IT General Controls - John Gatto (Part 3)
IT General Controls - John Gatto (Part 3)
Methodology Assessment
Exception protocols
Formalized testing methods
Source Control
Peer Review
Change control process
Standard project management templates / reports
Test environment separate from production
Formal reporting processes / templates
Consistent use of metrics (red, yellow, green)
IT General Controls 61
Methodology Assessment
Methodology Assessment
Is based on
Provides
best practices
Provides sufficient
Exists, is • PM: PMBOK,
flexibility to structure to
adhered to PRINCE2, etc.
support help PMs and
and is used • Technical:
project sizes reduce the SDLCs, SEI, etc.
by all projects
and types risk of project • Regulatory and
failure Legal as required
IT General Controls 62
Types of Project Engagements
Methodology Assessment
Readiness Assessment
Post-Implementation Review
Advisory Services
Advisory Services
IT General Controls 63
Why Be Involved?
RISK
MANAGEMENT and
Companies continue to VALUE ADD
Proactive controls consulting
invest in technology to
will result in appropriate
reduce admin costs,
controls being implemented
increase efficiencies
early in the development
and achieve competitive
process
advantages
IT General Controls 64
SDLC Risks
Adoption of Inappropriate
Inadequate
inappropriate technology and Scope variations
controls in the
SDLC for the architecture
SDLC process
application
User requirements
Lack of
and objectives not Time and cost Inadequate quality
management
met by the over-runs of the application
support
application
Inadequate Insufficient
Inadequate project stakeholder attention to
management (including internal security and Inadequate testing
audit) involvement controls in the
application
SDLC Risks
Insufficient
Performance Inappropriate attention to
Inadequate
criteria not resourcing / configuration
other
being met staffing model management
dependencies
Poor planning
Inadequate Insufficient Post cut-over
for data
disruption to
staffing skills documentation conversion and
business
cutover
IT General Controls 65
Project Success Factors
1. User
2. Executive 3. Clear
Involvement:
Support: Business
Business and IT
Key executives Objectives:
users are
provide alignment Stakeholders
involved with key
with business understand the
consensus-
strategy, as well core value of the
building,
as financial, project and how it
decision-making,
emotional, and aligns with
and information-
conflict resolution business
gathering
support. strategy.
processes.
5. Emotional Maturity:
4. Agile Optimization:
Project manager directs
Project uses iterative development the emotions and actions
and optimization processes to of project stakeholders
avoid unnecessary features and and avoids ambition,
ensure critical features are arrogance, ignorance,
included. abstinence, and
fraudulence.
IT General Controls 66
Selection of Engagements
Conduct a risk analysis to identify projects or initiatives
that present the greatest risk using enterprise resources:
Project Audit
Portfolio Company Services Corporate
Management Management Management Compliance
(PPM)
(PPM Mandates
Demand Regulatory
Management / Oversight
Risk Office -
Assessments Privacy
Business
Case
Risk Model
Engagement Selection
Audit Approach
We do the first one annually. I have always believed that audit sb doing
more advisory work.
We need to ensure that the SDLC process is followed but more value
in the other. So, what are the phases and how much time?
IT General Controls 67
SDLC Phases
IT General Controls 68
SDLC Methodology
Analysis
Design
Implementation
Maintenance
SDLC - Design
Balancing
Edits
Quality Assurance
Output
Database Administration
IT General Controls 69
Things to Look for….
Documented procedures
and User Training prior to Traceability
‘Go Live’
IT General Controls 70
System & User Acceptance Testing
IT G
General
al Controls 142
IT General Controls 71
System & Acceptance Testing
• Deliverables:
• Sign-off for System Test
• Sign-off for Acceptance Test
• Updated test case artifacts
Consideration of Risk
• Identify risk associated with the application and its associated data,
sources, infrastructure and systems.
• Assess the impact on the audit objectives, audit plan, audit scope and
audit procedures.
Functionality
• Determine purpose of the application and verify functionality against
requirements
• Verify end-user acceptance for newly installed application
• Special considerations: Security, Operational controls, Financial controls
• Verify various scenarios to understand/test functionality?
IT General Controls 72
Planning the Audit
Consideration of the Control
Consideration of Scope
Environment
Determine relevant technologies and
controls associated with auditing the
applications
Target/destination systems
If the primary purpose of the audit is
auditing proper functionality, the
controls might be application
development controls or systems Infrastructure or components
development life cycle (SDLC)
controls. In particular, controls for
testing the application are important. Databases
Efficiency Effectiveness
Financial
Compliance reporting
implications
IT General Controls 73
Map Systems and Data Flows
Relevant IT components (description)
Business processes
Controls
Determine Risks
t.
IT General Controls 74
Identify Key Controls
Key Controls
Access security
Coding
Disaster Recovery
IT General Controls 75
Key Controls
Auto notifications
Actuarial Excel
Access
External Reporting
APL ( A Programming
Language)
Health Care VBA (Visual Basic for
Management Applications).
IT General Controls 76
EUC Control Framework
gy
Technology
Process
People
ople
Governance
Peop
op
Policies & • Define levels of • Apply risk requirements
Procedures access ranking and • Determine
• Define • Define determine support strategy
Ownership applications in control scope • Implement
• Monitor & scope • Define and technology
Report apply specific
controls
Management’s Role
Management must With full population of
define what constitutes EUCs, management
an EUC and compile a should determine which
list of applications used of these is impacting the
by the user group organization
Management should
assess the usage of Management should
these EUCs and develop comprehensive
determine if standard policies and procedures
procedures are followed
Management should
evaluate existing policies
and procedures and
work to establish an
organization wide
version
IT General Controls 77
End User Computing
Types of Errors
Errors caused by data being incorrectly entered
Input errors into the application.
• Data import error.
• Manual entry error
IT General Controls 78
Risks
Storage of data
Key Facts
Number of
people with Usage
Input
access / (finance / Complexity Risks
Sources
admin operations)
rights
Owner(s) Users
Application Name
IT General Controls 79
Controls Required
Archiving
Training
Disaster Recovery
IT General Controls 80
Definition from COBIT
Disaster Recovery Planning (DRP),
a key component of Business
DRP comprises consistent actions
Continuity Planning (BCP), refers to
to be undertaken prior to, during and
the technological aspect of BCP –
subsequent to a disaster. It is built
the advance planning and
from a comprehensive planning
preparations necessary to minimize
process, involving all of the
the loss and ensure continuity of
enterprise business processes.
business functions in the event of a
disaster.
IT General Controls 81
Purpose
Questions to Ask
IT General Controls 82
Enterprise View
Business Continuity
Management
Disaster Recovery
Helpful Hints
IT General Controls 83
Helpful Hints
Maintain a functionall
Ensure change control
area checklist to
keeps your continuity
continue business
plan current with
effectively in the case
process and
of a disruption or
technology changes
emergency
IT General Controls 84
Disaster Recovery Plans
Audit Focus
Goals &
Updated Frequency Objectives
Approaches
Participants
Approved Reporting
Evaluation
IT General Controls 85
Audit Focus
What to do
differently next time
Action items
identified
Evaluation
What Is IAM?
Identity and Access Management (IAM) attempts to
address three important questions:
IT General Controls 86
Why Implement IAM?
The elements
used to uniquely
describe a person or The rights
machine. that the identity
was granted.
IT General Controls 87
Concepts Related to IAM Process
IT General Controls 88
Enforcement Process
IT General Controls 89
Auditing IAM
Assess the organization’s
• IAM strategy
• provisioning process
• enforcement process
Document identities, identity repositories, and
identity lifecycle components
Testing IAM
IT General Controls 90
User Recertification
Regularly re-validate
Detective control thru
all users’ access
out the year
levels on all systems
• Excessive levels of • Ensure it is done
access • Ensure the
• Terminated users population is
• Potential process complete
problems
Access Management
Does everyone have access to what How do we secure new systems
they need for their jobs and can before adding to the network; is there
unmanaged devices attach to our production data in non-production
network? systems?
IT General Controls 91
IAM Risks
Periodic
Provisioning Removal
Review
Complex and
decentralized
Lack of evidence environments create
supporting system level challenges to properly Reliability on manual
access with review access controls
authorizati0ns
Insufficient monitoring
Lack of guidance when
procedures to
provisioning user access
Processes are compensate for reliance
leading to SOD issues
inconsistent and not on manual controls
properly documented
IT General Controls 92