IT Internal Control Checklist
IT Internal Control Checklist
The following table can be used to document the application systems of the auditee.
Environmental controls
16. Are there policies and
procedures in place to cover
environmental controls?
17. Are the following
environmental controls in
place:
Fire suppression
systems
Fire extinguishers
Focus area Answer Examples of evidence What could go w Reference to Comments
Yes / No to be obtained / rong if control have not been evidence
verified implemented? obtained
UPS, generators,
Air conditioning
systems (especially in
computer room)
Humidity,
temperature control
systems
18. Is there a formal, documented
and tested emergency
procedure in place?
IT service continuity
19. Does the entity have a
disaster recovery plan?
20. Are copies of the IT continuity
plan and disaster recovery
plan kept off-site
21. Has a backup and retention
strategy been implemented?
22. Are backups performed,
verified and checked for
successful completion?
23. Are backups stored in a secure
offsite storage facility?
Logical Access control
24. Is there a formally
documented and approved
user management standards
and procedures in the
organization?
25. Are processes in place to
review user access rights on
the system and if the rights
are in line with their
responsibilities
26. Does every user have a unique
user name
Focus area Answer Examples of evidence What could go w Reference to Comments
Yes / No to be obtained / rong if control have not been evidence
verified implemented? obtained
27.
Conclusion
The following problems / risk areas have been identified in this working paper
The internal control over IT in the authority is adequate.