0% found this document useful (0 votes)
62 views21 pages

Sr. No. Attribute Activity Description Process Reference

The document describes various IT general controls (ITGC) at the State Bank of Pakistan (SBP). It includes 19 ITGC processes related to the control environment, information and communication, and risk assessment. For each process, it identifies potential risks of material misstatement to the financial statements. It then describes the specific control activities in place to address each risk, and classifies the inherent and residual risk. The controls are focused on access restrictions, change management controls, IT operations controls, and controls over confidential data sharing.

Uploaded by

Wajahat Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views21 pages

Sr. No. Attribute Activity Description Process Reference

The document describes various IT general controls (ITGC) at the State Bank of Pakistan (SBP). It includes 19 ITGC processes related to the control environment, information and communication, and risk assessment. For each process, it identifies potential risks of material misstatement to the financial statements. It then describes the specific control activities in place to address each risk, and classifies the inherent and residual risk. The controls are focused on access restrictions, change management controls, IT operations controls, and controls over confidential data sharing.

Uploaded by

Wajahat Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Sr. No.

Process Attribute Activity Description


Reference

1 ITGC Control Access Rights


Environment

2 ITGC Control Closing of Accounting


Environment period/year in the
Accounting Software
3 ITGC Control Selects and develops
Environment general controls over
technology

4 ITGC Control Selects and develops


Environment general controls over
technology

5 ITGC Control Selects and develops


Environment general controls over
technology
6 ITGC Control Selects and develops
Environment general controls over
technology

7 ITGC Control Selects and develops


Environment general controls over
technology

8 ITGC Control Selects and develops


Environment general controls over
technology
9 ITGC Control Identifies and analyses
Environment significant changes that
could impact internal
controls

10 ITGC Information Selects and develops


& general controls over
Communicati technology
on

11 ITGC Information Selects and develops


& control activities to
Communicati mitigate risks
on

12 ITGC Control Selects and develops


Environment general controls over
technology

13 ITGC Control Selects and develops


Environment general controls over
technology
14 ITGC Control Identifies risks to the
Environment achievement of
objectives and analyses
risks to manage them

15 ITGC Control Assesses fraud risk to


Environment the achievement of
objectives
16 ITGC Control Selects and develops
Environment control activities to
mitigate risks

17 ITGC Control Selects and develops


Environment control activities to
mitigate risks

18 ITGC Control Identifies and analyses


Environment significant changes that
could impact internal
controls

19 ITGC Control Selects and develops


Environment general controls over
technology
21 ITGC Control Selects and develops
Environment general controls over
technology
Identification of Risk of Material Misstatement Control
("What Could Go Wrong") Ref
Risk Description Number
Editable access of eCIB application provided to persons other ITGC 02
than SBP's employees (Internal and Statutory Auditors,
Consultants, etc.)

Erroneous/intentional posting of Accounting entry in the ITGC 02


earlier closed period/year

Unauthorized access to eCIB application and database results ITGC 03


in errors in CIB reporting

Unauthorized access to IT systems, applications and data ITGC 02


results in errors in financial reporting

Unauthorized access to IT systems, applications and data ITGC 03


results in errors in financial reporting

Unauthorized access to IT systems, applications and data ITGC 03


results in errors in financial reporting

Unauthorized access to IT systems, applications and data ITGC 03


results in errors in financial reporting

Unauthorized access to IT systems, applications and data ITGC 03


results in errors in financial reporting
Unauthorized access to IT systems, applications and data ITGC 10
results in errors in financial reporting

Unauthorized access to IT systems, applications and data ITGC 03


results in errors in financial reporting

Unauthorized access to IT systems, applications and data ITGC 03


results in errors in financial reporting

Absence of regular back-up which may lead to loss of crucial ITGC 04


data

Absence of regular back-up which may lead to loss of crucial ITGC 04


data

Servers and end users PCs are infected with virus ITGC 05

Unauthorized access to the IT systems, applications and data ITGC 05


by external parties
Unauthorized access to IT systems, applications and data ITGC 06
results in errors in financial reporting

Significant developments and changes to information systems ITGC 06


relevant to financial reporting are made, resulting in errors in
financial reporting.

Errors in changes made to key applications relevant to ITGC 06


financial reporting.

Problems and incidents are not effectively managed. ITGC 09

Intentional sharing of crucial and confidential data of the ITGC 07


SBP's by staff to outsiders (e.g. competitors)
Control That Addresses Risk of Material Classification Risk Associated Operating
Misstatement of Inherent with the Control Frequency
— Control Name Risk (Not Higher, (Annually,
(Normal, Higher) Quarterly,
View-only access of eCIB applicationprovided to Significant Higher As Needed
persons other than SBP's employees (Internal and
Statutory Auditors, Consultants, etc.) who are not
required to modify the financial transactions

Closing of previous period/year to restrict back- Significant Higher As Needed


dating of transactions

1. For CMS System - all new users are given pre- Significant Higher As Needed
expired password and the system prompts the user to
set new password at the time of first login

2. For Tally - all new users are given pre-expired


password and the system prompts the user to set new
password at the time of first login

1. For CMS - Users access rights are granted by IT Significant Higher As Needed
only upon specific approval by the concerned
functional head

2. For Tally - Users access rights are granted by IT


only upon specific approval by the concerned
functional head

System prompts the user to change the password Normal Not Higher As Needed
after the expiration of 30 days.

Password must contain at least 7 characters, alpha Normal Not Higher As Needed
numeric (alphabets, numbers and special characters).

If the password is wrongly entered continuously for Normal Not Higher As Needed
5 times within 30 minutes, the respective login id
gets locked.

If a user is not accessing the system for more than Normal Not Higher As Needed
specified time, the system gets automatically locked.
There exists a periodic review of the user profiles Normal Not Higher As Needed
for systems access, to confirm appropriateness.

Requests for creation of new user ids are received by Significant Higher As Needed
the IT Executive on standardized form, duly signed
by the respective HOD.

1. User termination, resignation is informed to IT Normal Not Higher As Needed


Executive through email by HR.

2. User account is disabled immediately after


receiving an email request. Before processing this
request, IT archives the mail box of the user.

3. Full & Final Settlement Form is signed by the IT


Executive only when the necessary access rights
have been disabled in the system.

1. Regular back-up strategy defined for server and Significant Not Higher As Needed
auto-back up is taken at defined frequency.

2. Retrieval is tested at reasonable frequency

Off-site storage of back-up to tackle any unforeseen Significant Not Higher As Needed
event at the office premises.

1. Desktops: Significant Not Higher As Needed


All the user desktops are installed with anti virus
scanner, which scans the new files on an ongoing
basis

2. Servers:
All servers are installed with anti virus scanner.

3. Gateway:
Mail server is managed and all the Emails are
scanned by threat management gateway.

4. The anti virus gets automatically updated with the


latest version through process of auto updates

1. Firewalls have been installed. Significant Not Higher As Needed


2. The logs are regularly reviewed by IT Executive
Changes in programs can be made only with prior Significant Not Higher As Needed
approval of the Board of Directors or the HOD
concerned, with the simultaneous involvement and
approval of the IT personnel.

Decisions around significant developments and Significant Not Higher As Needed


changes to information systems relevant to financial
reporting are made in conjunction with Finance
Manager and after approval of BOD

Specific changes are made to key applications Significant Not Higher As Needed
relevant to financial reporting only after sign off
from the relevant stakeholders

An in-house IT personnel resolves issues faced by Normal Not Higher As Needed


users as required

1. Deactivation of external storage devices on SBP's Significant Higher As Needed


PCs.

2. Restricting access to all public sites and domain


Nature of Control- Deficiencies Control Exist
Control Automated (Yes/No)
or Manual
Preventive Automated Editable access of eCIB application provided to No
persons other than SBP's employees (Internal and
Statutory Auditors, Consultants, etc.)

Preventive Automated Previous closed month/year is not blocked for No


editing transactions

Preventive Automated For Tally - all three users are given same password 1. Yes
which is not required to be changed either after first 2. No
login or subsequently

Preventive Automated For Tally - all the users in the accounts dept. are 1. Yes
sharing common user-id password and having same 2. No
access rights

Preventive Automated System does not give any alerts or notifications to No


force-change the password after expiration of 30
days
Preventive Automated Password logic is not defined No

Preventive Automated No locking of login id upon incorrect entries of No


password.

Preventive Automated - Yes


Both Preventive Automated No periodic review of user profile for system access. No
& Detective

Preventive Manual No procedure of sending a standard form duly No


signed by the respective HOD for new user-id
creation.

Preventive Manual 1. No procedure of sending a email request for No


disabling the access rights from the system.

2. IT Executive does not sign on the Full & Final


Settlement form regarding disabling access rights
from the system

Preventive Automated - Yes

Preventive Automated There is no off-site storage of the back-up server No

Preventive Automated - Yes

Preventive Automated The logs are not reviewed by IT Executive 1. Yes


2. No
Preventive Automated - Yes

Preventive Automated - Yes

Preventive Automated - Yes

Preventive Automated - Yes

Preventive Automated Access to public sites and domain have not been 1. Yes
restricted 2. No
Remedial methods Control Design Control
Conclusion Operational
(Effective, Effectiveness
Ineffective) Conclusion
Eligible persons other than designated employees to Ineffective
be provided view-only access of eCIB application

Block previous closed month/ year for editing Ineffective


transactions

For Tally - give all the users individual pre-expired 1. Effective


passwords, which the users need to change at the 2. Ineffective
time of first log-in

For Tally - give all the users separate user-id 1. Effective


password and access rights. 2. Ineffective

Introduce a password change policy whereby the Ineffective


system gives a pop-up to force-change the password
after expiration of 30 days
Define a Password policy Ineffective

Define a Password policy Ineffective

- Effective
Introduce a process of periodic review of user Ineffective
profiles for system access.

Require request for new user-id creation to be sent to Ineffective


the IT Executive through a duly signed standard
form

1. Introduce a procedure of sending email request for Ineffective


disabling the access rights from the system.

2. Require signature by IT Executive on the Full &


Final Settlement form confirming disabled access
rights from the system

- Effective

Ensure off-site storage of back-up for ensuring Ineffective


safety of back-up

- Effective

Require regular review of logs by IT Executive 1. Effective


2. Ineffective
- Effective

- Effective

- Effective

- Effective

Restrict access to public sites and domain 1. Effective


2. Ineffective
Substantive Procedures Planned Evidence of Control Control Process
Owner Owner

Access right restriction As per discussion with IT Finance IT


Executive and various users Manager Executive

Access right restriction As per discussion with IT Finance IT


Executive and various users Manager Executive

Conduct live-check for password change As per discussion with IT Finance IT


Executive Manager Executive

Process of granting access rights As per discussion with IT Finance IT


Executive Manager Executive

Conduct live-check for password change As per discussion with IT Finance IT


Executive Manager Executive

- As per discussion with IT Finance IT


Executive Manager Executive

- As per discussion with IT Finance IT


Executive Manager Executive

Conduct live-check for auto-locking of system As per discussion with IT Finance IT


Executive Manager Executive
- As per discussion with IT Finance IT
Executive Manager Executive

Standard forms duly signed by respective HOD to As per discussion with IT Finance IT
be checked Executive Manager Executive

Review the procedure of disabling access rights As per discussion with IT Finance IT
from the system Executive and Finance Manager Manager Executive

Review back-up policy As per discussion with IT Finance IT


Executive Manager Executive

Review back-up policy As per discussion with IT Finance IT


Executive Manager Executive

Check for working of anti-virus software on As per discussion with IT Finance IT


selected PC's Executive Manager Executive

- As per discussion with IT Finance IT


Executive Manager Executive
Review the significant changes made during the As per discussion with IT Finance IT
year Executive Manager Executive

Review the significant changes made during the As per discussion with IT Finance IT
year Executive Manager Executive

Review the significant changes made during the As per discussion with IT Finance IT
year Executive Manager Executive

Review the mechanism of solving the problems As per discussion with IT Finance IT
and incidents faced by the users Executive and various users Manager Executive

Ensure whether external storage devices are As per discussion with IT Finance IT
deactivated and access to public sites have been Executive and various users Manager Executive
restricted
Application Is IPE used in If yes, List of IPE Reference of Testing Work
System performing paper for conclusion on
relevant Control Design,
Control? If yes, Implementation
Tally No - -

Tally No - -

1. CMS No - -
2. Tally

1. CMS No - -
2. Tally

Tally, CMS, No - -
Sensys TDS

Tally, CMS, No - -
Sensys TDS

Tally, CMS, No - -
Sensys TDS

Tally, CMS, No - -
Sensys TDS
CMS No - -

- No - -

- No - -

CMS, Sensys No - -
TDS

CMS, Sensys No - -
TDS

- No - -

- No - -
Tally, CMS No - -

Tally, CMS No - -

Tally, CMS No - -

CMS, Sensys No - -
TDS & Matrix
Cosec
- No - -

You might also like