Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.

Slides:



Advertisements
Similar presentations
Systems Implementation and Operation
Advertisements

The International Security Standard
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
Dr. Mohamed A. Hamada Lecturer of Accounting Information Systems Advanced Auditing Lecture 1 Assurance and Attestation Services.
Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
Auditing Computer-Based Information Systems
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Dr Gordon Russell, Napier University Unit Data Dictionary 1 Data Dictionary Unit 5.3.
1 Outsourcing Contract and Service Level Issues Sharon O’Bryan Week 5 November 2, 2004.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
Security Controls – What Works
Information Security Policies and Standards
Database Administration Chapter FOSTER School of Business Acctg. 420.
The Demand for Audit and Other Assurance Services Chapter 1.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Other Assurance Services Chapter 25.
Uniqueness of user names is enforced Customer information logged to database Require contact information as well as address address will.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
IT Security Auditing Martin Goldberg.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Concepts of Database Management Seventh Edition
Factors to be taken into account when designing ICT Security Policies
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
SAS 70 (Statement on Auditing Standards No. 70) Kelley Piner Charles Roberts Ashley Walker.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
1 LOGICAL ACCESS FOR University Medical Group Saint Louis University Click the Speaker Icon for Audio.
HIPAA PRIVACY AND SECURITY AWARENESS.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
David N. Wozei Systems Administrator, IT Auditor.
Concepts of Database Management Eighth Edition
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 - 1 ©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
Environmental auditing
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Pertemuan 3-4 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Advanced Accounting Information Systems Day 19 Control and Security Frameworks October 7, 2009.
Database Administration
Introduction to Information Security
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley The Demand for Audit and Other Assurance Services Chapter 1.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
Review of IT General Controls
The Demand for Audit and Other Assurance Services
The Demand for Audit and Other Assurance Services
Session 11 Other Assurance Services
Service Organization Control (SOC)
Other Assurance Services
Other Assurance Services
PLANNING A SECURE BASELINE INSTALLATION
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Information Systems Audit Program

Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists of the various tests that auditors must perform within the scope of their audits to determine whether key controls intended to mitigate significant risks are functioning as designed.

Benefit(cont.) Based on the results of the tests performed, the auditor should be able to determine the adequacy of the controls over a particular process.

Other Benefits Assist audit management in resource planning. – For example, management can estimate the total number of hours required to perform an audit based on the expected amount of time required to perform each of the steps in the audit program. They can help promote consistency in tests performed on audits of the same process from one cycle to the next.

Categories The IS controls in the audit program have been grouped into four general categories: – Environmental controls – Physical security controls – Logical security controls – IS operating controls

Objective To assess the adequacy of environmental, physical security, logical security, and operational controls designed to protect IS hardware, software, and data against unauthorized access and accidental or intentional destruction or alteration, and to ensure that information systems are functioning in an efficient and effective manner to help the organization achieve its strategic objectives.

Environmental controls

Step 1 Assess the adequacy and effectiveness of the organization’s IS security policy. In addition, assess whether the control requirements specified in the organization’s IS security standards adequately protect the information assets of the organization. At a minimum, the standards should specify the following controls and require them to be applicable to all information systems

The maiden password should be changed after the system is installed. There is a minimum password length of eight or more characters. Passwords require a combination of alpha and numeric characters. The password is masked on the screen as it is entered. The password file is encrypted so nobody can read it. There is a password expiration period of 60 days or less.

Three or fewer unsuccessful sign-on attempts are allowed, then the user ID is suspended. User sessions are terminated after a specified period of inactivity (e.g., five minutes or less). Concurrent sign-on sessions are not allowed. Procedures are in place to remove user IDs of terminated users in a timely manner. Users are trained not to share or divulge their passwords with other users, post them in their workstations, store them in electronic files, or perform any other act that could divulge their passwords.

Unsuccessful sign-on attempts and other logical security-related events (e.g., adding and deleting users, resetting passwords, restarting the system) are logged by the system, and the log is reviewed regularly by system security staff. Fully developed and tested backup and recovery procedures exist to help ensure uninterrupted business resumption in the event of a full or partial disaster. New information systems are required to be designed to enable the aforementioned controls to be implemented by system security administrators. New systems include those developed in house, those purchased from vendors, and third-party processor systems. In the case of software vendors and third-party processors, the above control requirements should be specified as requirements in the contract.

Step 2 For service organization applications, examine the most recent report on the policies and procedures placed in operation at the vendor’s data processing site as prepared by its external auditors. In the United States, the format and testing requirements are dictated by Statement on Auditing Standards 70 (SAS 70), issued by the American Institute of Certified Public Accountants. SAS 70 reports may also describe tests of the operating effectiveness of the policies and procedures if the vendor has contracted the external auditor to do so.

Assess the adequacy of controls described in the report and determine whether applicable control recommendations have been implemented at your organization. If applicable, determine whether another type of security or privacy certification exists (e.g., TruSecure, SysTrust, WebTrust, BBBOnline, TRUSTe).

Step 3 If the system was purchased from and supported by a vendor, assess the financial stability of the system vendor using the most recent audited financial statements prepared by the vendor’s external auditors. (Optimally, this step should be performed prior to when the decision is made to purchase the system. Otherwise, significant resources could be wasted on a system for which the vendor will no longer exist.)

Select a sample of recent invoices from the system vendor and determine whether costs have been properly recorded and classified on the financial statements of your organization. Costs should normally be amortized over the expected useful life of the system. For IS development projects, determine whether applicable internal development costs (e.g., programmer hours) have been capitalized and amortized over the estimated useful life of the internal use system in accordance with AICPA Statement of Position (SOP) 98-1 (does not apply to software sold to external parties).

Step 4 Examine the vendor software license agreement and any agreements for ongoing maintenance and support to ensure that they are current, address service needs, and do not contain or omit any wording that could be detrimental to your organization. Where applicable, the agreements should also require that a copy of the programming source code of the current version of the software be stored in escrow by an independent third party so that it is available to your company in the event the vendor goes out of business or another stipulated event occurs (e.g., breach of contract; software no longer supported by vendor).