Audit of Outsourced Software Development PDF
Audit of Outsourced Software Development PDF
The need for IS Assurance services for conducting IS audit with the objective
of providing assurance on protection of Intellectual property\security audit was
communicated by AMG to AAA, CA Firm and the same had been appointed by
AMG for providing assurance services on protection of Intellectual
property/security audit.
• Provide assurance to AMG that the intellectual property of AMG including assets
and access to such assets (hardware, software, manuals, media, etc.) used at
the AMG labs at DLF in Bangalore are adequately secured (physically and
logically) from unauthorised and inappropriate use through adequate and
appropriate physical, environmental and logical access controls;
• Review the process and methods in place at AMG labs at DLF so as to provide
assurance to AMG that there are adequate and appropriate safeguards and
procedures that prevent unauthorized access, mishandling and damage to any of
the assets of AMG at AMG labs at DLF;
• Review whether all the facilities provided by AMG are being used for the
purposes of AMG's operations by personnel authorised or assigned for AMG's
operations only at DLF;
• Validate the process and methods at AMG labs at BLF against available norms
and standards of AMG wherever available
We, AAA, the CA Firm, hereby appointed to:
1. Introduction
2. Auditee Environment
AMG is the world's leading provider of management solutions that ensure the
availability, performance, and recovery of business-critical applications. AMG
calls this application service assurance and it means that the applications its
customers rely on most stay up and running, around the clock. For more than
20 years, the largest and most successful companies have relied on AMG
Software. AMG Software is among the world's largest independent software
vendors, a Forbes 500 company and a member of the S&P 500, with
revenues of $2.3 billion in the last 12 months.
DLF Software (DLF) is the Auditee Company to whom AMG has outsourced
its software development wherein AMG labs have been set up wherein all the
facilities provided by AMG are being used for the purposes of AMG's
operations by personnel authorized or assigned for AMG's operations only at
DLF allocated work site.
3. Background
AMG has outsourced software development through ODS mode to DLF. AMG
has supplied IT infrastructure for these services and has also recruited
required personnel who work at DLF for the software projects of AMG. AMG
wanted an independent assurance on the security and usage of the
technology as also protection of the IPR of AMG.
5. Scope of assignment
Based on the detailed discussions with Mr. Ben Crocker and visit to the AMG
Labs at DLF, the primary objectives of the assignment of Intellectual Property
Security Audit are finalized as follows:
• To review whether all the facilities provided by AMG are being used for the
purposes of AMG's operations by personnel authorized or assigned for AMG's
operations only at DLF;
We want an all time attendant for assisting and providing time to time
information about system & policies adopted by company. We need Service
Level Agreement with DLF. And we also need Information Security Policies of
company. We need high speed internet facility with other IT related supports.
Control over the process of managing third-party services that satisfy the
business requirement to ensure that roles and responsibilities of third parties
are clearly defined, adhered to and continue to satisfy requirements is enabled
by control measures aimed at the review and monitoring of existing contracts
and procedures for their effectiveness and compliance with organization
policy.
Functional Objectives
Step Two: Embed Security Metrics and SLAs into Outsourcing Contracts
The assurance levels the enterprise selected in Step 1 (above) is then applied
to incorporate business risk and the output is normalized to an easy to
understand letter grade (A, B, C, etc…). Thus, enterprises can set an
acceptable grade – “A” for example and outsourcing providers know they must
achieve that grade for the application to be accepted.
Setting thresholds and using standard based scoring removes the subjectivity
and “gray-area” on what constitutes acceptance and clarifies the process for
both the enterprise and provider. Below is a chart that demonstrates how
organizations can use assurance levels, quality scores and testing methods to
achieve an overall rating:
Step Five: Outsource Applications to Providers with Security
Certifications
• ISO 27001
• System Security Engineering-Capability Maturity Model (SSE-CMM)
• CMM/Capability Maturity Model Integration (CMMI)
While the above are high-level quality and development programs are a good
indicator of supplier trustworthiness, they do not guarantee application security
expertise and do not replace independent security testing. Organizations
should also look for application security specific testing and certifications that
have been formally validated by an independent quality seal of approval such
as Veracode‟s “Verified by Veracode” assurance program.
Summary of Steps:
Security
8. Documents reviewed
Efficiency of operations
Service Support
Application Management
SYSTRUST AND
Principles and Criteria: Broad Areas:
WEBTRUST:
SysTrust engagements Communicates
are designed for the Security Procedures and also
provision or advisory Monitors it.
services or assurance
on the reliability of a · Availability Policies
system WebTrust
· Processing integrity Communications
engagements relate
toassurance or advisory · Confidentiality Procedures
services on an
organisation‟s system · Online privacy Monitoring
related toe-commerce
SERVICE
HIPAA: The Health SAS 70 – STATEMENT OF
AUDITOR’S
Insurance AUDITING
REPORTS:
Portability and
Accountability Act were
service auditor’s examination is
enacted by the
widely recognized, because it
U.S.Congress for Type I report
represents that a service organization
Protection of health
has been through an in-depth audit of
insurance coverage for
their control activities, which
workers and their
generally include controls over
families when they
information technology
change or lose their Type II report
jobs.
Number of the
Title of the Standard Standard
Basic principles governing an Audit SA 200
Objectives and scope of the Audit of
financial statements SA 200A
Term of audit engagement SA 210
Quality control for Audit work SA 220
Documentation SA 230
The Auditor's responsibility to consider
fraud and error in an Audit of financial
statement SA 240
www.icai.org;
www.cit.icai.org;
www.isaca.in;
www.caclubindia.in
10. Deliverables
Findings
• While conducting our Audit we have observed that AMG software
does not have any security policy regarding authorized use of
infrastructure and man power skills provided by AMG software so
that it can be ensured that its facilities are not used for other
assignments by DLF in AMG Labs.
• The door for the first floor lab does not automatically lock itself
after it has been opened. If a user is not careful in ensuring the
door is locked after he/she enters or leaves the lab there could be
opportunities for unauthorised users to enter the lab without using
the keypad device.
• No individual logins have been created since all the users have
to work on a common project.
• There are no back-up systems available for the systems supplied
by AMG.
• The documented generic disaster recovery plan is the same is applicable
to DLF as a whole and is not customised to AMG labs.There is no
Disaster recovery plan for the systems that are supplied by AMG and
the communication capabilities of the labs.
• Alternative processing capabilities for the systems supplied by AMG
are not identified.
• No annual maintenance contracts exist for AMG supplied
machines.
Recommendations
• AMG software should draft security policy for authorised access of
resources.
• It leads to piggybacking. There must be auto locking of door after
an entry of a person within a fraction of seconds.
• Each and every person shall have their separate login (User Name
and passwords) and all have access on the basis of “Need to do ,
Need to know” else it would be a threat to Company against
disgruntled employees.
• There must be backup systems available at DLF which shall be
compatible to the existing applications.
• Disaster Recovery Plan should be separate for AMG Software as
per the system requirement.
• Alternate Processing capabilities should also be provided by the
AMG Management.
• There must be AMC Contract with the Third party vendors to ensure
smooth functioning.
To
The Board of Directors
AMG Software
Houston, Texas
USA
Inherent Limitations
The audit opinion expressed in this report has been formed on the above
basis.
Findings
• While conducting our Audit we have observed that AMG
software does not have any security policy regarding authorized
use of infrastructure and man power skills provided by AMG
software so that it can be ensured that its facilities are not used
for other assignments by DLF in AMG Labs.
• The door for the first floor lab does not automatically lock itself after
it has been opened. If a user is not careful in ensuring the door is
locked after he/she enters or leaves the lab there could be
opportunities for unauthorised users to enter the lab without using
the keypad device.
• No individual logins have been created since all the users have to
work on a common project.
• There are no back-up systems available for the systems supplied by
AMG.
• The documented generic disaster recovery plan is the same is applicable
to DLF as a whole and is not customised to AMG labs.There is no
Disaster recovery plan for the systems that are supplied by AMG and the
communication capabilities of the labs.
• Alternative processing capabilities for the systems supplied by AMG are
not identified.
• No annual maintenance contracts exist for AMG supplied machines.
Recommendations
• AMG software should draft security policy for authorised access of
resources.
• It leads to piggybacking. There must be auto locking of door after an
entry of a person within a fraction of seconds.
• Each and every person shall have their separate login (User Name
and passwords) and all have access on the basis of “Need to do ,
Need to know” else it would be a threat to Company against
disgruntled employees.
• There must be backup systems available at DLF which shall be
compatible to the existing applications.
• Disaster Recovery Plan should be separate for AMG Software as
per the system requirement.
• Alternate Processing capabilities should also be provided by the
AMG Management.
• There must be AMC Contract with the Third party vendors to ensure
smooth functioning.
Audit Opinion
Dated: 14.01.2019
Place: CHANDIGARH
CA Ben Crocker
M. No. 000000
Partner