AUI3703 Exam Notes
AUI3703 Exam Notes
Topic 1: International Standards for the Professional Practice of Internal Auditing (IPPF)
Mandatory:
The Definition of Internal Auditing
The Code of Ethics
The International Standards for the Professional Practice of Internal Auditing
Strongly recommended guidance:
Practice Advisories (Implementation Guidance)
Practice Guides (Supplemental Guidance, guidance on internal audit tools and techniques)
Position papers
Assurance services
Traditional auditing services at various levels such as compliance, investigating & testing,
performance evaluation
Assurance services involve the internal auditor's objective assessment of evidence to provide an
independent opinion or conclusions regarding an entity, operation, function, process, system, or other
subject matter. The nature and scope of the assurance engagement are determined by the internal
auditor. There are generally three parties involved in assurance services: (1) the person or group
directly involved with the entity, operation, function, process, system, or other subject matter – the
process owner, (2) the person or group making the assessment – the internal auditor, and (3) the
person or group using the assessment – the user.
EXAMPLES:
• The assessment that management's policies and procedures are adhered to.
• Examining whether control procedures are mitigating the risks identified.
Consulting services:
Objective is to support management in achieving their objectives
Consulting services are advisory in nature, and are generally performed at the specific request of an
engagement client. The nature and scope of the consulting engagement are subject to agreement with
the engagement client. Consulting services generally involve two parties: (1) the person or group
offering the advice – the internal auditor, and (2) the person or group seeking and receiving the advice
– the engagement client. When performing consulting services the internal auditor should maintain
objectivity and not assume management responsibility.
EXAMPLES:
Conducting control self-assessment training.
Providing advice to management on risk management, control and governance issues.
Assisting in developing and drafting policies.
Process development
Training
Provision of advice
Principles – Code Of Ethics
1
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Internal auditors are expected to apply and uphold the following four principles:
1. Integrity The integrity of internal auditors establishes trust and thus provides the basis for reliance
on their judgment.
2. Objectivity Internal auditors exhibit the highest level of professional objectivity in gathering,
evaluating, and communicating information about the activity or process being examined. Internal
auditors make a balanced assessment of all the relevant circumstances and are not unduly influenced
by their own interests or by others in forming judgments.
3. Confidentiality Internal auditors respect the value and ownership of information they receive and do
not disclose information without appropriate authority unless there is a legal or professional obligation
to do so.
4. Competency Internal auditors apply the knowledge, skills, and experience needed in the
performance of internal audit services.
2. Objectivity
Internal auditors:
2.1. Shall not participate in any activity or relationship that may impair or be presumed to impair their
unbiased assessment. This participation includes those activities or relationships that may be in
conflict with the interests of the organisation.
2.2. Shall not accept anything that may impair or be presumed to impair their professional judgment.
2.3. Shall disclose all material facts known to them that, if not disclosed, may distort the reporting of
activities under review.
3. Confidentiality
Internal auditors:
3.1. Shall be prudent in the use and protection of information acquired in the course of their duties.
3.2. Shall not use information for any personal gain or in any manner that would be contrary to the law
or detrimental to the legitimate and ethical objectives of the organisation.
4. Competency
Internal auditors:
4.1. Shall engage only in those services for which they have the necessary knowledge, skills, and
experience.
4.2. Shall perform internal audit services in accordance with the International Standards for the
Professional Practice of Internal Auditing (Standards).
4.3. Shall continually improve their proficiency and the effectiveness and quality of their services.
2
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
3
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
4
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
5
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
6
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Reider’s definition
Operational or performance auditing is an audit of operations performed from a management
viewpoint to evaluate the economy, efficiency, and effectiveness of any and all operations, limited only
by management's desires.
7
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Effectiveness is the extent to which an activity achieves its stated performance objectives.
Effectiveness amounts to doing the right things. Doing the right things is about performing the right
activities to achieve a performance objective. If you perform the right activities, you will achieve the
performance objective and be effective. Improving effectiveness, will improve organisational
performance.
Effectiveness – the relationship between actual outputs and planned outputs
Results of operation.
Efficiency is the extent to which a process or activity has been optimised such that, all other things
remaining constant,
• its output has been maximised for a given amount of input, or
• its input has been minimised for a given amount of output
Efficiency – the relationship between actual inputs and actual outputs
At least cost without sacrificing results.
Method of operation.
Economy is the extent to which an organisation, unit or activity gets the right quantity and quality of a
resource at the right time and best possible price.
Economy – the relationship between planned inputs and actual inputs in terms of unit costs
Without sacrificing efficiency and results.
8
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
people or technology
9
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
10
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
11
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Definition of Fraud
Fraud is the unlawful and intentional making of a misrepresentation which causes actual prejudice or
which is potentially prejudicial.
Elements of the crime
The elements of the crime are
(1)misrepresentation
(2) which causes or may cause prejudice, and which is
(3) unlawful and
(4) intentional
Fraud Triangle
Perceived need (Pressure)
Perceived opportunity
Rationalization
Red Flags
Exhibit a lifestyle that appears to be well beyond their current means
Have an unusual propensity to spend money
Are experiencing extreme financial problems and/or have overwhelming personal debts
Are suffering from depression or other emotional problems
Appear to have a gambling obsession
Have a need or craving for status and believe money can buy that status
12
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Fraud prevention
Organisational awareness
Performing background investigations
Providing anti fraud training
Evaluating performance and compensation programs
Conducting exit interviews
Authority limits
Transactional level procedures
Fraud detection
Whistleblower hotlines
Process controls
Proactive fraud detection procedures
13
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Differences between the objectives of a fraud investigation and the objectives of other internal
auditing projects
Internal Auditing project Fraud investigation
Looking for symptoms that indicate that Looking for evidence supporting an identified
problems may exist. irregularity.
Looking for weaknesses in the system, or Determining the particulars of the irregularity.
susceptibility of the system to problems.
Making recommendations for improving Quantifying the loss or scope of the problem and
efficiency, economy and effectiveness. the period in which it took place, the method used
and the people involved.
Reassuring management. Acting as a gatherer of information and evidence.
Emphasising compliance with developed
procedures and controls and improving them.
14
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
the case
The analysis of the evidence gathered to form a professional opinion
The conclusion; findings and recommendations
15
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
16
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
17
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
18
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Definition of risk
The uncertain event that could influence the achievement of the organisational objectives.
Computer Risk
Inherent risk - is the likelihood of a significant loss occurring before taking into account any risk-
reducing factors.
Control risk - is the likelihood that the control processes established to limit or manage inherent
risk are ineffective.
Detection risk - is the risk that if a material problem that would affect the conclusion pertaining to
an audit objective has occurred, the auditors will not find it.
This might arise because entries and activities are not fully examined.
Audit risk - is the risk that audit coverage will not address significant business exposures.
Audit risk consists of three components, namely inherent risk, control risk and detection risk.
Top 10 Technology Risks issued as identified by the IIA advanced technology committee
1. Legislation and Regulatory Compliance
2. Threat / vulnerability management (Application exploits, viruses, Trojans, worms etc)
3. Privacy (including identity protection)
4. Continuous monitoring / auditing / assurance
5. Wireless security
6. Intrusion protection ( firewalls, monitoring, analysis etc)
7. IT Outsourcing
8. Enterprise security metrics (dashboards, scorecards, analytics etc)
9. Identity management
19
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Opportunities enabled by IT
o ERP (enterprise resource planning)
- Integration of business processes using a single operating database
- Online real-time processing of transactions
- Seamless interaction and sharing of information among functional areas
- Improved process performance
- Elimination of data redundancy and errors
- Timely decision making
o EDI (electronic data interchange)
- Transaction processing efficiency
- Fewer data processing errors
Control Activities
Within the IT environment management should ensure that:
systems function as planned;
that data integrity is maintained;
information and data are confidential;
that systems and information are available when needed;
data is accurate, complete and valid; and
access to systems and programs are only granted to authorised users.
Internal controls
It is the task of management, and not the auditor, to design and implement effective internal control
systems in order to manage business risks and ensure that attention is paid to all aspects of control.
The elements of management:
planning
organising
directing
controlling
Internal control is defined as the process designed and effected by those charged with governance, by
management, and by other personnel to provide reasonable assurance about the achievement of
organisational objectives regarding the following three categories:
the reliability and integrity of financial reporting
the effectiveness and efficiency of operations
compliance with applicable laws and regulations
Internal control in a computer environment is achieved by implementing and maintaining general
controls and application controls.
20
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
IT Governance: The leaderships, structure and oversight processes that ensure the organisation’s IT
supports the objectives and strategies of the organisation.
IT Management controls
Provides assurance that the organisation is structured with clearly defined lines of reporting and
responsibility and has implemented effective control processes
IT controls at management level comprise standards, organisation and management, and physical and
environmental controls.
Standards should cover:
o Systems development processes
o System software configuration
o Application controls
o Data structures
o Documentation
Aspects of IT Management controls
o Segregation of duties
o Financial controls
o Change management controls
21
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
IT Technical controls
Specific to the technologies in use within the organisations IT infrastructures
System software controls
o Access rights allocated and controlled according to the organisation’s stated policy
o Division of duties enforced through system software and other configuration controls
o Intrusion and vulnerability assessment, prevention, detection in place and continuously monitored
o Intrusion testing performed on a regular basis
o Encryption services applied where confidentiality is a stated requirement
o Change management process
o System development and acquisition control
o Application based controls (validation)
- Input controls
- Processing controls
- Output controls
- Integrity controls
- Management trail
22
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
When an auditor first considers using CAATS in carrying out the audit process, the first step is to
attend to the following factors:
the computer knowledge, expertise and experience required to use CAATS
the availability of suitable CAATS and suitable computer facilities
whether it would be impractical to use ordinary (noncomputer assisted) audit techniques
whether the effectiveness and efficiency of the audit process would be increased if CAATS were
used
the timing for the execution of CAATS
the auditing software that will be used
23
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Examining records for inconsistencies, inaccuracies and missing data and creating reports.
Audit plan
The audit plan should be reviewed to ensure that optimum use is made of the available audit software.
Appropriate resources should be available to support the audit plan.
Attention should be paid to the following aspects:
need for continuity of staff on each audit to ensure that the use of audit software increases
over time
experience of scheduled audit staff in the use of audit software
training requirements for audit staff before the fieldwork begins
need for, and timing of, technical support
specialised hardware or software required to access the auditee’s data
need for auditees to retain data necessary for the audit and to ensure that the auditor is made
aware of changes in, for example file structures and content
The failure to plan adequately for the use of CAATS can result in
cost and time overruns
arriving at the wrong audit conclusion
failure to achieve the desired objective of the test
significant frustration to both the auditor and the auditee
24
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
25
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
26
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
For identities to become part of the identity and access management system there are three stages
that need to be followed, namely:
• Provisioning. Request, validate, approve, propagate and communicate the process. This should be in
line with the security policy.
• Identity management. Monitor and manage passwords, audit and reconcile, administer policies and
strategise or manage systems.
• Enforce: authenticate, authorise and log activities.
Encryption
Data that are communicated between two computers or other devices should be secured against
eavesdropping or even manipulation.
One way to ensure the security of data is to use encryption.
Cryptography is the name given to the use of mathematical algorithms to transform data. Its
primary use is the protection of information.
Encryption is a technique for turning messages into unreadable codes by scrambling up the data
in such a way that the legitimate recipient can unscramble or “decrypt” the message easily, but an
unauthorised recipient would only see garbage.
The auditor needs to test the following:
o That secure socket layer (SSL) communication protocol is used to secure sensitive
information as it makes use of a two-key encryption standard.
o That public key infrastructure (PKI) is utilised in conjunction with SSL.
27
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
28
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Assurance services
the assessment that management’s policies and procedures are adhered to
examining whether control procedures are mitigating the risks identified
The internal audit activity must evaluate risk exposures relating to the organisation’s governance,
operations and information systems regarding the:
o Reliability and integrity of financial and operational information.
o Effectiveness and efficiency of operations and programs.
o Safeguarding of assets and
o Compliance with laws, regulations, policies, procedures and contracts.
Consulting services
conducting control self-assessment training
providing advice to management on risk management, control and governance issues
assisting in developing and drafting policies
In terms of standard 2120 on risk management and consulting services:
2120.C1 – During consulting engagements, internal auditors must address risk consistent with the
engagement’s objectives and be alert to the existence of other significant risks.
2120.C2 – Internal auditors must incorporate knowledge of risks gained from consulting
engagements into their evaluation of the organisation’s risk management processes.
2120.C3 – When assisting management in establishing or improving risk management processes,
internal auditors must refrain from assuming any management responsibility by actually managing
risks.
29
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
30
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
Quality of communications
Accurate – communication is free from errors and distortions and are faithful to the underlying
facts
Objective – communications are fair, impartial and unbiased and are the result of a fair-minded
and balanced assessment of all relevant facts and circumstances
Clear – communications are easily understood and logical, avoiding unnecessary technical
language and providing all significant and relevant information.
Concise – communications are to the point and avoid unnecessary elaboration, superfluous detail,
redundancy and wordiness
Constructive – communications are helpful to the engagement client and the organisation and
lead to improvement where needed.
Complete – communications lack nothing that is essential to the target audience and include all
significant and relevant information and observations to support recommendations and
conclusions
Timely – communications are opportune and expedient, depending on the significance of the
issue, allowing management to take appropriate corrective action.
31
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
32
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
33
AUI3703 The Internal Audit Process: Specific Audit Assignments and reporting 2016
34