IT General Controls
IT General Controls
ACCA UK's Internal Audit Network held a series of seven webinars on de-mystifying
IT audit for business auditors in 2017. The series started in May and concluded in
November with a webinar about the General Data Protection Regulation (GDPR). It
featured three main presenters - Vincent Mulligan FCCA (IT Audit Consultant at
Eisteoir Consulting Ltd), Mike Hughes CISA, SGEIT, CRISC and Steve Connors
CISM, FIPA, FFA (both partners at Haines Watts). To register to watch any of the
webinars in this completed series, click here.
This article provides a few brief highlights of the second webinar in the series on IT
general controls. In this session, the speakers considered the nature of ITGC, the
challenges internal auditors face reviewing them and the approaches that you can
use to audit them.
“Auditors cannot rely on automated controls if ITGC are not effective – if the
foundations are not there then you cannot rely on what you have built upon those
foundations.”
When should we audit IT General Controls?
Any weakness in IT general controls will have an impact on the application controls
audit so it is important that you look at IT general controls at an early stage so that
you can wrap that into your planning of application audits. Timing will also be
influenced by annual audit planning, changes in the IT environment, and events and
emerging risks.
You will need to consider what skills and experience is required to effectively audit
ITGC the timing of work (before or after implementation of any IT projects), and
specific risks to your environment.
When auditing IT General Controls, you can audit them as separate control audits or
you can incorporate some IT General Controls work into IT functional audits.
Integrated audits can build on work that has already been done in relation to general
computer controls. However we are not just relying on auditors – these are controlled
environments so there are other business assurance processes such as continuous
monitoring, vendor audits, etc which will also provide assurance. When you are
thinking about getting assurance over IT General Controls, in addition to audits you
should consider the other mechanisms we use to get assurance – such as taking
part or observe at steering committees, and also ensuring you have access to
metrics and dash boards that will give you a view as to what is currently happening
in the IT environment. This can inform your view on the annual planning process and
what they may need to change.
The risk is that unauthorised access to data may result in the destruction or change
of data, either malicious or accidental. This could include the recording of inaccurate
or fraudulent transaction. The objective is to implement access controls to restrict
access to specific programs and data to only those who are authorised to do so.
When we are auditing access controls, we are not talking about one process – we
are talking about multiple processes that layered together give us the layers of
defence that create the secure environment. Some of the layers that we would
expect to see in an IT General Controls framework:
Policies &
Procedures
Access
Periodic Controls
Password
Access
Requirements
Reviews
Physical Privileged
Access Users
Walkthrough Testing
• Logical access controls at the operating • Existence of security policy and
system/database level communication Sample of users – incl
• Security logs/review password resets, matching of access to job
• Process for starters/leavers/changes role, super user, review of violation logs
• Periodic review of user access • Sample of starters/leavers/changes –
• How is SoD achieved – consider access to appropriately authorised and timely
• Periodic review of user access – evidence
development, testing and live
• Sample of users with access to
environments as well as multiple user development/test/live – consider
accounts appropriateness of SoD, evidence of conflict
• Environmental controls – visit data • Evidence of testing environmental controls
centre/server room • Data centre access:
• What is the process for setting • Compare to staff list
up/terminating access to the server • Test to ensure unauthorised users can’t
room/data centre access
Program Change and Development
This relates to the development of applications and after they have been running live
for some time, how changes are made. The risk is that unauthorised amendments to
systems or programs may result in attacks (eg. denial of service) or fraudulent
activities. The objective is to have robust program change management controls to
ensure all changes to systems and applications are authorised, tested, documented
and approved. Further, programme development should follow a similar system of
authorisation, testing, approval and implementation.
Methodology
Authorisation
Post-Impl
Testing
Reviews
Approval
Change
& Dev Migration to
Data
the Live
Migration
Environment
Emergency Configuration
Changes Changes
Walkthrough Testing
End to end processing of a change Existence of change procedures
request
Walkthrough Testing
End to end processing of a development Existence of systems development lifecycle
project
Sample of developments:
Development lifecycle
• Confirm to development
Project management lifecycle/methodology
Procurement of IT equipment • Appropriate approvals
(software/hardware/infrastructure) • Testing/UAT/sign-offs
• Migration process – including data migration
Implementation of the project • Testing of interfaces
• Document retention
• Training
• Documentation is produced/updated
• Governance (risk
assessment/reporting/management)
• Post go live review
Computer operations
The risk is that systems and applications are inaccurately processing data and/or
processing inaccurate data. The objective is to have controls to ensure that system
and application processing operations are authorised, and any deviations from
normal behaviour are identified, investigated and ultimately resolved.
Job
Processing &
Monitoring
Comp
Ops
Incident & Back-up and
Problem Recovery
Resolution Procedures
Walkthrough and testing for computer operations:
Walkthrough Testing
• Backup and recovery procedures • Sample of backup logs to ensure no
• Periodic testing – file recovery/restore exceptions/errors.
• Back up storage • Sample of failed backups – what action was
• End to end process for incident taken?
management (incl escalation) • Evidence of recovery testing and results of
• Incident/problem tracking – helpdesk last test
facilities and software • Sample of requests for file restores
• Monitoring of live environment to identify • Physical & environmental controls over
failures access to and storage of back up tapes etc. or
• Job processing – including how going forward, the cloud
exceptions are actioned (e.g. if an • Sample of incidents/failures – confirm acted
interface fails to load) upon appropriately
• Sample of job processes to ensure completed
• Sample of scheduling failures to ensure
appropriate action taken
These have been very brief highlights of the webinar - to register to watch the
whole webinar, and any of the other webinars in this completed series, click
here.