACA. All rights reserved.
23 © Copyright 2016 ISACA. All rights reserved. 24 © Copyright 2016 ISACA. All rights reserved.
25 © Copyright 2016 ISACA. All rights reserved. 26 © Copyright 2016 ISACA. All rights reserved.
Key Term Definition How does Task 3.2 relate to each of the following
Request for A document distributed to software vendors, knowledge statements?
proposal (RFP) requesting them to submit a proposal to develop or Knowledge Statement Connection
provide a software product. K3.2 Knowledge of IT acquisition and The IS auditor must understand the variety
vendor management practices (e.g., of vendor provided services (commercial
Requirements A technique used in which the affected user groups evaluation and selection process, contract off-the-shelf hardware/software products,
definition define the requirements of the system for meeting management, vendor risk and relationship outsourced services to include cloud
the defined needs. Some of these are business, management, escrow, software licensing), offerings, managed services, etc.).
regulatory and security-related requirements as including third-party outsourcing
relationships, IT suppliers and service
well as development-related requirements. providers
27 © Copyright 2016 ISACA. All rights reserved. 28 © Copyright 2016 ISACA. All rights reserved.
29 © Copyright 2016 ISACA. All rights reserved. 30 © Copyright 2016 ISACA. All rights reserved.
Requirements Definition
Requirements definition should include descriptions of what a In order to successfully complete a requirements definition,
system should do, how users will interact with a system, the project team will complete tasks such as:
conditions under which the system will operate and the o Identify stakeholders.
information criteria the system should meet. o Record requirements in a structured format and consult
with stakeholders.
o Verify requirements are complete, consistent,
unambiguous, verifiable, modifiable, testable and
traceable.
o Detect and correct conflicts.
o Identify any constraints.
o Resolve conflicts.
31 © Copyright 2016 ISACA. All rights reserved. 32 © Copyright 2016 ISACA. All rights reserved.
33 © Copyright 2016 ISACA. All rights reserved. 34 © Copyright 2016 ISACA. All rights reserved.
appropriate.
and design functional
requirements requirements functional concept
architecture
requirements
o Review the RFP to ensure that it covers the items listed and Architecture Architecture Presentation and Architecture Delivery of
documentation.
requirements
35 © Copyright 2016 ISACA. All rights reserved. 36 © Copyright 2016 ISACA. All rights reserved.
Phase
the deliverables, contracts and SLAs. Requirements
statement is produced.
The Big
2. Delivery Time Picture
Develop delivery plan: priorities, goals, key facts,
principles, communication strategies, key indicators,
progress on key tasks and responsibilities. Task 3.2 The IS auditor must
Evaluate IT supplier selection and
understand existing and
3. Installation
contract management processes to
emerging vendor services
and the control needed to
Plan
Develop and review the plan with involved parties. levels and requisite controls are met.
adequately address
associated risks.
Test Plan
requirements specifications, definition of processes
and metrics.
37 © Copyright 2016 ISACA. All rights reserved. 38 © Copyright 2016 ISACA. All rights reserved.
39 © Copyright 2016 ISACA. All rights reserved. 40 © Copyright 2016 ISACA. All rights reserved.
whether business requirements are Project Portfolio The set of projects owned by a company. It usually
includes the main guidelines relative to each
achieved in a cost-effective manner while project, including objectives, costs, time lines and
41 © Copyright 2016 ISACA. All rights reserved. 42 © Copyright 2016 ISACA. All rights reserved.
43 © Copyright 2016 ISACA. All rights reserved. 44 © Copyright 2016 ISACA. All rights reserved.
How does Task 3.3 relate to each of the following How does Task 3.3 relate to each of the following
knowledge statements? knowledge statements?
Knowledge Statement Connection Knowledge Statement Connection
K3.6 Knowledge of requirements analysis The IS auditor must understand the life K3.13 Knowledge of project success The IS auditor needs to understand the
and management practices (e.g., cycle of program, project and unique criteria and project risk specific success criteria for the
requirements verification, traceability, gap system and software development system/software programs and respective
analysis, vulnerability management, requirements. projects.
security requirements)
K3.8 Knowledge of system development
methodologies and tools, including their system/software development
strengths and weaknesses (e.g., agile methodologies and tools enable him or her
development practices, prototyping, rapid to better evaluate the existence and
application development [RAD], effectiveness of critical system
object-oriented design techniques, secure development controls.
coding practices, system version control)
45 © Copyright 2016 ISACA. All rights reserved. 46 © Copyright 2016 ISACA. All rights reserved.
47 © Copyright 2016 ISACA. All rights reserved. 48 © Copyright 2016 ISACA. All rights reserved.
Project Context
When analyzing the context of a project, the IS auditor Understanding the environment and context of the
must consider: projects help to identify:
o Importance of the project in the organization o Common objectives for the organization
o o Risk
the project o Resource connections
o Relationship between the project and other projects
o Connection between the project and the underlying
business case
49 © Copyright 2016 ISACA. All rights reserved. 50 © Copyright 2016 ISACA. All rights reserved.
Quality
assurance
51 © Copyright 2016 ISACA. All rights reserved. 52 © Copyright 2016 ISACA. All rights reserved.
53 © Copyright 2016 ISACA. All rights reserved. 54 © Copyright 2016 ISACA. All rights reserved.
mart
Customer
Serv ices
Online
M easurable
A project needs clearly
defined results that are: A ttainable
WBS Sales
Application
Development
R ealistic
T imely
WP1 Web WP2 Sales
Page Interface
Development Code
Development
55 © Copyright 2016 ISACA. All rights reserved. 56 © Copyright 2016 ISACA. All rights reserved.
Project
System
Management
Deliverables
Deliverables
System
Communication Solution Application Changeover
Infrastructure Requirements Test Cases
Plan Design Development Plan
Setup
Data
Conversion
Scope Plan Conversion
Scripts
Specifications
Schedule
Source: ISACA, CISA Review Manual 26th Edition, figure 3.6 Source: Personas & Tecnicas Multimedia SL copyright 2009. All rights reserved. Used by permission.
57 © Copyright 2016 ISACA. All rights reserved. 58 © Copyright 2016 ISACA. All rights reserved.
59 © Copyright 2016 ISACA. All rights reserved. 60 © Copyright 2016 ISACA. All rights reserved.
61 © Copyright 2016 ISACA. All rights reserved. 62 © Copyright 2016 ISACA. All rights reserved.
Conduct reviews to determine whether a introduced in one CASE chart will update all other related charts
automatically. CASE can be installed on a microcomputer for
63 © Copyright 2016 ISACA. All rights reserved. 64 © Copyright 2016 ISACA. All rights reserved.
65 © Copyright 2016 ISACA. All rights reserved. 66 © Copyright 2016 ISACA. All rights reserved.
Project Planning
How does Task 3.4 relate to each of the following When planning a project, the project manager needs to
knowledge statements? determine the various tasks to be performed, as well as
Knowledge Statement Connection the following:
K3.8 Knowledge of system development o Task sequence
methodologies and tools, including their differing methodologies enables
strengths and weaknesses (e.g., agile them to better evaluate the existence and o Task duration
development practices, prototyping, rapid effectiveness of critical system
application development [RAD], development controls with each o Task priority
object-oriented design techniques, secure
coding practices, system version control)
methodology.
o Task budget
K3.13 Knowledge of project success The IS auditor needs to evaluate the o Task resources
criteria and project risk specific success criteria for the
system/software programs and respective During project execution, the project manager must
projects and how management is control the scope, resource usage and risk.
evaluating progress toward meeting these
criteria along with addressing deficiencies
that put the program and respective
projects at risk.
67 © Copyright 2016 ISACA. All rights reserved. 68 © Copyright 2016 ISACA. All rights reserved.
Software Size This method determines the relative physical size of the application
Estimation software. Critical Path This method lays out project activities as a network of branches and
Methodology calculates the longest path of planned activities to determine the shortest
possible completion.
Function Point FPA measures the size of an information system based on the number and
Analysis complexity of the inputs, outputs, files, interfaces and queries. Gantt Charts This tool charts when an activity should begin and when it should end.
Cost Budgets This method estimates work effort, including personnel hours, machine
hours and other external costs, and multiplies the effort by the hourly rate. Program PERT uses three different estimates of each activity duration and then
Evaluation applies a CPM algorithm to reduce it to a single number.
Review Technique
Software Cost This tool defines all cost drivers and then develops a cost estimate of the
Estimation system and total project. Timebox This technique defines software deliverables that have short and fixed
Management timeframes.
69 © Copyright 2016 ISACA. All rights reserved. 70 © Copyright 2016 ISACA. All rights reserved.
SDLC
SDLC critical success factors include:
o Productivity
Phase 1 Feasibility Study
Phase 6
Postimplementation
71 © Copyright 2016 ISACA. All rights reserved. 72 © Copyright 2016 ISACA. All rights reserved.
73 © Copyright 2016 ISACA. All rights reserved. 74 © Copyright 2016 ISACA. All rights reserved.
o Organization- objective is to o
o
E-commerce
Electronic data interchange
collect, collate, store, archive and share information o Email
with business users and various applicable support o Point-of-sale (POS) systems
functions. o
o
Electronic banking and electronic finance
Payment systems and electronic funds transfer (EFT)
o End-user- The objective is to o Automated teller machines (ATM)
provide different views of data for their performance o Purchase accounting systems
o Integrated manufacturing systems
optimization. o Industrial control systems (ICS)
o Interactive voice response (IVR)
o Image processing
o Artificial intelligence (AI) and business intelligence systems
o Decision support system (DSS)
o Customer relationship management (CRM)
o Supply chain management (SCM)
75 © Copyright 2016 ISACA. All rights reserved. 76 © Copyright 2016 ISACA. All rights reserved.
Development Methods
Agile Development Prototyping Development
A family of similar development processes that espouse a The process of quickly putting together a working model (a
nontraditional way of developing complex systems. These prototype) in order to test various aspects of a design, illustrate
ideas or features and gather early user feedback. Prototyping
flexibly handle changes to the system being developed or the uses programmed simulation techniques to represent a model
project that is performing the development. of the final system to the user for advisement and critique. The
emphasis is on end-user screens and reports. Internal controls
are not a priority item since this is only a model.
Rapid Application Development (RAD)
A methodology that enables enterprises to develop strategically
important systems faster, while reducing development costs
and maintaining quality by using a series of proven application
development techniques, within a well-defined methodology.
77 © Copyright 2016 ISACA. All rights reserved. 78 © Copyright 2016 ISACA. All rights reserved.
79 © Copyright 2016 ISACA. All rights reserved. 80 © Copyright 2016 ISACA. All rights reserved.
81 © Copyright 2016 ISACA. All rights reserved. 82 © Copyright 2016 ISACA. All rights reserved.
Fourth-generation languages (4GLs) During the design and development phases, the IS auditor should do
the following:
languages that are environmentally independent and
o Review the system flowcharts for adherence to the general design.
have simple language subsets and a workbench
o Verify that appropriate approvals were obtained for any changes.
approach.
o Review the input, processing and output controls designed into the
system for appropriateness.
o Interview the key users to determine their understanding of how the
system will operate.
o Assess the adequacy of audit trails to provide traceability and
accountability of system transactions.
o Verify the integrity of key calculations and processes.
o Verify that the system can identify and process erroneous data
correctly.
o Review the quality assurance results.
o Verify that all recommended corrections were made.
83 © Copyright 2016 ISACA. All rights reserved. 84 © Copyright 2016 ISACA. All rights reserved.
85 © Copyright 2016 ISACA. All rights reserved. 86 © Copyright 2016 ISACA. All rights reserved.
Key Term Definition How does Task 3.5 relate to each of the following
Application The policies, procedures and activities designed to knowledge statements?
controls provide reasonable assurance that objectives Knowledge Statement Connection
relevant to a given automated solution (application) K3.2 Knowledge of IT acquisition and Identify key controls required to mitigate
are achieved vendor management practices (e.g., risks associated with vendor evaluation and
evaluation and selection process, contract selection processes and terms and
Input control Techniques and procedures used to verify, validate management, vendor risk and relationship conditions within vendor contracts.
and edit data to ensure that only correct data are management, escrow, software licensing),
entered into the computer including third-party outsourcing
relationships, IT suppliers and service
providers
K3.4 Knowledge of project management The acquisition process keys upon
control frameworks, practices and tools proactive and responsive project
management practices and tools ensuring
the services and material are acquired to
meet project goals and objectives.
89 © Copyright 2016 ISACA. All rights reserved. 90 © Copyright 2016 ISACA. All rights reserved.
Task to Knowledge
How does Task 3.5 relate to each of the following How does Task 3.5 relate to each of the following
knowledge statements? knowledge statements?
Knowledge Statement Connection Knowledge Statement Connection
K3.5 Knowledge of risk management Through focused and integrated risk K3.7 Knowledge of enterprise architecture Based on the defined system
practices applied to projects management analysis, the IS auditor can related to data, applications and technology requirements, the project team must then
proactively identify issues that can (e.g., web-based applications, web translate these requirements into defined
negatively impact a project. services, n-tier applications, cloud services, system architectures. The IS auditor must
K3.6 Knowledge of requirements analysis Failure to accurately and completely virtualization) understand how the requirements map to
and management practices (e.g., document all applicable technical, the resultant architectures and that the
requirements verification, traceability, gap operational and functional requirements will selected architecture is properly selected.
analysis, vulnerability management, lead to project delays, overruns and even K3.8 Knowledge of system development The project team needs to select the
security requirements) failure. methodologies and tools, including their correct system development method based
strengths and weaknesses (e.g., agile on system complexity and the need to
development practices, prototyping, rapid implement new systems more quickly to
application development [RAD], object- achieve benefits before the business
oriented design techniques, secure coding changes.
practices, system version control)
91 © Copyright 2016 ISACA. All rights reserved. 92 © Copyright 2016 ISACA. All rights reserved.
How does Task 3.5 relate to each of the following How does Task 3.5 relate to each of the following
knowledge statements? knowledge statements?
Knowledge Statement Connection Knowledge Statement Connection
K3.9 Knowledge of control objectives and For each phase of the system development K3.11 Knowledge of configuration and Project management must establish
techniques that ensure the completeness, project, specific control objectives must be release management relating to the configuration management processes from
accuracy, validity, and authorization of documented and a control mechanism in development of information systems the very start through post-implementation
transactions and data place for project success. IS auditors are turnover to operations and the subsequent
the control engineers based on their deep system upgrades and decommissioning.
understanding of risk management K3.12 Knowledge of system migration and The project team must plan and develop
practices. infrastructure deployment practices and the tools and processes for migrating new,
K3.10 Knowledge of testing methodologies The project team must plan, develop and data conversion tools, techniques and upgraded and modified systems to ensure
and practices related to the information complete appropriate testing in order to procedures desired system functionality is retained
system development life cycle (SDLC) confirm that all documented system throughout these activities.
requirements are met.
93 © Copyright 2016 ISACA. All rights reserved. 94 © Copyright 2016 ISACA. All rights reserved.
95 © Copyright 2016 ISACA. All rights reserved. 96 © Copyright 2016 ISACA. All rights reserved.
updated in a computer
system.
o Processing accomplishes
the correct task. Application
o Processing results
Controls
meet expectations.
o Data are maintained.
Output Processing
97 © Copyright 2016 ISACA. All rights reserved. 98 © Copyright 2016 ISACA. All rights reserved.
Input authorization verifies that all transactions have Batch controls and balancing group input transactions to
been authorized and approved by management. Types provide control totals. Types of batch controls and
of authorization include: balances include:
o Signatures on batch forms or source documents o Total monetary amount
o Online access controls o Total items
o Unique passwords o Total documents
o Terminal or client workstation identification o Hash totals
o Source documents o Batch registers
o Control accounts
o Computer agreements
99 © Copyright 2016 ISACA. All rights reserved. 100 © Copyright 2016 ISACA. All rights reserved.
Processing Controls
Input error handling verifies that only correct data is Processing procedures and controls are meant to ensure
accepted into a system. It can be processed by the the reliability of application program processing.
following:
o Rejecting only transactions with errors
o Rejecting the whole batch of transactions
o Holding the batch in suspense
o Accepting the batch and flagging error transactions
101 © Copyright 2016 ISACA. All rights reserved. 102 © Copyright 2016 ISACA. All rights reserved.
Data validation and editing procedures ensure that input data Processing controls are meant to ensure the
are validated and edited as close to the time and point of
origination as possible. completeness and accuracy of accumulated data.
o Sequence check o Manual recalculations
o Limit check o Editing
o Range check
o Validity check o Run-to-run totals
o Reasonableness check o Programmed controls
o Table lookups o Reasonableness verification of calculated amounts
o Existence check
o Key verification o Limit checks on amounts
o Check digit o Reconciliation of file totals
o Completeness check o Exception reports
o Duplicate check
o Logical relationship check
103 © Copyright 2016 ISACA. All rights reserved. 104 © Copyright 2016 ISACA. All rights reserved.
Output Controls
Data file controls ensure that only authorized processing
occurs to stored data.
o Before and after image reporting Logging and storage of negotiable, sensitive
Output controls
o Maintenance error reporting and handling provide
and critical forms in a secure place
Computer generation of negotiable
o Source documentation retention assurance that instruments, forms and signatures
o Internal and external labeling the data delivered Report accuracy, completeness and
to users will be timeliness
o Version usage
presented, Reports generated from the system
o Data file security formatted and Report distribution
Balancing and reconciling
o One-for-one checking delivered in a Output error handling
o Prerecorded input consistent and Output report retention
secure manner.
o Transaction logs Verification of receipt of reports
109 © Copyright 2016 ISACA. All rights reserved. 110 © Copyright 2016 ISACA. All rights reserved.
111 © Copyright 2016 ISACA. All rights reserved. 112 © Copyright 2016 ISACA. All rights reserved.
113 © Copyright 2016 ISACA. All rights reserved. 114 © Copyright 2016 ISACA. All rights reserved.
Key Terms
Key Term Definition Key Term Definition
Quality assurance A planned and systematic pattern of all actions Test data Simulated transactions that can be used to test
(QA) necessary to provide adequate confidence that an item processing logic, computations and controls actually
or product conforms to established technical programmed in computer applications. Individual
requirements (ISO/IEC 24765). programs or an entire system can be tested. This
System testing Testing conducted on a complete, integrated system to technique includes integrated test facilities (ITFs) and
base case system evaluations (BCSEs).
requirements. System test procedures typically are Test programs Programs that are tested and evaluated before approval
performed by the system maintenance staff in their into the production environment. Test programs, through
development library. a series of change control moves, migrate from the test
environment to the production environment and become
production programs.
115 © Copyright 2016 ISACA. All rights reserved. 116 © Copyright 2016 ISACA. All rights reserved.
117 © Copyright 2016 ISACA. All rights reserved. 118 © Copyright 2016 ISACA. All rights reserved.
How does Task 3.6 relate to each of the following How does Task 3.6 relate to each of the following
knowledge statements? knowledge statements?
Knowledge Statement Connection Knowledge Statement Connection
K3.10 Knowledge of testing methodologies Based on the testing methods applied, K3.12 Knowledge of system migration and One critical project management decision
and practices related to the information testing content and delivery schedules will infrastructure deployment practices and involves the method selected for migrating
system development life cycle (SDLC) differ, and the IS auditor must be able to data conversion tools, techniques and the completed system into the production
determine the timing and specific testing procedures environment. This is based on size,
that needs to be completed prior to system complexity and business-driven
go-live. requirements.
K3.11 Knowledge of configuration and Maintaining an accurate and complete K3.13 Knowledge of project success Through the use of establishing KPIs
release management relating to the hardware, software and process baseline is criteria and project risk related to system requirements, at the start
development of information systems critical to ensure the system not only is of the project the project management
ready for migration to production office can use these as the benchmark to
operations but can also be maintained over determine project success.
its product life.
119 © Copyright 2016 ISACA. All rights reserved. 120 © Copyright 2016 ISACA. All rights reserved.
o System testing
work downward to individual units. A series of tests designed to ensure that modified programs, objects, database
schema, etc., which collectively constitute a new or modified system, function
properly
Final acceptance testing
System testing that takes place during the implementation phase and applies the
121 © Copyright 2016 ISACA. All rights reserved. 122 © Copyright 2016 ISACA. All rights reserved.
123 © Copyright 2016 ISACA. All rights reserved. 124 © Copyright 2016 ISACA. All rights reserved.
attempts.
125 © Copyright 2016 ISACA. All rights reserved. 126 © Copyright 2016 ISACA. All rights reserved.
examine accuracy, completeness, consistency and o Review the test plan, error reports, end user documentation and procedures
used for completeness and accuracy.
authorization of data presently held in a system. Two o Reconcile control totals and converted data.
common types include: o Verify cyclical processing and critical reports for accuracy.
o Relational integrity o Interview end users of the system for their understanding of new methods,
procedures and operating instructions.
performed at the data element and record-based o Verify that system security is functioning as designed.
levels. o Review parallel testing results and the user acceptance testing.
o Referential integrity Define existence o Review unit and system test plans to determine whether tests for internal
controls are planned and performed.
relationships between entities in different tables of a o Review the user acceptance testing and ensure that the accepted software
database that needs to be maintained by the DBMS. has been delivered to the implementation team. The vendor should not be
able to replace this version.
o Review procedures used for recording and following through on error
reports.
127 © Copyright 2016 ISACA. All rights reserved. 128 © Copyright 2016 ISACA. All rights reserved.
129 © Copyright 2016 ISACA. All rights reserved. 130 © Copyright 2016 ISACA. All rights reserved.
131 © Copyright 2016 ISACA. All rights reserved. 132 © Copyright 2016 ISACA. All rights reserved.
133 © Copyright 2016 ISACA. All rights reserved. 134 © Copyright 2016 ISACA. All rights reserved.
How does Task 3.7 relate to each of the following How does Task 3.7 relate to each of the following
knowledge statements? knowledge statements?
Knowledge Statement Connection Knowledge Statement Connection
K3.10 Knowledge of testing methodologies Review evidence (test plans and test K3.14 Knowledge of post-implementation
and practices related to the information results) to ensure that procedures are review objectives and practices (e.g., requirements were achieved. Careful
system development life cycle (SDLC) carried out as prescribed by organizational project closure, control implementation,
standards. benefits realization, performance utilization, trouble tickets, work orders and
K3.13 Knowledge of project success Based on established project KPIs being measurement) overall satisfaction with the system. This
criteria and project risk
objectives, the IS auditor can use under objectives and requirements were
performance of project KPIs to correlate to achieved.
higher project risk.
135 © Copyright 2016 ISACA. All rights reserved. 136 © Copyright 2016 ISACA. All rights reserved.
137 © Copyright 2016 ISACA. All rights reserved. 138 © Copyright 2016 ISACA. All rights reserved.
Post-implementation
During the implementation phase, the IS auditor should Post-implementation reviews are typically conducted
perform the following: after the project has been in use long enough to realize
o Verify appropriate sign-offs have been obtained. its business benefits and costs and to measure the
o Review the programmed procedures used for
scheduling and running the system. units.
o Review all system documentation to ensure its Metrics include:
completeness. o Total cost of ownership (TCO)
o Verify all data conversion to ensure that they are o Return on investment (ROI)
correct and complete.
139 © Copyright 2016 ISACA. All rights reserved. 140 © Copyright 2016 ISACA. All rights reserved.
141 © Copyright 2016 ISACA. All rights reserved. 142 © Copyright 2016 ISACA. All rights reserved.
143 © Copyright 2016 ISACA. All rights reserved. 144 © Copyright 2016 ISACA. All rights reserved.
Change Management
Change management is a process to document and A change management process should include the
authorize any change requests. procedures for the following:
Change requests are initiated from the end user, o A formal change request process
operational staff, and system development and o Documentation
maintenance staff. o Testing of changes
o Emergency changes
o Deploying changes into production
o Handling unauthorized changes
145 © Copyright 2016 ISACA. All rights reserved. 146 © Copyright 2016 ISACA. All rights reserved.
Configuration Management
Configuration management uses change management The IS auditor should review the change management
processes along with checkpoints, reviews and sign-off process for possible improvements in the following:
procedures. o Change request methodology and procedures
o Response time and response effectiveness
Develop the Baseline Analyze and Develop o User satisfaction
o Security access restrictions
configuration applicable report on the configuration
management plan. components. results. status reports.
o Emergency procedures
o Acknowledgement and resolution of items on the
change control log
Update the
Perform
configuration Develop release
configuration
status accounting procedures.
control activities.
database.
147 © Copyright 2016 ISACA. All rights reserved. 148 © Copyright 2016 ISACA. All rights reserved.
149 © Copyright 2016 ISACA. All rights reserved. 150 © Copyright 2016 ISACA. All rights reserved.
151 © Copyright 2016 ISACA. All rights reserved. 152 © Copyright 2016 ISACA. All rights reserved.
153 © Copyright 2016 ISACA. All rights reserved. 154 © Copyright 2016 ISACA. All rights reserved.
155 © Copyright 2016 ISACA. All rights reserved. 156 © Copyright 2016 ISACA. All rights reserved.