CISA Exam Prep Domain 2-2019
CISA Exam Prep Domain 2-2019
Domain 2
• IT Governance • IT Management
• IT Governance and IT Strategy • IT Resource Management
• IT-Related Frameworks • IT Service Provider Acquisition and
• IT Standards, Policies, and Procedures Management
• Maturity Models
6
IT Governance and IT Strategy
Enterprise Governance
Value Creation
Accountability Assurance
Resource Utilization
7
Enterprise Governance of Information and Technology (EGIT)
• The purpose of EGIT is to direct IT endeavors to ensure that IT aligns with and supports the
enterprise’s objectives and its realization of promised benefits.
• Additionally, IT should enable the enterprise by exploiting opportunities and maximizing benefits. IT
resources should be used responsibly, and IT-related risk should be managed appropriately.
Outcomes of Effective information Security Governance
IT resource management
Performance measurement
Compliance management
• Focuses on implementing processes that address legal and regulatory policy and
contractual compliance requirements
EGIT Good Practices
3. The need to meet regulatory requirements for IT controls in areas such as privacy and financial
reporting and in specific sectors such as finance, pharmaceuticals and health care
4. The selection of service providers and the management of service outsourcing and acquisition
5. IT governance initiatives that include adoption of control frameworks and good practices to help
monitor and improve critical IT activities to increase business value and reduce business risk
6. The need to optimize costs by following, where possible, standardized rather than specially
developed approaches
8. The need for enterprises to assess how they are performing against generally accepted standards
and their peers
The Role of Audit in EGIT
• In accordance with the define role of the IS auditor, the following aspects of EGIT must be assessed:
13
Effective Information Security Governance
14
Outcomes of Effective Information Security Governance
15
Strategic Planning
16
Business Intelligence
17
BI Data flow Architecture
18
Activity
• In order to maximize the corporate focus on core operations, the CIO is looking to move several
key enterprise application suites to the cloud. These application suites support operations that
cross international boundaries and contain personally identifiable information and intellectual
property.
• When looking at how the corporation addresses confidentiality of data being stored by the cloud
services provider, what are some important governance areas to be considered?
Knowledge
Check An IS auditor is evaluating the IT governance framework of an organization. Which of
1 the following would be the GREATEST concern?
To ensure that the IT governance framework is effectively in place, senior management must be involved and aware
of roles and responsibilities. Therefore, it is most essential to ensure the involvement of senior management when
evaluating the soundness of IT governance.
Knowledge
Check
Which of the following IT governance good practices improves strategic alignment?
2
C. A structure is provided that facilitates the creation and sharing of business information
C. A structure is provided that facilitates the creation and sharing of business information
Top management mediating between the imperatives of business and technology is an IT strategic alignment good
practice.
IT-related Frameworks
24
EGIT Frameworks
• COBIT
• International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC)
27000
26
Standards
• IS auditors should understand that policies are a part of the audit scope and
test the policies for compliance.
• IS controls should flow from the enterprise’s policies and IS auditors should
use policies as a benchmark for evaluating compliance.
Information Security Policy
• A security policy for information and related technology is a first step toward building the security
infrastructure for technology-driven organizations.
• This policy should be used by IS auditors as a reference framework for performing audit
assignments.
• The adequacy and appropriateness of the policy is also an area of review during an IS audit.
Policy Components
• The information security policy may comprise a set of policies, generally addressing the following
concerns:
• Data classification policy — Provides classifications and levels of control at each classification
• End-user computing policy — Identifies the parameters and usage of desktop, mobile and other
tools
• Access control policy — Describes methods for defining and granting access to users of various
IT resources
• Acceptable use policy (AUP) — Controls the use of information system resources through
defining how IT resources may be used by employees
Procedures
• Guidelines should contain information that will be helpful in executing the procedures. Including
clarification of:
32
Activity
IT risk is managed by embedding accountability into the enterprise. The IS auditor should recommend the
implementation of accountability rules to ensure that all responsibilities are defined within the organization. Note
that this question asks for the best recommendation—not about the finding itself.
Knowledge
Check When auditing the onsite archiving process of emails, the IS auditor should pay the
2 MOST attention to:
Without a data retention policy that is aligned to the company’s business and compliance requirements, the email
archive may not preserve and reproduce the correct information when required.
Organizational Structure
38
Organizational Structure
• Organizational structure is a key component to governance. They provide the key decision-
making entities in an enterprise. The following section provides guidance for organizational
structures and roles and responsibilities within EGIT.
• Keep in mind that the actual structure may differ depending on the size, industry and
location of an enterprise.
39
IT Governing Committees
• The IS auditor should know the responsibilities of, authority possessed by and
membership of such committees.
IT Committee Analysis
Board of directors
Executive management
Steering committee
CISO/information security
management
Audit executives
42
IT Organizational Structure and Responsibilities
43
IT Organizational Structure
• The IS auditor should compare observed roles and responsibilities with formal organizational
structures and job descriptions.
IT Functions
• Asset custody
• Authorization capability
• Transaction recording
• If adequate SoD does not exist, the following may occur with a
lower likelihood of detection:
• Misappropriation of assets
• Misstated financial statements
• Inaccurate financial documentation (due to errors or
irregularities)
Audit Trails
Independent Reconciliation
reviews
Supervisory Exception
reviews reporting
Transaction logs
50
Auditing IT Governance Structure and Implementation
52
Activity
D. A disruption of operations
Knowledge
Check An IS auditor reviewing an organization that uses cross-training practices should
1 assess the risk of:
D. A disruption of operations
Cross-training is a process of training more than one individual to perform a specific job or procedure. However, in
using this approach, it is prudent to have first assessed the risk of any person knowing all parts of a system and the
related potential exposures related to abuse of privilege.
Enterprise Architecture
56
Enterprise Architecture
• EA facilitates the understanding of, management of, and planning for IT investments through
comparison of the current state and an optimized future state.
Enterprise Architecture
• Technology-driven EA — Seeks to clarify the complex technology choices faced by an organization in order
to provide guidance on the implementation of various solutions.
• Business-driven EA — Attempts to understand the organization in terms of its core processes, and derive
the optimum mix of technologies needed to support these processes.
Activity
A steering committee consists of representatives from the business and IT and ensures that IT investment is based on
business objectives rather than on IT priorities.
Knowledge
Check
As an outcome of information security governance, strategic alignment provides:
2
Information security governance, when properly implemented, should provide four basic outcomes: strategic
alignment, value delivery, risk management and performance measurement. Strategic alignment provides input for
security requirements driven by enterprise requirements.
Enterprise Risk Management
64
Risk Management
• A fifth response, rejection of risk through choosing to ignore it, is not considered effective risk management.
The presence of this risk response should be a red flag for the IS auditor.
Developing a Risk Management Plan
67
Risk Management Program
• Risk analysis is defined as a process by which frequency and magnitude of IT risk scenarios are estimated.
• Qualitative analysis methods — Descriptive rankings are used to describe risk likelihood and impact.
• Semi-quantitative analysis methods — Descriptive rankings are associated with numeric values.
• Quantitative analysis methods — Numeric values, for example, in the form of financial costs, are used to
describe risk likelihood and impact.
• Each of the three methods offers a perspective on risk, but it is important to acknowledge the assumptions
incorporated into each risk analysis.
Knowledge
Check Which of the following factors should an IS auditor PRIMARILY focus on when
1 determining the appropriate level of protection for an information asset?
The appropriate level of protection for an asset is determined based on the risk associated with the asset. The results
of the risk assessment are, therefore, the primary information that the IS auditor should review.
Knowledge
Check When an organization’s disaster recovery plan (DRP) has a reciprocal agreement,
2 which of the following risk treatment approaches is being applied?
A. Transfer
B. Mitigation
C. Avoidance
D. Acceptance
Knowledge
Check When an organization’s disaster recovery plan (DRP) has a reciprocal agreement,
2 which of the following risk treatment approaches is being applied?
A. Transfer
B. Mitigation
C. Avoidance
D. Acceptance
74
Maturity Models
75
Capability Maturity Model Integration
76
Laws, Regulations and Industry Standards affecting the Organization
77
Governance, Risk and Compliance
• Financial
• Legal
78
Impact of Laws, Regulations and Industry Standards on IS Audit
Communication of procedures
Consistent enforcement
79
IT Resource Management
80
IT Resource Management
81
HR Management
Employee Promotional
Hiring
Handbook Policies
Terms and
Scheduling and
Training Conditions of
Time Reporting
Employment
Performance Termination
Change Management
• The IS budget allows for an adequate allocation of funds and for forecasting, monitoring and
analyzing financial information.
• A “user-pays” scheme can improve application and monitoring of IS expenses and resources.
• In this arrangement, end users are charged for costs of IS services they receive.
• These charges are based on a standard formula and include such IS services as staff time,
computer time and other relevant costs.
Information Security
87
IT Service Provider Acquisition and Management
88
IT Service Function Strategies
89
Outsourcing Practices and Strategies
• Review SLAs
90
Outsourcing Practices and Strategies
• Incorporate service quality expectations, including usage of ISO/IEC 15504 (Software Process
Improvement and Capability Determination [SPICE]), CMMI, ITIL or ISO methodologies.
• Ensure that violation reporting, and follow-up are required by the contract.
• Ensure any requirements for owner notification and cooperation with any investigations.
• Ensure that change/version control and testing requirements are contractually required for the
implementation and production phases.
• Ensure that the parties responsible and the requirements for network controls are adequately
defined and any necessary delineation of these responsibilities established.
• State specific, defined performance parameters that must be met; for example, minimum processing
times for transactions or minimum hold times for contractors.
91
Outsourcing Practices and Strategies
• Ensure that the contract indemnifies the company from damages caused by the organization
responsible for the outsourced services.
• Incorporate clear, unambiguous “right to audit” provisions, providing the right to audit vendor
operations (e.g., access to facilities, access to records, right to make copies, access to personnel,
provision of computerized files) as they relate to the contracted services.
• Ensure that the contract adequately addresses business continuity and disaster recovery provisions,
and appropriate testing.
• Establish that the confidentiality, integrity and availability (sometimes referred to as the CIA triad) of
92 organization-owned data must be maintained, and clearly establish the ownership of the data.
Outsourcing Practices and Strategies
• Require that the vendor comply with all relevant legal and regulatory requirements, including those
enacted after contract initiation
• Establish ownership of intellectual property developed by the vendor on behalf of the customer
• Require that the vendor follow the organization’s policies, including its information
• Follow the organization’s security policy (unless the vendor’s policies have been agreed to in advance
by the organization)
93
• Require the vendor to identify all subcontract relationships and requiring the organization’s approval
to change subcontractors
Globalization Practices and strategies
• The IS auditor can assist in this process by ensuring that IT management considers the following
risk and audit concerns when defining the globalization strategy and completing the subsequent
transition to remote offshore locations:
• Continuity of operations
• Personnel
• Telecommunication issues
94
Outsourcing and Third-party Audit Reports
• Management assertions and how well these address the services being
provided by the service provider
95
Cloud Governance
• Ensure that IT is aligned with the business, systems are secure, and risk is managed is
challenging in any environment and even more complex in a third-party relationship.
• Governance activities such as goal setting, policy and standard development, defining roles
and responsibilities, and managing risk must include special considerations when dealing
with cloud technology and its providers.
• Policies must be modified or developed to address the process of sourcing, managing and
discontinuing the use of cloud services
96
Governance in Outsourcing
• Manage the relationship to ensure that contractual obligations are met through
SLAs and operating level agreements (OLAs).
• Establish clear roles and responsibilities for decision making, issue escalation,
dispute management, demand management and service delivery.
• Monitor • Manage
• Performance levels • Changes to the organization
• Service reports • Changes in the third-party services
• Security incidents • Changes to physical location of service
• Audit trails and records of security events, facilities
operational problems, failures, tracing of • Chang of vendors or subcontractors
faults and disruptions related to the
service delivered
98
IT Performance Monitoring and Reporting
99
IT Performance Monitoring and Reporting
100
Performance Optimization
101
The PDCA Method
Do Act
• Establish • Study results
objectives and from the “Do”
processes needed • Implement the step, looking for • Analyze
to deliver desired plan, collecting deviations from deviations and
results. data for charting desired results. request corrective
and analysis. actions.
Plan Check
Tools and Techniques
Continuous and measurable improvement of quality is the primary requirement to achieve the business objective for
the quality management system (QMS).
IT Balanced Scorecard
• The IT balanced scorecard (BSC) is a management evaluation technique that can be applied to the
EGIT process.
Business Contribution
How does management view the IT
department?
Mission
To obtain a reasonable business
contribution from IT investments
Objectives Cause
Business/IT alignment Effect
Value Delivery
User Orientation Cost management Future Orientation
How do users view the IT department? Risk management How well is IT positioned to meet future
Mission needs?
To be the preferred supplier of Mission
information systems To develop opportunities to answer
Objectives IT BSC future challenges
Preferred supplier of applications and Objectives
operations Training and education of IT staff
Partnership with users Expertise of IT staff
User satisfaction Research into emerging technologies
Operational Excellence
How effective and efficient are the IT
processes?
Mission
To deliver effective and efficient IT
applications and services
Objectives
Efficient and effective developments
Efficient and effective operations
Maturity level of IT processes
Source: ISACA, IT Governance Domain Practices and Competencies: Measuring and Demonstrating the Value of IT, USA, 2005, figure 7
Activity
It is critical that an independent security review of an outsourcing vendor be obtained because customer credit
information will be kept there.
Knowledge
Check
Before implementing an IT balanced scorecard (BSC), an organization must:
2
D. Control IT expenses
Because a BSC is a way to measure performance, a definition of key performance indicators is required before
implementing an IT BSC.
Knowledge
Check
Before implementing an IT balanced scorecard (BSC), an organization must:
2
D. Control IT expenses
Quality Assurance and Quality Management of IT
115
Quality Assurance
116
Quality Management
117
Activity