0% found this document useful (0 votes)
347 views6 pages

IT Due Diligence Questionnaire

The document contains a questionnaire about IT due diligence covering topics such as IT management, personnel, contractors, network, operating systems, applications, data, disaster recovery, operations, third-party services, laptops/workstations, security, and spreadsheets. It includes over 50 questions to determine practices, policies, and controls in place within an organization's IT environment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
347 views6 pages

IT Due Diligence Questionnaire

The document contains a questionnaire about IT due diligence covering topics such as IT management, personnel, contractors, network, operating systems, applications, data, disaster recovery, operations, third-party services, laptops/workstations, security, and spreadsheets. It includes over 50 questions to determine practices, policies, and controls in place within an organization's IT environment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

IT DUE DILIGENCE QUESTIONNAIRE

Description Yes No

IT Management

Is there an IT strategic plan?

Is there a mechanism by which the business community articulates expected


events (transactions, new locations, etc.) to IT so that IT can adequately plan?

Are IT policies and procedures developed, approved and centrally posted for key
IT processes?

Are the policies and procedures updated at least annually?

Are metrics used to monitor system performance and output?

Is there an acceptable use policy regarding company IT assets that all personnel
are required to acknowledge?

Are external programs, such as PCI or regulatory requirements, appropriately


understood and is compliance adequately monitored?

Personnel

Does the IT function appear to be adequately staffed?

Is there a mechanism to monitor the productivity of IT personnel?

Are personnel required to attend certain training or obtain certain qualifications?

What is the average length of service for IT personnel?

Are contractors used?

Are there policies that expressly prohibit the use of company programs or data
for purposes other than work?

Contractors

Are contractors required to comply with the same policies and procedures as
employees, such as the requirement to sign non-disclosure agreements?

Are the contractors’ length of stay monitored so that they comply with IRS
regulations?

Is contractor access to company intellectual property, including in-house


developed programs or company data, appropriately restricted?

Are roles and responsibilities of contractors appropriately defined and


communicated?

1
Description Yes No

Is any intellectual property developed by contractors, such as web or other


applications, appropriately protected through legal means?

Network

Is there a topology of the network hardware?

How many points of external entry into the network exist?

Is each point of entry protected by a firewall?

Is firewall activity monitored?

Are there wireless devices on the network?

Is wireless traffic encrypted?

Is there a VPN or other remote access to the network?

Is remote access monitored?

Is a tool used that monitors for rogue devices that are attached to the network?

Operating Systems

How many operating systems are there?

Is each operating system currently supported by its manufacturer?

Is each operating system up to date with patches provided by the manufacturer?

Are there any users with unsupported operating systems on their laptops or
workstations that transmit data into the network?

Is there a formal process, including documentation, by which users are


provisioned with access to the operating systems(s)?

Is there timely communication from human resources that results in the


decommissioning of accounts upon termination?

Applications – Developed

Is a system development life cycle model (e.g., waterfall, rapid application


development, spiral, AGILE, etc.) utilized?

Is evidence, such as test results and approvals, maintained for future reference?

Is there a PMO or committee that monitors the progress of each project?

Is the source code protected by copyright?

Is the source code placed in escrow?

Has an inventory been performed of applications and databases that support

2
Description Yes No

business processes that are in scope for Sarbanes-Oxley?

Is there a formal process, including documentation, by which users are


provisioned with access to the application?

Is there timely communication from human resources that results in the timely
decommissioning of accounts upon termination?

Is security, including segregation of duties, considered during the development


cycle?

Are interfaces between systems subjected to a system development life cycle


(SDLC) process that includes retention of test results and approvals?

Are there separate development/quality assurance (QA) and production


environments?

Do developers have any access to the production environment?

If so, is it only granted for emergency fixes and then removed?

Is there a mechanism to track the labor involved during the development cycle so
that those costs can be capitalized?

Are the provisions of SOP 98-1, Accounting for the Costs of Computer Software
Developed or Obtained for Internal Use, understood by the programmers so that
non-qualifying costs are not capitalized?

Is there an ongoing process to manage segregation of duties conflicts?

Applications – Shrinkwrap

Are company-wide licenses utilized and monitored for shrinkwrap software


programs?

Is the company up to date on all vendor released patches?

Is there a formal process, including documentation, by which users are


provisioned with access to the application(s)?

Is there timely communication from human resources that results in the


decommissioning of accounts upon termination?

Is there an ongoing process to manage segregation of duties conflicts?

Change Management

Are changes to programs or systems standardized, documented and subject to


formal change management procedures?

Is there a formal process to handle emergency requests?

Are all changes, other than infrastructure changes, initiated by the business?

3
Description Yes No

Data

Is there a data dictionary or an inventory of data identified as critical?

Is it clear who is responsible for data integrity?

Is access to databases restricted to 1-2 personnel?

Is database activity logged and monitored?

What types of databases are used?

Is sensitive data (e.g., credit card numbers, SSNs, etc.) encrypted or masked in
the database(s)?

Is there a data warehouse?

Is ownership of the data in and access to the data warehouse appropriately


defined and controlled?

Is all data removed from laptops or workstations prior to their disposal?

Has the flow of key financial reporting or other key data been mapped so that all
programs are identified?

Disaster Recovery

Is there a formal disaster recovery plan (DRP)?

Where is the alternate site?

Has the DRP been tested?

Has a business impact assessment been performed that considers the impact of
systems failure on the financial reporting process?

Are databases backed up nightly?

Are backup media stored off-site?

Are tests to restore data from backup media conducted periodically?

Are applications backed up after any change is introduced?

Do remote users back up their laptops at least weekly?

Is there an uninterrupted power supply for the data center?

Is there a non-liquid fire suppression system for the data center?

Operations

Does IT management monitor the performance and capacity levels of the


systems and network?

4
Description Yes No

Is there a formal problem management (help desk) process?

What is the average length of time to close a problem ticket?

How many problem tickets are there that have been open for more than 3 days?

Third-Party Services

Are third parties used for any IT services?

Are there contracts that clearly articulate the responsibilities of the third parties?

Are there performance metrics that third parties are required to adhere to?

Is there a mechanism to validate the effectiveness of key internal controls at third


parties, such as a right to audit clause in the contract or an SAS 70 letter?

Are third parties properly qualified through an assessment of their capabilities to


deliver required services, and is there a review of their financial viability?

Laptops/Workstations

Is there an inventory of laptops and workstations?

Is the inventory validated by means of a physical count periodically?

Is the physical count reconciled to the general ledger?

Does every laptop and workstation have anti-virus protection?

Does every laptop and workstation have a personal firewall?

Are the laptops/workstations leased or owned?

Is only authorized software permitted for use by employees on company IT


assets?

Security

Are access rights at the application and operating system level periodically
reviewed and confirmed?

Is there an intrusion detection system?

Are external vulnerability scans performed periodically?

Is access to IT assets (e.g., data center assets) appropriately restricted and


controlled?

Spreadsheets

Is there an inventory of high-risk, high-importance processes (e.g., spreadsheets


that are relevant to financial reporting)?

5
Description Yes No

Has the logic in each spreadsheet been verified by somebody other than the
creator of the spreadsheet?

Is access to key spreadsheets restricted via a shared drive or password?

Are all of these spreadsheets backed up periodically?

You might also like