IT Internal Control System - ICS-Matrix
IT Internal Control System - ICS-Matrix
Risks Inventory
Risks if the controls are not being followed: UA.01 An approved procedure must be in place for granting access to all systems /
- Inappropriate user and IT access to system resources incl. violation of segregation of duties applications of business and infrastructure IT organisation (Password - Review if policy is complete and accurate and if processes of
IT Access Control Policy
principle settings). the client are in line with the policy
- Informal or unapproved requests for access to system resources
UA.02 Approved role- and authorisation concepts must exist and be followed. - User and authorisation requests for employees joining or - Approval supervisor?
Creations and changes of roles and authorisations should be approved. moving (within) the organisation - Approval role owner?
- Change log showing changes to user authorisations - Form available?
User Authentication
UA.04 Periodic reviews should be performed - at least annually - to ensure the Documentation of periodic review procedures - Timely review?
validity of access rights for all current users / IT personnel. - Appropriate persons involved?
- Follow up activities executed (e.g. removal of a user)?
UA.05 Approved procedures must exist and followed to ensure immediate action
- User Termination: User and authorisation requests for leavers - Form available?
relating to suspending and closing user accounts.
- Change log showing changes to user authorisations - Timely deactivation of the user accounts?