Академический Документы
Профессиональный Документы
Культура Документы
IT Governance
IT Auditing, Hall, 3e
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part.
IT Governance
IT Governance: subset of corporate governance that
focuses on the management and assessment of strategic
IT resources
Key objects:
◦ Reduce risk
◦ Ensure investments in IT resources add value to the
corporation
All employees and stakeholders must be active
participants in key IT decisions
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 1
IT Governance Controls
Three IT governance issues addressed by SOX and the
COSO internal control framework:
◦ Organizational structure of the IT function
◦ Computer center operations
◦ Disaster recovery planning
Nature of risk associated with each issue
Controls used to mitigate risk
Audit objectives
Tests of controls
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 2
Structuring the IT Function
Centralized data processing
[see Figure 2-1]
Organizational chart [see Figure 2-2]
Database administrator
Data processing manager/dept.
Data control
Data preparation/conversion
Computer operations
Data library
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
3
Structuring the IT Function
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
4
Structuring the IT Function
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
5
Structuring the IT Function
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
6
Structuring the IT Function
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
7
Structuring the IT Function
Segregation of incompatible IT functions
Alternative 1: segregate systems analysis from programming
[see Figure 2-3]
Two types of control problems from this approach:
Inadequate documentation
Is a chronic problem. Why?
Not interesting
Lack of documentation provides job security
Assistance: Use of CASE tools
Potential for fraud
Example: Salami slicing, trap doors
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 8
Structuring the IT Function
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
9
Structuring the IT Function
Segregation of incompatible IT functions
Segregate data library from operations
Physical security of off-line data files
Implications of modern systems on use of data library:
Real-time/online vs. batch processing
Volume of tape files is insufficient to justify full-time librarian
Alternative: rotate on ad hoc basis
Custody of on site data backups
Custody of original commercial software and licenses
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
10
Structuring the IT Function
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
11
Structuring the IT Function
▪ Segregation of incompatible IT functions
✔ Audit procedures:
❑ Obtain and review security policy
❑ Verify policy is communicated
❑ Review relevant documentation (org. chart, mission
statement, key job descriptions)
❑ Review systems documentation and maintenance records
(using a sample)
❑ Verify whether maintenance programmers are also original
design programmers
❑ Observe segregation policies in practice
❑ Review operations room access log
❑ Review user rights and privileges
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
12
The Distributed Model
Distributed Data Processing (DDP) involves
reorganizing the central IT function into small
IT units that are placed under the control of
end users
Two alternatives shown in [figure 2-4]
Alternative A: centralized
Alternative B: decentralized / network
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
13
Risks Associated with DDP
Inefficient use of resources
Mismanagement of resources by end users
Hardware and software incompatibility
Redundant tasks
Destruction of audit trails
Inadequate segregation of duties
Hiring qualified professionals
Increased potential for errors
Programming errors and system failures
Lack of standards
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
14
Advantages of DDP
Cost reduction
End user data entry vs. data control group
Application complexity reduced
Development and maintenance costs reduced
Improved cost control responsibility
IT critical to success then managers must control the
technologies
Improved user satisfaction
Increased morale and productivity
Backup flexibility
Excess capacity for DRP
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
15
Controlling the DDP Environment
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
16
Audit Objectives: DDP Environment
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
17
Audit Objectives: DDP Environment
Review the corporate policy on computer security
◦ Verify that the security policy is communicated to
employees
Review documentation to determine if individuals or
groups are performing incompatible functions
Review systems documentation and maintenance records
◦ Verify that maintenance programmers are not also design
programmers
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
18
The Computer Controls Center
Physical location
Avoid human-made and natural hazards
Example: Chicago Board of Trade
Construction
Ideally: single-story, underground utilities, windowless, use of
filters
If multi-storied building, use top floor (away from traffic flows,
and potential flooding in a basement)
Access
Physical: Locked doors, cameras
Manual: Access log of visitors
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
19
The Computer Controls Center
Air conditioning
Especially mainframes
Amount of heat even from a group of PCs
Fire suppression
Automatic: usually sprinklers
Gas, such as halon, that will smother fire by removing oxygen
can also kill anybody trapped there
Sprinklers and certain chemicals can destroy the computers
and equipment
Manual methods
Power supply
Need for clean power, at a acceptable level
Uninterrupted power supply
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
20
Audit Objectives: The Computer
Center
physical security IC protects the computer
center from physical exposures
insurance coverage compensates the
organization for damage to the computer
center
operator documentation addresses routine
operations as well as system failures
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
21
Considerations: The Computer Center
Controls
man-made threats and natural hazards
underground utility and communications lines
air conditioning and air filtration systems
access limited to operators and computer center workers;
others required to sign in and out
fire suppression systems installed
fault tolerance
◦ redundant disks and other system components
◦ backup power supplies
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
22
Audit Procedures: The Computer Center
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e
23
Disaster Recovery Planning
Disaster recovery plans (DRP) identify:
◦ actions before, during, and after the disaster
◦ disaster recovery team
◦ priorities for restoring critical applications
Audit objective – verify that DRP is
adequate and feasible for dealing with
disasters
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 24
Disaster Recovery Plan
1. Critical Applications – Rank critical applications so an orderly and effective restoration of
computer systems is possible.
2. Create Disaster Recovery Team – Select team members, write job descriptions, describe
recovery process in terms of who does what.
3. Site Backup – a backup site facility including appropriate furniture, housing, computers, and
telecommunications. Another valid option is a mutual aid pact where a similar business or
branch of same company swap availability when needed.
4. Hardware Backup – Some vendors provide computers with their site – known as a hot site or
Recovery Operations Center. Some do not provide hardware – known as a cold site. When
not available, make sure plan accommodates compatible hardware (e.g., ability to lease
computers).
5. System Software Backup – Some hot sites provide the operating system. If not included in
the site plan, make sure copies are available at the backup site.
6. Application Software Backup – Make sure copies of critical applications are available at the
backup site
7. Data Backup – One key strategy in backups is to store copies of data backups away from the
business campus, preferably several miles away or at the backup site. Another key is to test
the restore function of data backups before a crisis.
8. Supplies – A modicum inventory of supplies should be at the backup site or be able to be
delivered quickly.
9. Documentation – An adequate set of copies of user and system documentation.
10. TEST! – The most important element of an effective Disaster Recovery Plan is to test it
before a crisis occurs, and to test it periodically (e.g., once a year).
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 25
Disaster Recovery Planning
Major IC concerns:
◦second-site backups
◦critical applications and databases
● including supplies and documentation
◦back-up and off-site storage procedures
◦disaster recovery team
◦testing the DRP regularly
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 26
Second-Site Backups
Empty shell - involves two or more user
organizations that buy or lease a building and
remodel it into a computer site, but without
computer equipment
Recovery operations center - a completely
equipped site; very costly and typically shared
among many companies
Internally provided backup - companies with
multiple data processing centers may create
internal excess capacity
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 27
DRP Audit Procedures
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 28
DRP Audit Procedures
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 29
Benefits of IT Outsourcing
Improved core business processes
Improved IT performance
Reduced IT costs
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 30
Risks of IT Outsourcing
Failure to perform
Vendor exploitation
Costs exceed benefits
Reduced security
Loss of strategic advantage
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 31
Audit Implications of IT Outsourcing
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or
duplicated, or posted to a publicly accessible website, in whole or in part. Hall, 3e 32