IT Risk Management - Audit Program - Final
IT Risk Management - Audit Program - Final
IT Risk Management
IS Audit/Assurance Program
IT Risk Management
Column Name Description Instructions
Process Sub-area An activity within an overall process influenced by the enterprise's To make the audit program manageable, it is recommended to break out
policies and procedures that takes inputs from a number of sources, the scope of the audit into sub-areas. The auditor can modify this field to
manipulates the inputs and produces outputs entity-specific names and terms. ISACA has used the most commonly used
terms as the basis to develop this audit program.
Ref. Risk Specifies the risk this control is intended to addressed This field can be used to input a reference/link to risk described in the
entity's risk register or enterprise risk management (ERM) system, or to
input a description of the risk a particular control is intended to address.
Control Objectives A statement of the desired result or purpose that must be in place to This field should describe the behaviors, technologies, documents or
address the inherent risk in the review areas within scope processes expected to be in place to address the inherent risk that is part
of the audit scope.
Controls The means of managing risk, including policies, procedures, guidelines, This field should describe in detail the control activities expected to be in
practices or organizational structures, which can be of an administrative, place to meet the control objective. Control activities can be in roles and
technical, management or legal nature responsibilities, documentation, forms, reports, system configuration,
segregation of duties, approval matrices, etc.
Control Type Controls can be automated (technical), manual (administrative) or Specify whether the control under review is automated, manual, physical
physical. or a combination. This information is useful in determining the testing
steps necessary to obtain assessment evidence.
Automated/technical controls are things managed or performed by
computer systems.
Manual/administrative controls are usually things that employees can or
cannot do.
Physical controls include locks, fences, mantraps and even geographic
specific controls.
Control Classification Another way to classify controls is by the way they address a risk Specify whether the control under review is preventive, detective,
exposure. corrective or compensating. This information will be helpful when defining
testing steps and requesting evidence.
Preventive controls should stop an event from happening.
Detective controls should identify an event when it is happening and
generate an alert that prompts a corrective control to act.
Corrective controls should limit the impact of an event and help resume
normal operations within a reasonable time frame.
Compensating controls are alternate controls designed to accomplish the
intent of the original controls as closely as possible when the originally
designed controls cannot be used due to limitations of the environment.
Control Frequency Control activities can occur in real-time, daily, weekly, monthly, annually, Specify whether the control under review occurs in real-time, daily,
etc. weekly, monthly, annually, etc. This information will be helpful when
defining testing steps and requesting evidence.
Testing Step Identifies the steps being tested to evaluate the effectiveness of the This field should describe in detail the steps necessary to test control
control under review activities and collect supporting documentation. The auditor can modify
this field to meet entity-specific needs. ISACA has used a set of generic
steps develop this audit program.
Ref. COBIT 5 Identifies the COBIT 5 process related to the control objective or control Input the COBIT 5 process or practice that relates to this control.
activities
Ref. Specifies frameworks and/or standards that relate to the control under Input references to other frameworks used by the entity as part of their
Framework/Standards review (e.g., NIST, HIPAA, SOX, ISO) compliance program.
Ref. Workpaper The evidence column usually contains a reference to other documents Specify the location of supporting documentation detailing the audit steps
that contain the evidence supporting the pass/fail mark for the audit step. and evidence obtained.
Pass/Fail Document preliminary conclusions regarding the effectiveness of controls. Specify whether the overall control is effective (Pass) or not effective (Fail)
based on the results of the testing.
Comments Free format field Document any notes related to the review of this Process Sub-area or
specific control activities.
IS Audit/Assurance Program
IT Risk Management
Ref. Control Control Control
Process Sub-Area Risk Control Objectives Controls Type Class Frequency
Governance CO1. Senior IT and enterprise management and C1. The board of directors or similar function
the board regularly and routinely consider, receives information on IT risk exposures and
monitor and review IT risk management. measures in place to deal with risk containment
and associated costs, and approves the
appropriateness of the risk management plan and
its alignment with the appetite for risk.
IT Risk Management CO2. The IT risk management framework is C4. Management Framework Definition
Framework aligned with the ERM framework. Control: The IT risk management framework
utilizes a methodology and definitions that align
with the ERM framework.
IS Audit/Assurance Program
IT Risk Management
Ref. Control Control Control
Process Sub-Area Risk Control Objectives Controls Type Class Frequency
IT Risk Management CO3. The risk management process is aligned C5. Risk management process provides for risk
Process with the framework, addresses the goal of the identification by stakeholders and interested
risk assessment and establishes the risk criteria. parties.
IS Audit/Assurance Program
IT Risk Management
Ref. Control Control Control
Process Sub-Area Risk Control Objectives Controls Type Class Frequency
Event Identification CO4. Important events and near misses affecting C9. Stakeholders agree to and sign off on key
the IT function are identified, analyzed and risk- events and their impacts.
rated. The results are maintained in a registry or
database.
IS Audit/Assurance Program
IT Risk Management
Ref. Control Control Control
Process Sub-Area Risk Control Objectives Controls Type Class Frequency
Risk Assessments CO5. Risk assessments are performed on a C13. Risk assessments follow the risk
recurrent basis, using qualitative and quantitative management framework and process, using the
methods that assess the likelihood (probability) defined qualitative and quantitative metrics.
and impact of identified risk. The scope of this
assessment addresses both inherent and residual
risk.
IT Risk Response CO6. A risk response process has been defined C16. The results of the risk assessment generate a
and effectively implemented. risk mitigation strategy, which considers the
significance of the risk, probable cost and
benefits of remediation actions.
Maintenance and CO7. The risk action plan is monitored for C18. The risk action plan contains a prioritized
Monitoring of IT Risk appropriate execution, identification of costs, risk response, which identifies implementation
Action Plans benefits, responsibility and approval of remedial priorities, responsibilities, schedules, expected
actions or acceptance of residual risk. outcome of risk mitigation, costs and benefits.
IS Audit/Assurance Program
IT Risk Management
Ref. Control Control Control
Process Sub-Area Risk Control Objectives Controls Type Class Frequency
1. Determine if IT risk management practices are properly documented and reviewed at EDM03
predetermined intervals by senior IT management for approval.
2. Interview IT management to determine if management actively monitors the IT risk
management process.
3. Ensure that IT risk management reports to appropriate senior management responsible for
ERM and coordination with IT.
1. Determine if an escalation and follow-up process for monitoring IT risk exceptions is in place. EDM03
2. Determine if the follow-up process is reviewed by IT management and ERM on a regular basis.
3. Determine if issues escalated to senior management have been acted on in a reasonable time
frame.
1. Obtain the IT risk management framework and the ERM framework. EDM03;
2. Compare the two approaches and, if available, review documents and procedures. APO01
3. Verify that the risk management processes are aligned and integrated with the ERM
framework and related operational procedures.
4. Verify that the risk classifications are uniform and address strategic, program, project and
operational activities.
5. Identify the scales used to classify risk:
- Probability
- Expected losses/costs
- Materiality levels
- Nonfinancial factors
6. Assess whether the IT risk scales align with the enterprise risk scales.
7. Identify gaps and misalignments between the two processes.
1. Identify the procedure to identify and evaluate relevant negative impacts that could affect the APO12
enterprise goals or operations.
2. Determine if the procedure adequately records each event and the rationale used to assess
the risk priority and effect on the enterprise.
3. Obtain the negative impacts document. Determine if the documentation is maintained,
describes the known negative impacts, and include those impacts that should reasonably be
known.
4. Determine if a negative impacts registry is used and maintained.
1. Obtain documentation (meeting minutes, notes, etc.) that identifies team involvement in the APO12
event identification process.
2. Determine if the subject matter experts from the various functional teams have been actively
involved in event identification.
3. Determine if the cross-functional teams participate in the prioritization of events.
1. Using the sample generated for the risk metrics, determine: APO12
- If the materiality has been identified for each risk
- If the materiality is within the materiality classifications approved by the enterprise
- If the materiality assessment is reasonable
1. Review the risk assessment process for a required identification of each event's inherent risk, APO12
the controls in place that address the inherent risk, the residual risk as a result of the control
implementation and any required risk response.
2. Using the sample population generated of the risk metrics, for each event, determine if the
inherent risk, controls in place, residual risk and a required risk response have been documented
and analyzed.
1. Determine how risk response actions are approved by appropriate management. EDM03;
2. Using the sample, determine if the appropriate management has approved the risk response APO12
actions.
3. Determine if the business units have been formally notified of the risk actions.
4. Identify instances in which management has accepted the residual risk of a risk response.
Determine if the individual approving the acceptance of risk has the authority, responsibility and
accountability to accept the residual risk on behalf of the entity.
5. Ensure that all risk acceptance events are properly recorded with approvals.
1. Determine if the following documents include the necessary activities to manage IT risk: EDM03;
- Information Security Policy APO12
- Crisis Management Policy
- Third-party IT Service Delivery Management Policy
- Business Continuity Policy
- Program/Project Management Policy
- HR Policies
- Compliance Policy
- Quality Management Policy
- Service Management Policy
- Change Management Policy
- Delegation of Authority Policy
- Whistle Blower Policy
- Internal Control Policy
- Intellectual Property Policy
- Data Privacy Policy