Module I - Lesson 2
Module I - Lesson 2
MODULE IV
INTRODUCTION TO
INFORMATION
TECHNOLOGY (IT)
AUDIT
Module Author
JUDE CAPONPON, CPA, MBA, CTT
Accountancy Department
College of Business Administration and Accountancy
De La Salle University – Dasmarinas
Page 1
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
TABLE OF CONTENTS
Contents
TODAY’S GOSPEL .......................................................................................................................................... 3
LEARNING OBJECTIVES:................................................................................................................................. 3
LESSON 1 AUDITING AND IT AUDIT CONCEPTS, PRINCIPLES, TYPES AND PROCESSES ........ 6
Objectives ................................................................................................................................................. 6
Introduction .............................................................................................................................................. 6
Activating Prior Knowledge....................................................................................................................... 6
Acquiring New Knowledge ........................................................................................................................ 7
Types of Audits...................................................................................................................................... 7
Auditing as a Systematic Process .......................................................................................................... 9
The Information Technology (IT) Audit ............................................................................................... 10
Phases of an Information Technology (IT) Audit................................................................................. 11
Internal Control Objectives, Principles, and Models .......................................................................... 12
Risk Assessment .................................................................................................................................. 18
Information and Communication ....................................................................................................... 19
Monitoring .......................................................................................................................................... 20
Control Activities ................................................................................................................................. 20
Categories of Control Activities ......................................................................................................... 21
General Controls ................................................................................................................................. 24
Formative Assessment ................................................................................... Error! Bookmark not defined.
References:..................................................................................................... Error! Bookmark not defined.
Page 2
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
LEARNING OBJECTIVES:
While going through the module, the students are expected to:
1. Write a brief reflection about the Gospel;
2. Answer the motivation question;
3. Explain the basic principles and concepts in IT and IT Audit in building awareness of
the significant role of auditing in actual business operations;
4. Gain knowledge on the irregular acts and legal issues in Audit in a CIS Environment
5. Describe the audit process in a CIS Environment
TODAY’S GOSPEL
Psalm 23:1-6
Page 3
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
“The Lord is my shepherd, I lack nothing. He makes me lie down in green pastures, he leads me
beside quiet waters, he refreshes my soul. He guides me along the right paths for his name’s
sake. Even though I walk through the darkest valley, I will fear no evil, for you are with me; your
rod and your staff, they comfort me. You prepare a table before me in the presence of my
enemies. You anoint my head with oil; my cup overflows. Surely your goodness and love will
follow me all the days of my life, and I will dwell in the house of the Lord forever.”
Page 4
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Page 5
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Objectives
1. Know the difference between attest services and advisory services and be able to explain
the relationship between the two
2. Understand the structure of an audit and have a firm grasp of the conceptual elements of
the audit process
3. Understand internal control categories presented in the COSO framework
4. Understand the relationship between general controls, application controls, and financial
data integrity
Introduction
Business organizations undergo different types of audits for different purposes. The most
common of these are external (financial) audits and internal audits.
The official organization representing and certifying internal auditors, The Institute of Internal
Auditors (or IIA) defines Internal Auditing as 'an independent, objective assurance and
consulting actively designed to add value and improve an organization's operations. It helps an
organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate
and improve the effectiveness of risk management, control, and governance process.'
While Accounting Information System consists of the records and methods used to initiate,
identify, analyze, classify, and record the organization’s transactions and to account for the
Page 6
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
related assets and liabilities. The quality of information is that the accounting information system
generates impacts management’s ability to take actions and make decisions in connection with
the organization’s operations and to prepare reliable financial statements.
External Audit
An external audit is an independent attestation performed by an expert—the auditor— who
expresses an opinion regarding the presentation of financial statements. This task, known as the
attest service, is performed by Certified Public Accountants (CPA) who works for public
accounting firms that are independent of the client organization being audited. The audit
objective is always associated with assuring the fair presentation of financial statements. These
audits are, therefore, often referred to as financial audits. The Securities and Exchange
Commission (SEC) requires all publicly traded companies be subject to a financial audit
annually. CPAs conducting such audits represent the interests of outsiders: stockholders,
creditors, government agencies, and the general public.
The CPA’s role is similar in concept to a judge who collects and evaluates evidence and renders
an opinion. A key concept in this process is independence. The judge must remain independent
in his or her deliberations. The judge cannot be an advocate of either party in the trial, but must
apply the law impartially based on the evidence presented. Likewise, the independent auditor
collects and evaluates evidence and renders an opinion based on the evidence. Throughout the
audit process, the auditor must maintain independence from the client organization. Public
confidence in the reliability of the company’s internally produced financial statements rests
directly on an evaluation of them by an independent auditor.
The external auditor must follow strict rules in conducting financial audits. These authoritative
rules have been defined by the SEC, the Financial Accounting Standards Board (FASB), the
AICPA, and by federal law (Sarbanes-Oxley [SOX] Act of 2002). With the passage of SOX,
Congress established the Public Company Accounting Oversight Board (PCAOB), which has to
a great extent replaced the function served by the FASB, and some of the functions of the
AICPA (e.g., setting standards and issuing reprimands and penalties for CPAs who are convicted
of certain crimes or guilty of certain infractions). Regardless, under federal law, the SEC has
final authority for financial auditing.
Page 7
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Internal Audit
The Institute of Internal Auditors (IIA) defines internal auditing as an independent appraisal
function established within an organization to examine and evaluate its activities as a service to
the organization. Internal auditors perform a wide range of activities on behalf of the
organization, including conducting financial audits, examining an operation’s compliance with
organizational policies, reviewing the organization’s compliance with legal obligations,
evaluating operational efficiency, and detecting and pursuing fraud within the firm.
An internal audit is typically conducted by auditors who work for the organization, but this task
may be outsourced to other organizations. Internal auditors are often certified as a Certified
Internal Auditor (CIA) or a Certified Information Systems Auditor (CISA). While internal
auditors self-impose independence to perform their duties effectively, they represent the interests
of the organization. These auditors generally answer to executive management of the
organization or the audit committee of the board of directors, if one exists. The standards,
guidance, and certification of internal audits are governed mostly by the Institute of Internal
Auditors (IIA) and, to a lesser degree, by the Information Systems Audit and Control Association
(ISACA).
Fraud Audits
In recent years, fraud audits have, unfortunately, increased in popularity as a corporate
governance tool. They have been thrust into prominence by a corporate environment in which
both employee theft of assets and major financial frauds by management (e.g., Enron,
WorldCom, etc.) have become rampant. The objective of a fraud audit is to investigate anomalies
and gather evidence of fraud that may lead to criminal conviction. Sometimes fraud audits are
initiated by corporate management who suspect employee fraud. Alternatively, boards of
directors may hire fraud auditors to look into their own executives if theft of assets or financial
fraud is suspected. Organizations victimized by fraud usually contract with specialized fraud
units of public accounting firms or with companies that specialize in forensic accounting.
Typically, fraud auditors have earned the Certified Fraud Examiner (CFE) certification, which is
governed by the Association of Certified Fraud Examiners (ACFE).
Page 8
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Page 9
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Page 10
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Audit Planning
The first step in the IT audit is audit planning. Before the auditor can determine the nature and
extent of the tests to perform, he or she must gain a thorough understanding of the client’s
business. A major part of this phase of the audit is the analysis of audit risk. The auditor’s
objective is to obtain sufficient information about the firm to plan the other phases of the audit.
The risk analysis incorporates an overview of the organization’s internal controls. During the
review of controls, the auditor attempts to understand the organization’s policies, practices, and
structure. In this phase of the audit, the auditor also identifies the financially significant
applications and attempts to understand the controls over the primary transactions that are
processed by these applications.
The techniques for gathering evidence at this phase include conducting questionnaires,
interviewing management, reviewing systems documentation, and observing activities. During
this process, the IT auditor must identify the principal exposures and the controls that attempt to
reduce these exposures. Having done so, the auditor proceeds to the next phase, where he or she
tests the controls for compliance with pre-established standards.
Tests of Controls
The objective of the tests of controls phase is to determine whether adequate internal controls are
in place and functioning properly. To accomplish this, the auditor performs various tests of
controls. The evidence-gathering techniques used in this phase may include both manual
techniques and specialized computer audit techniques. We shall examine several such methods
later in this text.
At the conclusion of the tests-of-controls phase, the auditor must assess the quality of the internal
controls by assigning a level for control risk. As previously explained, the degree of reliance that
the auditor can ascribe to internal controls will affect the nature and extent of substantive testing
that needs to be performed.
Page 11
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Substantive Testing
The third phase of the audit process focuses on financial data. This phase involves a detailed
investigation of specific account balances and transactions through what are called substantive
tests. For example, a customer confirmation is a substantive test sometimes used to verify
account balances. The auditor selects a sample of accounts receivable balances and traces these
back to their source—the customers—to determine if the amount stated is in fact owed by a bona
fide customer. By so doing, the auditor can verify the accuracy of each account in the sample.
Based on such sample findings, the auditor is able to draw conclusions about the fair value of the
entire accounts receivable asset. Some substantive tests are physical, labor-intensive activities,
such as counting cash, counting inventories in the warehouse, and verifying the existence of
stock certificates in a safe. In an IT environment, the data needed to perform substantive tests
(such as account balances and names and addresses of individual customers) are contained in
data files that often must be extracted using Computer-Assisted Audit Tools and Techniques
(CAATTs) software. In a later chapter of this text, we will examine the role of CAATTs in
performing traditional substantive tests and other data analysis and reporting tasks.
Page 12
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Objectives
The internal control system should provide reasonable assurance that the four broad objectives of
internal control are met. This reasonableness means that the cost of achieving improved control
should not outweigh its benefits.
The internal control system should achieve the four broad objectives regardless of the data
processing method used (whether manual or computer based). However, the specific techniques
used to achieve these objectives will vary with different types of technology.
Limitations
Every system of internal control has limitations on its effectiveness:
Page 13
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Management’s Responsibility
PDC Model
Preventive Controls
Prevention is the first line of defense in the control structure. Preventive controls are passive
techniques designed to reduce the frequency of occurrence of undesirable events. Preventive
controls force compliance with prescribed or desired actions and thus screen out aberrant events.
When designing internal control systems, an ounce of prevention is most certainly worth a pound
of cure. Preventing errors and fraud is far more cost-effective than detecting and correcting
problems after they occur. The vast majority of undesirable events can be blocked at this first
level. For example, a well-designed data entry screen is an example of a preventive control. The
logical layout of the screen into zones that permit only specific types of data, such as customer
name, address, items sold, and quantity, forces the data entry clerk to enter the required data and
prevents necessary data from being omitted.
Page 14
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Detective Controls
Detection of problems is the second line of defense. Detective controls are devices, techniques,
and procedures designed to identify and expose undesirable events that elude preventive
controls. Detective controls reveal specific types of errors by comparing actual occurrences to
pre-established standards. When the detective control identifies a departure from standard, it
sounds an alarm to attract attention to the problem.
For example, assume that because of a data entry error, a customer sales order record contains
the following data:
Before processing this transaction and posting to the accounts, a detective control should
recalculate the total value using the price and quantity. Thus, this error above would be detected.
Corrective Controls
Corrective actions must be taken to reverse the effects of detected errors. There is an important
distinction between detective controls and corrective controls. Detective controls identify
undesirable events and draw attention to the problem; corrective controls actually fix the
problem. For any detected error, there may be more than one feasible corrective action, but the
best course of action may not always be obvious. For example, in viewing the preceding error,
your first inclination may have been to change the total value from P1,000 to P100 to correct the
problem. This presumes that the quantity and price values in the record are correct; they may not
be. At this point, we cannot determine the real cause of the problem; we know only that one
exists.
Page 15
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
SAS 109 requires that auditors obtain sufficient knowledge to assess the attitude and awareness
of the organization’s management, board of directors, and owners regarding internal control. The
following paragraphs provide examples of techniques that may be used to obtain an
understanding of the control environment.
1. Auditors should assess the integrity of the organization’s management and may use
investigative agencies to report on the backgrounds of key managers. Some of the “Big
Four” public accounting firms employ former FBI agents whose primary responsibility is
to perform background checks on existing and prospective clients. If cause for serious
reservations comes to light about the integrity of the client, the auditor should withdraw
from the audit. The reputation and integrity of the company’s managers are critical
Page 16
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Risk Assessment
Organizations must perform a risk assessment to identify, analyze, and manage risks relevant to
financial reporting. Risks can arise or change from circumstances such as:
Changes in the operating environment that impose new or changed competitive pressures
on the firm.
New personnel who have a different or inadequate understanding of internal control.
New or reengineered information systems that affect transaction processing.
Significant and rapid growth that strains existing internal controls.
The implementation of new technology into the production process or information system
that impacts transaction processing.
The introduction of new product lines or activities with which the organization has little
experience.
Organizational restructuring resulting in the reduction and/or reallocation of personnel
such that business operations and transaction processing are affected.
Page 18
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Entering into foreign markets that may impact operations (that is, the risks associated
with foreign currency transactions).
Adoption of a new accounting principle that impacts the preparation of financial
statements. SAS 109 requires that auditors obtain sufficient knowledge of the
organization’s risk assessment procedures to understand how management identifies,
prioritizes, and manages the risks related to financial reporting.
SAS 109 requires that auditors obtain sufficient knowledge of the organization’s information
system to understand:
The classes of transactions that are material to the financial statements and how those
transactions are initiated.
The accounting records and accounts that are used in the processing of material
transactions.
The transaction processing steps involved from the initiation of a transaction to its
inclusion in the financial statements.
Page 19
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
The financial reporting process used to prepare financial statements, disclosures, and
accounting estimates.
Monitoring
Management must determine that internal controls are functioning as intended. Monitoring is the
process by which the quality of internal control design and operation can be assessed. This may
be accomplished by separate procedures or by ongoing activities.
An organization’s internal auditors may monitor the entity’s activities in separate procedures.
They gather evidence of control adequacy by testing controls and then communicate control
strengths and weaknesses to management. As part of this process, internal auditors make specific
recommendations for improvements to controls.
Ongoing monitoring may be achieved by integrating special computer modules into the
information system that capture key data and/or permit tests of controls to be conducted as part
of routine operations. Embedded modules thus allow management and auditors to maintain
constant surveillance over the functioning of internal controls.
Another technique for achieving ongoing monitoring is the judicious use of management reports.
Timely reports allow managers in functional areas such as sales, purchasing, production, and
cash disbursements to oversee and control their operations. By summarizing activities,
highlighting trends, and identifying exceptions from normal performance, well-designed
management reports provide evidence of internal control function or malfunction.
Control Activities
Control activities are the policies and procedures used to ensure that appropriate actions are
taken to deal with the organization’s identified risks. Control activities can be grouped into two
distinct categories: physical controls and information technology (IT) controls.
Page 20
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Physical Controls
This class of controls relates primarily to the human activities employed in accounting
systems. These activities may be purely manual, such as the physical custody of assets, or
they may involve the physical use of computers to record transactions or update accounts.
Physical controls do not relate to the computer logic that actually performs accounting
tasks. Rather, they relate to the human activities that trigger and utilize the results of
those tasks. In other words, physical controls focus on people, but are not restricted to an
environment in which clerks update paper accounts with pen and ink. Virtually all
systems, regardless of their sophistication, employ human activities that need to be
controlled.
Page 21
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
b. Segregation of Duties. One of the most important control activities is the segregation
of employee duties to minimize incompatible functions. Segregation of duties can
take many forms, depending on the specific duties to be controlled.
Page 22
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Organizations must maintain audit trails for two reasons. First, this information is
needed for conducting day-to-day operations. The audit trail helps employees respond
to customer inquiries by showing the current status of transactions in process. Second,
the audit trail plays an essential role in the financial audit of the firm. It enables
external (and internal) auditors to verify selected transactions by tracing them from
the financial statements to the ledger accounts, to the journals, to the source
documents, and back to their original source. For reasons of both practical expedience
and legal obligation, business organizations must maintain sufficient accounting
records to preserve their audit trails.
e. Access Control. The purpose of access controls is to ensure that only authorized
personnel have access to the firm’s assets. Unauthorized access exposes assets to
misappropriation, damage, and theft. Therefore, access controls play an important
role in safeguarding assets.
Access to assets can be direct or indirect. Physical security devices, such as locks,
safes, fences, and electronic and infrared alarm systems, control against direct access.
Indirect access to assets is achieved by gaining access to the records and documents
that control the use, ownership, and disposition of the asset. For example, an
individual with access to all the relevant accounting records can destroy the audit trail
that describes a particular sales transaction. Thus, by removing the records of the
transaction, including the accounts receivable balance, the sale may never be billed
and the firm will never receive payment for the items sold. The access controls
needed to protect accounting records will depend on the technological characteristics
of the accounting system. Indirect access control is accomplished by controlling the
use of documents and records and by segregating the duties of those who must access
and process these records.
Page 23
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
General Controls
These are controls applied to all systems and are not application-specific. Also, these are
controls over IT Governance, IT Infrastructure, security and access to operating systems
and databases, application acquisition and development, and program change procedures.
In addition, general controls are needed to support the functioning of application controls,
and both are needed to ensure accurate financial reporting.
Page 24
Auditing in CIS Environment
Module I: Introduction to Information Technology (IT) Audit
Hall, J. (2016). Information Technology Auditing and Assurance, 4th Edition. South-Western:
Cengage Learning
IT Audit and AIS Quick Guides 2019 version by FIT Academy
https://learn.comptia.org/
https://help.sap.com/saphelp_sbo882/helpdata/en/45/0a572b37ca1f2ce10000000a1553f6/content
.htm?no_cache=true
https://help.sap.com/saphelp_sbo882/helpdata/en/45/0a574437ca1f2ce10000000a1553f6/content
.htm?no_cache=true
https://searchsap.techtarget.com/definition/SAP-Business-One
https://www.erp-information.com/database-management-system.html
Page 25