Assignment On: IS Audit and Inspection: Planning, Setting The Scope, and Preparing IS Audit For Any System Based Banking Operations
Assignment On: IS Audit and Inspection: Planning, Setting The Scope, and Preparing IS Audit For Any System Based Banking Operations
IS Audit and Inspection: Planning, Setting the Scope, and Preparing IS Audit for
any System Based Banking Operations
Table of Contents:
Introduction 2
Discussion 2
Planning / Pre-Audit activities 6
Appendices (Bibliography & other 7
References.)
Page 1 of 7
Introduction
An information technology audit, or information systems audit, is an examination
of the management controls within an Information technology (IT) infrastructure.
The evaluation of obtained evidence determines if the information systems are
safeguarding assets, maintaining data integrity, and operating effectively to
achieve the organization's goals or objectives. These reviews may be performed in
conjunction with a financial statement audit, internal audit, or other form of
attestation engagement. An effective information system audit leads the
organization to achieve its objectives and an efficient information system uses
minimum resources in achieving the required objectives.
The primary functions of an IT audit are to evaluate the systems that are in place
to guard an organization's information. Specifically, information technology
audits are used to evaluate the organization's ability to protect its information
assets and to properly dispense information to authorized parties.
Discussion
As per guidelines on internal control & compliance in banks issued by
Bangladesh Bank on February, 2016 IS auditors evaluate risk management
practices to determine whether the bank’s IS-related risks are properly managed.
IS auditors should conduct audit on overall information and related technological
security aspects covering the followings:
a. IT Asset Management i. IT Strategies, IT budget
j. Audit trails &Data Privacy
b. IT Service & Facility Management
Protection Management
c. Physical (client/server interface,
k. IT Service Contract &
telecommunication, server, data storage,
Agreements and Vendor
intranet, internet) & Environmental
Management
Security
d. User & Access Management l. IT Risk Management
e. Database Access & Network Security m. Data Integrity &Transaction
Management control
f. Data Center Security n. Data Retention & Disposal
o. System Acquisition,
g. Change & Patch Management
Development Management
Page 2 of 7
p. Business Continuity & Disaster
h. Problem & Incident Management
Recovery
The spectrum of IT Audit should cover the issues mentioned in the Board approved ICT
guidelines of the bank in line with ICT guidelines issued and updated by Bangladesh
Bank.
Circular and other instructions issued in this regard will also come under purview of IT
Audit to ensure data security. However IT Audit at least cover the following areas for
overall data security.
i. System Design
ii. Application/ Software Security
iii. Information Processing Facilities
iv. System Development Facilities
v. Network Security
vi. IT System (client/server interface, telecommunication, server, data storage, intranet,
internet) Physical Security
vii. IT System (server, data storage, intranet, internet) Access control/Security viii. Data
Disposal and Copyright (if any)
ix. Disaster Recovery & Business Continuity Plan
x. Overall Management
Information System Audit
The following are basic steps in performing the Information Technology Audit Process
Page 4 of 7
To ensure integrity, confidentiality and availability of information system(s) and
resources.
To investigate possible security vulnerabilities and incidents in order to ensure
conformance to the Bank’s security policies.
To ensure software systems deployed conforms to the Bank’s software
implementation policy
To ensure changes made to any systems conforms to the Bank’s Change
Control/Change Management policy
To ensure regular Backup of data and business critical system is taken &
preserved.
To ensure Restore of both data and full system is carried out on a regular basis, so
that data integrity can be ensured and the Bank can be prepared for any possible
disaster
To monitor user or system activity where appropriate
To investigate security incidents as when required.
An IT audit is different from a financial statement audit. While a financial audit’s
purpose is to evaluate whether an organization is adhering to standard accounting
practices, the purposes of an IT audit are to evaluate the system’s internal control design
and effectiveness. This includes, but is not limited to, efficiency and security protocols,
development processes, and IT governance or oversight.
Installing controls are necessary but not sufficient to provide adequate security. People
responsible for security must consider if the controls are installed as intended, if they are
effective if any breach in security has occurred and if so, what actions can be done to
prevent future breaches.
Page 5 of 7
Planning / Pre-Audit activities
Auditors must make certain assumptions when bidding on a project, such as having
access to certain data or staff. But once the auditor is on board, don’t assume anything;
everything should be spelled out in writing, such as receiving copies of policies or system
configuration data. These assumptions should be agreed to by both sides and include
input from the units whose systems will be audited.
Nobody likes surprises. Involve the business and IT unit managers of the audited systems
early on. This will smooth the process as a dispute over the auditor’s access. Consider the
case of one respected auditing firm that requested that copies of the system password and
firewall configuration files be e-mailed to them.
Page 7 of 7