Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trust in, and value from, information systems

Similar presentations


Presentation on theme: "Trust in, and value from, information systems"— Presentation transcript:

1 Trust in, and value from, information systems
ISACA® Trust in, and value from, information systems

2 Chapter 2 IT Governance and Management of IT
2012 CISA Review Course Chapter 2 IT Governance and Management of IT

3 Course Agenda Learning Objectives
Discuss Task and Knowledge Statements Discuss specific topics within the chapter Case studies Sample questions Instructor Directions: Advise participants that the course will be interactive and will include “audience participation”, breakout sessions, practice questions, assignments and references to additional study resources. Exam Preparation resources: CISA Review Manual 2012 CISA QAE 2011 CISA QAE Supplement 2012

4 Exam Relevance Ensure that the CISA candidate…
Understands and can provide assurance that the organization has the structure, policies, accountability mechanisms and monitoring practices in place to achieve the requirements of corporate governance of IT. The content area in this chapter will represent approximately 14% of the CISA examination (approximately 28 questions). Content to Emphasize: The content area in this chapter will represent approximately 14% of the CISA examination

5 Chapter 2 Learning Objectives
Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization’s strategies and objectives. Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organization’s strategies and objectives. Evaluate the IT strategy, including the IT direction, and the processes for the strategy’s development, approval, implementation and maintenance for alignment with the organization’s strategies and objectives. Instructor Directions: Task and knowledge statements represent the basis from which exam items are written. The learning objectives are what the IS auditors/CISA candidates are expected to know to perform their job duties. In order to perform all of the tasks, the IS auditor/CISA candidate should have a firm grasp of all the knowledge statements found in the CISA Review Manual. Content to Emphasize: Chapter 2 - Section One defines the eleven tasks within the IT governance area and provides the task statements that a CISA candidate is expected to know how to do. For more detailed information on how each knowledge statement maps back to the task statements, please refer to Exhibit 2.1—Tasks and Knowledge Statements Mapping. Review Manual reference pages: pgs

6 Chapter 2 Learning Objectives (continued)
Evaluate the organization’s IT policies, standards, and procedures, and the processes for their development, approval, implementation, maintenance, and monitoring, to determine whether they support the IT strategy and comply with regulatory and legal requirements. Evaluate the adequacy of the quality management system to determine whether it supports the organization’s strategies and objectives in a cost-effective manner. Evaluate IT management and monitoring of controls (e.g., continuous monitoring, quality assurance [QA]) for compliance with the organization’s policies, standards and procedures. Instructor Directions: The learning objectives are what IS auditors/CISA candidates are expected to know to perform their job duties. In order to perform all of the tasks, the IS auditor/CISA candidate should have a firm grasp of all the knowledge statements found in the manual. Content to Emphasize: Chapter 2 - Section One defines the eleven tasks within the IT governance area and provides the task statements that a CISA candidate is expected to know how to do. For more detailed information on how each knowledge statement maps back to the task statements, please refer to Exhibit 2.1—Tasks and Knowledge Statements Mapping. Review Manual reference pages: pgs

7 Chapter 2 Learning Objectives (continued)
Evaluate IT resource investment, use and allocation practices, including prioritization criteria, for alignment with the organization’s strategies and objectives. Evaluate IT contracting strategies and policies, and contract management practices to determine whether they support the organization’s strategies and objectives. Evaluate risk management practices to determine whether the organization’s IT-related risks are properly managed. Instructor Directions: The learning objectives are what IS auditors/CISA candidates are expected to know to perform their job duties. In order to perform all of the tasks, the IS auditor/CISA candidate should have a firm grasp of all the knowledge statements found in the manual. Content to Emphasize: Chapter 2 - Section One defines the eleven tasks within the IT governance area and provides the task statements that a CISA candidate is expected to know how to do. For more detailed information on how each knowledge statement maps back to the task statements, please refer to Exhibit 2.1—Tasks and Knowledge Statements Mapping. Review Manual reference pages: pgs

8 Chapter 2 Learning Objectives (continued)
Evaluate monitoring and assurance practices to determine whether the board and executive management receive sufficient and timely information about IT performance. Evaluate the organization’s business continuity plan to determine the organization’s ability to continue essential business operations during the period of an IT disruption. Instructor Directions: The learning objectives are what IS auditors/CISA candidates are expected to know to perform their job duties. In order to perform all of the tasks, the IS auditor/CISA candidate should have a firm grasp of all the knowledge statements found in the manual. Content to Emphasize: Chapter 2 - Section One defines the eleven tasks within the IT governance area and provides the task statements that a CISA candidate is expected to know how to do. For more detailed information on how each knowledge statement maps back to the task statements, please refer to Exhibit 2.1—Tasks and Knowledge Statements Mapping. Review Manual reference pages: pgs

9 2.2 Corporate Governance Ethical corporate behavior by directors or others charged with governance in the creation and presentation of value for all stakeholders The distribution of rights and responsibilities among different participants in the corporation, such as board, managers, shareholders and other stakeholders Establishment of rules to manage and report on business risks Instructor Directions: Discuss the overall concept of corporate governance.  Content to Emphasize: The Organisation for Economic Co-operation and Development (OECD) states: "Corporate governance involves a set of relationships between a company’s management, its board, its shareholders and other stakeholders. Corporate governance also provides the structure through which the objectives of the company are set, and the means of attaining those objectives and monitoring performance are determined. Good corporate governance should provide proper incentives for the board and management to pursue objectives that are in the interests of the company and its shareholders and should facilitate effective monitoring..” (OECD 2004, OECD Principles of Corporate Governance, p.11) With respect to public governance, the OECD states: “Good, effective public governance helps to strengthen democracy and human rights, promote economic prosperity and social cohesion, reduce poverty, enhance environmental protection and the sustainable use of natural resources, and deepen confidence in government and public administration.” (OECD website on Public Governance and Management). Review Manual Reference Pages: p. 87

10 2.3 IT Governance Comprises the body of issues addressed in considering how IT is applied within the enterprise. Effective enterprise governance focuses on: Individual and group expertise Experience in specific areas Key element: alignment of business and IT Review Manual Reference Pages: p

11 2.3 IT Governance (continued)
Two issues: IT delivers value to the business IT risks are managed Content to Emphasize: 1st is driven by strategic alignment of IT with the business 2nd is driven by embedding accountability into the enterprise Review Manual Reference Pages: p. 88

12 Practice Question 2-1 In order for management to effectively monitor the compliance of processes and applications, which of the following would be the MOST ideal? A. A central document repository B. A knowledge management system C. A dashboard D. Benchmarking The correct answer is C A dashboard provides a set of information to illustrate compliance of the processes, applications and configurable elements and keeps the enterprise on course. A central document repository provides a great deal of data, but not necessarily the specific information that would be useful for monitoring and compliance. A knowledge management system provides valuable information, but is generally not used by management for compliance purposes. Benchmarking provides information to help management adapt the organization, in a timely manner, according to trends and environment. p. 83

13 2.4 Information Technology Monitoring and Assurance Practices for Management
IT governance implies a system where all stakeholders provide input into the decision making process: Board Internal customers Finance Content to Emphasize: Review Manual Reference Pages: p. 88

14 2.4.1 Best Practices for IT Governance
Content to Emphasize:   IT governance structure IT governance purpose and integration Corporate governance Review Manual Reference Pages: p

15 2.4.1 Best Practices for IT Governance (continued)
IT governance has become significant due to: Demands for better return from IT investments Increases in IT expenditures Regulatory requirements for IT controls Selection of service providers and outsourcing Complexity of network security Adoptions of control frameworks Benchmarking Review Manual Reference Pages: p

16 2.4.1 Best Practices for IT Governance (continued)
Audit role in IT governance Audit plays a significant role in the successful implementation of IT governance within an organization Reporting on IT governance involves auditing at the highest level in the organization and may cross division, functional or departmental boundaries Content to Emphasize: The IS auditor should confirm that the terms of reference state the: • Scope of the work • Reporting line to be used • IS auditor’s right of access to information    Review Manual Reference Pages: p

17 2.4.1 Best Practices for IT Governance (continued)
In accordance with the defined role of the IS auditor, the following aspects related to IT governance need to be assessed: Alignment of the IS function with the organization’s mission, vision, values, objectives and strategies Achievement of performance objectives established by the business (e.g., effectiveness and efficiency) by the IS function Legal, environmental, information quality, fiduciary, security, and privacy requirements The control environment of the organization The inherent risks within the IS environment IT investment/expenditure Content to Emphasize: The organizational status and skill sets of the IS auditor should be considered for appropriateness with regard to the nature of the planned audit. Review Manual Reference Pages: p. 90

18 2.4.2 IT Strategy Committee The creation of an IT strategy committee is an industry best practice Committee should broaden its scope to include not only advice on strategy when assisting the board in its IT governance responsibilities, but also to focus on IT value, risks and performance Content to Emphasize: The analysis of steering committee responsibilities is information the CISA should know.. Review Manual Reference Pages: p. 90

19 Instructor Directions:
Discuss the roles and responsibilities of the IT Steering and Strategy Committees. Review Manual Reference Pages: p. 90

20 2.4.3 Standard IT Balanced Scorecard
A process management evaluation technique that can be applied to the IT governance process in assessing IT functions and processes Method goes beyond the traditional financial evaluation One of the most effective means to aid the IT strategy committee and management in achieving IT and business alignment Content to Emphasize: Discuss the three-layered structure used in addressing the four perspectives for an IT Balanced Scorecard: Mission Strategies Measures The standard IT balanced scorecard is information a CISA should know. Review Manual Reference Pages: pgs

21 2.4.4 Information Security Governance
Focused activity with specific value drivers Integrity of information Continuity of services Protection of information assets Integral part of IT governance Importance of information security governance Review Manual Reference Pages: p

22 2.4.4 Information Security Governance (continued)
Importance of information security governance Information security (Infosec) covers all information processes, physical and electronic, regardless of whether they involve people and technology or relationships with trading partners, customers and third parties. Infosec is concerned with all aspects of information and its protection at all points of its life cycle within the organization. Content to Emphasize: One of the major trends: outsourcing of in-house processes. Note: Information security coverage extends beyond the geographic boundary of the organization’s premises in onshoring and offshoring models being adopted by organizations. This trend has changed the way in which information security is managed. Review Manual Reference Pages: pgs. 92

23 2.4.4 Information Security Governance (continued)
Effective information security can add significant value to an organization by: Providing greater reliance on interactions with trading partners Improving trust in customer relationships Protecting the organization’s reputation Enabling new and better ways to process electronic transactions  Review Manual Reference Pages: p. 92

24 2.4.4 Information Security Governance (continued)
Outcomes of security governance Strategic alignment—align with business strategy Risk management—manage and execute appropriate measures to mitigate risks Value delivery—optimize security investments Performance measurement – measure, monitor and report on information security processes Resource management—utilize information security knowledge and infrastructure efficiently and effectively Process integration – integration of management assurance processes for security Review Manual Reference Pages: p

25 2.4.4 Information Security Governance (continued)
Effective information security governance To achieve effective information security governance, management must establish and maintain a framework to guide the development and management of a comprehensive information security program that supports business objectives This framework provides the basis for the development of a cost-effective information security program that supports the organization’s business goals. Content to Emphasize: The governance framework will generally consist of: • A comprehensive security strategy intrinsically linked with business objectives • Governing security policies that address each aspect of strategy, controls and regulation • A complete set of standards for each policy to ensure procedures and guidelines comply with policy • An effective security organizational structure void of conflicts of interest Review Manual Reference Pages: p. 93

26 2.4.4 Information Security Governance (continued)
Information security governance requires strategic direction and impetus from: Boards of directors / senior management Senior management Steering committees Chief information security officers Review Manual Reference Pages: pgs. 94

27 2.4.5 Enterprise Architecture
Involves documenting an organization’s IT assets in a structured manner to facilitate understanding, management and planning for IT investments Often involves both a current state and optimized future state representation Instructor Directions:  The exhibit (2.4) on Relationships of Security Governance Outcomes to Management Responsibilities is not specifically tested in the CISA exam but is information a CISA should be aware of. Content to Emphasize: The current focus on EA is a response to the increasing complexity of IT, the complexity of modern organizations, and an enhanced focus on aligning IT with business strategy and ensuring IT investments deliver real returns. Review Manual Reference Pages: p

28 2.4.5 Enterprise Architecture (continued)
The Basic Zachman Framework Data Functional Network People Process Strategy Scope Enterprise Model Systems Model Technology Model Detailed Representation Content to Emphasize: The ultimate objective is to complete all cells of the matrix. The idea is to provide guidance on issues such as: whether and when to use advanced technical environments how to better connect intra- and interorganizational systems how to “web enable” legacy and enterprise resource planning (ERP) applications whether to insource or outsource IT functions Review Manual Reference Pages: pgs. 94

29 2.4.5 Enterprise Architecture (continued)
The Federal Enterprise Architecture (FEA) hierarchy: Performance Business Service component Technical Data Content to Emphasize: The FEA has a hierarchy of five reference models: • Performance reference model—A framework to measure the performance of major IT investments and their contribution to program performance • Business reference model—A function-driven framework that describes the functions and subfunctions performed by the government, independent of the agencies that actually perform them • Service component reference model—A functional framework that classifies the service components that support business and performance objectives • Technical reference model—A framework that describes how technology supports the delivery, exchange and construction of service components • Data reference model—While still being developed, this will describe the data and information that support program and business line operations Review Manual Reference Pages: p. 94

30 2.5.1 Strategic Planning From an IS standpoint, strategic planning relates to the long-term direction an organization wants to take in leveraging information technology for improving its business processes Effective IT strategic planning involves a consideration of the organization’s demand for IT and its IT supply capacity Content to Emphasize:   The importance of developing strategic plans What makes a plan effective Who creates the plan Review Manual Reference Pages: p

31 2.5.1 Strategic Planning (continued)
The IS auditor should pay attention to the importance of IT strategic planning Focus on the importance of a strategic planning process or planning framework Consider how the CIO or senior IT management are involved in the creation of the overall business strategy Content to Emphasize: Discuss the IS auditor’s role in evaluating the strategic plan, process and framework Consider how the CIO or senior IT management are involved in the creation of the overall business strategy Repercussions of poor strategic plans/processes Review Manual Reference Pages: p

32 Practice Question 2-2 Which of the following would be included in an IS strategic plan? A. Specifications for planned hardware purchases B. Analysis of future business objectives C. Target dates for development projects D. Annual budgetary targets for the IS department The correct answer is B IS strategic plans must address the needs of the business and meet future business objectives. Hardware purchases may be outlined, but not specified, and neither budget targets nor development projects are relevant choices. Choices A, C and D are not strategic items. p

33 Practice Question 2-3 Which of the following BEST describes an IT department’s strategic planning process? A. The IT department will have either short-range or long-range plans depending on the organization’s broader plans and objectives. B. The IT department’s strategic plan must be time- and project-oriented, but not so detailed as to address and help determine priorities to meet business needs. C. Long-range planning for the IT department should recognize organizational goals, technological advances and regulatory requirements. D. Short-range planning for the IT department does not need to be integrated into the short-range plans of the organization since technological advances will drive the IT department plans much quicker than organizational plans. The correct answer is C Long-range planning for the IT department should recognize organizational goals, technological advances and regulatory requirements. Typically, the IT department will have long-range and short-range plans that are consistent and integrated with the organization’s plans. These plans must be time- and project-oriented, as well as address the organization’s broader plans toward attaining its goals. p.83-84

34 2.5.2 Steering Committee An organization’s senior management should appoint a planning or steering committee to oversee the IS function and its activities A high-level steering committee for information technology is an important factor in ensuring that the IS department is in harmony with the corporate mission and objectives Instructor Directions: Consider that the responsibilities will vary from organization to organization and that these responsibilities listed are the most common of the steering committee. The CISA candidate should know the purpose of the IS steering committee and it’s major responsibilities. Content to Emphasize: Primary functions performed by this committee include: • Review the long- and short-range plans of the IS department to ensure that they are in accordance with the corporate objectives. • Review and approve major acquisitions of hardware and software within the limits approved by the board of directors. • Approve and monitor major projects and the status of IS plans and budgets, establish priorities, approve standards and procedures, and monitor overall IS performance. • Review and approve sourcing strategies for select, or all, IS activities, including insourcing or outsourcing, and the globalization or offshoring of functions. • Review adequacy of resources and allocation of resources in terms of time, personnel and equipment. • Make decisions regarding centralization vs. decentralization and assignment of responsibility. • Support development and implementation of an enterprisewide information security management program. • Report to the board of directors on IS activities.     Review Manual Reference Pages: p. 95

35 2.6 Maturity and Process Improvement Models
IDEAL model Capability Maturity Model Integration (CMMI) Team Software Process (TSP) Personal Software Process (PSP) Review Manual Reference Pages: p

36 2.7 IT Investment and Allocation Practices
Financial benefits – impact on budget and finances Nonfinancial benefits – impact on operations or mission performance and results Instructor Directions: Mention and discuss the value of IT and the Val IT framework. Review Manual Reference Pages: p

37 2.8 Policies and Procedures
Reflect management guidance and direction in developing controls over: Information systems Related resources IS department processes Review Manual Reference Pages: p. 97

38 2.8.1 Policies High level documents Must be clear and concise
Set tone for organization as a whole (top down) Lower-level policies – defined by individual divisions and departments Instructor Directions: Discuss advantages and disadvantages to top-down and bottom-up approaches to developing policies. Content to Emphasize: Policies represent the corporate philosophy of an organization and the strategic thinking of senior management and the business process owners. individual divisions and departments should define lower-level policies. The lower-level policies should be consistent with the corporate-level policies. These would apply to the employees and operations of these units, and would focus at the operational level. Review Manual Reference Pages: p

39 2.8.1 Policies (continued) Information Security Policy
Defines information security, overall objectives and scope Is a statement of management intent Is a framework for setting control objectives including risk management Defines responsibilities for information security management Acceptable Use Policy Instructor Directions: Discuss information security policies and their role the auditor plays in reviewing the policy. Content to Emphasize: Review Manual Reference Pages: p

40 2.8.2 Procedures Procedures are detailed documents that:
Define and document implementation policies Must be derived from the parent policy Must implement the spirit (intent) of the policy statement Must be written in a clear and concise manner Content to Emphasize: An independent review is necessary to ensure that policies and procedures have been properly documented, understood and implemented Review Manual Reference Pages: p. 99

41 2.9 Risk Management The process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives. Avoid Mitigate Transfer Accept Review Manual Reference Pages: p. 99

42 2.9.1 Developing a Risk Management Program
To develop a risk management program: Establish the purpose of the risk management program Assign responsibility for the risk management plan Review Manual Reference Pages: p. 99

43 2.9.2 Risk Management Process
Identification and classification of information resources or assets that need protection Assess threats and vulnerabilities and the likelihood of their occurrence Once the elements of risk have been established they are combined to form an overall view of risk Content to Emphasize: Examples of typical assets associated with information and IT include: • Information and data • Hardware • Software • Services • Documents • Personnel Common classes of threats are: • Errors • Malicious damage/attack • Fraud • Theft • Equipment/software failure Review Manual Reference Pages: p

44 2.9.2 Risk Management Process (continued)
Evaluate existing controls or design new controls to reduce the vulnerabilities to an acceptable level of risk Residual risk Content to Emphasize: Final acceptance of residual risks takes into account: • Organizational policy • Risk identification and measurement • Uncertainty incorporated in the risk assessment approach • Cost and effectiveness of implementation Review Manual Reference Pages: p

45 2.9.2 Risk Management Process (continued)
IT risk management needs to operate at multiple levels including: The operational level The project level The strategic level Instructor Directions: Discuss the different risk management levels. Review Manual Reference Pages: p. 101

46 2.9.3 Risk Analysis Methods Qualitative Semiquantitative Quantitative
Probability and expectancy Annual loss expectancy method Review Manual Reference Pages: p

47 2.9.3 Risk Analysis Methods (continued)
Management and IS auditors should keep in mind certain considerations: Risk management should be applied to IT functions throughout the company Senior management responsibility Quantitative RM is preferred over qualitative approaches Quantitative RM always faces the challenge of estimating risks Quantitative RM provides more objective assumptions The real complexity or the apparent sophistication of the methods or packages used should not be a substitute for commonsense or professional diligence Special care should be given to very high impact events, even if the probability of occurrence over time is very low. Review Manual Reference Pages: p

48 2.10.1 Human Resource Management
Hiring Employee handbook Promotion policies Training Scheduling and time reporting Employee performance evaluations Required vacations Termination policies Instructor Directions: The IS auditor should be aware of personnel management issues but this information is not tested in the CISA exam due to its subjectivity and organizational-specific subject matter. Review Manual Reference Pages: pgs

49 Sourcing Practices Sourcing practices relate to the way an organization obtains the IS function required to support the business Organizations can perform all IS functions in- house or outsource all functions across the globe Sourcing strategy should consider each IS function and determine which approach allows the IS function to meet the organization’s goals Instructor Directions: Discuss how IS functions can be delivered. Content to Emphasize: Delivery of IS functions can include: • Insourced—Fully performed by the organization’s staff • Outsourced—Fully performed by the vendor’s staff • Hybrid—Performed by a mix of the organization’s and vendor’s staff; can include joint ventures/supplemental staff IS functions can be performed across the globe, taking advantage of time zones and arbitraging labor rates, and can include: • Onsite—Staff work onsite in the IS department • Offsite—Also known as nearshore, staff work at a remote location in the same geographical area • Offshore—Staff work at a remote location in a different geographic region Review Manual Reference Pages: p

50 2.10.2 Sourcing Practices (continued)
Outsourcing practices and strategies Contractual agreements under which an organization hands over control of part or all of the functions of the IS department to an external party Becoming increasingly important in many organizations The IS auditor must be aware of the various forms outsourcing can take as well as the associated risks Content to Emphasize:  Reasons for outsourcing include: • A desire to focus on core activities • Pressure on profit margins • Increasing competition that demands cost savings • Flexibility with respect to both organization and structure The services provided by a third party can include: • Data entry • Design and development of new systems in the event that the in-house staff does not have the requisite skills or is otherwise occupied in higher-priority tasks, or in the event of a one-time task in which case there is no need to recruit additional in-house skilled staff • Maintenance of existing applications to free in-house staff to develop new applications • Conversion of legacy applications to new platforms. For example, a specialist company may web-enable the front end of an old application. • Operating the help desk or the call center • Operations processing Review Manual Reference Pages: Pgs. 104

51 2.10.2 Sourcing Practices (continued)
Review Manual Reference Pages: pgs. 104

52 2.10.2 Sourcing Practices (continued)
Globalization practices and strategies Requires management to actively oversee the remote or offshore locations The IS auditor can assist an organization in moving IS functions offsite or offshore by ensuring that IS management considers the following: Legal, regulatory and tax issues Continuity of operations Personnel Telecommunication issues Cross-border and cross-cultural issues Review Manual Reference Pages: p. 105

53 2.10.2 Sourcing Practices (continued)
Governance in outsourcing Mechanism that allows organizations to transfer the delivery of services to third parties Accountability remains with the management of the client organization Transparency and ownership of the decision- making process must reside within the purview of the client Review Manual Reference Pages: p

54 2.10.2 Sourcing Practices (continued)
Third-party service delivery management Every organization using the services of third parties should have a service delivery management system in place to implement and maintain the appropriate level of information security and service delivery in line with third-party service delivery agreements The organization should check the implementation of agreements, monitor compliance with the agreements and manage changes to ensure that the services delivered meet all requirements agreed to with the third party. Review Manual Reference Pages: pgs. 108

55 2.10.3 Organizational Change Management
What is change management? Managing IT changes for the organization Identify and apply technology improvements at the infrastructure and application level Review Manual Reference Pages: p. 110

56 2.10.4 Financial Management Practices
User-pays scheme – chargeback IS budgets Review Manual Reference Pages: p. 110

57 Quality Management Software development, maintenance and implementation Acquisition of hardware and software Day-to-day operations Service management Security Human resource management General administration Instructor Directions: The IS auditor should be aware of quality management. However, the CISA exam does not test specifics on any ISO standards. Review Manual Reference pgs. 110

58 Practice Question 2-4 The MOST important responsibility of a data security officer in an organization is: A. recommending and monitoring data security policies. B. promoting security awareness within the organization. C. establishing procedures for IT security policies. D. administering physical and logical access controls. The correct answer is A A data security officer’s prime responsibility is recommending and monitoring data security policies. Promoting security awareness within the organization is one of the responsibilities of a data security officer. But, it is not as important as recommending and monitoring data security policies. The IT department, not the data security officer, is responsible for establishing procedures for IT security policies recommended by the data security officer and for the administration of physical and logical access controls. p

59 Practice Question 2-5 What is considered the MOST critical element for the successful implementation of an information security (IS) program? A. An effective enterprise risk management (ERM) framework B. Senior management commitment C. An adequate budgeting process D. Meticulous program planning The correct answer is B Commitment from senior management provides the basis to achieve success in implementing an information security program. An effective ERM framework is not a key success factor for an IS program. Although an effective IS budgeting process will contribute to success, senior management commitment is the key ingredient. Program planning is important, but will not be sufficient without senior management commitment. p

60 2.10.7 Performance Optimization
Process driven by performance indicators Optimization refers to the process of improving the productivity of information systems to the highest level possible without unnecessary, additional investment in the IT infrastructure Content to Emphasize: The broad phases of performance measurement are: • Establishing and updating performance measures • Establishing accountability for performance measures • Gathering and analyzing performance data • Reporting and using performance information Caveats of performance measurement include: • Model—A model is built or established first to evaluate the performance and alignment with the business objectives. • Measurement error—Conventional measures do not properly account for the true inputs and outputs. • Lags—Time lags between expense and benefit are not properly accounted for in current measures. • Redistribution—IT is used to redistribute the source of costs in firms; there is no difference in total output, only in the means of getting it. • Mismanagement—The lack of explicit measures of the value of information makes resources vulnerable to misallocation and overconsumption by managers. As a result, proper performance measurement techniques will play an increasing role for program managers and investment review boards. Review Manual Reference Pages: p. 111

61 2.10.7 Performance Optimization (continued)
Five ways to use performance measures: Measure products/services Manage products/services Assure accountability Make budget decisions Optimize performance Content to Emphasize: COBIT management guidelines are primarily designed to meet the needs of IT management for performance measurement. Goals and metrics and maturity models are provided for each of the 34 IT processes. These are generic and action-oriented for the purpose of addressing the following types of management concerns: • Performance measurement—What are the indicators of good performance? • IT control profiling—What is important? What are the critical success factors for control? • Awareness—What are the risks of not achieving our objectives? • Benchmarking—What do others do? How are they measured and compared? From a control perspective, the management guidelines address the key issue of determining the right level of control for IT such that it supports the objectives of the enterprise. Review Manual Reference Pages: p. 111

62 Practice Question 2-6 An IS auditor should ensure that IT governance performance measures: A. evaluate the activities of IT oversight committees. provide strategic IT drivers. adhere to regulatory reporting standards and definitions. D. evaluate the IT department. The correct answer is A Evaluating the activities of boards and committees providing oversight is an important aspect of governance and should be measured. Choices B, C and D are all irrelevant to the evaluation of IT governance performance measures. p.83-84

63 2.10 IS Organizational Structure and Responsibilities
Instructor Directions: The CISA exam does not test specific job responsibilities since they might vary within organizations. However, universally known responsibilities such as the business owners, information security functions and executive management might be tested, especially when testing access controls and data ownership. The IS auditor should be familiar with separation of duties. Review Manual Reference Pages: p. 112

64 2.11.1 IS Roles and Responsibilities
Systems development manager Project management Service Desk (help desk) End user End user support manager Instructor Directions: Explain the responsibilities of each role. Review Manual Reference Pages pgs. 112

65 2.11.1 IS Roles and Responsibilities (continued)
Data management Quality assurance manager Information security manager Content to Emphasize: Quality assurance manager—Responsible for negotiating and facilitating quality activities in all areas of information technology With the increase in outsourcing, including the use of multiple vendors, dedicated staff may be required to manage the vendors and outsourcers, including performing the following functions: • Act as the prime contact for the vendor and outsourcer within the IS function. • Provide direction to the outsourcer on issues and escalate internally within the organization and IS function. • Monitor and report on the service levels to management. • Review changes to the contract due to new requirements and obtain IS approvals. Review Manual Reference Pages: pgs. 112

66 2.11.1 IS Roles and Responsibilities (continued)
Vendor and outsourcer management Infrastructure operations and maintenance Media management Data entry Systems administration Security administration Quality assurance Review Manual Reference Pages: pgs

67 2.11.1 IS Roles and Responsibilities (continued)
Database administration Systems analyst Security architect Applications development and maintenance Infrastructure development and maintenance Network management Review Manual Reference Pages: pgs

68 2.11.2 Segregation of Duties Within IS
Avoids possibility of errors or misappropriations Discourages fraudulent acts Limits access to data Content to Emphasize: Duties that should be segregated include: • Custody of the assets • Authorization • Recording transactions If adequate segregation of duties does not exist, the following could occur: • Misappropriation of assets • Misstated financial statements • Inaccurate financial documentation (i.e., errors or irregularities) • Improper use of funds or modification of data could go undetected Unauthorized or erroneous changes or modification of data and programs may not be detected Review Manual Reference Pages: pgs. 115

69 2.11.2 Segregation of Duties Within IS (continued)
Instructor Directions: The segregation of duties control matrix (exhibit 2.9) is not an industry standard, but a guideline indicating which positions should be separated and which require compensating controls when combined. The matrix is illustrative of potential segregation of duties issues and should not be viewed or used as an absolute. Rather, it should be used to help identify potential conflicts so proper questions may be asked to identify compensating controls. Review Manual Reference Pages: p. 116

70 Practice Question 2-7 Which of the following tasks may be performed by the same person in a well-controlled information processing computer center? Security administration and change management Computer operations and system development System development and change management System development and systems maintenance The correct answer is D It is common for system development and maintenance to be undertaken by the same person. In both, the programmer requires access to the source code in the development environment, but should not be allowed access in the production environment. Choice A is not correct because the roles of security administration and change management are incompatible functions. The level of security administration access rights could allow changes to go undetected. Computer operations and system development (choice B) are incompatible, since it would be possible for an operator to run a program that he/she had amended. Choice C is incorrect because the combination of system development and change control would allow program modifications to bypass change control approvals. p

71 Practice Question 2-8 Which of the following is the MOST critical control over database administration? Approval of DBA activities Segregation of duties Review of access logs and activities Review of the use of database tools The correct answer is B Segregation of duties will prevent combination of conflicting functions. This is a preventive control, and it is the most critical control over database administration. Approval of DBA activities does not prevent the combination of conflicting functions. Review of access logs and activities is a detective control. If DBA activities are improperly approved, review of access logs and activities may not reduce the risk. Reviewing the use of database tools does not reduce the risk, as this is only a detective control and does not prevent combination of conflicting functions. p

72 2.11.3 Segregation of Duties Controls
Control measures to enforce segregation of duties include: Transaction authorization Custody of assets Access to data Authorization forms User authorization tables Review Manual Reference Pages: pgs

73 2.11.3 Segregation of Duties Controls (continued)
Compensating controls for lack of segregation of duties include: Audit trails Reconciliation Exception reporting Transaction logs Supervisory reviews Independent reviews Instructor Directions: Describe each of the compensating controls listed on the slide Review Manual Reference Pages: pgs. 117

74 Practice Question 2-9 When a complete segregation of duties cannot be achieved in an online system environment, which of the following functions should be separated from the others? Origination Authorization Recording Correction The correct answer is B Authorization should be separated from all aspects of record keeping (origination, recording and correction). Such a separation enhances the ability to detect the recording of unauthorized transactions. p.83-84

75 Practice Question 2-10 In a small organization, where segregation of duties is not practical, an employee performs the function of computer operator and application programmer. Which of the following controls should an IS auditor recommend? A. Automated logging of changes to development libraries Additional staff to provide segregation of duties Procedures that verify that only approved program changes are implemented D. Access controls to prevent the operator from making program modifications The correct answer is C In smaller organizations, it generally is not appropriate to recruit additional staff to achieve a strict segregation of duties. The IS auditor must look at alternatives. Of the choices, C is the only practical one that has an impact. The IS auditor should recommend processes that detect changes to production source and object code, such as code comparisons, so the changes can be reviewed by a third party on a regular basis. This would be a compensating control process. Choice A, involving logging of changes to development libraries, would not detect changes to production libraries. Choice D is in effect requiring a third party to do the changes, which may not be practical in a small organization. p.84-85

76 2.12 Auditing IT Governance Structure and Implementation
Indicators of potential problems include: Unfavorable end-user attitudes Excessive costs Budget overruns Late projects High staff turnover Inexperienced staff Frequent hardware/software errors Review Manual Reference Pages: pgs. 117

77 2.12.1 Reviewing Documentation
The following documents should be reviewed: IT strategies, plans and budgets Security policy documentation Organization/functional charts Job descriptions Steering committee reports System development and program change procedures Operations procedures Human resource manuals Quality assurance procedures Review Manual Reference Pages: p

78 2.12.2 Reviewing Contractual Commitments
There are various phases to computer hardware, software and IS service contracts, including: Development of contract requirements and service levels Contract bidding process Contract selection process Contract acceptance Contract maintenance Contract compliance Instructor Directions: An IS auditor should be familiar with the RFP process and know what needs to be reviewed in an RFP. It is also important to note that a CISA should know, from a governance perspective, the evaluation criteria and methodology of an RFP, and the requirements to meet organizational standards. Content to Emphasize: In reviewing a sample of contracts, the IS auditor should evaluate the adequacy of the following terms and conditions: • Service levels • Right to audit or third party audit reporting • Software escrow • Penalties for noncompliance • Adherence to security policies and procedures • Protection of customer information • Contract change process • Contract termination and any associated penalties Review Manual Reference Pages: pgs. 118

79 2.13 Business Continuity Planning
Business continuity planning (BCP) is a process designed to reduce the organization’s business risk A BCP is much more than just a plan for the information systems Content to Emphasize: Purpose – to enable a business to continue offering critical services in the event of a disruption and to survive a disastrous interruption to activities. Business continuity planning takes into consideration: Those key operations that are most necessary to the survival of the organization The human/material resources supporting them The business continuity plan includes: The disaster recovery plan that is used to recover a facility rendered inoperable, including relocating operations into a new location The restoration plan that is used to return operations to normality whether in a restored or new facility Review Manual Reference Pages: pgs

80 2.13 Business Continuity Planning (continued)
Corporate risks could cause an organization to suffer Inability to maintain critical customer services Damage to market share, reputation or brand Failure to protect the company assets including intellectual properties and personnel Business control failure Failure to meet legal or regulatory requirements Content to Emphasize: Modern business cannot avoid all forms of corporate risk or potential damage. A realistic objective is to ensure the survival of an organization by establishing a culture that will identify and manage those risks that could cause it to suffer. Examples of these corporate risks are listed on the slide. Review Manual Reference Pages: p

81 2.13.1 IS Business Continuity Planning
IS processing is of strategic importance Critical component of overall BCP Most key business processes depend on the availability of key systems and infrastructure components Instructor Directions: The CISA candidate will not be tested on the actual calculation of risk analysis; however, the IS auditor should be familiar with risk analysis calculation.  Content to Emphasize: An IS business continuity plan is more than just a plan for information systems. A business continuity plan identifies what the business will do in the event of a disaster. For example, where will employees report to work, how will orders be taken while the computer system is being restored, which vendors should be called to provide needed supplies? Review Manual Reference Pages: p

82 2.13.2 Disasters and Other Disruptive Events
Disasters are disruptions that cause critical information resources to be inoperative for a period of time Good BCP will take into account impacts on IS processing facilities Instructor Directions: Ask participants what constitutes a disaster in the workplace. Provide examples of planning for potential disasters (weather, terrorism, disruption in expected services, human error, etc)  Content to Emphasize: Of importance, but not tested, is the potential damage to image, reputation and brand by rumor or as a side effect of a business continuity or disaster recovery problem. Review Manual Reference Pages: p

83 2.13.3 Business Continuity Planning Process
Instructor Directions: Explain why it is so important to undertake the planning effort. Give examples on what could happen if no planning is made. Content to Emphasize: Phases of the business continuity planning process Creation of a business continuity and disaster recovery policy Business impact analysis Classification of operations and criticality analysis Development of a business continuity plan and disaster recovery procedures Training and awareness program Testing and implementation of plan Monitoring   Review Manual Reference Pages: p. 121

84 2.13.4 Business Continuity Policy
Defines the extent and scope of business continuity for both internal and external stakeholders Should be proactive Instructor Directions: Content to Emphasize: Review Manual Reference Pages: p. 121

85 2.13.5 Business Continuity Planning Incident Management
All types of incidents should be categorized Negligible Minor Major Crisis Content to Emphasize: Negligible incidents are those causing no perceptible or significant damage, such as very brief operating system (OS) crashes with full information recovery or momentary power outages with uninterruptible power supply (UPS) backup. Minor events are those that, while not negligible, produce no negative material (of relative importance) or financial impact. Major incidents cause a negative material impact on business processes and may affect other systems, departments or even outside clients. Crisis is a major incident that can have serious material (of relative importance) impact on the continued functioning of the business and may also adversely impact other systems or third parties. The severity of the impact depends on the industry and circumstances, but is generally directly proportional to the time elapsed from the inception of the incident to incident resolution. Review Manual Reference Pages: pgs

86 2.13.5 Business Continuity Planning Incident Management
Review Manual Reference Pages: p. 122

87 2.13.6 Business Impact Analysis
Critical step in developing the business continuity plan Three main questions to consider during BIA phase: What are the different business processes? What are the critical information resources related to an organization’s critical business processes? What is the critical recovery time period for information resources in which business processing must be resumed before significant or unacceptable losses are suffered? Instructor Directions: Use this slide to generate discussion on how detailed the answers to each question must be. Use Exhibit 6.3 on the next slide to identify: The sum of all costs – downtime and recovery – should be minimized. Downtime costs increase over time, recovery costs decrease over time. The sum usually is a U curve. At the bottom of the U curve is where the lowest cost can be found. Note: The IS auditor should be able to evaluate the BIA. Review Manual Reference Pages: pgs

88 2.13.6 Business Impact Analysis (continued)
Review Manual Reference Pages: p. 124

89 2.13.6 Business Impact Analysis (continued)
What is the system’s risk ranking? Critical Vital Sensitive Non-sensitive Instructor Directions: The CISA candidate will NOT be tested on calculation of costs. Content to Emphasize: Critical – These functions cannot be performed unless they are replaced by identical capabilities. Critical applications cannot be replaced by manual methods. Tolerance to interruption is very low; therefore, cost of interruption is very high. Vital – These functions can be performed manually, but only for a brief period of time. There is a higher tolerance to interruption than with critical systems and, therefore, somewhat lower costs of interruption, provided that functions are restored within a certain time frame (usually five days or less). Sensitive – These functions can be performed manually, at a tolerable cost and for an extended period of time. While they can be performed manually, it usually is a difficult process and requires additional staff to perform. Non-sensitive – These functions may be interrupted for an extended period of time, at little or no cost to the company, and require little or no catching up when restored. Review Manual Reference Pages: p. 125

90 2.13.7 Development of Business Continuity Plans
Factors to consider when developing the plans: Predisaster readiness covering incident response management to address all relevant incidents affecting business processes Evacuation procedures Procedures for declaring a disaster (escalation procedures) Circumstances under which a disaster should be declared. The clear identification of the responsibilities in the plan The clear identification of the persons responsible for each function in the plan The clear identification of contract information The step-by-step explanation of the recovery process The clear identification of the various resources required for recovery and continued operation of the organization Content to Emphasize: Based on the inputs received from BIA, criticality analysis and recovery strategy selected by management, a detailed business continuity and disaster recovery plan should be developed. It should address all issues involved in interruption to business processes, including recovering from a disaster. The various factors that should be considered while developing the plan are listed on the slide. The plan should be documented and written in a simple language understandable to all. It is common to identify teams of personnel who are made responsible for specific tasks in case of disasters. Some important teams which should be constituted and their responsibilities are explained on the next slides. Copies of the plan should be maintained offsite. Review Manual Reference Pages: p. 125

91 2.13.8 Other Issues in Plan Development
Management and user involvement is vital to the success of BCP Essential to the identification of critical systems, recovery times and resources Involvement from support services, business operations and information processing support Entire organization needs to be considered for BCP Content to Emphasize: The personnel who must react to the interruption/disaster scenarios are those responsible for the most critical resources. Therefore, management and user involvement is vital to the success of the business continuity plan. User management involvement is essential to the identification of critical systems, their associated critical recovery times and the specification of needed resources. The three major divisions that require involvement in the formulation of the business continuity plan are support services, business operations and information processing support. Because the underlying purpose of business continuity planning is the resumption of business operations, it is essential to consider the entire organization, not just IS processing services, when developing the plan. Review Manual Reference Pages: p. 125

92 2.13.9 Components of a Business Continuity Plan
A business continuity plan may consist of more than one plan document Continuity of operations plan (COOP) Disaster recovery plan (DRP) Business resumption plan Continuity of support plan / IT contingency plan Crisis communications plan Incident response plan Transportation plan Occupant emergency plan (OEP) Evacuation and emergency relocation plan Content to Emphasize: For the planning, implementation and evaluation phase of the business continuity plan the following should be agreed upon: • The policies that will govern all of the continuity and recovery efforts • The goals/requirements/products for each phase • Alternate facilities to perform tasks and operations • Critical information resources to deploy (e.g., data and systems) • Persons responsible for completion • Available resources to aid in deployment (including human) • The scheduling of activities with priorities established Review Manual Reference Pages: p

93 2.13.9 Components of a Business Continuity Plan (continued)
Components of the plan Key decision-making personnel Backup of required supplies Insurance Instructor Directions: Review Manual Reference Pages: pgs

94 2.13.9 Components of a Business Continuity Plan (continued)
Insurance IS equipment and facilities Media (software) reconstruction Extra expense Business interruption Valuable papers and records Errors and omissions Fidelity coverage Media transportation Instructor Directions: Several key points are important to remember about insurance. Most insurance covers only financial losses, based upon the historical level of performance and not the existing level of performance. Also, insurance does not compensate for loss of image/goodwill. The Business Continuity Plan should contain key information about the organization's insurance. The information systems processing insurance policy is usually a multi-peril policy designed to provide various types of IS coverage. It should be modularly constructed in modules, so that it can be adapted to the insured’s particular IS environment. Note: Specifics on insurance policies are not tested on the CISA exam because they differ from country to country. The test covers what should be included in policies and third-party agreements but would not test the specific types of coverage. Review Manual Reference Pages: p. 127

95 Plan Testing Schedule testing at a time that will minimize disruptions to normal operations Test must simulate actual processing conditions Test execution: Documentation of results Results analysis Recovery / continuity plan maintenance Instructor Notes: This is an important part of the IS auditor’s responsibility assessing the results and the value of the BCP and the DRP tests. Content to Emphasize: One of the purposes of the business continuity test is to determine how well the plan works or which portions of the plan need improvement. The test should be scheduled during a time that will minimize disruptions to normal operations. Weekends are generally a good time to conduct tests. It is important that the key recovery team members be involved in the test process and allotted the necessary time to put their full effort into it. The test should address all critical components and simulate actual primetime processing conditions, even if it is conducted in off hours. Test Execution – To perform testing, each of the following test phases should be completed: Pretest, Test, Post-Test. Documentation of Results – During every phase of the test, detailed documentation of observations, problems and resolutions should be maintained. Results Analysis – It is important to have ways to measure the success of the plan and test against the stated objectives. Therefore, results must be quantitatively gauged as opposed to an evaluation based only on observation. Recovery/Continuity plan maintenance – Plans and strategies for business continuity should be reviewed and updated on a scheduled basis to reflect continuing recognition of changing requirements. Review Manual Reference Pages: pgs

96 2.13.11 Summary of Business Continuity
Business continuity plan must: Be based on the long-range IT plan Comply with the overall business continuity strategy Review Manual Reference Pages: p. 129

97 2.13.11 Summary of Business Continuity and Disaster Recovery (continued)
Process for developing and maintaining the BCP/DRP Conduct risk assessment Prepare business impact analysis Choose appropriate controls and measures for recovering IT components to support the critical business processes Develop the detailed plan for recovering IS facilities (DRP). Develop a detailed plan for the critical business functions to continue to operate at an acceptable level (BCP). Test the plans Maintain the plans as the business changes and systems develop. Review Manual Reference Pages: p. 129

98 2.14 Auditing Business Continuity
Understand and evaluate business continuity strategy Evaluate plans for accuracy and adequacy Verify plan effectiveness Evaluate offsite storage Evaluate ability of IS and user personnel to respond effectively Ensure plan maintenance is in place Evaluate readability of business continuity manuals and procedures Instructor Directions: Use this slide to introduce the topic of how to audit business continuity. Each of the points on this slide are explained in detail on the following slides. Review Manual Reference Pages: p. 129

99 2.14.1 Reviewing the Business Continuity Plan
IS auditors should verify that basic elements of a well-developed plan are evident including: Currency of documents Effectiveness of documents Interview personnel for appropriateness and completeness Instructor Directions: Lead discussion by introducing the following questions: Who is responsible for administration or coordination of the plan? Is the plan administrator/coordinator responsible for keeping the plan up-to-date? Is there a disaster recovery implementation team (i.e., the first response team members who will react to the emergency with immediate action steps)? Where is the disaster recovery plan stored? What critical systems are covered by the plan? What systems are not covered by the plan? Why not? What equipment is not covered by the plan? Why not? Does the plan operate under any assumptions? What are they? Does the plan identify rendezvous points for the disaster management committee or emergency management team to meet and decide if business continuity should be initiated? Are the documented procedures adequate for successful recovery? Does the plan address disasters of varying degrees? Are telecommunication’s backups (both data and voice line backups) addressed in the plan? Where is the backup facility site? Does the plan address relocation to a new information processing facility in the event that the original center cannot be restored? Does the plan include procedures for merging master file data, automated tape management system data, etc., into pre-disaster files? Review Manual Reference Pages: pgs

100 2.14.2 Evaluation of Prior Test Results
IS auditors must review the test results to: Determine whether corrective actions are in the plan Evaluate thoroughness and accuracy Determine problem trends and resolution of problems Review Manual Reference Pages: p. 130

101 2.14.3 Evaluation of Offsite Storage
An IS auditor must: Evaluate presence, synchronization and currency of media and documentation Perform a detailed inventory review Review all documentation Evaluate availability of facility Content to Emphasize: The offsite storage facility should be evaluated to ensure the presence, synchronization and currency of critical media and documentation. Review Manual Reference Pages: p. 130

102 2.14.4 Interviewing Key Personnel
Key personnel must have an understanding of their responsibilities Current detailed documentation must be kept Review Manual Reference Pages: p. 131

103 2.14.5 Evaluation of Security at Offsite Facility
An IS auditor must: Evaluate the physical and environmental access controls Examine the equipment for current inspection and calibration tags Review Manual Reference Pages: p. 131

104 2.14.6 Reviewing Alternative Processing Contract
An IS auditor should obtain a copy of the contract with the vendor The contract should be reviewed against a number of guidelines Contract is clear and understandable Organization’s agreement with the rules Content to Emphasize: Ensure that the contract is written clearly and is understandable. Reexamine and confirm the organization’s agreement with the rules that apply to sites shared with other subscribers. Ensure that insurance coverage ties in with and covers all (or most) expenses of the disaster. Ensure that tests can be performed at the hot site at regular intervals. Review and evaluate communications requirements for the backup site. Ensure that enforceable source code escrow is reviewed by a lawyer specializing in such contracts. Determine the limitation recourse tolerance in the event of a breached agreement. Review Manual Reference Pages: p. 131

105 2.14.7 Reviewing Insurance Coverage
Insurance coverage must reflect actual cost of recovery Coverage of the following must be reviewed for adequacy Media damage Business interruption Equipment replacement Business continuity processing Instructor Directions: The CISA candidate should know what critical provisions need to be included within insurance policies to safeguard the organization. Review Manual Reference Pages: p. 131

106 Case Study A Scenario An IS auditor has been asked to review the draft of an outsourcing contract and SLA and recommend any changes or point out any concerns prior to these being submitted to senior management for final approval. The agreement includes outsourcing support of Windows and UNIX server administration and network management to a third party. Servers will be relocated to the outsourcer’s facility that is located in another country, and connectivity will be established using the Internet. Operating system software will be upgraded on a semiannual basis, but it will not be escrowed. All requests for addition or deletion of user accounts will be processed within three business days. Instructor Directions: Discuss case study Review Manual Reference Pages: p. 131

107 Case Study A Scenario (continued)
Intrusion detection software will be continuously monitored by the outsourcer and the customer notified by if any anomalies are detected. New employees hired within the last three years were subject to background checks. Prior to that, there was no policy in place. A right to audit clause is in place, but 24-hour notice is required prior to an onsite visit. If the outsourcer is found to be in violation of any of the terms or conditions of the contract, it will have 10 business days to correct the deficiency. The outsourcer does not have an IS auditor, but it is audited by a regional public accounting firm. Review Manual Reference Pages: p. 131

108 Case Study A Question 1. Which of the following should be of MOST concern to the IS auditor? A. User account changes are processed within three business days. B. Twenty-four hour notice is required prior to an onsite visit. C. The outsourcer does not have an IS audit function. D. Software escrow is not included in the contract. The correct answer is A Three business days to remove the account of a terminated employee would create an unacceptable risk to the organization. In the intervening time, significant damage could be done. In contrast, some degree of advance notice prior to an onsite visit is generally accepted within the industry. Also, not every outsourcer will have its own internal audit function or IS auditor. Software escrow is primarily of importance when dealing with custom application software, where there is a need to store a copy of the source code with a third party. Operating system software for generally available commercial operating systems would not require software escrow. Review Manual Reference Pages: p. 131 Answer p. 134

109 Case Study A Question 2. Which of the following would be the MOST significant issue to address if the servers contain personally identifiable customer information that is regularly accessed and updated by end users? A. The country in which the outsourcer is based prohibits the use of strong encryption for transmitted data. B. The outsourcer limits its liability if it took reasonable steps to protect the customer data. C. The outsourcer did not perform background checks for employees hired over three years ago. D. System software is only upgraded once every six months. The correct answer is A Since connectivity to the servers is over the Internet, the prohibition against strong encryption will place any transmitted data at risk. The limitation of liability is a standard industry practice. Although the failure to perform background checks for employees hired more than three years ago is of importance, it is not as significant an issue. Upgrading system software once every six months does not present any significant exposure. Review Manual Reference Pages: p. 131 Answer p. 134

110 Case Study B Scenario An organization has implemented an integrated application for supporting business processes. It has also entered into an agreement with a vendor for application maintenance and providing support to the users and system administrators. This support will be provided by a remote vendor support center using a privileged user ID with O/S level super user authority having read and write access to all files. The vendor will use this special user ID to log on to the system for troubleshooting and implementing application updates (patches). Due to the volume of transactions, activity logs are only maintained for 90 days. Instructor Directions: Discuss case study Review Manual Reference Pages: p. 132

111 Case Study B Question 1. Which of the following is a MAJOR concern for the IS auditor? A. User activity logs are only maintained for 90 days. B. The special user ID will access the system remotely. C. The special user ID can alter activity log files. D. The vendor will be testing and implementing patches on servers. The correct answer is C Because the super user ID has read and write access to all files, there is no way to ensure that the activity logs are not modified to hide unauthorized activity by the vendor. Remote access is not a major concern as long as the connection is made over an encrypted line, and testing and implementing patches on servers is part of vendor- provided support. Although 90- day retention of logs may not be sufficient in some business situations, it is not as major a concern as is the fact that the vendor has the ability to alter the activity logs. Review Manual Reference Pages: p. 132 Answer p. 134

112 Case Study B Question 2. Which of the following actions would be MOST effective in reducing the risk that the privileged user account may be misused? A. The special user ID should be disabled except when maintenance is required. B. All usage of the special user account should be logged. C. The agreement should be modified so that all support is performed onsite. D. All patches should be tested and approved prior to implementation. The correct answer is A The MOST effective and practical control in this situation is to lock the special user account when it is not needed. The account should be opened only when vendor needs access for support and closed immediately after use. All activities should be logged and reviewed for appropriateness. The other choices are not as effective or practical in reducing the risk. Review Manual Reference Pages: p. 132 Answer p. 134

113 Case Study C Scenario An IS auditor was asked to review alignment between IT and business goals for a small financial institution. The IS auditor requested various information including business goals and objectives and IT goals and objectives. The IS auditor found that business goals and objectives were limited to a short bulleted list, while IT goals and objectives were limited to slides used in meetings with the CIO (the CIO reports to the CFO). It was also found in the documentation provided that over the past two years, the risk management committee (composed of senior management) only met on three occasions, and no minutes of what was discussed were kept for these meetings. When the IT budget for the upcoming year was compared to the strategic plans for IT, it was noted that several of the initiatives mentioned in the plans for the upcoming year were not included in the budget for that year. Instructor Directions: Discuss case study Review Manual Reference Pages: p. 132

114 Case Study C Question 1. Which of the following should be of GREATEST concern to the IS auditor? A. Strategy documents are informal and incomplete. B. The risk management committee seldom meets and does not keep minutes . C. Budgets do not appear adequate to support future IT investments. D. The CIO reports to the CFO. The correct answer is B The fact that the risk management committee seldom meets and when it does meet, no minutes are taken, is the greatest concern. Because senior management is not meeting regularly to discuss key risk issues, and minutes are not captured which would provide for follow up, analysis and commitment, this indicates a serious lack of governance. The other options are not as serious in their potential impact on the organization. Review Manual Reference Pages: p. 132 Answer p. 134

115 Case Study C Question 2. Which of the following would be the MOST significant issue to address? A. The prevailing culture within IT. B. The lack of information technology policies and procedures. C. The risk management practices as compared to peer organizations. D. The reporting structure for IT. The correct answer is B The absence of policies and procedures makes it difficult if not impossible to implement effective IT governance. Other issues are secondary by comparison. Review Manual Reference Pages: p. 132 Answer p. 134

116 Case Study D Scenario An IS Auditor is auditing the IT governance practices for an organization. During the course of the work, it is noted that the organization does not have a full time chief Information officer (CIO). The organization chart of the entity provides for an information systems manager reporting to the chief financial officer (CFO), who in turn reports to the board of directors. The board plays a major role in monitoring IT initiatives in the entity and the CFO communicates on a frequent basis the progress of IT initiatives. Instructor Directions: Discuss case study Review Manual Reference Pages: p. 133

117 Case Study D Scenario (cont’d)
From reviewing the segregation of duties matrix, it is apparent that application programmers are only required to obtain approval from the data base administrator (DBA) to directly access production data. It is also noted that the application programmers have to provide the developed program code to the program librarian, who then migrates it to production. Information systems audits are carried out by the internal audit department, which reports to the CFO at the end of every month, as part of business performance review process; the financial results of the entity are reviewed in detail and signed off by the business managers for correctness of data contained therein. Instructor Directions: Discuss case study Review Manual Reference Pages: p. 133

118 Case Study D Question 1. Given the circumstances described, what would be of GREATEST concern from an IT governance perspective? A. The organization does not have a full-time CIO. B. The organization does not have an IT steering committee. C. The board of the organization plays a major role in monitoring IT initiatives. D. The information systems manager reports to the CFO. The correct answer is D The information systems manager should ideally report to the board of directors or the chief executive officer (CEO) to provide a sufficient degree of independence. The reporting structure that requires the Information Systems manager to report to the CFO is not a desirable situation and could lead to the compromise of certain controls. Review Manual Reference Pages: p. 133 Answer p. 134

119 Case Study D Question 2. Given the case, what would be of GREATEST concern from a segregation of duties perspective? A. Application programmers are required to obtain approval only from the DBA for direct write access to data. B. Application programmers are required to turn over the developed program code to the program librarian for migration to production. C. The internal audit department reports to the CFO. D. Business performance reviews are required to be signed off only by the business managers. The correct answer is A The application programmers should obtain approval from the business owners before accessing data. DBAs are only custodians of the data and should only provide access that is authorized by the data owner. Review Manual Reference Pages: p. 133 Answer p. 134 119

120 Case Study D Question 3. Which of the following would BEST address data integrity from a mitigating control standpoint? A. Application programmers are required to obtain approval from DBA for direct access to data. B. Application programmers are required to hand over the developed program codes to the program librarian for transfer to production. C. The internal audit department reports to the CFO. D. Business performance results are required to be reviewed and signed off by the business managers. The correct answer is D Sign-off on data contained in the financial results by the business managers at the end of the month would detect any significant discrepancies that would result from tampering of data through inappropriate direct access of data without the approval or knowledge of the business managers. Review Manual Reference Pages: p. 133 Answer p. 134

121 Case Study E Scenario An organization is developing revised business continuity (BCPs) and disaster recovery plans (DRPs) for its headquarters facility and network of 16 branch offices. The current plans have not been updated in more than eight years, during which time the organization has grown by over 300 percent. At the headquarters facility, there are approximately 750 employees. These individuals connect over a local area network to an array of more than 60 application, database and file print servers located in the corporate data center and over a frame relay network to the branch offices. Traveling users access corporate systems remotely by connecting over the Internet using virtual private networking. Users at both headquarters and the branch offices access the Internet through a firewall and proxy server located in the data center. Critical applications have a recovery time objective (RTO) of between three and five days. Branch offices are located between 30 and 50 miles from one another, with none closer to the headquarters’ facility than 25 miles. Instructor Directions: Discuss case study Review Manual Reference Pages: p. 133

122 Case Study D Scenario (cont’d)
Each branch office has between 20 and 35 employees plus a mail server and a file/print server. Backup media for the data center are stored at a third-party facility 35 miles away. Backups for servers located at the branch offices are stored at nearby branch offices using reciprocal agreements between offices. Current contracts with a third party hot site provider include 25 servers, work area space equipped with desktop computers to accommodate 100 individuals, and a separate agreement to ship up to two servers and 10 desktop computers to any branch office declaring an emergency. The contract term is for three years, with equipment upgrades occurring at renewal time. The hot site provider has multiple facilities throughout the country in case the primary facility is in use by another customer or rendered unavailable by the disaster. Senior management desires that any enhancements be as cost effective as possible. Instructor Directions: Discuss case study Review Manual Reference Pages: p. 133

123 Case Study E Question 1. On the basis of the above information, which of the following should the IS auditor recommend concerning the hot site? A. Desktops at the hot site should be increased to 750. B. An additional 35 servers should be added to the hot site contract. C. All backup media should be stored at the hot site to shorten the RTO. D. Desktop and server equipment requirements should be reviewed quarterly. The correct answer is D As equipment needs in a rapidly growing business are subject to frequent change, quarterly reviews are necessary to ensure that the recovery capability keeps pace with the organization. Since not all employee job functions are critical during a disaster, it is not necessary to contact the same number of desktops at a recovery facility as the number of employees. Similarly, not every server is critical to the continued operation of the business. In both cases, only a subset will be required. Since there is no assurance that the hot site will not already be occupied, it would not be advisable to store backup media at the facility. These facilities are generally not designed to provide extensive media storage, and frequent testing by other customers could compromise the security of the media. Review Manual Reference Pages: p. 133 Answer p. 134

124 Case Study E Question 2. Given the case, what would be of GREATEST concern from a segregation of duties perspective? A. Application programmers are required to obtain approval only from the DBA for direct write access to data. B. Application programmers are required to turn over the developed program code to the program librarian for migration to production. C. The internal audit department reports to the CFO. D. Business performance reviews are required to be signed off only by the business managers. The correct answer is B The most cost-effective solution is to recommend that branches have sufficient capacity to accommodate critical personnel from another branch. Since critical job functions would represent only perhaps 20 percent of the staff from the affected branch, accommodations for only four to seven critical staff members would be needed. Adding each of the branches to the hot site contract would be far more expensive, while adding capacity to the hot site contract would not provide coverage as hot site contracts base their pricing on each location covered. Finally, relocating branch servers to the data center could result in performance issues, and would not address the question of where to locate displaced employees. Review Manual Reference Pages: p. 133 Answer p. 134

125 Conclusion Chapter 2 Quick Reference Review
Pages of CISA Review Manual 2012


Download ppt "Trust in, and value from, information systems"

Similar presentations


Ads by Google