Application Controls Audit Work Program
Application Controls Audit Work Program
SAMPLE 1
Planning
Fieldwork
Five areas should be considered for all financial end-user developed applications. These include:
• Change Control
• Version Control
• Access Control
• Input Control
• Security and Integrity of Data
Furthermore, for high complexity documents, the following items should also be considered:
• Documentation
• Development Life Cycle
• Backups
• Archiving
• Logic Inspection
• Segregation of Duties/Roles and Procedures
• Overall Analytics
Depending on the complexity, one of the following audit programs should be used:
2 Source: www.knowledgeleader.com
FOR MICROSOFT OFFICE DOCUMENTS
Change Controls
Version Controls
Access Controls
Verify that the policy appropriately covers access control (see Change
Control – in well-controlled environments, these controls should be the
same).
Input Controls
Verify that the policy appropriately covers input control (see Change
Control – in well-controlled environments, these controls should be the
same).
Verify that the policy appropriately covers the security and integrity of
data. An example of appropriate controls is:
• An independent party verifies the data entered in the document
against the source documents (e.g., the spreadsheet matches the
JDE report).
Review
Review the applications where they reside on the network and verify that
the documents comply with the policies.
3 Source: www.knowledgeleader.com
FOR SQL OR OTHER IN-HOUSE DEVELOPED APPLICATIONS
Change Controls
Version Controls
Access Controls
Input Controls
Verify that the policy appropriately covers the security and integrity of
data (see Access and Input Control above).
Review
Review the applications where they reside on the network and verify that
they comply with the policies.
4 Source: www.knowledgeleader.com
FOR OUT-OF-THE-BOX APPLICATIONS:
Change Controls
Version Controls
Access Controls
Input Controls
Verify that the policy appropriately covers the security and integrity of
data (see Access and Input Control above).
Review
Review the applications where they reside on the network and verify that
they comply with the policies.
5 Source: www.knowledgeleader.com
APPLICATION CONTROLS AUDIT WORK PROGRAM:
SAMPLE 2
This sample work program covers various application controls necessary to support the business, focusing
primarily on access and change controls.
Change Control
Verify that the policy requires significant report changes and new reports
are appropriately tested by the requester. Appropriate control is:
• Users test through re-performance significant changes to existing
reports and newly created significant reports upon completion. Users
respond with changes or authorization that no changes are necessary.
Access Controls
6 Source: www.knowledgeleader.com
Time Project Work Step Initial WP Ref.
Input Controls
Verify that manual input controls are in place and followed. Examples of
appropriate controls are:
• An independent party verifies inputs against source documents.
• An independent party reviews monitoring reports and verifies check
figures against independent information.
Application Management
7 Source: www.knowledgeleader.com