CIA17 CIA1 BookOnline SU3 Outline
CIA17 CIA1 BookOnline SU3 Outline
This study unit is the first of two covering Section II: Internal Control / Risk from The IIA’s CIA
Exam Syllabus. This section makes up 25% to 35% of Part 1 of the CIA exam and is tested at the
awareness level. The relevant portion of the syllabus is highlighted below. (The complete syllabus is in
Appendix B.)
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
2 SU 3: Control Frameworks and Fraud
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
SU 3: Control Frameworks and Fraud 3
b. Objectives
1) The three classes of objectives direct organizations to the different (but
overlapping) elements of control.
a) Operations
i) Operations objectives relate to achieving the entity’s mission.
● Appropriate objectives include improving (1) financial
performance, (2) productivity, (3) quality, (4) innovation, and
(5) customer satisfaction.
ii) Operations objectives also include safeguarding of assets.
● Objectives related to protecting and preserving assets assist in
risk assessment and development of mitigating controls.
● Avoidance of waste, inefficiency, and bad business decisions
relates to broader objectives than safeguarding of assets.
b) Reporting
i) To make sound decisions, stakeholders must have reliable, timely,
and transparent financial information.
ii) Reports may be prepared for use by the organization and
stakeholders.
iii) Objectives may relate to
Financial and nonfinancial reporting.
●
c) Compliance
i) Entities are subject to laws, rules, and regulations that set minimum
standards of conduct.
● Examples include taxation, environmental protection, and
employee relations.
● Compliance with internal policies and procedures is an
operational matter.
d) The following is a useful memory aid for the COSO classes of objectives:
O = Operations
R = Reporting
C = Compliance
2) Achievement of Objectives
a) An internal control system is more likely to provide reasonable assurance
of achieving the reporting and compliance objectives than the operational
objectives.
b) Reporting and compliance objectives are responses to standards
established by external parties, such as regulators.
i) Thus, achieving these objectives depends on actions almost entirely
within the entity’s control.
c) However, operational effectiveness may not be within the entity’s control
because it is affected by human judgment and many external factors.
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
4 SU 3: Control Frameworks and Fraud
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
SU 3: Control Frameworks and Fraud 5
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
SU 3: Control Frameworks and Fraud 7
Figure 3-1
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
8 SU 3: Control Frameworks and Fraud
3. CoCo Model
a. The CoCo model is thought to be more suited for internal auditing purposes. It consists
of 20 criteria grouped into 4 components:
1) Purpose
2) Commitment
3) Capability
4) Monitoring and Learning
b. The following is a useful memory aid for the components of the CoCo model:
P = Purpose Police
C = Commitment Can
C = Capability Catch
M = Monitoring Many
L = Learning Lawbreakers
4. COBIT -- A Framework for IT Governance and Management
a. COBIT is the best-known control and governance framework that addresses
information technology.
1) In its original version, COBIT was focused on controls for specific IT processes.
2) Over the years, information technology has gradually come to pervade every
facet of the organization’s operations. IT can no longer be viewed as a function
distinct from other aspects of the organization.
a) The evolution of COBIT has reflected this change in the nature of IT within
the organization.
5. COBIT 5 -- Five Key Principles
a. Principle 1: Meeting Stakeholder Needs
1) COBIT 5 asserts that value creation is the most basic stakeholder need. Thus,
the creation of stakeholder value is the fundamental goal of any enterprise,
commercial or not.
a) Value creation in this model is achieved by balancing three components:
i) Realization of benefits
ii) Optimization (not minimization) of risk
iii) Optimal use of resources
2) COBIT 5 also recognizes that stakeholder needs are not fixed. They evolve
under the influence of both internal factors (e.g., changes in organizational
culture) and external factors (e.g., disruptive technologies).
a) These factors are collectively referred to as stakeholder drivers.
3) In response to the identified stakeholder needs, enterprise goals are established.
a) COBIT 5 supplies 17 generic enterprise goals that are tied directly to the
balanced scorecard model.
4) Next, IT-related goals are drawn up to address the enterprise goals.
a) COBIT 5 translates the 17 generic enterprise goals into IT-related goals.
5) Finally, enablers are identified that support pursuit of the IT-related goals. An
enabler is broadly defined as anything that helps achieve objectives.
a) The seven categories of enablers are listed in item 5.d. on the next page.
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
SU 3: Control Frameworks and Fraud 9
6) COBIT 5 refers to the process described on the previous page as the goals
cascade. It can be depicted graphically as follows:
Figure 3-2
b. Principle 2: Covering the Enterprise End-to-End
1) COBIT 5 takes a comprehensive view of all of the enterprise’s functions and
processes. Information technology pervades them all; it cannot be viewed as a
function distinct from other enterprise activities.
a) Thus, IT governance must be integrated with enterprise governance.
2) IT must be considered enterprise-wide and end-to-end, i.e., all functions and
processes that govern and manage information “wherever that information may
be processed.”
c. Principle 3: Applying a Single, Integrated Framework
1) In acknowledgment of the availability of multiple IT-related standards and best
practices, COBIT 5 provides an overall framework for enterprise IT within which
other standards can be consistently applied.
2) COBIT 5 was developed to be an overarching framework that does not address
specific technical issues; i.e., its principles can be applied regardless of the
particular hardware and software in use.
d. Principle 4: Enabling a Holistic Approach
1) COBIT 5 describes seven categories of enablers that support comprehensive IT
governance and management:
a) Principles, policies, and frameworks
b) Processes
c) Organizational structures
d) Culture, ethics, and behavior
e) Information
f) Services, infrastructure, and applications
g) People, skills, and competencies
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
10 SU 3: Control Frameworks and Fraud
2) The last three of these enablers also are classified as resources, the use of
which must be optimized.
3) Enablers are interconnected because they
a) Need the input of other enablers to be fully effective and
b) Deliver output for the benefit of other enablers.
e. Principle 5: Separating Governance from Management
1) The complexity of the modern enterprise requires governance and management
to be treated as distinct activities.
a) In general, governance is the setting of overall objectives and the
monitoring of progress toward those objectives. COBIT 5 associates
governance with the board of directors.
i) Within any governance process, three practices must be addressed:
evaluate, direct, and monitor.
b) Management is the carrying out of activities in pursuit of enterprise goals.
COBIT 5 associates these activities with executive management under
the leadership of the CEO.
i) Within any management process, four responsibility areas must be
addressed: plan, build, run, and monitor.
6. The eSAC Model
a. In the eSAC (Electronic Systems Assurance and Control) model, the entity’s internal
processes accept inputs and produce outputs.
1) Inputs: Mission, values, strategies, and objectives
2) Outputs: Results, reputation, and learning
b. The eSAC model’s broad control objectives are influenced by the COSO
Framework:
1) Operating effectiveness and efficiency
2) Reporting of financial and other management information
3) Compliance with laws and regulations
4) Safeguarding of assets
c. The following are eSAC’s IT business assurance objectives:
1) Availability. The entity must ensure that information, processes, and services are
available at all times.
2) Capability. The entity must ensure reliable and timely completion of transactions.
3) Functionality. The entity must ensure that systems are designed to user
specifications to fulfill business requirements.
4) Protectability. The entity must ensure that a combination of physical and logical
controls prevents unauthorized access to system data.
5) Accountability. The entity must ensure that transactions are processed under
firm principles of data ownership, identification, and authentication.
d. The following is a useful memory aid for the eSAC IT business assurance objectives:
A = Availability A
C = Capability Court
F = Functionality Finds
P = Protectability People
A = Accountability Accountable
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
SU 3: Control Frameworks and Fraud 11
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
12 SU 3: Control Frameworks and Fraud
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
SU 3: Control Frameworks and Fraud 13
c. Risk reduction (mitigation) lowers the level of risk associated with an activity. For
example, the risk of systems penetration can be reduced by maintaining a robust
information security function within the entity.
d. Risk sharing transfers some loss potential to another party. Examples are purchasing
insurance, hedging, and entering into joint ventures.
e. Risk exploitation seeks risk to pursue a high return on investment.
5. Responsibilities
a. Senior Management
1) The CEO sets the tone at the top of the entity and has ultimate responsibility for
ERM.
2) Senior management should ensure that sound risk management processes are
in place and functioning.
3) Senior management also determines the entity’s risk management philosophy.
For example, officers who issue definitive policy statements, insist on written
procedures, and closely monitor performance indicators exhibit one type of risk
management philosophy. Officers who manage informally and take a relaxed
approach to performance monitoring exhibit a different philosophy.
a)
If senior management establishes a consistent risk management
philosophy, all parts of the entity can respond to risk appropriately.
b. Board of Directors
1) The board has an oversight role. It should determine that risk management
processes are in place, adequate, and effective.
2) Directors’ attitudes are a key component of the internal environment. They must
possess certain qualities for them to be effective.
a)
A majority of the board should be outside directors.
b)
Directors generally should have years of experience either in the industry
or in corporate governance.
c) Directors must be willing to challenge management’s choices. Complacent
directors increase the chances of adverse consequences.
c. Risk Committee and Chief Risk Officer
1) Larger entities may wish to establish a risk committee composed of directors that
also includes managers, the individuals most familiar with entity processes.
a)
A chief risk officer (CRO) may be appointed to coordinate the entity’s risk
management activities. The CRO is a member of, and reports to, the risk
committee.
d. Internal Auditing
1) According to The IIA, internal auditors may be directed by the board to evaluate
the effectiveness and contribute to the improvement of risk management
processes.
2) The internal auditors’ determination of whether risk management processes are
effective is a judgment resulting from the assessment that
a) Entity objectives support and align with its mission.
b) Significant risks are identified and assessed.
c) Appropriate risk responses are selected that align risks and the entity’s risk
appetite.
d) Relevant risk information is captured and communicated in a timely
manner across the entity, enabling staff, management, and the board to
carry out their responsibilities.
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
14 SU 3: Control Frameworks and Fraud
6. Graphical Depiction
a. The COSO ERM Framework is depicted as a matrix in the form of a cube with rows,
slices, and columns.
1) The rows are the eight components, the slices are the four categories of
objectives, and the columns are the organizational units of the entity.
b. The entity should make the appropriate response at each intersection of the
Framework, such as control activities for achieving reporting objectives at the division
level.
COSO ERM Framework
Figure 3-3
7. ERM Limitations
a. Limitations of ERM arise from the possibility of
1) Faulty human judgment,
2) Cost-benefit considerations,
3) Simple errors or mistakes,
4) Collusion, and
5) Management override of ERM decisions.
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
SU 3: Control Frameworks and Fraud 15
At one time, external audit professionals thought of risk only in the context of an audit (e.g., the probability
of not discovering a material financial statement misstatement). Today, after extensive research and many
scholarly publications, risk is recognized as something that must be examined and mitigated in every aspect
of an organization’s operations. Thus, CIA candidates should understand the distinct responsibilities of
(1) the internal audit activity and (2) senior management and the board for enterprise-wide risk.
b. Two Implementation Standards link the assessment of risk to specific risk areas.
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
16 SU 3: Control Frameworks and Fraud
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
SU 3: Control Frameworks and Fraud 17
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
18 SU 3: Control Frameworks and Fraud
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
SU 3: Control Frameworks and Fraud 19
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].
20 SU 3: Control Frameworks and Fraud
Copyright © 2016 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected].