Processing Integrity
Processing Integrity
• COBIT control objective DS 11.1 addresses the need for controls over the input, processing, and
output of data.
• Identifies six categories of controls that can be used to satisfy that objective.
• Three categories/groups of integrity controls are designed to meet the preceding objectives:
• Input controls
If the data entered into a system is inaccurate or incomplete, the output will be, too.
(Garbage in garbage out.)
Companies must establish control procedures to ensure that all source documents are
authorized, accurate, complete, properly accounted for, and entered into the system or
sent to their intended destination in a timely manner.
1. Forms design ---- source documents and other forms should be designed to help
ensure that errors and omissions are minimized.
a. Pre-numbered forms sequence test
Pre-numbering helps verify that no items are missing.
When sequentially pre-numbered input documents are used, the
system should be programmed to identify and report missing or
duplicate form numbers.
b. Turnaround documents
• The preceding tests are used for batch processing and online real-time processing.
• Both processing approaches also have some additional controls that are unique to each
approach.
In addition to the preceding controls, when using batch processing, the following data entry
controls should be incorporated:
1. Sequence check --Tests whether the data is in the proper numerical or alphabetical sequence.
2. Error log--Records information about data input or processing errors (when they occurred,
cause, when they were corrected and resubmitted).
3. Batch totals
Summarize key values for a batch of input records. Commonly used batch totals include:
i. Financial totals—sums of fields that contain dollar values, such as total sales.
ii. Hash totals—sums of nonfinancial fields, such as the sum of all social security
numbers of employees being paid.
iii. Record count—count of the number of records in a batch.
These batch totals are calculated and recorded when data is entered and used later to
verify that all input was processed correctly.
• Processing controls
• Data matching
• File labels
Protect against accidental writing over or erasing of data files but are
not foolproof.
• Output controls
• Careful checking of system output provides additional control over processing integrity.
• Reconciliation procedures
– Human error
• Proper controls can minimize the risk of significant system downtime caused by the preceding
threats.
• Consequently, organizations must develop disaster recovery and business continuity plans to
enable them to quickly resume normal operations after such an event.
– Loss of system availability can cause significant financial losses, especially if the system
affected is essential to e-commerce.
– Organizations can take a variety of steps to minimize the risk of system downtime.
• Physical and logical access controls (Chapter 7) can reduce the risk of successful
denial-of-service attacks.
– COBIT control objective DS 13.5 identifies the need for preventive maintenance.
Examples:
– Use of redundant components can provide fault tolerance, which enables the system to
continue functioning despite failure of a component. Examples of redundant
components:
• Dual processors
• Arrays of multiple hard drives.
• COBIT control objectives DS 12.1 and 12.4 address the importance of proper location and design
of rooms housing mission-critical servers and databases.
– Cables with special plugs that cannot be easily removed reduce risk of damage due to
accidentally unplugging.
– Well-trained operators are less likely to make mistakes and more able to recover if they
do.
• Email should be scanned for viruses at both the server and desktop levels.
• Newly acquired software and disks, CDs, or DVDs should be scanned and tested first on a
machine that is isolated from the main network.
– Disaster recovery and business continuity plans are essential if an organization hopes to
survive a major catastrophe.
– Being without an IS for even a short period of time can be quite costly—some report as
high as half a million dollars per hour.
– Yet many large U.S. companies do not have adequate disaster recovery and business
continuity plans.
• The objectives of a disaster recovery and business continuity plan are to:
• Key components of effective disaster recovery and business continuity plans include:
1. Overall Security
Security provisions protect computer equipment, programs, communications, and data
from unauthorized access, modification, or destruction. Overal system security threats
include accidental or intentional damage to system assets; unauthorized access,
disclosure, modification of data and programs; theft; and interruption of crucial
business activities.
2. Program Development and Acquisition
The auditor's role in systems development should be limited to an independent review
of systems development activities. To maintain objectivity, auditors should not help
develop the system.
Two things can go wrong in program development: (1) inadvertent programming errors
due to misunderstanding system specifications or careless programming and (2)
unauthorized instructions deliberately inserted into the programs. These problems can
be controlled by requiring management and user authorization and approval, thorough
testing, and proper documentation.
3. Program Modification
The same threats that occur during program development occur during program
modification. When a program changes is submitted for approval, a list of all required
updates should be compiled and approved by management and program users. All
program changes should be tested and documented. During the change process, the
development al program must be kept separate from the product version. After the
modified program is approved, the production version replaces the developmental
version.
4. Computer Processing
During computer processing, the system may fail to detect erroneous input, improperly
correct input errors, process erroneous input, or improperly distribute or disclose
output. Auditors periodically reevaluate processing controls to ensure their continued
reliability. If they are unsatisfactory, user and source data controls may be strong
enough to compensate. If not, a material weakness exists, and steps should be taken to
eliminate the control deficiencies.
5. Source Data
An input controls matrix is used to document the review of source data controls. The
matrix shows the control procedures applied to input record field.
The data control function should be independent of other functions, maintain a data
control log, handle errors, and ensure the overall efficiency of operations. It is usually
not economically feasible for small businesses to have an independent data control
function. To compensate, user department controls must be stronger with respect to
data preparation, batch control totals, edit programs, restrictions on physical and logical
access, and error-handling procedures. These procedures should be the focus of the
auditor's systems review and tests of controls when there is no independent data
control function.
6. Data Files
The sixth objective concerns the accuracy, integrity, and security of data stored on
machine-readable files. If file controls are seriously deficient, especially with respect to
physical or logical access or to backup and recovery procedures, the auditor should
recommend they be rectified.
Audit Software
Computer-assisted audit techniques (CAATs) refer to audit software, often called
generalized audit software (GAS), that uses auditor-supplied specifications to generate a
program that performs audit functions, thereby automating or simplifying the audit
process. Two of the most popular software packages are Audit Control Language (ACL)
and Interactive Data Extraction and Analysis (IDEA). CAATs is ideally suited for examining
large data files to identify records needing further audit scrutiny.
As an example, a new tax collector in a small New England town requested a tax audit.
Using CAATs, the auditor assessed tax collection records for the previous 4 years, sorted
them by date, summed collections by month, and created a report of monthly tax
collections. The analysis revealed that collections during January and July, the two
busiest months, had declined by 58% and 72%, respectively. Auditors then used CAATs
to compare each tax collection record with property records. They identified several
discrepancies, including one committed by the former tax collector, who used another
taxpayer's payment to cover her own delinquent tax bills. The former tax collector was
arrested by embezzlement.