Chapter 2 - Cis
Chapter 2 - Cis
Key Objectives
- Reduce Risk
- Ensure that investments in IT resources add value to the corporation.
Before SOX, all IT investment decisions was given to the corporate IT professionals
Modern IT governance – all corporate stakeholders (board of directors, top management, departmental
users) are involved in important IT decisions. This reduces risk and increases the likelihood that IT
decisions will be in compliance with user needs, corporate policies, strategic initiatives, and internal
control requirements under SOX.
IT Governance Controls
Although all IT governance issues are important to the organization, not all of them are matters of internal
control under SOX that may potentially impact the financial reporting process.
Three IT governance issues that are addressed by SOX and the COSO internal control framework:
- Has implications for the nature and effectiveness of internal controls, which, in turn, has
implications for the audit.
- Two extreme organizational models—the centralized approach and the distributed approach.
- Most organizational structures embody elements of both models.
- Under this model, all data processing is performed by one or more large computers housed at a
central site.
- IT service activities are consolidated and managed as a shared organization resource
- IT services function are treated as a cost center whose operating costs are charged back to the
end users.
Organizational Chart of a Centralized IT Services Function
Database Administration – Responsible for the security and integrity of the database
Data Processing – Manages computer resources used to perform day-to-day transactions. Consist of the
following:
➢ Data Control / Data Entry – Receives hard copy source documents then transcribes/encodes them
into digital format. After data processing, this group would distribute finished sales reports to
users, such as the marketing managers.
➢ Computer Operations – Manages processing of the electronic files created in data conversion by
the central computer
➢ Data Library – A room adjacent to the computer center that stores offline data files. These files
can be back-ups or current data files. Also stores original copies of commercial software and their
licenses. Managed by a data librarian, responsible for the receipt, storage, retrieval, custody of
files, and controls access to the library. It is slowly becoming obsolete because of real-time
processing and direct-access files.
New Systems Development - responsible for analyzing user needs and for designing new systems to satisfy
those needs. Participants in these activities include:
➢ Systems Professionals - include systems analysts, database designers, and programmers who
design and build the system. Systems professionals gather facts about the user’s problem, analyze
the facts, and formulate a solution. They make the new information system.
➢ End Users – For whom the system is built. Includes Managers who receive reports and operations
personnel.
➢ Stakeholders – Individuals inside and outside the firm who have an interest in the system, but not
end users. Includes accountants, internal auditors, external auditor, and others who oversee the
systems development.
Systems Maintenance – Assumes responsibility after the system was designed and implemented.
Maintenance (Making changes to program logic to accommodate changes in user needs). During the
course of the system’s life (often several years), as much as 80 or 90 percent of its total cost may be
incurred through maintenance activities.
Segregation of Incompatible IT Functions
3. Divide transaction-processing tasks among individuals such that short of collusion between two or more
individuals, fraud would not be possible.
The IT environment tends to consolidate activities. A single application may authorize, process, and record
all aspects of a transaction. Thus, the focus of segregation control shifts from the operational level
(transaction processing tasks that computers now perform) to higher-level organizational relationships
within the computer services function.
- Of greatest importance
- Systems development and maintenance, creates and maintains the system, should not enter data
or run applications. Operations staff should run the systems and have no involvement in their
design.
- Consolidating them invites fraud and error.
- With detailed knowledge of the application’s logic and control parameters and access to the
computer’s operating system and utilities, an individual could make unauthorized changes to the
application during its execution. Such changes may be temporary (“on the fly”) and will disappear
without a trace when the application terminates / closed.
- . The DBA function is responsible for a number of critical tasks pertaining to database security,
including creating the database schema and user views, assigning database access authority to
users, monitoring database usage, and planning for future expansion. If they delegate these
responsibilities to others who have incompatible tasks, it may threaten database integrity. Thus,
it is independent in the organizational chart.
- Many companies organize their in-house systems development function into systems analysis,
who produce detailed designs of new systems, and applications programming, who codes the
system according to the design specifications and maintains the system.
- Two types of control problems associated:
➢ Inadequate Documentation – The two possible explanations are: it is more interesting to design,
test, and implement new systems than to document them, and job security. If only the
programmer knows how to interpret, test, and debug the system, it is difficult for others to figure
it out, therefore the programmer has bargaining power regarding his job, and becomes
indispensable. It creates a problem when the programmer leaves the firm, as the transition period
may become long and costly.
➢ Program Fraud- involves making unauthorized changes to program modules for the purpose of
committing an illegal act. If the original programmer is also assigned maintenance, the potential
for fraud is increased. The original programmer may have successfully hidden fraudulent code
among the legitimate ones, but it is important that only he has unrestricted access to it. It prevents
other programmers from finding it out, and he can make changes when audits are performed.
- The organizational chart earlier, which has new systems development and systems maintenance
separated is considered a superior structure. It addresses the two control problems:
➢ First, documentation standards are improved because the maintenance group requires
documentation to perform its maintenance duties. Without complete and adequate
documentation, the formal transfer of system responsibility from new systems development to
systems maintenance simply cannot occur.
➢ Second, denying the original programmer's future access to the program deters program fraud.
The fraudulent code will be out of the original programmer’s hand when it is handed over to the
maintenance group, meaning he cannot make more changes and is more likely to be discovered.
The success of this control depends on the existence of other controls that limit, prevent, and
detect unauthorized access to programs (such as source program library controls). Although
organizational separations alone cannot guarantee that computer frauds will not occur, they are
critical to creating the necessary control environment.
- DDP, to put it simply, is dividing up the main IT department into smaller units that are managed by end
users.
- Distinction between Alternative A and the centralized approach is the distribution of terminals (or
microcomputers) to end users for managing input and output.
- Alternative B. With this option, all computer services are provided to end users, who run independently.
The central IT role is consequently removed from the organizational structure.
- In DDP systems, the audit trail consists of a set of digital transaction files and master files that reside in
part or entirely on end-user computers.
- Achieving an adequate segregation of duties may not be possible in some distributed environments. The
distribution of the IT services to users may result in the creation of small independent units that do not
permit the desired separation of incompatible functions.
− Hiring Qualified Professionals
- End-user managers may lack the IT knowledge to evaluate the technical credentials and relevant
experience of candidates applying for IT professional positions.
− Lack of Standards
- Because of the distribution of responsibility in the DDP environment, standards for developing and
documenting systems, choosing programming languages, acquiring hardware and software, and
evaluating performance may be unevenly applied or even nonexistent.
ADVANTAGES OF DDP
− Cost Reductions
- DDP has reduced costs in two other areas: (1) data can be edited and entered by the end user, thus
eliminating the centralized task of data preparation; and (2) application complexity can be reduced, which
in turn reduces systems development and maintenance costs.
- Proponents of DDP contend that the benefits of improved management attitudes more than outweigh
any additional costs incurred from distributing these resources. They argue that if IT capability is indeed
critical to the success of a business operation, then management must be given control over these
resources.
- DDP proponents claim that distributing system to end users improves three areas of need that too often
go unsatisfied in the centralized model: (1) as previously stated, users desire to control the resources that
influence their profitability; (2) users want systems professionals (analysts, programmers, and computer
operators) to be responsive to their specific situation; and (3) users want to become more actively
involved in developing and implementing their own systems.
− Backup Flexibility
- If a disaster destroys a single site, the other sites can use their excess capacity to process the transactions
of the destroyed site.
3. Standard-Setting Body.
- The relatively poor control environment imposed by the DDP model can be improved by
establishing some central guidance.
4. Personnel Review.
- The corporate group is often better equipped than users to evaluate the technical credentials of
prospective systems professionals.
• Physical Location
• Construction
• Access
• Air-conditioning
• Fire suppression
• Fault Tolerance
Audit Objectives
The auditor’s objective is to evaluate the controls governing computer center security.
Specifically, the auditor must verify that:
• Physical security controls are adequate to reasonably protect the organization from
physical exposures
• Insurance coverage on equipment is adequate to compensate the organization for
the destruction of, or damage to, its computer center
Audit Procedures
• Tests of Physical Construction. The auditor should obtain architectural plans to determine that
the computer center is solidly built of fireproof material.
• Tests of the Fire Detection System. The auditor should establish that fire detection and
suppression equipment, both manual and automatic, are in place and tested regularly.
• Tests of Access Control. The auditor must establish that routine access to the computer center is
restricted to authorized employees. Details about visitor access (by programmers and others),
such as arrival and departure times, purpose, and frequency of access, can be obtained by
reviewing the access log.
• Tests of Raid. Most systems that employ RAID provide a graphical mapping of their redundant
disk storage. From this mapping, the auditor should determine if the level of RAID in place is
adequate for the organization, given the level of business risk associated with disk failure.
• Tests of the Uninterruptible Power Supply. The computer center should perform periodic tests
of the backup power supply to ensure that it has sufficient capacity to run the computer and air-
conditioning.
• Tests for Insurance Coverage. The auditor should annually review the organization’s insurance
coverage on its computer hardware, software, and physical facility. The auditor should verify that
all new acquisitions are listed on the policy and that obsolete equipment and software have been
deleted.
- is a comprehensive statement of all actions to be taken before, during, and after any type
of disaster.
Common Options:
Auditing Objective
- verify that management’s disaster recovery plan is adequate and feasible for
dealing with a catastrophe that could deprive the organization of its computing
resources
Audit Procedures
- Site Backup.
o evaluate the adequacy of the backup site arrangement.
- Critical Application List
o review the list of critical applications to ensure that it is complete.
- Software Backup
o verify that copies of critical applications and operating systems
are stored off-site.
- Data Backup
o verify that critical data files are backed up in accordance with the
DRP.
- Backup Supplies, Documents, and Documentation
o verify that the types and quantities of items specified in the DRP
such as check stock, invoices, purchase orders, and any special
purpose forms exist in a secure location
- Disaster Recovery Team
o verify that members of the team are current employees and are
aware of their assigned responsibilities
IT outsourcing
- outsource their IT functions to third-party vendors who take over responsibility for the
management of IT assets and staff and for delivery of IT services, such as data entry, data
center operations, applications development, applications maintenance, and network
management
Benefits :
- conflict with the core competency school by suggesting that firms should retain certain
specific non-core IT assets in-house.
- upports the outsourcing of commodity assets
Cloud Computing
1. Network Security
2. Network Implementation and Maintenance
3. Troubleshooting Support
4. System and File Backup
- an internationally recognized third-party attestation report designed for service organizations such as IT
outsourcing vendors.
- objective was to keep pace with the move toward globally accepted international accounting standards.
- certification does not stand as a symbol for exceptional service, it enables customers to recognize the
service provider as meeting a minimum set of standards within the industry. SSAE 16 certification is
focused on customers' business requirements rather than the needs of the business servicing those
customers.
1. Type 1 report attests to the vendor management’s description of their system and the suitability of the
design of controls.
2. Type 2 report attests to management’s description of their system, the suitability of the design of
controls, and the operating effectiveness of controls.
*Type 2 report takes a step further and evaluates the effectiveness of the controls.
*For client companies undergoing a financial statement audit, SSAE 16 Type 2 reports are important
because SOX Section 404 mandates the detailed testing of controls.
1. CARVE-OUT METHOD - exclude the subservice organization’s relevant control objectives and related
controls from management’s description and scope of the service auditor’s engagement.
2. INCLUSIVE METHOD - the control activities performed by the subservice organization are included
within the scope of the report.