Application Control
Application Control
Ali Masjono
Application Control
Communication Control
ROn
Weber,
Inform
ation
10/4/11 4
System
APPLICATION CONTROL
BY NATE LORD ON MONDAY SEPTEMBER 10, 2018
https://digitalguardian.com/blog/what-application-control Page 5
5
APPLICATION CONTROL
BY NATE LORD ON MONDAY SEPTEMBER 10, 2018
Page 6
6
Application Control
by Nate Lord on Monday September 10, 2018
• Completeness checks – controls ensure records processing from initiation to completion
• Validity checks – controls ensure only valid data is input or processed
• Identification – controls ensure unique, irrefutable identification of all users
• Authentication – controls provide an application system authentication mechanism
• Authorization – controls ensure access to the application system by approved business
users only
• Input controls – controls ensure data integrity feeds into the application system from
upstream sources
• Forensic controls – controls ensure scientifically and mathematically correct data, based
on inputs and outputs
Page 7
7
Application Control
by Nate Lord on Monday September 10, 2018
• Simply put, application controls ensure proper coverage and the
confidentiality, integrity, and availability of the application and its
associated data. With the proper application controls, businesses
and organizations greatly reduce the risks and threats associated
with application usage because applications are prevented from
executing if they put the network or sensitive data at risk.
Page 8
8
SECURE YOUR SOFTWARE WITH AN APPLICATION
CONTROL AUDIT.
• An application control audit is designed to ensure that an
application’s transactions and the data it outputs are secure,
accurate and valid. As applications have become the primary attack
vector for malicious individuals seeking to breach enterprise
defenses, the application control audit has become an important
tool in ensuring that software is free from flaws and vulnerabilities
that might be exploited by hackers.
Page 9
9
APPLICATION CONTROL SOFTWARE:
APPLICATION CONTROL AUDIT SOLUTIONS FROM VERACODE.
Page 10
10
APPLICATION CONTROL FRAMEWORK
• Application control involve ensuring that individual
application systems safeguard assets, maintain data
integrity and achieve their objectives effectively and
efficiently
• Pengendalian aplikasi ditujukan untuk meyakinkan bahwa
setiap sistem aplikasi yang digunakan oleh suatu
organisasi dapat menjaga asset, memaintain integritas
data dan dapat mencapai tujuan secara efisien dan
efektif.
ROn
Weber,
Inform
ation
10/4/11 12
System
PERBEDAAN PENGENDALIAN APLIKASI DAN
PENGENDALIAN UMUM
• Pengendalian aplikasi berbeda dengan pengendalian manajemen
dalam beberapa hal berikut ini
• Pengendalian aplikasi melibatkan hardware dan software bukan
SDM
• Pengendalian aplikasi diterapkan pada data dan prosesnya, bukan
pada proses pengembangan, maintenan dan proses operasional
sistem.
• Pengendalian aplikasi ada pada setiap sistem aplikasi dan
berhubungan dengan biaya dan manfaat. Sedangkan pengendalian
manajemen bergantung kepada analisis biaya dan manfaat
terhadap aplikasi secara menyeluruh.
• Pengendalian aplikasi cenderung fokus kepada penjagaan asset
(penjagaan terhadap kemungkinan hilang, pemindahan,
penghancuran) dan memaintain integritas data (meyakinkan
otorisasi penggunaan, lengkap, akurat dan tidak terjadi
pengulangan penyimpanan data)
ROn
Weber,
Inform
ation
10/4/11 13
System
WHY EVALUATE APPLICATION CONTROLS
• External auditors might have conclude that
management controls are reliable, as a result
auditors decided to proceeds to test the controls in
material application system with a view to relying on
these control and reducing extent of substantive
testing.
• Internal auditor, based on an evaluation of
management controls, might wish to test an
hypothesis about the strength or weaknesses in
specific types of controls within the application
system.
ROn
Weber,
Inform
ation
10/4/11 14
System
ASSESSING INFORMATION TECHNOLOGY RISK
Boundary
Comprises the components that establish the interface
between the user and the system.
Input
Comprises the components that capture, prepare and enter
command and data into system
Communication
Comprises the components that transmit data among
subsystem and systems
IS
Constr
ol and
AUdit,
ROn
15 Weber.
9/28/11 15
CISA
ASSESSING INFORMATION TECHNOLOGY RISK
Processing
Comprises the components that perform decision making,
computation, classification, ordering and summarizing of data
in the system
Database
Comprises the components that define, add, access, modify
and delete data in the system.
Output
Comprises the components that retrieve and present data to
users of the system
IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA, 2003 16
9/28/11 16