Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
230 views
18 pages
Information Technology General Controls Review (ITGC) Audit Program
Uploaded by
Jean Dumas Maurice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Information Technology General Controls Review (IT... For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
230 views
18 pages
Information Technology General Controls Review (ITGC) Audit Program
Uploaded by
Jean Dumas Maurice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Information Technology General Controls Review (IT... For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Information Technology General Controls Review (IT... For Later
You are on page 1
/ 18
Search
Fullscreen
Information Technology General Controls Review (ITGC) Audit Program 2012 tneraal Audit Work Plan Project Ovjective: Prepared by Date Prepare Reviewed by! IT General Conols (TGC) addtess the overall operation and activites ofthe IT function and its management and governance. The ITGC audit vill densify and assess general conios thoughout the orgauization’s IT iafresttctwe, The audoy(s) wall aque, observe, and gather evidence to obvain an understanding of the TT contol environment. COBIT provides the general framework forthe assessment and is antented. as necessary with applicable regulation, legislation, standards, policies, agreements, and relate guidance Reference: Section Procedures ‘Workpaper# “Auditor and Comments A_| General ‘AT Review prior assessments, audit report, findings, and recommendations of IT activitis for two yeast includ ‘© Extemal sit reports + Iatemal audi reports Regulatory agcucy rpents © Consuiting reports Assess appropriateness of corrective actions Das taken Docuunett th action taken fr each recommendation nd determine whether aay prior yeu’ comments should be caried forward fo te curren year’s commen Tat he technology pliforns in use aa the applications processed on each platform, Platform Snfrmaton for includes ‘+ Equipment manufseruer and model Quantity Software applications information inlutes: ‘Applicaton vendor and name Version / Release ae Review Board of Diewors and Commies agenda and sites from the past yea for content relevatt to TT Establish and octet follow-up plans as appropriate. Aso avi be MS Word, Conte lsh com Page lof 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program 2012 tneraal Audit Work Plan Project Prepared by Date Prepare Reviewed by! Procedures “Workpaper “Auditor aud Comanents aa Review Busines & IT Suatepic Planing lative Establish and document follow-up plans as appropriate aS Review sats of TT untatives undervay (changes in boasiness operations or IT nfastuctre outsourcing initiatives, web strategies ct.) and note those impacting risks ad conttols, Ae Review the sus ofousouced IT sevice and vepeaive vendr(s) and adjast audit procedures as appropriate to axles issues affected by outsourcing. AF ‘Review the lst of wading partners bases associ ‘with whom the organization shares o exchanges cleatonic information, an asses arrangements for {information security and compliance across organizational boundaries AS ‘Review example business associate contrat / chin oF trust agreements ay “Asses he woes and vlated sks fv Key pesonnel Fespousible forthe exchange of dala /sfomnation extemal entities. [Review the job descipions for IT postions ieloding Secutity and Privacy Officers. Asses their pproptiatenes forthe oles identified, how well they ‘less separation of dies, and other considerations, xa ‘Assess he geneva state of taining provided to TT Sal ‘andthe related polices, procedures, and plas, sce, ‘ad training recoils. (See also Security raining inthe ‘Security and Application Systems Sections Page 2 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program Prepared by 2012 ternal Ani Work Plan Date Prepare Project: Reviewed by secon Procedures ‘Workpaper | Date “Auatior and Comments ‘Assess the management saaintenaace, planing, ant ‘appropeiateness of Documented Policies, Procedures, Standards, and Guidelines inching, but not limited te: ‘8 Gansal IT and IS Policies and Procedures , All Secuiy Policies including EIPAA, HITECH, State and oer Secmtity Requirements, et All Paivacy Policies including HIPAA, HITECHL ‘State and edhe Privacy Requzenents, et 44 Policies and Procedures for Release of Information Employee Termination Process Personne Proctces ~e-. clearance policies and procedures background check, et) visitor ani fusntenance personnel conto, disciplinary policies 2 Venuor Policies and Procedures (Change management poliies nd procedures Page 3 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program Prepared by 2012 ternal Ani Work Plan Date Prepare Project: Reviewed by! secon Procedures ‘Workpaper | Date “Auatior and Comments B__| [Organization and Operations BA | Obvain the cument IF Organization Chan) and asses seregaton of dies fer key functions (4: system aay development programming. testing. operations, ua.) ‘B2_| Review the crea IT organization charts) and asses segregation of tates for key fection (Le: system anaiyss, development, programming, testing. operations, suai... "BS | Review busines process Hows / Giagams for Telated setiviies and asses TT process controls a identified ‘BA_| Through discussion with IT persomel, evaluate the segzezation of eriel processing fnetons BS] Ensure the 7 fnction a suppor soup within the fgmization au doesnt inate of authoize transctons Wa) Detrnine wheter an FT seeing somniie wan equivalent committe provides effective IT governance within the orgaization. Page 4 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program 2012 tneraal Audit Work Plan Project Prepared by Date Prepare Reviewed by! Procedures “Workpaper “Auditor aud Comanents c Data Center (Environment and Physical Access) Note: The pysical environment reviewed wil consider the size and compleity of the organization and its operons. andthe types of teclnology in use or coming {nto se by th organization and its affiliates, partners, and related groups. Consider als the areas where technology {stsed ad whether the locations yreset risks di people and activities ae r natural or manmade threats ci ‘Evaluate the dia cater Tocaion() aad the host ‘buing(). Ensire combustible materials ate not stored ‘on loa above ot below the dara center. f combustible ‘materials age stored above, evaluate the fie suppeesson system sprite system wil result in water damage to floats below. “Tow the daa cenieis), Document the measures ken to contol physical acces to such areas asthe data cet, ‘Compute foom,elecomnunicains, wating closes, network access pois, “Heat all doors into the data center and ensure each adequately resuicts acess. ‘+ Enure all visitors, ineInding vendors, re requited to sign-in upon etry as ecorted a appeopiote td visitor recone ae retained, enti and observe the techniques im place (auvellance cameras, security guar, electonic cardkeys, et.) used to reste data ceuter access, Page $ of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program Prepared by 2012 ternal Ani Work Plan Date Prepare Project: Reviewed by! secon Procedures ‘Workpaper | Date “Auatior and Comments ‘Ca | Detemnine wineer te following environmental contol ae inplace and operational: a. Fite suppression equipment alo system or ‘ty line water suppression and extinguishes) '. Uniateruptibte power supply (UPS) €. Fmergency Power (eg. generators) 4. Temperature and humity contotiers—inctuding ‘ackup HAY Emergency power ctf switches Smoke and water detectors 2. Finergency lighting TES] Ensure te above ae repay Tse ad maintenance contracts are in fre. ‘E&_| Hentfy the equipment cooling systenv3). Ir water-cooled ‘ness the protection fr leakage and wheter a backup ‘water chiller exists ‘Cr_| Assess the routine maintenance of syste equipment fo susie its performance as expected and o monitor fale cr unsabe systems, ‘ES | Henify ie Vocation’) of constes for system an network operation and maintenance, and assess the use ‘and conto of emote consoles, Page 6 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program Prepared by 2012 ternal Ani Work Plan Date Prepare Project: Reviewed by! secon Procedures ‘Workpaper | Date “Auatior and Comments D__| Accessor Security Controls Phisieal Access DI} Ensrepiyscal acces to computer oom) edo peratos anc approprite supervisors, Locked computer lbs that require coded TD cards corkeys for entry . Manual key locks onthe computer Restricted acces to program litrares, and ops of al progsem access ‘DI Assess the completeness and appropriateness of Failiy Security Standards for autheatiaton. personel, acces, te Hleetvonie Acces DS] Asses the data secaiy policies and Wer eaorcemeat fr all incividuals with opportuitis to access data, Assess ‘whether the policies ates data ownership, privacy. access requirements, encryption, media, communications, passwords Page 7 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program 2012 tneraal Audit Work Plan Project Prepared by Date Prepare Reviewed by! Procedures “Workpaper “Auditor aud Comanents Da ‘Determine how system resources (Le, bach, on-line uansactions, datasets, and sensitive uilitis) ae protected actos al platforms, media. and transmissions dential applications tha provide their own security ‘mechanisms, Ensure appropiate capabilities are ‘implemented to include: ‘© Unique ser IDs assigned to all users ‘© Unattended devices automatically logged off ater a specified period of inatvity ‘Users are forced to change pesswords within a specified timeframe, ‘© Old passwords cannot be reused, ‘Passwords are properly masked on the system, "Review and asses the description of use authentication smechanisms—secue ID, biomettc, CHAPIPAP. et Tieatify and review the use of atomated athorization ‘an aientication mechanisms, profil templates, etc. ‘Assess the comectiity of remote, dabup, wiles, ‘mobil, and other systems that provide aecessto sensiive date andthe specific sci techniques i place for remote or mobile acess an ser eatcation. De Review the procedures to authorize aad revoke stem aceess. Ensure proper auosization is cbtained prior to stanting user access othe system resourees. Evaluate the rocedires established to remove use IDs an passverds fom the sytem when an employee Teaves an to adjust sccess privileges as sr foes and responsibilities change Page 8 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program 2012 tneraal Audit Work Plan Project Prepared by Date Prepare Reviewed by! Procedures Workpaper “Auditor aud Comanents Da ‘Selecta sample of wer in the systems security package ‘and ensue stem acess appropriate a peopely authorize, Selecta supe of sastve data clues and eis appropriate access nanagemeut ‘enti all wers with pvleged acess ahorities and sess the proceites for monitoring all activities of Privileged ses Da ‘Review documentation for niusion protection’ detection ‘aud T ingfastuetare management noriterine systens (Gotemal and extemal network iftatructue) ‘Review descriptions of fogging and auditing systems and assess their appropriateness, “Assess the logving of security related infomation andthe ideaificaton and management of secuity incidents o& violations. Review sample logs and reporting for incident assessment and remediation, ‘Review the doctinentaton forthe liideat Response ‘Team and lncieat Respoase Proces elated protected information los, thet, disclosuze, security breach, notification precedes, et ‘Review the incident response wacking mechanism snd records of security incidents, and esses the timeliness and appropriateness of response, recovery, notification, followup review, cortective proces, et ‘Asses the iafomation security traning provided o TT Sta and the related policies. procedures, and plans, Schedules, and raining records, Page 9 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program Prepared by 2012 ternal Ani Work Plan Date Prepare Project: Reviewed by! secon Procedures ‘Workpaper | Date “Auatior and Comments DAS | Assess the information security waning provided to won- TT staff and the related policies, procedies, aad plans, schedules, and taining records D.id_| Assess the resilis ofthe mos rece sary penetaion testing and the methods used Page 10 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program 2012 tneraal Audit Work Plan Project Prepared by Date Prepare Reviewed by! Procedures “Workpaper “Auditor aud Comanents E ‘Systems Development and Documentation Controls EI ‘Obtain an understanding of the systems development, maintenance, and change management processes. ED ‘Assess the Witten procedures (inthe overall pocies ad rocedres manual) oulining the steps followed to soli systems, Ese hse psn proper approval te implemeat program changes: appropriate documentation describing the nature tad logic of propose changes proper methodology for testing, debuaeing and approving all change on a test system before implementing the changes in production systems; ad & log s maintained ofall sytem enhancements tad modifications, EF ‘Asses Me Walang for security of online appicaions, de appropriateness for applicable personne, ad the extent to ‘Which it imtegrated wi the building, manteuance ‘esting. plementation, and use oF online systems processing sensitive and protected sommation. Er ‘Asser the methodology for approving mad developing new application systems. Eustie the methodology applies to all ypes of systems. EE “Assess he Sjsems Development Life Cyele ws pastored by prownel Cosies te lowing ‘User participation and sign-off b. Acceptance Testing . Proper review and approval atthe completion of [key stages inthe development process and documentation requirements Page ors © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program 2012 tneraal Audit Work Plan Project Prepared by Date Prepare Reviewed by! Procedures “Workpaper “Auditor aud Comanents EG Selecta saple of systems inthe development lifecycle process and eview the development documentation to assess compliance with the SDL methodology. ‘Review te IT change management proceses and procedutes to cust eitialfusetions ate pevformed 4 All changes to programs. files. and devices ‘equie written aherzaton before they are implemented , All changes go tough a singe contol poi Only specified personnel are aurorized to approve and apply changes, 4. Users accep the change, via sof, prio to implementation of ay change ia peoduction, Documentation of all changes clearly identifies ‘the wail rom inition trongh every step including post change acceptance. Processes are i place to east agreement on privity of change requests 2 Changes are itmplemented into te production csvitontuct by persounel not responsible for ‘making the chaiges (segregation of dtc) 1h Procedures ae in place for emergency changes. Ee Selecta sample of recent proaram changes an review the ‘ange documentation for compliance with application rogram change procedures Ex) “Asser the procedures in place to routinely text for ‘uamithorized or undocumented program changes (eg. by ‘comparison ofthe working program othe approved code Page 12 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program Prepared by 2012 ternal Ani Work Plan Date Prepare Project: Reviewed by! oo Procedures ‘Workpaper | Date “Auatior and Comments E-10 | Evaluate the separation ofthe test environment fom production systems and data and ensure changes are ‘horouehly tested and approved prior moving the changed coe into the production envirnent. ET | Review te application progam change Tumover procedures pettommed by the infepenent sroup Fesponsile for inplementing the application changes nro the production environment ETE | Assess the meraency change procedes aad whether emergency changes are migrated throvgh seazepted Tienes to enable management review and approval of te change, EIS | Selecta sample of emergency program changes and asses compliance with established procedares, E14 | Assess the rocedures for making routine ate changes (ez. taates to aplicaton programs o abies ETS_| Assess whether programming standards inctade naning conventions and coding conventions E-16_| Wey he sofware package (Le, CA-Liberian) onthe processing system to provide secuity over production branes for source programs, ICL. a othe ls Page 13 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program Prepared by 2012 ternal Ani Work Plan Date Prepare Project: Reviewed by! secon Procedures ‘Workpaper | Date “Auatior and Comments F_| Hardware and System Software Controls FT| tdentify the fmetions india responsibie or hardware and sytem software consol uit into TT sume theatre ih yl Seledingnosis . Regular maintenance ©. Echo check 4. Duplicate process check Parity check FE] Assess the processes to ieniy and alaress ras Oar ‘may oveur ia operating systems and syste son Ware ‘a Logic aces before the operational stage 1b. Coding detected uring the programs testing ‘ebugzig) stage Modification can occur at any time, even while ‘processing, Ifnot handled properly, program ‘modifications can produce unexpected operations and invalid output and data (© Make iuginy of ny sauthorized program tmodifiestions (which isthe most ominous type ofsoftwae ero) Assess completeness of records kept ofall ‘modifications ae record for aay post ‘meaiiction detugsing Page 14 of 8 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program Prepared by 2012 ternal Ani Work Plan Date Prepare Project: Reviewed by! secon Procedures ‘Workpaper | Date “Auatior and Comments ‘G_| Computer Operations Job Scheduling) GA_| Determine through iniy the process for scheduling production batch processing. Ensure user autorization of all changes othe prodution schedule. Selet a sample of changes and evi them for compliance the Scheduling procedures, G2_| Iran anfomatie sheers wot wed. detente Dow roetion processing s contol ‘G3 | Determine Dow te computer operator ensies production proces properly completes. ‘G_| Tent he varions orp media awe nd wes the processes for dstribation of production processing ouput to users, Ensure sensitive daa is propery contalled Page 15 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program 2012 tneraal Audit Work Plan Project Prepared by Date Prepare Reviewed by! Procedures “Workpaper “Auditor aud Comanents H Backup Recovery HI ‘Review the Business Continuity Plan and Dissier Recovery Plan and ensure the systems and communications backup and recovery procedures are appropsately integrated inthe plan, ‘Ensfesjte ad incremental backups ae pefonned on regular bass. Assess he frequency of backups and eterminethrongh inguiry and review of documentation ‘whether ll ls and progsams are backed up propedy. Ensure on-line wanscton journals age backed up 10 provide recovery of transactions tat update the databases, Review the description of backup and achiving em(@) ‘Assess he procedures to ensure Backup copies of stem, programs. and data files ae rotted to a Secure offsite Storage location on a scheuled basis, Assess the rocedres for verifying the mmventoryof the backup dat, HS ‘enify te media ad processes involved in backup mad recovery and assess hi effectiveness. Ifa tape ‘managetent system (TMS) is pat of the processing system aud provides an inventory of tapes by location, observe tha tapes magained off ae propetly ‘Segregated onthe TMS. We Review the resalsof system recovery sting To ensure & suceesfil test was performed and documented within the prior twelve months Page 16 of 18 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program 2012 tneraal Audit Work Plan Project Prepared by Date Prepare Reviewed by! Procedures “Workpaper “Auditor aud Comanents Business Continuity Planning and Disaster Recovery 1 Review the business coutinity and resamption plans. ‘Through discussions with management and review ofthe business coutinuity and resumption plans, determine ‘whether the plans are curent and include the necessary ey component ‘Review the docuineutation ofthe esl oF he most recent fest of te business resumption plan determine the dates of prior plans. Document the fequency and success ofthe ents, I the pla has not been tested, inguize as 12 the plans for testi, 13 “Aesess TT managements plans for and voles ia arsring ‘nusiness continuity snd the recovery of T resources, Determine if the plan inelodes recovery of IT ata vendor site anal review he service agreement, 1 ‘Evaluate the disaster recovery plan forthe TT division, Ensure application recovery s based on risk (applications stitial tothe organization ae recovered first). 1S ‘Evaluate the resovery service vendor agement) (0 censure they provide fr adequate iaastucure to secover {he organization's IT resources and operations. Ensixe telecomnunications ae includes and covered during testing 16 ‘Review the rails of recovery testing oF TT operations at the vendor sites) Easretesis were successflly completed sad results documented Page 17 of 8 © CHIL Global associatesInformation Technology General Controls Review (ITGC) Audit Program Prepared by 2012 ternal Ani Work Plan Date Prepare Project: Reviewed by! secon Procedures ‘Workpaper | Date “Auatior and Comments J__| Telecommanications TA_| Review technical configurations, charts, sciematcs, network diagrams internal and external network inftastucte), 72] Review docuneaTaton regarding approved vente communication channels, mechanisms, protocols, and standards (1, extranet, VPN, SSH, FTP, Wi-Fi et.) TS _| Review procednres for sting wp, siting. ad manaaing networked work stations ad portable and mobile devices ‘Assess the security of procedirs for monitor. adding Femoving, aad configuring all devices oa the actor. Ta _| Review description of messaging architecture authentication, encryption methods, auditing Tossing Deteraine wher telecommunications provide a reliable and secure enviroment. Consider lad balancing devices, redundant systems, and allerate procedares forthe contiation of telecomumunication operations, 16 | Deternine i EDT (Flectrone Data Iverchange) utilized. Iso, evaluate security and athena of interchange. Also avaible ia MS Word, Cotuctchiblga.comn Page 18 of 18 © CHL Global Associates
You might also like
Auditing Itgc Examples
PDF
No ratings yet
Auditing Itgc Examples
16 pages
IT Knowledge - Testing GITCs Over Utility Tools v2023
PDF
No ratings yet
IT Knowledge - Testing GITCs Over Utility Tools v2023
12 pages
Change Management Audit Program Final
PDF
100% (2)
Change Management Audit Program Final
28 pages
IT General Controls Audit Template
PDF
No ratings yet
IT General Controls Audit Template
3 pages
03-05. - Sox y ITGC Framework
PDF
No ratings yet
03-05. - Sox y ITGC Framework
22 pages
KPMG Method
PDF
No ratings yet
KPMG Method
88 pages
PDF Information Technology General Controls Review Itgc Audit Program Prepared by 1pdf - Compress
PDF
No ratings yet
PDF Information Technology General Controls Review Itgc Audit Program Prepared by 1pdf - Compress
18 pages
How To Do A General IT Contr
PDF
100% (2)
How To Do A General IT Contr
46 pages
Risk Based Approach To Internal Audit Rachana D 21 5
PDF
100% (1)
Risk Based Approach To Internal Audit Rachana D 21 5
42 pages
ITGeneral Controls Audit
PDF
No ratings yet
ITGeneral Controls Audit
6 pages
ITA IT Risk Assessment Matrix
PDF
No ratings yet
ITA IT Risk Assessment Matrix
36 pages
ISAudit 2010oct18
PDF
No ratings yet
ISAudit 2010oct18
239 pages
IT Application Controls Checklist
PDF
No ratings yet
IT Application Controls Checklist
13 pages
IT Advisory
PDF
100% (1)
IT Advisory
46 pages
ISA Audit Guide 2010-01
PDF
No ratings yet
ISA Audit Guide 2010-01
243 pages
Audit Program For VMWare, and Netapp Controls in XYZ Co-Location Data Center
PDF
No ratings yet
Audit Program For VMWare, and Netapp Controls in XYZ Co-Location Data Center
9 pages
Protiviti - Report Writing and Communicating To The Audit Committee - 20181204
PDF
100% (1)
Protiviti - Report Writing and Communicating To The Audit Committee - 20181204
65 pages
IT Organization Audit Work Program
PDF
No ratings yet
IT Organization Audit Work Program
10 pages
07 - Cisa It Audit
PDF
No ratings yet
07 - Cisa It Audit
54 pages
4
PDF
No ratings yet
4
5 pages
ABC Private Limited: IT General Controls - RCM
PDF
No ratings yet
ABC Private Limited: IT General Controls - RCM
27 pages
Sarbanes-Oxley (SOX) Project Approach Memo
PDF
No ratings yet
Sarbanes-Oxley (SOX) Project Approach Memo
8 pages
I E&u RC RCM Itgc
PDF
100% (1)
I E&u RC RCM Itgc
36 pages
ITCi ITAC Change MGMT 0707
PDF
No ratings yet
ITCi ITAC Change MGMT 0707
37 pages
Risk Based IT Auditing Master Class: Unlocking Your World To A Sea of Opportunities
PDF
No ratings yet
Risk Based IT Auditing Master Class: Unlocking Your World To A Sea of Opportunities
8 pages
Information Technology General Controls Review (ITGC) Audit Program Prepared by - PDF
PDF
67% (3)
Information Technology General Controls Review (ITGC) Audit Program Prepared by - PDF
18 pages
IT Vendor Audit
PDF
100% (1)
IT Vendor Audit
36 pages
IT General Controls Questionnaire
PDF
100% (1)
IT General Controls Questionnaire
22 pages
Firewall Administration Audit Work Program
PDF
No ratings yet
Firewall Administration Audit Work Program
6 pages
CISA Segregation of Duties
PDF
75% (4)
CISA Segregation of Duties
5 pages
2020 Internal Audit Capabilities and Needs Survey Webinar Presentation
PDF
No ratings yet
2020 Internal Audit Capabilities and Needs Survey Webinar Presentation
25 pages
It Audit Checklist: Application Access Controls Network Access Controls
PDF
No ratings yet
It Audit Checklist: Application Access Controls Network Access Controls
2 pages
Project For It Audit
PDF
100% (1)
Project For It Audit
23 pages
A. Application Specific Questions: Application Name Application Name 1. General
PDF
No ratings yet
A. Application Specific Questions: Application Name Application Name 1. General
32 pages
Risks and Controls
PDF
100% (1)
Risks and Controls
6 pages
Access Controls Audit Program
PDF
No ratings yet
Access Controls Audit Program
6 pages
Segregration of Duties
PDF
No ratings yet
Segregration of Duties
30 pages
Background:: As An IT Auditor, One Should: Assist in Audit Engagement Planning and Reporting
PDF
No ratings yet
Background:: As An IT Auditor, One Should: Assist in Audit Engagement Planning and Reporting
6 pages
IT Auditing in SDLC Part II
PDF
No ratings yet
IT Auditing in SDLC Part II
15 pages
Example ITGC Audit PGM CHL GA
PDF
0% (1)
Example ITGC Audit PGM CHL GA
18 pages
IT Application Controls Icq
PDF
No ratings yet
IT Application Controls Icq
10 pages
Auditing Application Controls
PDF
No ratings yet
Auditing Application Controls
4 pages
Access To Programs and Data Audit Work Program
PDF
100% (1)
Access To Programs and Data Audit Work Program
2 pages
PCIDSS Compliance Requirement Checklist 2020
PDF
No ratings yet
PCIDSS Compliance Requirement Checklist 2020
6 pages
WAPO01 Manage The IT Management Framework Audit Assurance Program - Icq - Eng - 0814
PDF
100% (1)
WAPO01 Manage The IT Management Framework Audit Assurance Program - Icq - Eng - 0814
32 pages
Application Controls Audit Work Program
PDF
No ratings yet
Application Controls Audit Work Program
7 pages
GTAG 8 Application Control Testing
PDF
No ratings yet
GTAG 8 Application Control Testing
13 pages
Itgc Sox
PDF
No ratings yet
Itgc Sox
4 pages
5-IS & IT Audit (Process of Auditing IS)
PDF
100% (1)
5-IS & IT Audit (Process of Auditing IS)
19 pages
WAPO09 Manage Service Agreements Audit Assurance Program - Icq - Eng - 0814
PDF
No ratings yet
WAPO09 Manage Service Agreements Audit Assurance Program - Icq - Eng - 0814
28 pages
Cisa WB02
PDF
No ratings yet
Cisa WB02
136 pages
It6afinals Application Controls
PDF
No ratings yet
It6afinals Application Controls
2 pages
What Are IT General Controls? - ITGC: Access To Programs and Data
PDF
No ratings yet
What Are IT General Controls? - ITGC: Access To Programs and Data
4 pages
IT General Controls - 08
PDF
100% (2)
IT General Controls - 08
19 pages
Post Implementation Report - Guide
PDF
0% (1)
Post Implementation Report - Guide
7 pages
Access To Programs and Data Audit Work Program
PDF
No ratings yet
Access To Programs and Data Audit Work Program
2 pages
Sarbanes-Oxley Walkthrough Checklist
PDF
No ratings yet
Sarbanes-Oxley Walkthrough Checklist
1 page
Audit Chronology
PDF
No ratings yet
Audit Chronology
2 pages
How To Derive An IT Audit Universe
PDF
No ratings yet
How To Derive An IT Audit Universe
4 pages
Data Governance Questionnaire
PDF
No ratings yet
Data Governance Questionnaire
2 pages
WAPO02 Manage Strategy Audit Assurance Program - Icq - Eng - 0814
PDF
No ratings yet
WAPO02 Manage Strategy Audit Assurance Program - Icq - Eng - 0814
31 pages
Vulnerability Management Guideline v1.0.0 PUBLISHED
PDF
No ratings yet
Vulnerability Management Guideline v1.0.0 PUBLISHED
11 pages
Cisa WB04
PDF
0% (1)
Cisa WB04
124 pages
WAPO04 Manage Innovation Audit Assurance Program - Icq - Eng - 0814
PDF
No ratings yet
WAPO04 Manage Innovation Audit Assurance Program - Icq - Eng - 0814
28 pages
Audit Programs - ICT
PDF
No ratings yet
Audit Programs - ICT
15 pages
Cisa WB03
PDF
No ratings yet
Cisa WB03
212 pages
Questions Based On Information Technology and IT Audit: Computer Computing Applications
PDF
100% (1)
Questions Based On Information Technology and IT Audit: Computer Computing Applications
3 pages
Cisa WB05
PDF
No ratings yet
Cisa WB05
102 pages
WAPITS IT Strategic MGMT AP
PDF
No ratings yet
WAPITS IT Strategic MGMT AP
29 pages
It Audit Report For It Companies
PDF
No ratings yet
It Audit Report For It Companies
6 pages
Auditing Applications, Part 2: Tommie W. Singleton, PH.D., Cisa, Cgeit, Citp, Cpa, Is
PDF
No ratings yet
Auditing Applications, Part 2: Tommie W. Singleton, PH.D., Cisa, Cgeit, Citp, Cpa, Is
4 pages
From Static Networks To Software Defined Networking - Joa - Eng - 0716
PDF
No ratings yet
From Static Networks To Software Defined Networking - Joa - Eng - 0716
7 pages
Application Controls Questionnaire
PDF
No ratings yet
Application Controls Questionnaire
3 pages
Tech Brief Understanding Smart Contracts - Res - Eng - 1217
PDF
No ratings yet
Tech Brief Understanding Smart Contracts - Res - Eng - 1217
4 pages
Software Implementation Audit Program Overview
PDF
No ratings yet
Software Implementation Audit Program Overview
7 pages
Use Case Diagram Relationships Explained With Examples
PDF
No ratings yet
Use Case Diagram Relationships Explained With Examples
5 pages
Gtag - Appendix - 5: 5.2 Top 10 Questions Caes Should Ask About Vulnerability Management
PDF
No ratings yet
Gtag - Appendix - 5: 5.2 Top 10 Questions Caes Should Ask About Vulnerability Management
2 pages
01-Quizz W0 - L1
PDF
No ratings yet
01-Quizz W0 - L1
2 pages