Quiz-1-Reviewer
Quiz-1-Reviewer
DOMAIN 1
1
DOMAIN 1
THE PROCESS OF AUDITING INFORMATION SYSTEMS
2
DOMAIN 1 OVERVIEW
3
DOMAIN 1 OBJECTIVES
4
DOMAIN 1 TOPICS
Planning Execution
• IS Audit Standards, Guidelines and • Audit Project Management
Codes of Ethics • Sampling Methodology
• Business Processes • Audit Evidence Collection Techniques
• Types of Controls • Data Analytics
• Risk-Based Audit Planning • Reporting and Communication Techniques
• Types of Audits and Assessments • Quality Assurance and Improvement of
the Audit Process
5
PLANNING
SECTION 1
24
TOPICS
Introduction
IS Audit Standards, Guidelines and Codes
of Ethics
Business Processes
Types of Controls
25
WHAT IS AUDIT?
8
AUDIT PROCESS
9
IS AUDIT STANDARDS, GUIDELINES, AND CODES
OF ETHICS
SECTION 1
10
ISACA IS AUDIT AND ASSURANCE STANDARDS
11
ISACA IS AUDIT AND ASSURANCE STANDARDS FRAMEWORK
The framework for the ISACA IS Audit and Assurance Standards provides for
multiple levels of documents:
• Standards define mandatory requirements for IS audit and assurance and reporting.
• Guidelines provide guidance in applying IS audit and assurance standards. The IS auditor
should consider them in determining how to achieve implementation of the above standards,
use professional judgment in their application and be prepared to justify any departure from the
standards.
• Tools and techniques provide examples of processes an IS auditor might follow in an audit
engagement. The tools and techniques documents provide information on how to meet
the standards when completing IS auditing work, but do not set requirements.
12
STANDARDS AND GUIDELINES
General Apply to the conduct of all assignments, and deal with ethics,
(Guiding principles)
independence, objectivity and due care as well as
knowledge, competency and skill
Performance Deal with the conduct of the assignment, such as planning
and supervision, scoping, risk and materiality, resource
mobilization, supervision and assignment management, audit
and assurance evidence
Reporting Address the types of reports, means of communication and
the information communicated
13
ISACA IS AUDIT AND ASSURANCE GUIDELINES
Consider them in
Use professional
determining how to
judgment in
implement ISACA
applying them to
audit and assurance
specific audits.
standards.
Be able to justify
any departure from
the ISACA audit and
assurance
standards.
14
CODE OF PROFESSIONAL ETHICS
16
CODE OF PROFESSIONAL ETHICS
(CONT’D)
Inform appropriate parties of the results of work
performed, including the disclosure of all
significant facts known to them that, if not
disclosed, may distort the reporting of the results.
Support the professional education of stakeholders
in enhancing their understanding of the governance
and management of enterprise information
systems and technology, including audit, control,
security and risk management.
17
ITAF
18
BUSINESS PROCESSES
19
OVERVIEW
20
TOPICS
39
IS INTERNAL AUDIT FUNCTION
The role of the IS internal audit function should be established by an audit charter
approved by the board of directors and the audit committee (senior management if
these entities do not exist).
An audit charter is an overarching document that covers the entire scope of audit
activities in an entity while an engagement letter is more focused on a particular
audit exercise that is sought to be initiated in an organization with a specific
objective in mind.
The charter should clearly state management’s responsibility and objectives for,
and delegation of authority to, the IS audit function.
22
MANAGEMENT OF THE IS
AUDIT FUNCTION
23
AUDIT PLANNING
24
WHEN TO AUDIT
25
AUDIT PLANNING STEPS
Identify stated contents, such as policies, standards and required guidelines, procedures and organization structure.
26
ADDITIONAL CONSIDERATIONS
The audit plan should take into consideration the objectives of the IS audit relevant to
the audit area and its technology infrastructure and business strategic direction. The IS
auditor can gain this information by:
• Reading background material, including industry publications, annual reports and independent
financial analysis reports
• Reviewing prior audit reports or IT-related reports (from external or internal audits, or
specific reviews such as regulatory reviews)
• Reviewing business and IT long-term strategic plans
27
ADDITIONAL CONSIDERATIONS (CONT’D)
The IS auditor must also match available audit resources, such as staff, with the
tasks
defined in the audit plan.
28
LAWS AND REGULATIONS
29
IS AUDIT ROLE AND COMPLIANCE
30
IS AUDIT STEPS AND DETERMINING ORGANIZATIONAL
COMPLIANCE
Assess whether management and the IT function have considered the relevant external requirements
in their plans, policies, standards and procedures, as well as business application features.
Determine if there are procedures in place to ensure contracts or agreements with external IT services
providers reflect any legal requirements related to responsibilities.
31
BUSINESS PROCESS APPLICATIONS AND
CONTROLS
In an integrated application environment, controls are
embedded and designed into the business application
To effectively audit
that supports the processes. Business process control business application
assurance involves evaluating controls at the process and systems, an IS auditor
activity level. must obtain a clear
understanding of the
These controls may be a combination of: application system
under review.
• Management
• Programmed
• Manual controls
32
BUSINESS APPLICATION SYSTEMS
56
INTERNAL CONTROLS
57
CONTROL CLASSIFICATION
Class Function
Detective • Use controls that detect and report the occurrence of an error, omission or malicious act.
Corrective • Minimize the impact of a threat.
• Remedy problems discovered by detective controls.
• Identify the cause of a problem.
• Correct errors arising from a problem.
• Modify the processing system(s) to minimize future occurrences of the problem.
37
CONTROL OBJECTIVES AND CONTROL MEASURES
Control objective
• An objective of one or more operational area(s) or role(s) to be
achieved, in order to contribute to the fulfillment of strategic
goal(s) of the company. That is, the control objective is such a
goal, that is explicitly related to the strategy of the company.
Control measure
• An activity contributing to the fulfillment of a control objective. Both
the control objective and control measure serve the decomposition
of the strategic-level goals into such lower-level goals and
activities, that can be assigned as tasks to the staff. This
assignment can take the form of a role description in a job
38
description.
IS CONTROL OBJECTIVES
39
IS CONTROL OBJECTIVES (CONT’D)
• Safeguarding assets
• System development life cycle (SDLC) processes are established, in place and operating effectively
• Integrity of general operating system (OS) environments
• Integrity of sensitive and critical application system environments
• Appropriate identification and authentication of users
• The efficiency and effectiveness of operations
• Integrity and reliability of systems by implementing effective change management procedures
• Complying with the users’ requirements, organizational policies and procedures, and applicable laws and
regulations (compliance objectives)
• Ensuring availability of IT services by developing efficient business continuity plans (BCPs), disaster
recovery plans (DRPs), that include backup and recovery processes
• Enhancing protection of data and systems by developing an incident response plan
• Ensuring integrity and reliability of systems by implementing effective change management procedures
• Ensuring that outsourced IS processes and services have clearly defined service level agreements (SLAs)
and contract terms and conditions to ensure the organization’s assets are properly protected and meet
61
business goals and objectives
GENERAL CONTROLS
Each general control can be translated into an IS-specific control. The IS auditor
should understand IS controls and how to apply them in planning an audit.
IS control procedures include:
• Strategy and direction of the IT function
• General organization and management of the IT function
• Access to IT resources, including data and programs
• Systems development methodologies and change control
42
IS-SPECIFIC CONTROLS (CONT’D)
43
RISK-BASED AUDIT PLANNING
44
RISK-BASED AUDITING
45
Conclude the Audit
• Create recommendations. • Write the audit report.
AUDIT RISK AND MATERIALITY
• As it relates to audit risk, it • The risk that a material • The risk that material • The probability that
is the risk level or error exists that would not errors or misstatements information or financial
exposure of the be prevented or detected that have occurred will reports may contain
process/entity to be on a timely basis by the not be detected by an IS material errors and that
audited without system of internal auditor. the auditor may not detect
considering the controls controls. For example, the an error that has
that management has control risk associated occurred. An objective in
implemented. Inherent with manual reviews of formulating the audit
risk exists independent of computer logs can be high approach is to limit the
an audit and can occur because activities audit risk in the area
because of the nature of requiring investigation are under scrutiny so the
the business. often easily missed due to overall audit risk is at a
the volume of logged sufficiently low level at the
information. The control completion of the
risk associated with examination.
computerized data
validation procedures is
ordinarily low if the
processes are
consistently applied.
46
RISK ASSESSMENT
47
RISK RESPONSE
48
RISK ASSESSMENT PROCESS
determine areas to be
•audited:
Enables management to Conduct Assessment
resources
• Ensures that relevant Identify Vulnerabilities and Predisposing Conditions
management
• Establishes a basis for Determine Magnitude of Impact
During audit planning, the IS auditor must perform or review a risk analysis to identify
risks and vulnerabilities in order to determine the controls needed to mitigate those
risks.
The IS auditor’s role is to:
• Understand the relationship between risk and control.
• Identify and differentiate risk types and the controls used to mitigate the risk.
• Evaluate risk assessment and management techniques used by the organization.
• Understand that risk exists as part of the audit process.
50
RISK MANAGEMENT PROCESS
51
TYPES OF AUDITS
Type Description
Compliance audits Compliance audits include specific tests of controls to demonstrate adherence to
specific regulatory or industry standards. Examples include Payment Card Industry
Data Security Standard (PCI DSS) audits for companies that process credit card data
and Health Insurance Portability and Accountability Act (HIPAA) audits for
companies that handle health care data.
Financial audits The purpose of a financial audit is to assess the accuracy of financial reporting. It
often involves detailed, substantive testing, although increasingly, auditors are
placing more emphasis on a risk- and control-based audit approach. This kind of
audit relates to financial information integrity and reliability.
52
TYPES OF AUDITS (CONT’D)
Type Description
Operational audits An operational audit is designed to evaluate the internal control structure in a given
process or area. Examples include
IS audits of application controls or logical security systems.
Administrative audits These are oriented to assess issues related to the efficiency of operational
productivity within an organization.
IS audits This process collects and evaluates evidence to determine whether the information
systems and related resources adequately safeguard assets, maintain data and
system integrity and availability, provide relevant and reliable information, achieve
organizational goals effectively, and consume resources efficiently. Also, do they
have, in effect, internal controls that provide reasonable assurance that business,
operational and control objectives will be met and that undesired events will be
prevented, or detected and corrected, in a timely manner.
53
TYPES OF AUDITS (CONT’D)
Type Description
Forensic audits Forensic auditing has been defined as auditing specialized in discovering, disclosing
and following up on fraud and crimes. The primary purpose of such a review is the
development of evidence for review by law enforcement and judicial authorities.
Integrated audits An integrated audit combines financial and operational audit steps. It is performed to
assess the overall objectives within an organization, related to financial information
and assets’ safeguarding, efficiency and compliance.
54
AUDIT METHODOLOGY
55
AUDIT PHASES
56
AUDIT PHASES (CONT’D)
Audit • Identify and select the audit approach to verify and test the
procedures controls.
and steps for • Identify a list of individuals to interview.
data gathering • Identify and obtain departmental policies, standards and
guidelines for review.
• Develop audit tools and methodology to test and verify
control.
57
AUDIT PHASES (CONT’D)
58