Sr. No. Attribute Activity Description Process Reference
Sr. No. Attribute Activity Description Process Reference
Servers and end users PCs are infected with virus ITGC 05
1. For CMS System - all new users are given pre- Significant Higher As Needed
expired password and the system prompts the user to
set new password at the time of first login
1. For CMS - Users access rights are granted by IT Significant Higher As Needed
only upon specific approval by the concerned
functional head
System prompts the user to change the password Normal Not Higher As Needed
after the expiration of 30 days.
Password must contain at least 7 characters, alpha Normal Not Higher As Needed
numeric (alphabets, numbers and special characters).
If the password is wrongly entered continuously for Normal Not Higher As Needed
5 times within 30 minutes, the respective login id
gets locked.
If a user is not accessing the system for more than Normal Not Higher As Needed
specified time, the system gets automatically locked.
There exists a periodic review of the user profiles Normal Not Higher As Needed
for systems access, to confirm appropriateness.
Requests for creation of new user ids are received by Significant Higher As Needed
the IT Executive on standardized form, duly signed
by the respective HOD.
1. Regular back-up strategy defined for server and Significant Not Higher As Needed
auto-back up is taken at defined frequency.
Off-site storage of back-up to tackle any unforeseen Significant Not Higher As Needed
event at the office premises.
2. Servers:
All servers are installed with anti virus scanner.
3. Gateway:
Mail server is managed and all the Emails are
scanned by threat management gateway.
Specific changes are made to key applications Significant Not Higher As Needed
relevant to financial reporting only after sign off
from the relevant stakeholders
Preventive Automated For Tally - all three users are given same password 1. Yes
which is not required to be changed either after first 2. No
login or subsequently
Preventive Automated For Tally - all the users in the accounts dept. are 1. Yes
sharing common user-id password and having same 2. No
access rights
Preventive Automated Access to public sites and domain have not been 1. Yes
restricted 2. No
Remedial methods Control Design Control
Conclusion Operational
(Effective, Effectiveness
Ineffective) Conclusion
Eligible persons other than designated employees to Ineffective
be provided view-only access of eCIB application
- Effective
Introduce a process of periodic review of user Ineffective
profiles for system access.
- Effective
- Effective
- Effective
- Effective
- Effective
Standard forms duly signed by respective HOD to As per discussion with IT Finance IT
be checked Executive Manager Executive
Review the procedure of disabling access rights As per discussion with IT Finance IT
from the system Executive and Finance Manager Manager Executive
Review the significant changes made during the As per discussion with IT Finance IT
year Executive Manager Executive
Review the significant changes made during the As per discussion with IT Finance IT
year Executive Manager Executive
Review the mechanism of solving the problems As per discussion with IT Finance IT
and incidents faced by the users Executive and various users Manager Executive
Ensure whether external storage devices are As per discussion with IT Finance IT
deactivated and access to public sites have been Executive and various users Manager Executive
restricted
Application Is IPE used in If yes, List of IPE Reference of Testing Work
System performing paper for conclusion on
relevant Control Design,
Control? If yes, Implementation
Tally No - -
Tally No - -
1. CMS No - -
2. Tally
1. CMS No - -
2. Tally
Tally, CMS, No - -
Sensys TDS
Tally, CMS, No - -
Sensys TDS
Tally, CMS, No - -
Sensys TDS
Tally, CMS, No - -
Sensys TDS
CMS No - -
- No - -
- No - -
CMS, Sensys No - -
TDS
CMS, Sensys No - -
TDS
- No - -
- No - -
Tally, CMS No - -
Tally, CMS No - -
Tally, CMS No - -
CMS, Sensys No - -
TDS & Matrix
Cosec
- No - -