Audit Program ITGC
Audit Program ITGC
ITGC ENVIRONMENT
CONTENTS
1 INTRODUCTION............................................................................................................ 2
2 AUDITING IN AN IT ENVIRONMENT...............................................................................3
3 IT AUDIT APPROACH..................................................................................................... 6
3.1 PLANNING PHASE.............................................................................................................................................7
Step 1. Obtain background information..........................................................................7
Step 2. Identify IT systems of relevance to financial management.................................7
Step 3. Assess the complexity of the IT systems..............................................................7
Step 4. Preliminary risk assessment................................................................................8
3.2 EXECUTION PHASE...........................................................................................................................................9
Step 5. Review of general controls................................................................................10
Step 6. Review of application controls...........................................................................12
3.3 REPORTING PHASE........................................................................................................................................12
Step 7. Document findings............................................................................................13
Step 8. Overall assessment............................................................................................13
4 RELATED PROCEDURES...............................................................................................14
5 ANNEXES.................................................................................................................... 15
5.1 CHECKLIST FOR GENERAL CONTROLS............................................................................................................15
5.2 LIST OF APPLICATION CONTROLS..................................................................................................................31
5.3 IT AUDIT GLOSSARY.....................................................................................................................................38
5. Section 3 provides step-by-step guidance for ITGC audit work. It defines eight
steps, broken down into planning, execution and reporting phases.
IT risks and controls 8. Most financial transactions and statements are now processed or produced using
in the internal
control framework IT systems. The procedures for initiating, recording, processing and reporting
transactions and recording the corresponding assets and liabilities are usually
implemented within IT systems. Given, therefore, that financial data are now
predominantly electronic data, financial and administrative controls are also
increasingly electronic in nature.
10. IT systems are one of the five components of the internal control framework,
and key IT controls should be in place to mitigate the IT-related risks and thus
ensure the confidentiality, availability and integrity of data and the efficiency and
effectiveness of business processes. The following table gives examples of risks
and their IT sources:
Audit objectives 13. The audit of controls on IT systems should have specific objectives, including
verification of the accounts or other data produced by the system (e.g. data
extracted for sampling purposes). The evaluation of internal controls should vary
according to the type of audit and the degree of reliance the auditor wishes to
place on them.
Reliability of data 14. When IT systems data are an important part of the audit and data reliability is
crucial to accomplishing the audit objective, auditors need to satisfy themselves
that the data are reliable and relevant.
15. Data produced, stored or provided to the auditor by means of IT should not be
treated as reliable until the auditor has convincing evidence that this is so. The
components of reliability are accuracy, completeness and validity.
The quality of the data received from the auditee may significantly influence
whether or not the audit objectives are achieved.
16. Evidence for the reliability of the computerized data provided by an auditee
may come, depending on the nature of the data, from assurance that internal
controls on IT are functioning securely and correctly, from cross-checking of
the data (e.g. by reconciling them with data from other sources), or from a
combination of the two.
17. The absence of appropriate IT controls may give rise to conditions and events
indicating a risk of material misstatement. This in turn would influence the
nature, timing and extent of subsequent IT-related audit
procedures.
Use of IT audit in 19. IT audit may be used in the context of a performance audit when:
performance audit
a) The audit focuses on the performance of IT systems;
b) The audit examines the efficiency and effectiveness of a business
process and/or programme where IT is a critical tool for the
organization managing these processes or programmes;
c) Data reliability is to be assessed.
Typical IT audit 20. IT audit work in LRWC occurs mainly in the context of:
work in LRWC
a) Financial audits: reviewing key general controls and related
application controls on information systems;
b) Compliance audits: reviewing whether IT controls comply with rules and
regulations, usually the DPA of 2012, PAGCOR and AMLA.
c) Specific IT audits: when the main audit objective is linked to the
effectiveness and efficiency of IT.
IT audit tasks 21. The following IT audit tasks are necessary so that audits can be planned and
implemented fully in accordance with the Control Objectives for Information and
Related Technologies (COBIT).
PLANNING
1. Obtain background information
Checklist for
3. Assess complexity of IT systems
general controls
EXECUTION
Refined checklist
5. Review of general controls for
general controls
YES
NO 6. Review of application controls List of
application
controls
REPORTING
7. Document findings
8. Overall assessment
23. The objective of the planning phase is to identify risks that are relevant to the
audit goals and determine which controls will be assessed during the execution
phase:
Step 1. Obtain 24. During the planning phase it is important for the auditor to obtain an
background
understanding of the auditee's IT systems, an inventory of the auditee’s IT systems
information
and resources (IT budget and staffing, IT organization, software and hardware) and
a statement of the concerns arising from previous internal or external audits of IT
systems.
Step 2. Identify 25. IT systems for accounting and financial reporting comprise procedures and
IT systems of
databases for initiating, recording, processing and reporting transactions and
relevance to
financial recording the auditee's corresponding assets and liabilities.
management
26. The auditor must identify which IT applications are important in the
context of financial reporting and business management and obtain sufficient
information and understanding in their regard.
27. In order to facilitate the evaluation of risks and the planning of IT audit
tasks, the auditor should document:
a) which IT applications feed into the financial statements;
b) which transactions are processed through these IT applications;
c) which areas of accounts (such as administrative expenditure) are
covered by these IT applications.
Step 3. Assess 28. The purpose of assessing the complexity of IT systems is to:
the
complexity of a) Identify risks - complex systems are more risky than simple ones;
the IT b) Decide whether there is a need for external assistance. In principle,
systems
auditors are competent to carry out IT audit tasks in relation to simple
systems, with the IT audit team providing support in the audit
of more complex systems.
Step 4. Preliminary 30. Using all the information obtained in the previous steps, the auditor will then
risk assessment
make a preliminary risk assessment.
32. Please note that the overall assessment of control risk should not be
better to the assessment of the internal control environment, since
even excellent control procedures can be undermined by a poor control
environment.
Identifying the risk 33. The auditor should be aware of conditions or events that may indicate a risk of
of material
material misstatement consequent upon the use of IT.
misstatement
The following is a non-exhaustive list of factors that should be considered, when
performing the preliminary risk assessment, as contributing to the risk of
material misstatement:
a) Changes in the IT environment;
b) Installation of significant new IT systems;
c) Insufficient controls on the transfer of data between IT systems;
d) Inconsistency between the entity’s IT and business strategies.
Planning of IT audit 36. The results of the planning phase (steps 1-4) should be stated in the corresponding
work
IT Audit Procedures and Engagement.
What are 37. General controls relate to the environment within which automated
general controls?
application systems are developed, maintained and operated. They are
concerned with IT-related policies, procedures and working practices.
38. They are used to ensure the proper development, implementation and
maintenance of all automated applications and the integrity of data files. They
therefore minimize risks to the functioning of the organization’s IT
systems and infrastructure and specific risks to applications.
b) Data management controls ensure that data are properly stored, archived
and disposed of. They also help ensure the reliable production of financial and
management information;
Step 5. Review 40. The most important criterion for the information when reviewing general controls
of general
in financial audit is integrity(reliability), which relates to audit assurance that the
controls
information is valid, accurate and complete. In a performance audit, the most
important aspects may be efficiency and effectiveness.
41. The effectiveness of IT controls will depend on the strength of the general
controls. If the auditor concludes that the general controls are effective, he should
then assess the effectiveness of application controls. However, ineffective general
controls will render application controls ineffective (or severely limit their
effectiveness) since they act as a foundation on which specific application controls
are built. Application controls are to be considered ineffective when, for instance,
the necessary logical or physical access controls are not functioning adequately.
43. The checklist for general controls (see annexes) provides guidance for
reviewing general controls through a set of close-ended questions that are mainly
concerned with the most significant control objectives in relation to data
reliability and the IT control environment. The checklist will help auditors check
the main IT control objectives, which are based on the COBIT framework in
reference to the related information criteria.
45. If the auditor concludes that the general controls are not functioning effectively,
the application controls will generally also be ineffective. The auditor should
review the application controls only if the general controls are effective (see
paragraph 41).
What are 46. Application controls, which may be manual (performed by users) or
application
automated (performed by computer software), are procedures that apply to the
controls?
processing of transactions by individual applications and are designed to ensure the
integrity and confidentiality of data.
47. Application controls relate to procedures that are used to initiate, record,
process or report transactions or other financial data. They help ensure that
transactions were duly authorized and completely and accurately recorded and
processed.
49. These objectives are targeted using six main types of application control
(COBIT):
a) System documentation controls;
b) Input controls;
c) Processing controls;
d) Output controls;
e) Data transmission controls;
f) Standing data and master file controls.
Manual and 51. Automated application controls which are embedded in an application reduce
automated
the risk of human error or manipulation of information and are therefore more
application controls
reliable than manual controls. Once properly established, automated application
controls are reliable until the next change to the program takes place. Efficient
general controls will lead to more reliance on automated rather than manual
application controls.
52. Where manual application controls are in place, the auditor should assess
arrangements for user cross-checking in the form of a manual comparison of
computer-processed data with the source documents.
53. When checking application controls on the systems identified during the
planning phase, the auditor may make use of the general framework in the annexed
list of application controls.
54. In the case of robust IT systems, the auditor should identify other application
controls in accordance with the financial regulatory framework after evaluating the
complexity of the application and the related IT risks.
Evidence 56. The auditor may obtain audit evidence by observation, inspection, inquiry and
confirmation, reperformance, recalculation, computation, analytical procedures,
or other generally accepted methods.
59. Auditors should explain each control weakness in relation to the IT risks. They
should also determine which areas of the accounts could be negatively affected by a
control weakness.
Step 8. Overall 60. In addition to the individual findings, the auditors should reach an overall
assessment
conclusion about IT controls.
61. The assessment may lead to three possible conclusions in the context of the
financial audit:
a) IT controls functioned effectively, consistently and continuously during the
period under review;
b) weaknesses are noted in the effectiveness and continuity of IT controls, but the
overall system is considered reliable;
c) IT controls are unreliable, i.e. they did not function as expected and/or
they did not function continuously during the period under review and/or they
could not be tested.
Documentation 62. In the same way as any other audit work, IT audit should be executed,
documented, supervised, and subject to quality control in accordance with the
LRWC’s IAD IT audit methodology.
Need for technical 63. The auditor must consider whether the cost of obtaining audit evidence is
resources
reasonable. As already stated, adequate assurance can often be obtained from a
more limited examination of general controls and by drawing upon other sources of
information.
64. The audit of application controls is not necessarily highly technical. Many
applications are designed to give definite assurance to management that data and
processing are in order, without the need for IT experts. In such cases, the checks
and procedures (including manual procedures) routinely carried out by regular
users may give satisfactory assurance that data and output are reliable. This level
of assurance will also be adequate for auditors – except in the case of specific IT
audits.
Need for further 65. When technical expertise is necessary for specific IT audit testing tasks
technical expertise
(network performance, penetration tests, security issues, user rights, change
management, technical documentation, etc.) and the necessary skills and resources
are not available in-house, external expertise should be organized to collect the
required audit evidence. This assistance should be planned at the preliminary stage
of the audit.
It is necessary to assess the IT general control environment as a basis for deciding how much audit reliance to place on data produced by computerized IT systems. Weaknesses
in the IT general control environment have a pervasive impact on all applications and data maintained in that environment.
The following checklist is a set of close-ended questions for use in a limited review of the IT general control environment at the audited entity. It will help auditors check the
main IT general control objectives, which are based on the COBIT framework in reference to the related information criteria, in the following areas:
Activity/entity audited:
Period/financial year audited:
Number of IT staff:
Document prepared by (name[s]): Date:
Document reviewed by (name[s]): Date:
COBIT
Control objectives Tests of controls Evaluation Documents required
ref.
1. Control objective: IT strategy is aligned PO1.4 1. Is there a multiannual IT strategy or IT plan (3- 5 IT strategy or IT
with and supports the overall business PO1.5 years) that is formally approved at an appropriate plan
strategy. level?
IT annual work
2. Does the IT strategy have adequate and relevant programmes
objectives, budget and performance indicators?
Related information criteria:
Effectiveness 3. Are there IT annual work programmes in line
with the IT strategy?
2. Control objective: Make effective and PO5.3 1. Is IT expenditure planned, managed and monitored IT annual budget
efficient IT investments and set and track PO5.4 within an annual budget which is aligned with the (separate or a
IT budgets in line with IT strategy and DS6.3 IT strategy and detailed enough to reflect the section of the
investment decisions. organization’s priorities? general budget of
the organization)
3. Control objective: Provide accurate, PO6.3 1. Are there written and formally approved policies Policies,
understandable and approved policies, PO6.4 and/or procedures covering most key aspects of IT procedures,
procedures and guidelines, embedded in PO6.5 management: guidelines and
an IT control framework. a. Data management and classification? manuals
b. Business continuity?
c. Information security?
Related information criteria: d. Risks and controls?
Effectiveness e. Change management?
4. Control objective: Establish transparent, PO4.1 1. Is the IT department appropriately placed within the IT process
flexible and responsive IT organizational PO4.3 organization, given the organization’s size and framework,
structures and define and implement IT PO4.4 mission? documented roles
processes equipped with owners, roles PO4.5 and responsibilities
2. Is there an IT steering committee composed of
and responsibilities. PO4.6
executive, business and IT management and IT job descriptions
PO4.8
charged with ensuring business alignment (with
PO4.11 IT human resources
supervision of IT plans and policies) and
PO7.1 policy and procedures
Related information criteria: monitoring IT services and projects?
PO7.4
Effectiveness and efficiency Decision or other
PO7.8 3. Are IT processes and IT-specific roles and
ME3.1 responsibilities properly defined, exercised and document relating to
monitored? the establishment of
an IT steering
4. Has an appointed information security officer? committee
5. Are there policies and procedures for managing staff Sample minutes of IT
recruitment and job termination? steering committee
6. Are the following roles segregated: meetings
a. Security: information security officer– system
owner – security administrator?
b. Changes: development – testing – quality
assurance – production?
5. Control objective: Identify, prioritize, PO9.1 1. Are IT risks managed in accordance with the Risk management
contain or accept relevant risks arising in PO9.2 organization’s risk management framework? framework and/or
the IT area and associated functions. PO9.3 policy
2. Is there an IT-specific risk management
PO9.4
framework? IT risk record/map
PO9.5
Related information criteria: 3. Are IT risks defined and monitored regularly in an
Confidentiality, integrity and availability IT risk record (separately or within the
organization’s general risk record)?
6. Control objective: Identify, implement ME2.1 1. Has a set of IT controls aligned with the Documentation of
and monitor an internal control process for ME2.2 organization’s internal control framework been internal IT controls
IT-related activities. ME2.7 established? or the organization’s
ME3.1 internal control
2. Has a set of IT controls designed to mitigate IT
risks been identified? standards
8. Control objective: Monitor and report ME.1.1 1. Are senior management (or the steering committee) Regular progress
process metrics and identify and ME.1.4 given regular progress reports on the overall reports
implement performance improvement ME.1.5 contribution made by IT to the business so that they
actions. ME.4.1 can monitor the extent to which the planned
ME.4.2 objectives have been achieved, budgeted resources
References to regulatory framework:
have been used, performance targets have been met
IR Art. 22a(1)(e); ICS9 and ICS15
and identified risks have been mitigated?
Related information criteria:
Effectiveness and efficiency
COBIT Documents
Control objectives Tests of controls Evaluation
ref. required
1. Control objective: Ensure that DS11.2 1. Are there policies established to store documents, data Data
data are properly stored, archived DS11.4 and source programmes in accordance with the management
and disposed of. DS11.5 organization’s activities, size and mission? policy
DS11.6
2. Do adequate policies and procedures exist for the Backup
backup of systems, applications, data and procedures
documentation:
a. Do backup procedures provide guarantees of data Procedures for
recovery (with frequencies, copies, verifications, disposal of
Related information criteria: media
Integrity etc.) and correspond to the business continuity
plan? Contracts with
b. Are all relevant data backed up (e.g. by means of third parties or
audit logs, documents, spreadsheets)? service-level
c. Is there well-defined logical and physical security agreements
for data sources and backup copies? (data
d. Has responsibility been assigned for the making and management
monitoring of backups? clauses)
3. Are systems, applications, data and documentation
maintained or processed by third parties adequately backed
up and/or secured?
4. Does the organization have policies to ensure the
protection of sensitive data and software when data and
hardware are disposed of or transferred?
5. Are the retention periods for data in line with contractual,
legal and regulatory requirements?
2. Control objective: Establish an PO2.3 1. Has a data dictionary been defined so that data Data
enterprise data model PO2.4 redundancy/incompatibility can be identified and data management
incorporating a data classification DS5.11 elements can be shared among applications and policy
scheme to ensure the integrity DS11.1 systems?
and consistency of all data. Data
2. Is the data dictionary applied to existing systems, classification
application development projects and major changes scheme
to IT applications?
Assigned data
3. Are owners identified for each data element (files, classifications
Related information criteria:
folders, applications, etc.)?
Confidentiality and integrity Data dictionary
4. Are data classified by information criterion:
a. confidentiality (public, limited, etc.);
b. integrity (moderate, sensitive, etc.);
c. availability (moderate, critical, etc.)?
5. Is there a document showing the classification of
each data element in accordance with the data
classification scheme?
3. Control objective (non-COBIT): AC2 1. Have controls been designed to ensure the reliability
Ensure reliable production of AC5 of computerized data, including controls over source
financial and management documents?
information. 2. Have controls been designed to ensure the integrity and
security of documents or files (such as spreadsheets)
which are kept on personal computers or shared drives
and are relied on by the organization in its financial
Related information criteria: workflow where:
Confidentiality and integrity a. those files are used to gather financial data or
make calculations and serve as a basis for
manual entries in financial systems
instead of source documents?
b. the files are used for financial reporting?
COBIT
Control objectives Tests of controls Evaluation Documents required
ref.
1. Control objective: Build the DS2.5 1. Are there a written and formally approved business BCP and DRP
capabilities to carry out day- DS4.2 continuity plan (BCP) and disaster recovery plan
to-day automated business DS4.3 (DRP)? Test reports
activities with minimal, DS4.4 2. Does the BCP cover:
acceptable interruption. DS4.5 a. Business impact analysis (BIA)?
b. All key business functions and processes?
c. Roles, responsibilities and communication
processes?
3. Are BCP tests scheduled and completed on a regular
Related information criteria: basis?
Availability and effectiveness 4. Is the BCP kept updated so that it continually reflects
actual business requirements?
5. Are all critical backup media, documentation, data
and other IT resources necessary for IT recovery
stored offsite?
6. Do the BCP and DRP define recovery point objectives
(RPOs) and recovery time objectives (RTOs)?
7. Are backup policies defined in accordance with RPOs
and RTOs?
NB: in the absence of a suitable BCP the audited entity should be advised of the risk without delay.
COBIT
Control objectives Tests of controls Evaluation Documents required
ref.
1. Control objective: Establish and maintain PO6.3 1. Has an IT security policy and/or plan IT security policy
IT security roles, responsibilities, policies, DS5.1 been drawn up and approved at the and/or plan
standards and procedures. DS5.2 appropriate level?
Relevant security
2. Does the IT security plan include/cover policies and
the following: procedures
a. A complete set of security policies and
standards in line with the established IT
Related information criteria: security policy framework?
Confidentiality, integrity and effectiveness b. Procedures for implementing and
enforcing those policies and
standards?
c. Roles and responsibilities?
d. Staffing requirements?
e. Security awareness and training?
f. Enforcement procedures?
g. Investment in the necessary security
resources?
2. Control objective: Implement procedures DS5.3 1. Are there procedures for defining access rights User access rights
for controlling access based on the DS5.4 (view/add/change/delete) to policy/ user
individual’s need to view, add, change or financial/operational systems and management policy
delete data. data/documents?
Access control lists
(for
Related information criteria: financial/operational
Confidentiality and integrity systems and data)
4. Control objective: Controls on the DS5.3 1. Are user access rights requested by user Access control lists
appropriate segregation of duties for DS5.4 management, approved by system/data (for financial
requesting and granting access to systems PO4.11 owners and implemented by the security systems and data)
and data exist and are followed. administrator?
Job descriptions
2. Are the following roles segregated:
a. Infrastructure: security officer –
Related information criteria:
system owner – security administrator?
Confidentiality and integrity
b. Applications: system owner
(authorisation and monitoring) –
security administrator?
6. Control objective: Provide and maintain a DS12.2 1. Has a policy been defined, and is it Policies relating to
suitable physical environment to protect IT DS12.3 implemented, concerning the physical physical security
assets from access, damage or theft. DS12.5 security and access control measures that are
to be followed to prevent fire, water damage,
power outages, theft, etc. at IT premises?
2. Is access to IT premises (IT rooms and
Related information criteria: facilities) granted, limited and revoked in
Confidentiality and integrity accordance with physical security policies?
3. Is there a procedure for logging and
monitoring all access to IT premises
(including by contractors and vendors)?
COBIT
Control objectives Tests of controls Evaluation Documents required
ref.
1. Control objective: AI6.1 1. Is there a formally approved, implemented and monitored Change
Control the impact AI6.2 framework/procedures for managing changes to IT applications, management
assessment, AI6.3 programs and databases? framework/
authorisation and AI6.4 procedures
implementation of all AI6.5 2. Does the change management framework include/cover:
changes to IT AI6.6 a. Roles and responsibilities? All records of a
infrastructure, b. Change request procedures? sample of
applications and c. The assessment of risks and the impacts of changes? changes (from
technical solutions; d. Management authorisation for change requests? change request
minimize errors due to e. Approval by the key stakeholders, such as users and system log to move into
incomplete request owners, before changes move into production? production)
specifications; and halt f. Management review and approval of changes before they move
implementation of into production?
unauthorized changes. g. The classification of changes (major, minor, emergency
changes, etc.)?
h. The tracking of changes?
i. Version control mechanisms?
j. The definition of rollback procedures?
k. The use of emergency change procedures?
Related information l. Audit trails?
criteria: Integrity,
availability, effectiveness
and efficiency
2 Control objective: Test AI7.2 1. Are all major changes tested against functional and operational Test plans and
that applications and AI7.6 requirements to ensure that original business goals are achieved? other documents
infrastructure solutions relevant to the
2. Are all major changes executed in accordance with a test plan which
are fit for the intended testing of a major
covers:
purpose and free from change to an IT
a. Organizational standards, roles and responsibilities?
errors, and that adequate application/
b. Test preparation, including site preparation?
data conversion has program
c. Training requirements, if needed?
occurred.
d. Installation or update of a defined test environment?
e. Planning/performance/documentation/retention of test
cases?
f. Error and problem handling?
Related information g. Correction and escalation?
criteria: Effectiveness h. Formal approval?
3. Are tests implemented on the live production system or in a test
environment?
COBIT
Control objectives Tests of controls Evaluation Documents required
ref.
1. Control objective: Identify DS1.1 1. Are there clearly-defined benefits and business Contract(s)
services delivered by IT. Define, objectives in support of the decision to outsource?
agree upon and regularly review SLA(s)
2. Are management requirements and expectations clearly
service-level agreements, which
defined in the contract/SLA?
should cover service support
requirements, related costs, 3. Were the risks assessed when deciding to outsource and
roles and responsibilities, etc., taken into account when specifying the necessary controls?
and be expressed in business 4. Was the IT project carried out in accordance with
terms. existing project management standards?
2. Control objective: DS1.5 1. Does the contract/SLA define reporting procedures as Monitoring
Continuously monitor specified ME1.4 regards the type, content, frequency and distribution of report(s)
service-level performance ME1.5 reports?
criteria. Reports on achievement ME1.6
2. Is a procedure in place for continuous monitoring and
of service levels should be
regular reporting on the achievement of objectives?
provided in a format that is
meaningful to stakeholders. 3. Have formal performance criteria been established to
facilitate and measure the achievement of the SLA
objectives?
Note: The following is a general outline of application controls (source: “IT Assurance Guide Using COBIT”6 and “COBIT and Application Controls”7). In the case of robust IT applications,
the auditor should identify other application controls in accordance with the financial regulatory framework after evaluating the complexity of the application and the related IT risks.
Control Objective: Ensure that source 1. Design source documents in a way that they increase accuracy with which data can be recorded, control the workflow
documents are prepared by authorized and facilitate subsequent reference checking. Where appropriate, include completeness controls in the design of the source
and qualified personnel following documents.
established procedures, taking into
2. Create and document procedures for preparing source data entry, and ensure that they are effectively and properly
account adequate segregation of
communicated to appropriate and qualified personnel. These procedures should establish and communicate required
duties regarding the origination and
authorisation levels (input, editing, authorizing, accepting and rejecting source documents). The procedures should also identify
approval of these documents.
the acceptable source media for each type of transaction.
Errors and omissions can be minimized
3. Ensure that the function responsible for data entry maintains a list of authorized personnel, including their
through good input form design.
signatures.
Detect errors and irregularities so they
can be reported and corrected. 4. Ensure that all source documents include standard components, contain proper documentation (e.g., timeliness,
predetermined input codes, default values) and are authorized by management.
5. Automatically assign a unique and sequential identifier (e.g., index, date and time) to every transaction.
Related information criteria: Integrity
and efficiency. 6. Return documents that are not properly authorized or are incomplete to the submitting originators for correction, and log
the fact that they have been returned. Review logs periodically to verify that corrected documents are returned by originators
in a timely fashion, and to enable pattern analysis and root cause review.
Control Objective: Ensure that data 1. Define and communicate criteria for timeliness, completeness and accuracy of source documents. Establish
input is performed in a timely mechanisms to ensure that data input is performed in accordance with the timeliness, accuracy and completeness criteria.
manner by authorized and qualified
2. Use only pre-numbered source documents for critical transactions. If proper sequence is a transaction
staff.
requirement, identify and correct out-of-sequence source documents. If completeness is an application requirement,
Correction and resubmission of data identify and account for missing source documents.
that were erroneously input should be
performed without compromising 3. Define and communicate who can input, edit, authorize, accept and reject transactions, and override errors. Implement
original transaction authorisation access controls and record supporting evidence to establish accountability in line with role and responsibility definitions.
levels. 4. Define procedures to correct errors, override errors and handle out-of-balance conditions, as well as to follow up,
Where appropriate for reconstruction, correct, approve and resubmit source documents and transactions in a timely manner. These procedures should consider
retain original source documents for things such as error message descriptions, override mechanisms and escalation levels.
the appropriate amount of time. 5. Generate error messages in a timely manner as close to the point of origin as possible. The transactions should not be
processed unless errors are corrected or appropriately overridden or bypassed. Errors that cannot be corrected immediately
should be logged in an automated suspense log, and valid transaction processing should continue. Error logs should be
Related information criteria: Integrity reviewed and acted upon within a specified and reasonable period of time.
6. Ensure that errors and out-of-balance reports are reviewed by appropriate personnel, followed up and corrected
within a reasonable period of time, and, where necessary, incidents are raised for more senior-level attention. Automated
monitoring tools should be used to identify, monitor and manage errors.
7. Ensure that source documents are safe-stored (either by the business or by IT) for a sufficient period of time in line
with legal, regulatory or business requirements.
Control Objective: Ensure that 1. Ensure that transaction data are verified as close to the data entry point as possible and interactively during online
transactions are accurate, complete sessions. Ensure that transaction data, whether people-generated, system-generated or interfaced inputs, are subject to a
and valid. variety of controls to check for accuracy, completeness and validity. Wherever possible, do not stop transaction validation
after the first error is found. Provide understandable error messages immediately to enable efficient remediation.
Validate data that were input, and edit
or send back for correction as close to 2. Implement controls to ensure accuracy, completeness, validity and compliance to regulatory requirements of data
the point of origination as possible. input. Controls may include sequence, limit, range, validity, reasonableness, table look-ups, existence, key verification,
check digit, completeness (e.g., total monetary amount, total items, total documents, hash totals), duplicate and logical
relationship checks, and time edits. Validation criteria and parameters should be subject to periodic reviews and
confirmation.
Related information criteria: 3. Establish access control and role and responsibility mechanisms so that only authorized persons input, modify
Integrity and efficiency. and authorize data.
4. Define requirements for segregation of duties for entry, modification and authorisation of transaction data as well as
for validation rules. Implement automated controls and role and responsibility requirements.
5. Report transactions failing validation and post them to a suspense file. Report all errors in a timely fashion and do
not delay processing of valid transactions.
6. Ensure that transactions failing edit and validation routines are subject to appropriate follow-up until errors are
remediated. Ensure that information on processing failures is maintained to allow for root cause analysis and help adjust
procedures and automated controls.
Control Objective: Maintain the 1. Establish and implement mechanisms to authorize the initiation of transaction processing and to ensure that only
integrity and validity of data throughout appropriate and authorized applications and tools are used.
the processing cycle.
2. Routinely verify that processing is completely and accurately performed with automated controls, where
Detection of erroneous transactions appropriate. Controls may include checking for sequence and duplication errors, transaction/record counts, referential
does not disrupt the processing of valid integrity checks, control and hash totals, range checks and buffer overflow.
transactions.
3. Ensure that transactions failing validation routines are reported and posted to a suspense file. Where a file contains
valid and invalid transactions, ensure that the processing of valid transactions is not delayed and all errors are reported in a
timely fashion. Ensure that information on processing failures is kept to allow for root cause analysis and help adjust
procedures and automated controls, to ensure early detection or prevent errors.
Related information criteria: Integrity,
4. Ensure that transactions failing validation routines are subject to appropriate follow-up until errors are
confidentiality, and availability.
remediated or the transaction is cancelled.
5. Ensure that the correct sequence of jobs has been documented and communicated to IT operations. Job output should
include sufficient information regarding subsequent jobs to ensure that data are not inappropriately added, changed or lost
during processing.
6. Verify the unique and sequential identifier to every transaction (e.g., index, date and time).
7. Maintain the audit trail of transactions processed. Include date and time of input and user identification for each
online or batch transaction. For sensitive data, the listing should contain before and after images and should be checked
by the business owner for accuracy and authorisation of changes made.
8. Maintain the integrity of data during unexpected interruptions in data processing with system and database utilities.
Ensure that controls are in place to confirm data integrity after processing failures or after use of system or database utilities
to resolve operational problems. Any changes made should be reported and approved by the business owner before they are
processed.
9. Ensure that adjustments, overrides and high-value transactions are reviewed promptly in detail for
appropriateness by a supervisor who does not perform data entry.
10. Reconcile file totals. For example, a parallel control file that records transaction counts or monetary value as data
should be processed and then compared to master file data once transactions are posted. Identify,, report and act upon out-
of-balance conditions.
Control Objective: Establish 1. When handling and retaining output from IT applications, follow defined procedures and consider privacy and security
procedures and associated requirements. Define, communicate and follow procedures for the distribution of output.
responsibilities to ensure that output is
2. At appropriate intervals, take a physical inventory of all sensitive output, such as negotiable instruments, and compare
handled in an authorized manner,
it with inventory records. Create procedures with audit trails to account for all exceptions and rejections of sensitive output
delivered to the appropriate recipient
documents.
and protected during transmission;
verification, detection and correction of 3. Match control totals in the header and/or trailer records of the output to balance with the control totals produced
the accuracy of output occur; and by the system at data entry to ensure completeness and accuracy of processing. If out-of-balance control totals exist,
information provided in the output is report them to the appropriate level of management.
used.
4. Validate completeness and accuracy of processing before other operations are performed. If electronic output is reused,
ensure that validation has occurred prior to subsequent uses.
5. Define and implement procedures to ensure that the business owners review the final output for reasonableness,
accuracy and completeness, and output is handled in line with the applicable confidentiality classification. Report potential
Related information criteria: Integrity, errors; log them in an automated, centralized logging facility; and address errors in a timely manner.
confidentiality, availability and
6. If the application produces sensitive output, define who can receive it, label the output so it is recognizable by people
effectiveness.
and machines, and implement distribution accordingly. Where necessary, send it to special access- controlled output
devices.
Control Objective: Before passing 1. Where transactions are exchanged electronically, establish an agreed-upon standard of communication and
transaction data between internal mechanisms necessary for mutual authentication, including how transactions will be represented, the responsibilities of
applications and business/ operational both parties and how exception conditions will be handled.
functions (within or outside the
2. Tag output from transaction processing applications in accordance with industry standards to facilitate counterparty
enterprise), check the data for proper
authentication, provide evidence of non-repudiation and allow for content integrity verification upon receipt by the
addressing, authenticity of origin and
downstream application.
integrity of content.
3. Analyze input received from other transaction processing applications to determine authenticity of origin and the
Maintain authenticity and integrity
maintenance of the integrity of content during transmission.
during transmission or transport.
Access control list (ACL). An internal computerized table of access rules regarding the levels of
computer access permitted to logon IDs and computer terminals.
Access rights. The permission or privileges granted to users, programs or workstations to create, change,
delete or view data and files within a system, as defined by rules established by data owners and the
information security policy.
Application. A set of programs, data and clerical procedures which together form an information system
designed to handle a specific administrative or business function (e.g. accounting, payment of grants,
recording of inventory). Most applications can usefully be viewed as processes with input, processing,
stored data, and output.
Audit trail. A visible trail of evidence enabling one to trace information contained in statements or reports
back to the original input source.
Availability. The accessibility of a system, resource or file, where and when required. The time that a
system is not available is called downtime. Availability is determined by reliability, maintainability,
serviceability, performance, and security.
Backup. A duplicate copy (e.g. of a document or of an entire disc) made either for archiving purposes or for
safeguarding valuable files from loss should the active copy be damaged or destroyed. A backup is an
"insurance" copy.
Batch. A set of computer data or jobs to be processed in a single program run.
Buffer overflow. It occurs when a program or process tries to store more data in a buffer (temporary data
storage area) than it was intended to hold. Although it may occur accidentally through programming error,
buffer overflow is an increasingly common type of security attack on data integrity.
Business continuity plan (BCP). A logistical plan to recover and restore the critical business operations
within a predetermined time after a disaster or extended disruption. Some of the critical business operations
need IT services to continue: these are the critical IT services. A part of the BCP is the Disaster Recovery
Plan that addresses the restoration of the critical IT services.
Change management. The process responsible for controlling the lifecycle of all changes. The primary
objective of change management is to enable beneficial changes to be made, with minimum disruption to IT
Services.
Check digit. A numeric value, which has been calculated mathematically, is added to data to ensure that
original data have not been altered or that an incorrect, but valid match has occurred.
Control objective. A statement of the desired result or purpose to be achieved by implementing control
procedures in a particular process.
Data dictionary. A database that contains the name, type, source and authorization for access for each data
element in the organization’s files and databases. It also indicates which application programmes use that
data so that when a data structure is contemplated, a list of the affected programmes can be generated.
Disaster recovery plan (DRP). A plan used to restore the critical IT services in case of a disaster
affecting IT infrastructure. A DRP is not valid unless tested at least once a year. The DRP is a part of the
BCP.
Hash total. A figure obtained by some operations upon all the items in a collection of data and used for
control purposes. A recalculation of the hash total, and comparison with a previously computed value,
provides a check on the loss or corruption of the data.
Input. Information/data received by the computer system either from an external source or from another
area within the computer environment.
Integrity. One of the information criteria that information is valid, complete and accurate.