CISA Study Notes
CISA Study Notes
10. Evaluate the organization’s business continuity plan (BCP), including alignment
1. Execute a risk-based IS audit strategy in compliance with IS audit standards to of the IT disaster recovery plan (DRP) with the BCP, to determine the
ensure that key risk areas are audited organization’s ability to continue essential business operations during the
2. Plan specific audits to determine whether information systems are protected, period of an IT disruption.
controlled and provide value to the organization.
3. Conduct audits in accordance with IS audit standards to achieve planned audit Domain 3—Information Systems Acquisition, Development and Implementation
objectives. (18%)
4. Communicate audit results and make recommendations to key stakeholders 1 Evaluate the business case for the proposed investments in information
through meetings and audit reports to promote change when necessary. systems acquisition, development, maintenance and subsequent retirement to
5. Conduct audit follow-ups to determine whether appropriate actions have been determine whether the business case meets business objectives.
taken by management in a timely manner. 2 Evaluate IT supplier selection and contract management processes to ensure
that the organization’s service levels and requisite controls are met.
Domain 2—Governance and Management of IT (16%) 3 Evaluate the project management framework and controls to determine
1. Evaluate the IT strategy, including IT direction, and the processes for the whether business requirements are achieved in a cost-effective manner while
strategy’s development, approval, implementation and maintenance for managing risk to the organization.
alignment with the organization’s strategies and objectives. 4 Conduct reviews to determine whether a project is progressing in accordance
2. Evaluate the effectiveness of the IT governance structure to determine with project plans, is adequately supported by documentation, and has timely
whether IT decisions, directions and performance support the organization’s and accurate status reporting.
strategies and objectives. 5 Evaluate controls for information systems during the requirements,
3. Evaluate IT organizational structure and human resources (personnel) acquisition, development and testing phases for compliance with the
management to determine whether they support the organization’s strategies organization's policies, standards, procedures and applicable external
and objectives. requirements.
4. Evaluate the organization’s IT policies, standards and procedures, and the 6 Evaluate the readiness of information systems for implementation and
processes for their development, approval, release/publishing, implementation migration into production to determine whether project deliverables, controls
and maintenance to determine whether they support the IT strategy and and the organization's requirements are met.
comply with regulatory and legal requirements. 7 Conduct post-implementation reviews of systems to determine whether
5. Evaluate IT resource management, including investment, prioritization, project deliverables, controls and the organization's requirements are met.
allocation and use, for alignment with the organization’s strategies and
objectives. Domain 4—Information Systems Operations, Maintenance and Service
6. Evaluate IT portfolio management, including investment, prioritization and Management (20%)
allocation, for alignment with the organization’s strategies and objectives. 1 Evaluate the IT service management framework and practices (internal or third
7. Evaluate risk management practices to determine whether the organization’s party) to determine whether the controls and service levels expected by the
IT-related risk is identified, assessed, monitored, reported and managed. organization are being adhered to and whether strategic objectives are met.
8. Evaluate IT management and monitoring of controls (e.g., continuous 2 Conduct periodic reviews of information systems to determine whether they
monitoring, quality assurance [QA]) for compliance with the organization’s continue to meet the organization’s objectives within the enterprise
policies, standards and procedures. architecture (EA).
9. Evaluate monitoring and reporting of IT key performance indicators (KPIs) to
determine whether management receives sufficient and timely information.
3 Evaluate IT operations (e.g., job scheduling, configuration management, 6 Evaluate the information security program to determine its effectiveness and
capacity and performance management) to determine whether they are alignment with the organization’s strategies and objectives.
controlled effectively and continue to support the organization’s objectives.
4 Evaluate IT maintenance (patches, upgrades) to determine whether they are
controlled effectively and continue to support the organization’s objectives.
5 Evaluate database management practices to determine the integrity and
optimization of databases.
6 Evaluate data quality and life cycle management to determine whether they
continue to meet strategic objectives.
7 Evaluate problem and incident management practices to determine whether
problems and incidents are prevented, detected, analyzed, reported and
resolved in a timely manner to support the organization´s objectives.
8 Evaluate change and release management practices to determine whether
changes made to systems and applications are adequately controlled and
documented.
9 Evaluate end-user computing to determine whether the processes are
effectively controlled and support the organization’s objectives.
10 Evaluate IT continuity and resilience (backups/restores, disaster recovery plan
[DRP]) to determine whether they are controlled effectively and continue to
support the organization’s objectives
2. Code of Ethics – IPS PC DE 5. Organizations typically have four types of documents in place:
● Support the implementation of appropriate policies, standards, guidelines, ● Policies = goals; policies provide emphasis, set directions, and must be
and procedures for information systems. backed by recognized management. Policies that are not managed in a
centralized manner may suggest a non-uniform measurement standard.
● Perform your duties with objectivity, professional care, and due diligence
● Standards = definition of requirement; mid-level documents containing
in accordance with professional standards. Support the use of best
practices. measurement control points to ensure uniform implementation in support
of a policy. A missing standard indicates negligence by failing to define the
● Serve the interests of stakeholders in an honest and lawful manner that requirement. Compliance is mandatory.
reflects a credible image upon your profession. i. Categories of standards (highest influence on lowest):
● Maintain privacy and confidentiality of information obtained during your ▪ Regulatory
audit except for required disclosure to legal authorities. ▪ Industry
● Undertake only those activities in which you are professionally competent;
▪ Organizational
strive to improve your competency.
● Disclose accurate results of all work and significant facts to the appropriate ▪ Personal
parties. ● Guidelines = general instructions; provides vague direction of to provide
● Support ongoing professional education to help stakeholders enhance their limited advice in absence of applicable standard. Guidelines are
understanding of information systems security and control. discretionary and can be used to create new standards.
● Program management vs. Project ▪ Product or service: efficiency, effectiveness, controls, and life-cycle
i. Program: ongoing activities managed by an executive. ▪ Processes: method or result
ii. Project: a short-term activity managed by a project manager operating
outside the normal organizational structure. ▪ System: design or configuration
● Audit program monitoring and review ▪ General controls: preventive, detective, and corrective
i. Key goal indicator (KGI): use goals as performance evaluation.
▪ Organizational plans: present and future objectives
ii. Key performance indicator (KPI): use metric as performance evaluation.
iv. Identify objectives and restriction on scope
● Planning audits:
▪ Undue restrictions on scope would be a major concern.
i. Scope: the boundaries to be reviewed
ii. Criteria: identify a set of policies to be measured against. ▪ Standards are mandatory, and any deviation would require
iii. Team justification
v. Audits vs assessments:
8. Audit process
▪ Traditional audit ▪ Technical testing and analysis (excellent)
iii. Fundamental issues concerning internal controls
▪ Assessments: for training and awareness purpose where the goal is
to determine value of current process. ▪ Management is often exempt from controls
▪ Control self-assessments (CSA): executed by the auditee with auditor ▪ How controls are implemented determines the level of assurance
as facilitator. The goal is self improvement of the client or identify iv. Hierarchy of internal controls (highest to lowest)
area with higher risk. Independence is not required.
▪ General control (overall): policies, structures, job description,
vi. Risk management strategies: applied to all organizational activities.
segregation of duties, budgeting, and auditing.
▪ Accept
▪ Pervasive controls (follows technology): they are those general
▪ Mitigate controls that focus on the management and monitoring of the
technology environment.
▪ Transfer
▪ Detailed controls (task): specific steps or tasks to be performed.
▪ Avoid
▪ Application controls (embedded in programs)
● Performing the audit
v. Internal control categories: detective, preventive, and corrective.
i. Determining competence and evaluating auditors vi. Implementation methods:
▪ Skills matrix: area of knowledge, proficiency, and specialized training ▪ Administrative ($): people-based control by using written policies
required to fulfill the audit and procedures
▪ Use the work of other requirements: ▪ Physical ($$): physical barriers or visual deterrents
o Independence and objectivity
o Competence, qualification, and experience ▪ Technical ($$$): using software or hardware process to calculate an
o Agreement on scope approval or denial based on specific attributes (special technology)
o Level of review and supervision required ● Audit planning
ii. Data collection technique
i. Work should be repeatable by another auditor (5Ws), and properly
▪ Observation (good) documented in working papers.
ii. Assign audit team: ensure adequate experience, competency, and
▪ Surveys (poor)
training of the members.
▪ Document review (good) iii. Shewhart’s process technique: plan-do-check-act cycle
● Gather evidence
▪ Interviews (good)
i. Direct evidence more preferable to indirect evidence
▪ Workshops (mixed) ii. Audit samples:
▪ Computer-assisted audit tools (good)
iv. Evidence life cycle: failure to maintain a proper chain of custody may
▪ Statistic sampling: mathematical quantifiable and presented as a
disqualify the evidence: The ideal is to ensure the evidence is properly
percentage. Examples include: random, cell (predefined interval), collected, under appropriate custody, and unaltered during the process.
and fixed interval. v. Compliance testing: tests for the presence or absence of something.
▪ Non-statistic sampling: based on judgment. Example includes ▪ Attribute sampling: determine the presence of certain attribute
haphazard. Ideal is to focus on materiality rather than
representation of the actual population. ▪ Stop-and-go sampling: when few errors are expected
iii. Computer-Assisted Audit Tools methods
▪ Discovery sampling: 100% sampling to detect fraud or when the
CAAT method Characteristics Complexity
likelihood of evidence existing is low
Online event Read logs & alarms Low ▪ Precision or expected error rate: lower error rate = large sample in
monitor
testing; smaller sample is used when the population is expected to
Embedded program Flags selected transactions Low be error-free
audit hooks vi. Substantive testing: seek to verify the content and integrity of evidence
▪ Variable sampling: used to designate dollar values or weights of an
Continuous & Audits any transaction that Medium
intermittent meets preselected criteria entire subject population by prorating from a smaller sample.
simulation ▪ Unstratified mean estimation: attempt to project an estimated total
for the whole subject population.
Snapshot Assembles a sequence of Medium
data captures into an audit ▪ Stratified mean estimation: calculate an average by group.
trail.
▪ Difference estimation: used to determine the difference between
Embedded audit Processes dummy High audited and unaudited claims of value.
module transactions along with ● Audit findings:
genuine, live transaction
i. Independence is required in the report for external auditor.
System control audit System-level audit program High ii. Indicators of illegal or irregular activity:
review file with used to monitor multiple ▪ Questionable payments
embedded audit EAMs inside the application
modules software. This is a mainframe ▪ Unsatisfactory record control
class of control. ▪ Unsatisfactory explanations
CAATs are able to perform faster than humans and produce more ▪ Other questionable circumstance
accurate data in functional testing. However, costs, training, and
iii. Examples of irregular activities:
security of output are major consideration.
▪ Fraud
▪ Theft or embezzlement ● Capability Maturity Model (CMM): provides a framework for developing,
improving and sustaining business performance in your environment.
▪ Suppression: suppressing data or records
i. Level of maturity
▪ Racketeering: the process of repeated fraud or other crime # Level Description Process ISO
Concentration New product Forecast needs Minimum staffing 3. Executive Steering Committee
based on trend ● Goal: align IT functions with current business objective.
What products Tasks to meet Forecast costs vs Initiate new ● Methods: Critical success factors and scenario approach
and services long-term plan expected revenue support training
are planned ● Aligning software to business needs
i. Establish the need (internal vs. external)
Focus General Financial plan Daily support
ii. Identify the work effort
statement iii. Summarize the impact
Domain 3. Information Systems Acquisition, Development and Implementation iv. Conduct initial feasibility analysis
1. Strategic system (fundamental change) vs. tactical system (support) v. Present the benefit
● IT steering committee provides open communication of business objective
2. Capability Maturity Model for IT support. Focus is placed on fulfillment of the business objective.
● Goal: to eliminate decision-making authority from the department
manager and workers and shifts to executive management level.
4. Change Management
● A baseline reference to chart current progress or regression.
● Change control board: the board review all changes requires and
● Levels of CMM: determine whether authorization should be granted. Change control
i. Level 0 = Nonexistent: nothing is getting done and individual managers review must include input from business users.
hold the authority for decisions. ● Approaches:
ii. Level 1 = Initial: Decision authority resides in the individual workers and
i. Evolutionary
is supported by a local manager.
▪ Traditional viewpoint where number one source of failures is a result ● Phase 1: Feasibility Study
of error in planning and design. i. Goal: determine the strategic benefits to be accomplished and the
anticipated payback schedule of the project.
▪ System Development Life Cycle:
ii. Constructive Cost Model: a method to estimate the effort, schedule,
a. Waterfall model: The waterfall method helps ensure that errors and cost of developing a new software application.
are detected early in the development process. Waterfall
development is a procedure-focused development cycle with ▪ Source lines of code: forecasts estimate by counting the individual
formal sign-off at the completion of each level. lines of program source code regardless of the embedded design
b. Spiral model: It’s a risk-driven model which means that the quality.
overall success of a project highly depends on the risks analysis
▪ Function point analysis: divide program functions into classes and
phase. Risk analysis requires specific expertise on every iteration.
<Note> The waterfall and spiral are based on gather requirements, rank them by complexity. Based on complexity, the estimated of
forecasting, designing, and building. work is calculated.
c. Agile Prototyping model: It fits when the project is unable to iii. Statement of work: a formal approval by the executive management to
forecast, plan, or don’t have a detailed design. A repeated trial- grant the go-ahead of the project and force cooperation.
and-error process is utilized. iv. Auditor should focus on initial needs analysis and ensure the risk
ii. Revolutionary mitigation strategy is in place.
● Agile development method ▪ Durability guarantees that a successful transaction will persist and
i. Uses time-box management techniques to force individual iterations of cannot be undone.
a prototype in a short time span by allowing programmers to start ● Decision support system
writing a program using lots of trial and error without spending time on i. Reference by context: value = low; supplies answers based on estimated
preplanning documentation. level of reference.
ii. It is designed for use by small teams of talented programmers. ii. Colleague, or associate, level: provides tedious calculation support but
iii. However, it does not scale very well. leaves the real decisions to the user.
iv. An ongoing team learning process to refine project management. iii. Expert level: written by capturing specialized data from a person who
v. It places greater reliance on the undocumented knowledge contained in has been performing the desired work for 20 or 30 years.
a person’s head.
● Rapid application development method
i. Well defined methodology that works for small, well-trained team
ii. Uses 4GL programming language Domain 4—Information Systems Operations, Maintenance and Service
Management
● Hueristic (prototyping) development 1. Personnel roles and responsibility
i. Combines best of the SDLC with an iterative approach that enables Job Role Authorized Production Development Security Execute
developer and customer to react to risks at each iteration Changes Library Library Access Administration Production
ii. Focuses on prototyping screens and reports Access Configuration Changes
▪ Critical IS resources supporting critical business processes 4. The IS auditor might need to review specific reports associated with availability
and response. This list identifies log types and characteristics:
▪ Critical recovery period before significant losses occur
● System logs identify the activities performed on a system and can be
▪ A determination of acceptable downtime is made analyzed to determine the existence of unauthorized access to data by a
iii. Classify of operations and criticality user or program.
iv. Identify IS processes that support business criticality ● The review of abnormal job-termination reports should identify application
v. Develop BCP and IS DRP
vi. Develop resumption procedures jobs that terminated before successful completion.
vii. Training and awareness programs ● Operator problem reports are used by operators to log computer
viii. Test and implement plan operations problems and their solutions. Operator work schedules are
ix. Monitoring: Periodic testing of the recovery plan is critical to ensure maintained by IS management to assist in human resource planning.
that whatever has been planned and documented is feasible.
● Capacity-monitoring software to monitor usage patterns and trends
● Terms
enables management to properly allocate resources and ensure
continuous efficiency of operations.
● Network-monitoring devices are used to capture and inspect network ● Level 0 + 1 – High transfer rate; striped plus mirror; losing 2 drives = major
traffic data. The logs from these devices can be used to inspect activities data loss
from known or unknown users to find evidence of unauthorized access.
2. Open Systems Interconnection Model: a conceptual model that characterizes
● System downtime provides information regarding the effectiveness and
and standardizes the communication functions of a telecommunication or
adequacy of computer preventive maintenance programs and can be very computing system without regard to its underlying internal structure and
helpful to an IS auditor when determining the efficacy of a systems- technology.
maintenance program. Layer Name Example protocols Function
● A host-based intrusion prevention system (IPS) prevents unauthorized Packet Filtering Router Network Layer
changes to the host.
● A network-based intrusion detection system (IDS) relies on attack 4. In any given scenario, following are the best practises for Wireless (Wi-Fi)
signatures based on known exploits and attack patterns. security:
i. Statistical: calculation of network traffic and loadings ● Enable MAC (Media Access Control) address filtering.
ii. Signature: known patterns and techniques
iii. Neural: learning network ● Enable Encryption to protect data in transit.
iv. Honey bits, pot, net: sacrificial files, server, or subnet
● Disable SSID (service set identifier) broadcasting.
● Security ranking: randomly generated PSK > MAC-based PSK (MAC address
of a computer is fixed and often accessible) > WEP (very weak encryption
technique and can be cracked within minutes) > SSID.
● In any given scenario, WPA-2 (Wi-Fi Protected Access) is the strongest
encryption standard for the wireless connection.
● In any given scenario, confidentiality of the data transmitted in a wireless
LAN is BEST protected, if the session is encrypted using dynamic keys (as
compared to static keys)
● Electromagnetic emissions from a terminal can be detected by
sophisticated equipment and displayed, thus giving access to data to
unauthorized persons.
● Configuration management is one of the key components of any network
since it establishes how the network will function internally and externally.
Domain 5—Protection of Information Assets
● Task-based access control: bases on task requirement.
1. Security goal and matching control
Security Goal Primary Control Failure Consequence ● Attribute-based access controls: a selective control that is flexible.
8. Risk assessment
● First step is to identify the assets. (in some cases, critical process)
● Fourth step is prioritizing the risk on the basis of impact. (IT risk analysis)
9. Security Requirements
● Authenticity – verification that message not changed in transit
● Network availability