Risks and Controls
Risks and Controls
Risks and Controls
Technology
Risks and
Controls
What is Risk?
Chances of negative outcomes
A possibility that a threat is
capable of exploiting a known
weakness or vulnerability
Business Risk
The likelihood that an organization will not
achieve its business goals and objectives
Chances of occurrence can be attributed to
internal and external factors
Auditors must first become familiar with
the enterprises Strategic Plan
Audit Risk
The likelihood that an organizations
external auditor makes a mistake when
issuing an opinion attesting to the fairness
of its financial statements or that an IT
auditor fails to uncover a material error or
fraud.
Audit Risk
Audit
Risk =
(AR)
Inherent
Risk (IR)
Control
Risk (CR)
Detection
Risk (DR)
Test of Controls
Objective is to determine whether
adequate internal controls are in place and
functioning properly
Substantive Tests
Involves a detailed investigation of specific
account balances
Residual Risk
Any risk remaining after implementation
of effective internal controls
Security Risk
Includes risks associated with:
i) data access
ii) integrity
Physical or logical unauthorized
access to data
Risks in collecting and
processing of data
Continuity Risk
Includes risks associated with an
information systems availability and
backup and recovery
Availability
Backup &
Recovery
Risk Management
Attempts to balance risk
against the needs of the organization
Document IT
Controls
Monitor IT
Risks &
Controls
Risk Assessment
Operational process by which risks
are identified and characterized.
IT Risk Assessment
1) Identify Threats/ Exposures
Chance is .05 %
Guesstimation
Expected
Value of =
Risk
Estimated
%
Loss from X Likelihood
Specific
of Loss
Risk
Internal Control
Objectives
1) To safeguard assets of the firm
2) To ensure the accuracy and reliability
of accounting records and information
3) To promote efficiency of the firms
operations
4) To measure compliance with laws
and regulations
Internal Control
Limitations
1) Possibility of Error
2) Circumvention
3) Management Override
4) Changing Conditions
Preventive Control
Passive techniques designed to
reduce the frequency of occurrence
of undesirable events
Detective Control
Devices, techniques and procedures
designed to identify and expose
undesirable events that elude
preventive controls
Corrective Control
Actions that must be taken to
reverse the effects of detected
errors.
SAS 109
Based on the COSO
framework
Describes the complex
relationship between the
firms internal controls,
auditors assessment of risk
and the planning of audit
procedures
COBIT
Control Objectives for Information and
Related Technologies
defines a set of generic processes for the
management of IT, with each process
defined together with process inputs and
outputs, key process-activities, process
objectives, performance measures and an
elementary maturity model
COBIT 5
[Process Reference Model]
ITIL
Information Technology Infrastructure
Library
set of practices for IT Service
Management (ITSM) that focuses on
aligning IT services with the needs of
business
ITIL
ISO/IEC 27000
explains the purpose of an Information
Security Management System (ISMS)
used to manage information security risks
and controls within an organization.
ISO/IEC 27000
Components of
Internal Control
1) Control Environment
2) Risk Assessment
3) Control Activities
4) Information and Communication
5) Monitoring
Control Environment
Sets the tone for the organization
Influences the control awareness of its
management and employees
i. Integrity & ethical values
ii. Organization structure
iii. BODs and Audit Committee participation
iv. Managements philosophy and operating style
v. Procedures for delegating responsibility & authority
vi. Performance assessment method of management
vii. External influence (ex. Regulatory agencies)
viii. Policies and procedures for managing human resources
Risk Assessment
Identify, analyze and manage risks
relevant to financial reporting
Information &
Communication
The Accounting Information
System consists of records and
methods used to initiate, identify,
analyze, classify and record the
organizations transactions and to
account for the related assets and
liabilities.
Monitoring
Process by which the quality of
internal control design and
operation can be assessed.
2 categories:
i. Physical Controls
ii. Information Technology (IT)
Controls
Control Activities
Policies and procedures used to
ensure that appropriate actions are
taken to deal with the organizations
identified risks
2 categories
i. Physical Controls
ii. IT Controls
Physical Controls
Transaction Authorization
Segregation of duties
Supervision
Accounting Records
Access Control
Independent Verification
IT Controls
Application Controls
- ensures validity, completeness &
accuracy of financial transactions
General Controls
- applies to all systems
Documenting
IT Controls
I. Internal Control Narratives
Text describing controls over a
particular risk
Should describe the origin and
disposition of each document (paper
or electronic), list processing steps
and describe internal controls (ex.
approvals and authorizations).
Documenting
IT Controls
II. Flowcharts
Systems flowcharts that highlights
control points
Uses symbols and connectors to
show documents, data flows and
process steps
Documenting
IT Controls
Common Flowchart Symbols
Computer
Process
Start/
Stop
Document
Manual
Process
Data Flow
Decis
ion
Disk
Storage
Keyboard
Input
Online
Storage
Documenting
IT Controls
III. Internal Control
Questionnaires
Lists questions about internal
control over various applications,
processes or risks.
Answerable with yes or no