d2 - CISA - Domain 01 - Day-2 - Information Systems Auditing Process (Execution)
d2 - CISA - Domain 01 - Day-2 - Information Systems Auditing Process (Execution)
Domain 01:
1
Day02-Information Systems Auditing Process
2
Day02-Information Systems Auditing Process (Execution)
Several steps are required to perform an audit. Adequate Execution is a necessary first step in
performing effective IS audits.
To efficiently use IS audit resources, audit organizations must assess the overall risk for the
general and application areas and related services being audited, and then develop an audit
program that consists of objectives and audit procedures to satisfy the audit objectives.
The audit process requires an IS auditor to gather evidence, evaluate the strengths and
weaknesses of controls based on the evidence gathered through audit tests, and prepare an
audit report that presents to management those issues (i.e., areas of control weaknesses with
recommendations for remediation) in an objective manner
3
Day02-Information Systems Auditing Process (Execution)
4
Day02-Information Systems Auditing Process (Execution)
5
Day02-Information Systems Auditing Process (Execution)
AUDIT OBJECTIVES
Audit objectives refer to the specific goals that must be accomplished by the audit.
In contrast, a control objective refers to how an internal control should function. An audit
generally incorporates several audit objectives.
Audit objectives often focus on confirming that internal controls exist to minimize business risk
and they function as expected.
These audit objectives include assuring compliance with legal and regulatory requirements as
well as the confidentiality, integrity, reliability and availability of information and IT resources.
One of the primary purposes of an IS audit is to identify control objectives and the related
controls that address the objective.
6
Day02-Information Systems Auditing Process (Execution)
AUDIT PHASES
Each phase in the execution of an audit can be divided into key steps to plan, define, perform
and report the results.
An IS auditor often evaluates IT functions and systems from different perspectives, such as
security (confidentiality, integrity and availability), quality (effectiveness, efficiency), fiduciary
(compliance, reliability), service and capacity.
The audit work program is the audit strategy and plan—it identifies scope, audit objectives and
audit procedures to obtain sufficient, relevant and reliable evidence to draw and support audit
conclusions and opinions.
7
Day02-Information Systems Auditing Process (Execution)
AUDIT PHASES
8
Day02-Information Systems Auditing Process (Execution)
Evidence is any information used by an IS auditor to determine whether the entity or data being audited follows the
established criteria or objectives and supports audit conclusions. It is a requirement that conclusions be based on
sufficient, relevant and competent evidence.
When planning the IS audit, the type of audit evidence to be gathered, its use as audit evidence to meet audit
objectives and its varying levels of reliability should be considered.
Audit evidence may include:
• An IS auditor’s observations (presented to management)
• Notes taken from interviews
• Results of independent confirmations obtained by an IS auditor from different stakeholders
• Material extracted from correspondence and internal documentation or contracts with external partners
• The results of audit test procedures
10
Day01-Information Systems Auditing Process (Execution)
RISK FACTORS:
Evaluation of the risk factors should be based on objective criteria, although subjectivity cannot
be completely avoided.
For example, in respect to the reputation factor, the criteria (based on which inputs can be
solicited from the business) may be rated as:
• High—A process issue may result in damage to the reputation of the organization that will take
more than six months to recover.
• Medium—A process issue may result in damage to the reputation of the organization that will
take less than six months but more than three months to recover.
• Low—A process issue may result in damage to the reputation of the organization that will take
less than three months to recover.
11
Day01-Information Systems Auditing Process (Execution)
Ecommerce is the buying and selling of goods online. Typically, a buyer purchases goods and
services from a website and provides delivery and payment details, including transfers or
payment orders.
The website may gather details about customers and offer other items that may be of interest.
The term e-business includes buying and selling online as well as customer support or
relationships between businesses.
Ecommerce, as a general model, uses technology to enhance the processes of commercial
transactions among a company, its customers and business partners. The technology used can
include the Internet, multimedia, web browsers, proprietary networks, automatic teller
machines (ATMs) and home banking.
12
Day01-Information Systems Auditing Process (Execution)
Control Classifications
14
Day01-Information Systems Auditing Process (Execution)
Control Classifications
15
Day01-Information Systems Auditing Process (Execution)
RISK ASSESSMENT
17
Day01-Information Systems Auditing Process (Execution)
18
Day01-Information Systems Auditing Process (Execution)
21