Presentation is loading. Please wait.

Presentation is loading. Please wait.

© John Beveridge CobiT Update NSAA IT Conference Richmond, VA John W. Beveridge September 27, 2007.

Similar presentations

Presentation on theme: "© John Beveridge CobiT Update NSAA IT Conference Richmond, VA John W. Beveridge September 27, 2007."— Presentation transcript:


2 © John Beveridge CobiT Update NSAA IT Conference Richmond, VA John W. Beveridge September 27, 2007

3 © John Beveridge 2 Deputy State Auditor, Commonwealth of Massachusetts Adjunct faculty at Bentley College Co-Chair of Commonwealths Enterprise Security Board Member of Information Systems Auditing Standards Board and Assurance Board Member of CobiT Steering Committee, International President of ISACA/F, Served as member of IT Commission, Governors Commission on Computer Crime, Governors Commission on Computer Technology and Law, & Governors Task Force on E-Commerce John Beveridge, CISA, CISM, CGFM, CFE, CQA

4 © John Beveridge 3 l Authoritative, up-to-date, international set of generally accepted IT control objectives and control practices for day- to-day use by business managers and auditors. l Structured and organized to provide a powerful control model and evaluative tool

5 © John Beveridge 4 Focuses on information having integrity, being secure, and available. Management-oriented Supports corporate and IT governance Process-oriented Controls-based Measurement-driven Based on a Strong Foundation and Sound Principles of Internal Control

6 © John Beveridge 5 C OBI T Promotes an improved focus on business information requirements Helps ensure that IT processes are defined and that responsibilities are assigned Supports managements efforts to demonstrate due diligence Serves as excellent criteria for evaluation Strengthens the understanding, design, implementation, exercise, and evaluation of internal control

7 © John Beveridge 6 Right information, to only the right party, in the right format, at the right time, at the right cost. Information that is relevant, reliable, secure, and available. Information provided by systems that have integrity by means of a well-managed and properly controlled IT environment. Focus on Information and IT Management

8 © John Beveridge 7 To Those Individuals Who are Interested in and Responsible for the Management and Evaluation of Information Technology Management IT & Business Users Auditors / Advisors Academics & Students of Management and IT Legislators, Regulators, Oversight Bodies Vendors Who is C OBI T aimed at?

9 © John Beveridge 8 Need for better operational controls Importance of technology Risks associated with an ever changing technology environment Demand for recognizable value Need to hold senior management accountable and strengthen governance

10 © John Beveridge 9 Achieving sufficient value from IT to support the entitys mission within a complex, vulnerable and ever changing environment Adequately managing risk with increasing IT dependence Effectively dealing with the scale and cost of current and future IT investments Protecting operations and IT resources against increasing vulnerabilities and a wide spectrum of threats

11 © John Beveridge 10 Being able to adequately track and measure IT performance in support of business objectives Obtaining adequate assurance for the integrity, security and availability of IT systems Being able to demonstrate due diligence in meeting IT governance objectives

12 © John Beveridge 11 Today, we are no longer just automating an established business process. Instead, we are using technology to expand business process capabilities and management decision making -- It is about IT-enabled change. Poorly-managed IT places the integrity, security, and availability of data and systems at risk and increases the likelihood of unrealized benefit.

13 © John Beveridge 12 Management Issues Difficulty of obtaining adequate assurance that operational and control objectives are being addressed and will be met Not being sufficiently aware of the impact of technology on control assessment Not knowing who is really responsible for system integrity, security, and availability Having cluttered or defused points of accountability for IT processes across the organization

14 © John Beveridge 13 Management Issues Not recognizing that we often manage IT as if it were separate from the enterprise when in fact it is highly integrated with business operations Uncoordinated strategic planning between business and IT operations Outsourcing without adequate monitoring and evaluation

15 © John Beveridge 14 Management Issues There are a whole host of folks who pose a real danger to IT systems Meeting privacy requirements Failing to meet regulatory or legal requirements Having a false sense of security Achieving adequate value to support the entitys mission

16 © John Beveridge 15 Management Questions Is IT well managed? –Are we doing the right things? –Are we doing them the best way? –Are they being done well? –Are we achieving desired benefits? Is IT properly controlled? Do we exercise and can we demonstrate due diligence? Are the information technology drivers in sync with the agencys mandates and business goals?

17 © John Beveridge 16 How do responsible managers keep the ship on course? …… keep it afloat? How do we achieve satisfactory results for our citizens and stake-holders? How do we adapt in a timely manner to best practices for our organizations environment?

18 © John Beveridge 17 To establish and maintain course... and afloat Strategic and tactical planning, monitoring and evaluation – dashboards with indicators – Disaster recovery and BCP to keep it afloat To achieve satisfactory results for our customers and stake-holders Measurement processes, balanced scorecard, etc. To adapt in a timely manner to best practices for our organizations environment Benchmarking, CMM comparisons

19 © John Beveridge 18 IT Value How do we manage to achieve acceptable IT value? What policies, practices and assurance mechanisms do we apply to the right resources to achieve value? What guidance is there to assist management in understanding IT processes and how to achieve IT process results? What standards should be applied to our IT environment? How do we address governance?

20 © John Beveridge 19 Many organizations recognize the potential benefits of technology The successful organizations: Understand that IT is more than an enabler Understand and manage the risks associated with implementing new technologies Keep a keen eye on the mission and goals, and Know where they are through measured progress and monitoring and evaluation Need for IT Governance Control Framework

21 © John Beveridge 20 Organizations require a structured approach for managing these and other challenges. Need to ensure that IT objectives are agreed to, good management controls are in place, and there is effective monitoring of performance to keep on track and avoid unexpected outcomes. The Need for IT Governance Keeping IT Running Security Value/Cost Managing Complexity Aligning IT with Business Regulatory Compliance

22 © John Beveridge 21 CobiT underscores the importance to recognize: Optimizing value, safeguarding, and ensuring the availability of technology is an entity or senior management issue, not just an IT management issue Business and IT goals depend on our understanding of how to dynamically apply IT, measure results, and engage IT and business process management Requires understanding of what we want the technology to do, and how we are going to measure success Need for IT Governance Control Framework

23 © John Beveridge 22 COBIT: Starts from business requirements Is process-oriented, organizing IT activities into a generally accepted process model Identifies the major IT resources to be leveraged Defines the management control objectives to be considered Incorporates major international standards Has become the de facto standard for overall control of IT COBIT helps bridge the gaps between business risks, control needs and technical issues. It provides good practices across a domain and process framework and presents activities in a manageable and logical structure. IT resources need to be managed by a set of naturally grouped processes. C OBI T provides a framework that achieves this objective. COBIT Provides a Framework for IT Governance

24 © John Beveridge 23 How Does C OBI T View IT Governance? Consists of leadership, organizational structures, and processes that ensure that IT sustains and extends the enterprises strategies and objectives IT governance is the responsibility of executives and the board of directors

25 © John Beveridge 24 IT Governance Objectives IT is aligned with the business and enables the business to maximize benefit IT resources are safeguarded and used in a responsible and ethical manner IT-related risks are addressed through appropriate controls and managed to minimize risk and exposure

26 © John Beveridge 25 IT Governance Integrates and institutionalizes good practices to ensure that IT supports the business objectives. Enables the enterprise to take advantage of its information and IT resources to maximize benefit and capitalize on opportunities.

27 © John Beveridge 26 C OBI T IT Governance IT is aligned with the business IT enables the business and maximizes benefits IT resources are used responsibly IT risks are managed appropriately

28 © John Beveridge 27 IT Governance Focus Areas Strategic alignment Value delivery Resource management Risk management Performance measurement

29 © John Beveridge 28 IT Governance Focus Areas Strategic Alignment focuses on ensuring the linkage of business and IT plans; defining, maintaining and validating the IT value proposition; and aligning IT operations with enterprise operations. Value Delivery is about executing the value proposition throughout the delivery cycle, ensuring that IT delivers the promised benefits against the strategy, concentrating on optimizing costs and proving the intrinsic value of IT.

30 © John Beveridge 29 IT Governance Focus Areas Resource Management is about the optimal investment in, and the proper management of, critical IT resources: applications, information, infrastructure and people. Key issues relate to the optimization of knowledge and infrastructure. Risk Management requires risk awareness by senior corporate officers, a clear understanding of the enterprises appetite for risk, understanding of compliance requirements, transparency about the significant risks to the enterprise and embedding of risk management responsibilities into the organization.

31 © John Beveridge 30 IT Governance Focus Areas Performance Measurement tracks and monitors strategy implementation, project completion, resource usage, process performance and service delivery, using, for example, balanced scorecards that translate strategy into action to achieve goals measurable beyond conventional accounting.

32 © John Beveridge 31 What Should Management Do? Inquire: Ask the right questions Focus on ITs Alignment with the agency objectives Value delivery Risk management Adopt an IT governance framework Focus on important IT processes and core IT competencies Embed responsibilities for IT security and management in the organization Measure performance and results

33 © John Beveridge 32 To Manage and Control IT, C OBI T Recommends: Employing fundamentals of IT governance Understanding strategic value of IT Understanding and managing associated risks Exercising appropriate frameworks of control Having mechanisms to provide adequate assurance that IT governance objectives are addressed

34 © John Beveridge 33 Agencies Need Assurance è That information and systems can be relied upon è That operations are adequately controlled è That information has integrity, is protected, and will be available è That due diligence and compliance with good business practices can be demonstrated. CobiT provides the control criteria and evaluation methodology

35 © John Beveridge 34 CobiT is an Authoritative Source Built on a sound framework of control and IT-related control practices. Aligned with de jure and de facto standards and regulations. Subject to extensive review and exposure. Aligned with control models, standards and best practices for IT management

36 © John Beveridge 35 C OBI Ts View of the Definition of Control Why Control Information Systems? è The answer lies in the realm of what the business wants: to accomplish and avoid è It therefore falls to the spectrum of: objectives and risks

37 © John Beveridge 36 C OBI Ts View of the Definition of Control The Objectives and Risks become •Value Drivers and Risk Drivers in C OBI T

38 © John Beveridge 37 Control (as defined by COBIT) The policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected.

39 © John Beveridge 38 To Achieve Business Objectives To Avoid Risks, Threats and Exposures Control (as defined by COBIT) The policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected. Source: COBIT Control Objectives. P. 12.

40 © John Beveridge CobiT promotes a healthy understanding about reasonable assurance and residual risk Knowing the acceptable levels for reasonable assurance and residual risk is a critical success factor for designing and managing an adequate framework of control

41 © John Beveridge 40 Assurance Level 100% Residual Risk 0% Reasonable Assurance

42 © John Beveridge 41 Relation to Other Control Models CobiT is in alignment with other control models: – COSO – COCO – Cadbury – King

43 © John Beveridge 42 Organizations will consider and use a variety of IT models, standards and best practices. They must be understood to consider how they can be used together, with COBIT acting as the consolidator (umbrella). C OBI T ISO 9000 ISO ITIL COSO WHAT HOW C OBI T and Other IT Management Frameworks SCOPE OF COVERAGE

44 © John Beveridge 43 C OBI T Cube The COBIT framework describes how IT processes deliver the information that the business needs to achieve its objectives. For controlling this delivery, COBIT provides three key components, each forming a dimension of the COBIT cube. Business Requirements for Information Criteria IT Resources IT Processes

45 © John Beveridge 44 C OBI T: Premise The COBIT framework is based on the premise that IT needs to deliver the information that an enterprise requires to achieve its objectives. i IT Resources and Processes Information Business Processes Business Objectives provide to for achieving The COBIT framework helps align IT with the business by focusing on business information requirements and organising IT resources. COBIT provides the framework and guidance to implement IT governance.

46 © John Beveridge 45 IT Resource Management CobiT underscores and demonstrates that IT resources need to be managed by naturally grouped processes to provide organizations with type and quality of information required to achieve organizational objectives.

47 © John Beveridge C OBI T C OBI T is a valuable IT governance tool that helps in the understanding and management of risks and benefits associated with information integrity, security, and availability, and the management of related technology.

48 © John Beveridge 47

49 © John Beveridge 48 Addresses key attributes of information produced by IT. Links recommended control practices for IT to business and control objectives. Provides guidance in implementing and evaluating the appropriateness of IT-related management control practices.

50 © John Beveridge Where is C OBI T Today?

51 © John Beveridge 50 How is CobiT Focused? IT Governance – better coverage with governance practices Business requirements – better business to IT linkages with cascading goals and supporting metrics Harmonization – improved integration with key practices Value Creation – extended focus on IT investment Enterprise architecture - process structure and resources Process definitions and process flows – improved descriptions, activities, inputs and output Language and presentation – more concise in presentation, action-oriented, control model and management guidelines are consolidated into one document

52 © John Beveridge 51 What are the key COBIT Documents? Control Objectives define what needs to be done to implement an effective control structure to improve IT performance and address IT solutions and service delivery risks. Control Practices provides guidance on the risks to be avoided and value to be gained from implementing a control objective, and instruction on how to implement the objective. IT Assurance Guide provides guidance for the assurance team with a structured assurance approach linked to the C OBI T framework that is understandable for business and IT professionals

53 © John Beveridge 52 C OBI T and Related Products C OBI T 4.1COBIT is an IT governance framework and supporting tool set that allows managers to bridge the gap between control requirements, technical issues and business risks. Board Briefing on IT Governance To help executives understand why IT governance is important, what its issues are and what their responsibility is for managing it Information Security Governance To help overcome these barriers by explaining information security in business terms. It comes complete with tools and techniques to help managers uncover security-related problems IT Governance Implementation Guide Provides a generic road map for implementing IT governance using the COBIT and Val IT resources Control PracticesProvide guidance on why the control objectives are worth implementing and how to implement them IT Assurance Guide Provides guidance on how COBIT can be used to support a variety of assurance activities together with suggested testing steps for all the IT processes and control objectives

54 © John Beveridge 53 C OBI T and Related Products COBIT Quickstart To summarized version of the COBIT resources, focusing on the most crucial IT processes, control objectives and metrics, all presented in an easy-to-follow format to help users gain the benefits of COBIT quickly. COBIT Security Baseline (available 3rd quarter 2007) To focuses on IT security risk in a way that is simple to follow and implement for everyone, from the home user or small- to medium- sized enterprise to executives and board members of larger organizations. Val IT To provides guidance for managing an organization s portfolio of IT-enabled business investments and for maximizing the quality of business cases for IT-enabled business investments. IT Control Objectives for Sarbanes-Oxley To provides guidance on how to ensure compliance for the IT environment based on the COBIT control objectives related to financial reporting. Aligning COBIT, ITIL and ISO To explain to business users and senior management the value of IT best practices and how harmonization, implementation and integration of best practices (COBIT, ITIL and ISO/IEC 17799) may be made easier. COBIT Mapping Series To overview and various mappings of COBIT to other international guidance have been published by ITGI, such as CMM, ISO17799.

55 © John Beveridge 54 C OBI T and Related Products

56 © John Beveridge 55

57 © John Beveridge Control Objectives Framework Control Objectives Management Guidelines Maturity Models

58 © John Beveridge 57 Focus on IT Alignment by linking Information Criteria, IT Resources and IT Goals to Business Goals Focus on Value Delivery by using value-oriented IT goals to focus on the IT processes that are critical to deliver effectively Focus on Risk Management by using risk-oriented IT goals to focus on the IT processes that are needed to manage risk Focus on Resource Management by using Maturity Models to ensure there is a capability to deliver Focus on Performance Management by using metrics and scorecards to ensure plans are on track and deviations are identified and corrected C OBI T Objectives - IT Governance Topics

59 © John Beveridge 58

60 © John Beveridge 59 Concise Control Objectives PO1.2 Business-IT Alignment Establish processes of bi-directional education and reciprocal involvement in strategic planning to achieve business and IT alignment and integration. Mediate between business and IT imperatives so priorities can be mutually agreed. PO1.2 Business-IT Alignment Educate executives on current technology capabilities and future directions, the opportunities that IT provides, and what the business has to do to capitalize on those opportunities. Make sure the business direction to which IT is aligned is understood. The business and IT strategies should be integrated, clearly linking enterprise goals and IT goals and recognizing opportunities as well as current capability limitations, and broadly communicated. Identify where the business (strategy) is critically dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established. PO5.1 Financial Management Framework Establish and maintain a financial framework to manage the investment and cost of IT assets and services through portfolios of IT enabled investments, business cases and IT budgets. PO5.1 Financial Management Framework Establish a financial framework for IT that drives budgeting and cost/benefit analysis, based on investment, service and asset portfolios. Maintain the portfolios of IT-enabled investment programmers, IT services and IT assets, which form the basis for the current IT budget. Provide input to business cases for new investments, taking into account current IT asset and service portfolios. New investments and maintenance to service and asset portfolios will influence the future IT budget. Communicate the cost and benefit aspects of these portfolios to the budget prioritization, cost management and benefit management processes. CobiT 4.1 CobiT 4.0

61 © John Beveridge 60

62 © John Beveridge 61

63 © John Beveridge 62 Framework Update

64 © John Beveridge 63 C OBI T Framework Documents relationships among information criteria, IT resources, and IT processes Links control objectives and control practices to business processes and business objectives Assists in confirming that appropriate IT processes (and practices) are in place Facilitates evaluation and assurance methods

65 © John Beveridge 64 Information Criteria -- The 1st Component Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability

66 © John Beveridge 65 IT Resources -- The 2nd Component Application Systems Information Infrastructure People

67 © John Beveridge 66 IT Process Domains -- The 3rd Component Plan and Organize Acquire and Implement Deliver and Support Monitor and Evaluate

68 © John Beveridge 67 C OBI T Process Model Subdivides IT into four domains 34 processes in line with the domains Responsibility areas of plan, build, run and monitor, providing an end-to- end Enterprise architecture concepts help identify the resources essential for process success

69 © John Beveridge 68 What Are the Main Changes?

70 © John Beveridge 69 Plan and Organize Acquire and Implement Deliver and Support Monitor and Evaluate C OBI T Domains: Information Processes (3rd Component) Feedback

71 © John Beveridge 70 C OBI T Framework To provide the information that the enterprise requires to achieve its objectives, the enterprise needs to invest in and manage and control IT resources using a structured set of processes in order to provide the services that deliver the required enterprise information. Basic COBIT Principle

72 © John Beveridge 71 CobiT Framework Helps one understand the: relationship of controls to control objectives, importance of focusing on control objectives and their relationship to the business organization and its business processes, and value of managed processes and resources to attain data integrity, security and availability.

73 © John Beveridge 72

74 © John Beveridge 73 CobiT is Business-focused Business orientation is the main theme of C OBI T. Designed to be used by IT service providers, users and auditors, and to also provide comprehensive guidance for management and business process owners.

75 © John Beveridge 74 Business Orientation of C OBI T Links business goals to IT goals Provides metrics and maturity models to measure their achievement Identifies the associated responsibilities of business and IT process owners.

76 © John Beveridge 75 Business Goals Financial Perspective Expand market share Increase revenue Return on Investment Optimize asset utilization Manage business risks Customer Perspective Improve customer orientation and service Offer competitive products and service Service availability Agility in responding to changing business requirements Cost optimization of service delivery

77 © John Beveridge 76 Business Goals Internal Perspective Automate and integrate the business value chain Improve and maintain business process functionality Lower process costs Compliance with external laws and regulations Transparency Compliance with internal policies Improve and maintain operational and staff productivity Learning and Growth Perspective Product and business innovation Obtain reliable and useful information for strategic decision making Acquire and maintain skilled and motivated personnel

78 © John Beveridge 77 IT Goals 1.Respond to business requirements in alignment with business strategy 2.Respond to governance requirements in line with board direction 3.Ensure the satisfaction of end users with service offerings and service levels 4.Optimize the use of information 5.Create IT agility 6.Define how business function and control requirements are translated in effective and efficient automated solutions 7.Acquire and maintain integrated and standardized application systems 8.Acquire and maintain and integrated and standardized infrastructure

79 © John Beveridge 78 IT Goals 9.Acquire and maintain IT skills that respond to the IT strategy 10.Ensure mutual satisfaction of third-party relationships 11.Seamlessly integrate applications and technology solutions into business processes 12.Ensure transparency and understanding of IT cost, benefits, strategy, policies and service levels 13.Ensure proper use and performance of the applications and technology solutions 14.Account for and protect all IT assets 15.Optimize the IT infrastructure, resources and capabilities 16.Reduce solution and service delivery defects and rework 17.Protect the achievement of IT objectives 18.Establish clarity of business impact of risks to IT objectives and resources

80 © John Beveridge 79 IT Goals 19.Ensure critical and confidential information is withheld from those who should not have access to it 20.Ensure automated business transactions and information exchanges can be trusted 21.Ensure IT services and infrastructure can properly resist and recover from failures due to error, deliberate attack or disaster 22.Ensure minimum business impact in the event of an IT service disruption or change 23.Make sure that IT service are available as required 24.Improve ITs cost-efficiency and its contribution to business profitability 25.Deliver projects on time and on budget meeting quality standards 26.Maintain the integrity of information and processing infrastructure 27.Ensure IT compliance with laws and regulations 28.Ensure that IT demonstrates cost-efficient service quality, continuous improvement and readiness for future change

81 © John Beveridge 80

82 © John Beveridge 81 Linking Business Goals to IT Goals An Example: The business goal of increasing revenue is linked to IT goals numbers 25 and 28, which are: Deliver projects on time and on budget meeting quality standards and Ensure that IT demonstrates cost- efficient service quality, continuous improvement and readiness for future change

83 © John Beveridge 82

84 © John Beveridge 83 Linking IT Goals to IT Processes Example of linking IT goals to IT processes: The IT goal of optimizing the use of information is linked to IT processes PO2 and DS11 (information architecture and managing data)

85 © John Beveridge 84

86 The WATERFALL Navigation Aid -- High Level Control Objectives for Each Process The control of which satisfy is focusing on Is achieved by IT Processes Business Requirements Control Statements Control Practices High-Level Control Objective Users satisfaction Is measured by

87 © John Beveridge 86

88 © John Beveridge 87 RACI Chart Identifies who is Responsible, Accountable, Consulted and/or Informed Addresses considerations for points of accountability Addresses issues of communication and desired input (who would be consulted) Rather than titles, think of positions in terms of roles Depending on the size of the organization or the IT function, several roles may be combined

89 © John Beveridge 88 Primary Inputs and Outputs CobiT identifies from where primary inputs are obtained for each process The inputs are identifies and where they came from Also identifies to which IT processes the process provides output to The outputs (from the process) are identified to where they would be directed

90 © John Beveridge 89

91 © John Beveridge 90 Metrics Performance measurement is essential for IT governance. Requires setting and monitoring measurable objectives of what the IT processes need to deliver (process outcome) and how they deliver it (process capability and performance).

92 © John Beveridge 91 Metrics Activity Goals tells us how well the process is performing –Measured by KPIs Process Goals tell us what IT must deliver –Measured by Key Goal indicators IT Goals tell us what we expect from IT –Measured by Key Goal Indicators

93 © John Beveridge 92

94 © John Beveridge 93

95 © John Beveridge 94

96 © John Beveridge 95 Use of Maturity Models The assessment of process capability based on the C OBI T maturity models is a key part of IT governance implementation. Enables gaps in capability to be identified and demonstrated to management. Action plans can then be developed

97 © John Beveridge 96

98 © John Beveridge Control Practices Control Objectives Value Drivers Risk Drivers

99 © John Beveridge 98 Control Design Necessary and sufficient steps Roles & responsibilities Characteristics Generic and specific practices Active and passive Input, outputs, activities

100 © John Beveridge 99 IT Control Practices Provides guidance on risks to avoided and value to be gained Provides detailed guidance on specific controls needed to address high-level and detailed control objectives Provides guidance on how, why and what to implement to improve IT performance Includes key elements of value and risk statements and control practices

101 © John Beveridge 100 IT Control Practices Describing the different necessary and sufficient steps to achieve a control objective Action-oriented, enabling timely execution and measurable Relevant to the purpose of the control objective Supporting clear roles and responsibility including segregation

102 © John Beveridge 101 The benefits listed under why do it are tangible and motivate to implement controls complete The set of control practices is complete (e.g. key controls) and implementation satisfies the control objective good business practice Control practices listed are generally accepted as good business practice sustainable Control practices suggest sustainable solutions effective The control practices are effective in addressing the risk linked to not achieving the detailed control objective efficient The control practices suggest efficient solutions concise The wording of the control practices is concise while providing clear and unambiguous guidance on what is expected for implementation realistic The control practices are realistic Control Practices Characteristics:

103 © John Beveridge IT Assurance Guide Need for IT Governance and Assurance The CobiT Framework IT Assurance Approaches How CobiT Supports IT Assurance Activities

104 © John Beveridge 103 Approach Testing of a control approach covering 4 assurance objectives 1.Existence 2.Design effectiveness 3.Operating effectiveness (implemented, consistent application and proper use) 4.Design and operating efficiency (cost/benefit and possible use of automation) Providing 3 types of assurance guidance Testing the suggested control design Testing control objective achievement Documenting impact of control weaknesses IT Assurance Steps

105 © John Beveridge 104 Approach Tests based on a documented taxonomy of relevant assurance methods Enquire and confirm (via different source) Inspect (walk-through, search, compare, review) Observe (confirmation is inherent) Re-perform or re-calculate and analyze (often based on a sample) Automated evidence collection (sample, trace, extract) and analyze IT Assurance Steps

106 © John Beveridge 105

107 © John Beveridge 106

108 © John Beveridge 107

109 © John Beveridge 1 Using CobiT

110 © John Beveridge 109 Provide Direction Compare Measure Performance IT Activities Increase automation (make the business effective) Decrease cost (make the enterprise efficient) Manage risks (security, reliability and compliance) IT is aligned with the business IT enables the business and maximizes benefits IT resources are used responsibly IT-related risks are managed appropriately Set Objectives CobiT provides the basis for IT Governance CobiT Links business goals to IT Goals CobiT Framework provides a common understanding of ITs role CobiT IT Processes and Maturity Models focus on IT capability CobiT KGIs and KPIs enable measurement

111 © John Beveridge 110 Using CobiT From an organizational perspective, entities should use control models such as COSO and CobiT along with generally accepted control practices to build and exercise appropriate controls to help manage their entities.

112 © John Beveridge 111 Strong Basis for Policy Development Use CobiT as a basis to develop or strengthen policies and control practices Compare existing policies and standard procedures against CobiT Conduct high-level and detailed policy reviews

113 © John Beveridge 112 Using CobiT Matrices to Focus on: IT Functions –Their importance? –Level of performance? –Control documentation? Responsible Parties of IT –Performed by? –Contracted services? –Primary responsible party? Risk Assessment –Importance, level of risk, control documentation?

114 © John Beveridge 113 CobiTs Evaluation Focus What is most critical to the business? What are the CSFs? What are the risks and threats? How robust and appropriate does the internal control structure appear? What are managements concerns?

115 © John Beveridge 114 Risks to the Entity? è Unaware of the risks è Poor understanding of CSFs è Absence of KPIs è No scorecard or basis of measurement è Absence of monitoring and evaluation è Weak IT control environment è Unknown loss of data or system integrity

116 © John Beveridge 115 C OBI T Focuses on Risk-Based Approach Focuses on the entity from a management perspective Emphasis on knowledge of the business and the technology Focus on assessing the effectiveness of a combination of controls Linkage between risk assessment and testing focusing on control objectives

117 © John Beveridge 116 To Address Outsourced Services Determine whether desired processes are in place and establish accountability Agree on levels of control, measurement and evaluation Use CobiT to help design service contracts by identifying deliverables and responsibilities Use CobiT for ongoing monitoring and evaluation of providers and partners

118 © John Beveridge 117 Recap: CobiT Recognizes IT is an integral part of the organization IT governance is an integral part of corporate governance Focus on control objectives can strengthen appropriateness and use of internal controls Measurement is crucial to internal control Monitoring and evaluation are integral to a system of internal control

119 © John Beveridge 118

120 © John Beveridge 119 Interrelationships of CobiT Components

121 © John Beveridge 120 C OBI T Content Diagram CobiT and Val IT frameworks Control Objectives Key Management Pratices IT Governance Implementation Guide, 2 nd Edition CobiT Control Practices 2 nd Edition IT Assurance Guide

122 © John Beveridge 121 CobiT Update Freely downloadable from: For questions and assistance: John W. Beveridge x 135 Best to me at: Thank You

Download ppt "© John Beveridge CobiT Update NSAA IT Conference Richmond, VA John W. Beveridge September 27, 2007."

Similar presentations

Ads by Google