Gtag 8 Auditing Application Controls
Gtag 8 Auditing Application Controls
Auditing
Application
Controls
Global Technology Audit Guide (GTAG) 8:
Auditing Application Controls
Authors
The IIA publishes this document for informational and educational purposes. This document is intended to provide information,
but is not a substitute for legal or accounting advice. The IIA does not provide such advice and makes no warranty as to any legal or
accounting results through its publication of this document. When legal or accounting issues arise, professional assistance should
be sought and retained.
GTAG – Table of Contents
1. Executive Summary...............................................................................................................................................................1
2. Introduction....................................................................................................................................................................2
3. Risk Assessment.....................................................................................................................................................................7
Assess Risk....................................................................................................................................................................7
Access Controls.............................................................................................................................................................9
Planning................................................................................................................................................................10
Documentation Techniques..................................................................................................................................12
Testing..........................................................................................................................................................................13
6. Appendices...................................................................................................................................................................18
7. Glossary................................................................................................................................................................................26
8. References....................................................................................................................................................................27
Over the last several years, organizations around the world However, the degree of successful risk management is directly
have spent billions of dollars upgrading or installing new dependent upon:
business application systems for different reasons, ranging • The organization’s risk appetite, or tolerance.
from tactical goals, such as year 2000 compliance, to • The thoroughness of the risk assessment related
strategic activities, such as using technology as an enabler to the application.
of company differentiation in the marketplace. An • The affected business processes.
application or application system is a type of software that • The effectiveness of general
enables users to perform tasks by employing a computer’s information technology (IT) controls.
capabilities directly. According to The Institute of • The design and ongoing extent of operating
Internal Auditors’ (IIA’s) GTAG 4: Management of IT effectiveness of the control activities.
Auditing, these types of systems can be classified as either
transactional applications or support applications. One of the most cost-effective and efficient approaches
Transactional applications process organizationwide data by: organizations use to manage these risks is through the use
• Recording the value of business of controls that are inherent or embedded (e.g., three-way
transactions in terms of debits and match on account payable invoices) into transactional and
credits. support applications as well as controls that are
• Serving as repositories for financial, configurable (e.g., accounts payable invoice tolerances).
operational, and regulatory data. These types of controls are generally referred to as
• Enabling various forms of financial and application controls
managerial reporting, including the — those controls that pertain to the scope of individual
processing business processes or application systems, including data edits,
of sales orders, customer invoices, vendor separation of business functions, balancing of processing
invoices, and journal entries. totals, transaction logging, and error reporting.2
It is also important for chief audit executives (CAEs)
Examples of transactional processing systems include and their staff to understand the difference between
SAP R/3, PeopleSoft, and Oracle Financials, which are application controls and IT general controls (ITGCs). The
often referred to as enterprise resource planning (ERP) ITGCs apply to all organizationwide system components,
systems, as well as countless other non-ERP examples. processes, and data,3 while application controls are
These systems process transactions based on programmed specific to a program or system supporting a particular
logic and, in many cases, in addition to configurable tables business process. The “Application Controls Versus IT
that store unique organizational business and processing General Controls” section of this chapter will go into
rules. greater detail about these two types of controls.
On the other hand, support applications are specialized Due to the importance of application controls to risk
software programs that facilitate business activities. Examples management strategies, CAEs and their teams need to
include e-mail programs, fax software, document imaging develop and execute audits of application controls on a
software, and design software. However, these applications periodic basis to determine if they are designed appropriately
generally do not process transactions.1 and operating effectively. Therefore, the objective of this
As with any technology that is used to support business GTAG is to provide CAEs with information on:
processes, transactional and support applications may pose 1. What application controls are and their benefits.
risks to the organization, which stem from the inherent 2. The role of internal auditors.
nature of the technology and how the system is configured, 3. How to perform a risk assessment.
managed, and used by employees. With respect to 4. Application control review scoping.
transactional processing systems, risks can have a negative 5. Application review approaches
impact on the integrity, completeness, timeliness, and and other considerations.
availability of financial or operational data if they are not
mitigated appropriately. Furthermore, the business processes To further assist CAEs or other individuals who use this
themselves will have some element of inherent risk, regardless guide, we also have included a list of common application
of the application used to support them. As a result of these controls and a sample audit plan.
application technology and business process risks, many
organizations use a mix of automated and manual controls
to manage these risks in transactional and support
applications.
1
1 GTAG 4: Management of IT Auditing, p. 5.
2 GTAG 1: Information Technology Controls, p. 3.
3 GTAG 1: Information Technology Controls, p. 3.
2
GTAG – Introduction – 2
Defining Application Controls to make sure that the data entered is consistent with the
Application controls are those controls that pertain to the associated program logic and only allows correct data to be
scope of individual business processes or application systems, saved. Otherwise, incorrect or invalid data is rejected at the
including data edits, separation of business functions, time of data entry.
balancing of processing totals, transaction logging, and Detective controls also perform as the name implies — that
error reporting. Therefore, the objective of application is, they detect errors based on a predefined program logic.
controls is to ensure that: An example of a detective control is one that discovers a
• Input data is accurate, complete, favorable or unfavorable variation between a vendor invoice
authorized, and correct. price and the purchase order price.
• Data is processed as intended in an Application controls, particularly those that are detective in
acceptable time period. nature, are also used to support manual controls used in the
• Data stored is accurate and complete. en- vironment. Most notably, the data or results of a detective
• Outputs are accurate and complete. con- trol can be used to support a monitoring control. For
• A record is maintained to track the process of instance, the detective control described in the previous
data from input to storage and to the eventual paragraph can note any purchase price variances by using a
output.4 program to list these exceptions on a report. Management’s
review of these exceptions can then be considered a
Several types of application controls exist. These include: monitoring control.
• Input Controls – These controls are used mainly
to check the integrity of data entered into a
business application, whether the data is entered Application Controls Versus IT General
directly by staff, remotely by a business partner, or
through
Controls It is important for CAEs and their staff to
understand the relationship and difference between
a Web-enabled application or interface. Data input
application controls and Information Technology General
is checked to ensure that is remains within
Controls (ITGCs). Otherwise, an application control review
specified parameters.
may not be scoped appropriately, thereby impacting the
• Processing Controls – These controls provide an
quality of the audit and its coverage.
automated means to ensure processing is complete,
ITGCs apply to all systems components, processes, and
accurate, and authorized.
data present in an organization or systems environment. 6
• Output Controls – These controls address what
The objectives of these controls are to ensure the appropriate
is done with the data and should compare output
development and implementation of applications, as well
results with the intended result by checking the
as the integrity of program and data files and of computer
output against the input.
operations.7 The most common ITGCs are:
• Integrity Controls – These controls monitor data
• Logical access controls over infrastructure,
being processed and in storage to ensure it remains
applications, and data.
consistent and correct.
• System development life cycle controls.
• Management Trail – Processing history controls,
• Program change management controls.
often referred to as an audit trail, enables
• Physical security controls over the data center.
management to identify the transactions and events
they record by tracking transactions from their source • System and data backup and recovery controls.
to their output and by tracing backward. These • Computer operation controls.
controls also monitor the effectiveness of other
controls and identify errors as close as possible Because application controls relate to the transactions
to their sources.5 and data pertaining to each computer-based application
system, they are specific to each individual application. The
objectives of application controls are to ensure the
Additional application control components include
completeness and accuracy of records, as well as the
wheth- er they are preventive or detective. Although both
validity of the entries made to each record, as the result
control types operate within an application based on
of program processing.8 In other words, application
programmed or configurable system logic, preventive controls
controls are specific to a given application, whereas ITGCs
perform as the name implies — that is, they prevent an error
are not. Common application control activities include:
from occur- ring within an application. An example of a
preventive con- trol is an input data validation routine. • Determining whether sales orders are processed
The routine checks
3
7,8 ISACA, IS Auditing Guideline – Application Systems Review, Document G14, p. 3.
4
GTAG – Introduction – 2
9 The Committee of Sponsoring Organizations of the Treadway Commission’s (COSO’s), Internal Control over Financial Reporting —
Guidance for Smaller Public Companies, Vol. III, p. 61.
5
10 COSO’s, Internal Control over Financial Reporting — Guidance for Smaller Public Companies, Vol. III, p. 56.
11 PCAOB, Auditing Standard No. 5, An Audit of Internal Control Over Financial Reporting That is Integrated with An Audit of Financial Statements, paragraph B29.
6
GTAG – Introduction – 2
12 PCAOB, Auditing Standard No. 5, An Audit of Internal Control Over Financial Reporting That is Integrated with An Audit of Financial Statements, paragraph B29.
13 PCAOB, Auditing Standard No. 5, An Audit of Internal Control Over Financial Reporting That is Integrated with An Audit of Financial Statements, paragraphs B29 - 30.
14 IIA Standard 1220: Due Professional Care.
15 IIA Standard 1210.A3.
7
GTAG – Introduction – 2
8
16 IIA Standard 1130.C1
9
GTAG – Introduction – 2
Education
The educational value internal auditors can provide to the
organization is not limited to application controls. Another
key opportunity for internal auditors to provide value to
the organization is through controls education. From an
application control perspective, internal auditors can educate
management on:
• How the risk profile will change once the new
application is brought online.
• Known inherent control weaknesses in
the applications under development.
• Prospective solutions to mitigate
identified weaknesses.
• The various services auditors can provide to
management as part of the system’s development
efforts.
Controls Testing
If the implementation team has designed and deployed
controls based on the risk assessment, or without the
benefit of one, internal auditors can provide value by
independently testing the application controls. This test
should determine if the controls are designed adequately
and will operate effectively once the application is
deployed. If any of the controls are designed
inadequately or do not operate effectively, auditors should
present this information along with any recommendations
to management to prevent the presence of unmanaged
risks when the application is deployed fully.
Application Reviews
Transactional and support applications require control
reviews from time to time based on their significance to the
overall control environment. The frequency, scope, and
depth of these reviews should vary based on the
application’s type and impact on financial reporting,
regulatory compliance, or operational requirements, and
the organization’s reliance on the controls within the
application for risk management purposes.
1
GTAG – Risk Assessment – 3
Assess Risk
The auditor should use risk assessment techniques to identify 2. Which business processes are impacted by
critical vulnerabilities pertaining to the organization’s these risks?
reporting, and operational and compliance requirements 3. Which systems are used to perform these processes?
when developing the risk assessment review plan. These 4. Where are processes performed?
techniques include:
• The review’s nature, timing, and extent.
When identifying risks, auditors may find it useful to
• The critical business functions employ a top-down risk assessment to determine which
supported by application controls. applications to include as part of the control review and
• The extent of time and resources to be what tests need to be performed. For instance, Figure 1
expended on the review. outlines an effective methodology for identifying financial
reporting risks and the scope of the review. Please note this
In addition, auditors should ask four key questions when illustration does not represent the only way to conduct all
determining the review’s appropriate scope: types of risk assessment.
1. What are the biggest organizationwide risks and
main audit committee concerns that need to be
assessed and managed while taking management
views into account?
10-K
Financial Statements
FS Accounts Mapped to Processes; Processes Mapped to Business Units Non-financial Disclosures Mapped to Processes
Figure 1. Financial statement risk analysis approach. See Risk Assessment Approach in the following section.
1
GTAG – Risk Assessment – 3
1
GTAG – Scoping of Application Control Reviews – 4
1
GTAG – Application Review Approaches and
Other Considerations – 5
Planning
After completing the risk evaluation and determining
the scope of the review, auditors need to focus on the
development and communication of the detailed review
plan. The first step in developing the detailed review plan
is to create a planning memorandum that lists the following
application control review components:
• All review procedures to be performed.
• Any computer-assisted tools and
techniques used and how they are used.
• Sample sizes, if applicable.
• Review items to be selected.
• Timing of the review.
1
auditors can send a letter to management announcing the
review. This letter should include:
• The review’s expected start date.
• The review’s timeframe.
• The key business areas under review.
1
GTAG – Application Review Approaches and
Other Considerations – 5
START
C1
Resolve Issue With PR
Requisition
C3
No, notify
Procurement
C4C5
C2
C6
6. Receive Goods
Receivi
C7 Against PO C8
C14 C11
Triangles represent each control in the process. The number of each control ties to the activity represented on the Risk and Controls Matrix.
Figure 4. A flowchart of a procure-to-pay process.
1
GTAG – Application Review Approaches and
Other Considerations – 5
Documentation Techniques requisition has been created, the buyer will review
In addition to the documentation standards used by the purchase requisition for its appropriateness,
internal auditors, the following are suggested approaches for completeness, and accuracy. Components of the
documenting each application control. purchase requisition that are reviewed include,
but are not limited to, the vendor, item, quantity,
Flowcharts and account coding. If the review does not reveal
Flowcharts are one of the most effective techniques used any errors, the buyer will approve the purchase
to capture the flow of transactions and their associated requisition. If the buyer rejects the purchase
application and manual controls used within an end-to-end requisition for any reason, the requisitioner will
business process, because they illustrate transaction flows. be notified. Finally, if issues with the original
Figure 4 shows an example of a flowchart for a procure-to- requisition are resolved as required, the buyer
pay process. Due to the difficulty of fitting the actual control will approve the requisition.
descriptions on the flowchart, it is prudent to instead ii) All purchase requisitions are reviewed on
simply number the controls on the flowchart and have a a monthly basis to detect any
separate document, such as a risk and controls matrix (see unauthorized requisitions as well as any
Figure 6, pages 14–17), that contains the control excessive order quantities (Controls C2
descriptions and associated information. However, and C3).
flowcharts may not be practical all of the time, and a
process narrative is sometimes more appropriate. This
b) Purchase Order Processing
typically happens when an auditor is documenting the
i) Once the purchase requisition has been
areas or work performed within the IT environment. In
approved by the buyer, he or she will create a
many cases, the work performed by IT and the related
purchase order referencing the requisition in
application controls do not flow in a linear manner as do
the procurement application (Control C4).
business processes such as procure-to-pay.
The buyer will then forward a copy of the
purchase order to the supplier.
Process Narratives ii) All purchase orders are reviewed on a monthly
Process narratives are another technique available to basis to detect any unauthorized purchase orders
document business process transaction flows with their as well as any excessive order quantities
associated applications, as shown in Figure 5. These (Controls C5 and C6).
narratives are best used as a documentation tool for relatively
non-complex business processes and IT environments. 2) Receiving
This is because the more complex the business process
a) All goods are received at the shipping and
is, the more difficult it is to create a process narrative receiving dock. A warehouse employee will review
that reflects the process’ true nature adequately and
the packing slip, make note of the purchase order
accurately. Therefore, when relatively complex business number, and count the items that are physically
processes are documented, auditors should create
received. The warehouse employee then logs onto
a flowchart with a corresponding process narrative the procurement application and enters the
that numbers the controls on the process narrative.
number of items received against the appropriate
Auditors also should create a separate document, such as a line item number on the purchase order.
risk and controls matrix.
b) The appropriate member of the accounting
department reviews and reconciles the inventory
Narrative Procure-to-pay general ledger account on a monthly basis to
Primary Contact(s) determine the goods that have been received,
but not invoiced by the vendor (Control C7).
Key Components C1, C2, C3, C4, C5, C6, C7, C8, C9, c) The appropriate buyer from the purchasing
C10, C11, C12, C13, and C14.
department reviews all unmatched purchase order
Figure 5. Risk and control matrix. reports on a monthly basis (Control C8).
The following is an example process narrative that covers the
3) Accounts Payable
procure-to-pay process.
a) The accounts payable department receives invoices
from the various suppliers on a daily basis. These
1) Procurement
invoices are sorted and assigned to each accounts
a) Requisitioning
payable clerk, based on the vendor’s name. Each
i) When employees need to buy goods or services,
clerk is required to stamp each invoice with the date
they will create a purchase requisition in the
it was received by the accounts payable department.
procurement application (Control C1). Once the
Each accounts payable clerk then matches the
1
GTAG – Application Review Approaches and
Other Considerations – 5
1
GTAG – Application Review Approaches and
Other Considerations – 5
&GGFDUJWFOFT
0QFSBUJPOBM
FSFRVFODZ
0CjFDUJWFT
LJLFMJIPPE
MBO⁄AVUP
3FDPSEFE
$MBTTJGJFE
ADUJWJUJFT
/VNCFS
1SF⁄%FU
*NQBDU⁄
$POUSPM
$POUSPM
K (:⁄/)
3FTVMUT
1PTUFE
7BMVFE
5JNFMZ
/PUFT
(:⁄/)
3JTLT
5FTU
3FBM
*⁄$
3A
$&
$A
T
MBjPS: 1SPDVSFNFOU
4VC: 1VSDIBTF 3FRVJTJUJPO 1SPDFTTJOH
ADUJWJUZ: $SFBUF
$l $POUSPMT QSPWJEF %VF UP UIF MBDL $POUSPMT BSF TVDI
SFBTPOBCMF PG BQQSPQSJBUF UIBU BDDFTT JT
BTTVSBODF TFHSFHBUJPO PG EVUJFT, HSBOUFE POMZ UP
UIBU QVSDIBTF B VTFS JT BCMF UP UIPTF JOEJWJEVBMT
SFRVJTJUJPOT DSFBUF, BQQSPWF (J.F., XJUI B CVTJOFTT
AMXBZT
BSF DSFBUFE SFMFBTF), BTTJHO, BOE QVSQPTF GPS
CZ BVUIPSJ[FE DPOWFSU B QVSDIBTF ) DSFBUJOH QVSDIBTF 9 A 1 9 9 9 9 9
QFSTPOOFM SFRVJTJUJPO, SFTVMUJOH SFRVJTJUJPOT.
DPNQMFUFMZ BOE JO UIF JOBQQSPQSJBUF
BDDVSBUFMZ. SFXBSEJOH PG
CVTJOFTT UP TVQQMJFST,
PWFSQBZNFOUT, BOE
FYDFTTJWF JOWFOUPSZ
MFWFMT.
MPOUIMZ
BSF DSFBUFE SFMFBTF), BTTJHO, BOE VOBVUIPSJ[FE
CZ BVUIPSJ[FE DPOWFSU B QVSDIBTF ) QVSDIBTF 9 9 9 M % 9 9 9 9 9
QFSTPOOFM SFRVJTJUJPO, SFTVMUJOH SFRVJTJUJPOT.
DPNQMFUFMZ BOE JO UIF JOBQQSPQSJBUF
BDDVSBUFMZ. SFXBSEJOH PG
CVTJOFTT UP TVQQMJFST,
PWFSQBZNFOUT, BOE
FYDFTTJWF JOWFOUPSZ
MFWFMT.
1
GTAG – Application Review Approaches and
Other Considerations – 5
&GGFDUJWFOFT
0QFSBUJPOBM
FSFRVFODZ
0CjFDUJWFT
LJLFMJIPPE
MBO⁄AVUP
3FDPSEFE
$MBTTJGJFE
ADUJWJUJFT
/VNCFS
1SF⁄%FU
*NQBDU⁄
$POUSPM
$POUSPM
K (:⁄/)
3FTVMUT
1PTUFE
7BMVFE
5JNFMZ
/PUFT
(:⁄/)
3JTLT
5FTU
3FBM
*⁄$
3A
$A
$&
T
MBjPS: 1SPDVSFNFOU
4VC: 1VSDIBTF 0SEFS 1SPDFTTJOH
ADUJWJUZ: $SFBUF
AMXBZT
BDDVSBUFMZ. DPOWFSU B QVSDIBTF ) DSFBUJOH QVSDIBTF 9 A 1 9 9 9 9 9
SFRVJTJUJPO, SFTVMUJOH PSEFST.
JO UIF JOBQQSPQSJBUF
SFXBSEJOH PG CVTJOFTT
UP TVQQMJFST,
PWFSQBZNFOUT, BOE
FYDFTTJWF JOWFOUPSZ
MFWFMT.
MPOUIMZ
BSF DSFBUFE DSFBUF, BQQSPWF (J.F., VOBVUIPSJ[FE
CZ BVUIPSJ[FE SFMFBTF), BTTJHO, BOE ) QVSDIBTF PSEFST. 9 9 9 M % 9 9 9 9 9
QFSTPOOFM DPOWFSU B QVSDIBTF
DPNQMFUFMZ BOE SFRVJTJUJPO SFTVMUJOH
BDDVSBUFMZ. JO UIF JOBQQSPQSJBUF
SFXBSEJOH PG
CVTJOFTT UP TVQQMJFST,
PWFSQBZNFOUT, BOE
FYDFTTJWF JOWFOUPSZ
MFWFMT.
Figure 6. Continued.
2
GTAG – Application Review Approaches and
Other Considerations – 5
&GGFDUJWFOFT
0QFSBUJPOBM
0CjFDUJWFT
FSFRVFODZ
LJLFMJIPPE
MBO⁄AVUP
3FDPSEFE
$MBTTJGJFE
ADUJWJUJFT
/VNCFS
1SF⁄%FU
*NQBDU⁄
$POUSPM
$POUSPM
K (:⁄/)
3FTVMUT
1PTUFE
7BMVFE
5JNFMZ
/PUFT
(:⁄/)
3JTLT
5FTU
3FBM
*⁄$
3A
$A
$&
T
MBjPS: 3FDFJWJOH
4VC: (PPET 3FDFJQU 1SPDFTTJOH
ADUJWJUZ: $SFBUF
$7 $POUSPMT QSPWJEF ATTPDJBUJOH B HPPET 5IF HPPET
SFBTPOBCMF BTTVSBODF SFDFJQU XJUI BO SFDFJWFE⁄OPU
UIBU HPPET SFDFJQUT BSF JODPSSFDU QVSDIBTF JOWPJDFE BDDPVOU
QSPDFTTFE CZ PSEFS PS JODPSSFDU MJOF JT SFDPODJMFE PO B
MPOUIMZ
BVUIPSJ[FE QFSTPOOFM JUFN DPVME SFTVMU JO UIF ) NPOUIMZ CBTJT. 9 9 9 M % 9 9 9 9 9
DPNQMFUFMZ, BDDVSBUFMZ, JOBDDVSBUF WBMVJOH PG
BOE JO B UJNFMZ JOWFOUPSZ BOE UIF
NBOOFS. HPPET SFDFJWFE⁄OPU
JOWPJDFE BDDPVOU,
UIFSFCZ DBVTJOH EFMBZT
JO JOWPJDF BOE
QBZNFOU QSPDFTTJOH.
$8 $POUSPMT QSPWJEF (PPET SFDFJQUT BSF 6ONBUDIFE
SFBTPOBCMF BTTVSBODF OPU SFDPSEFE QVSDIBTF PSEFS
UIBU HPPET SFDFJQUT BSF BQQSPQSJBUFMZ. SFQPSUT BSF
MPOUIMZ
QSPDFTTFE CZ M SFWJFXFE PO B 9 9 9 M % 9 9 9 9
BVUIPSJ[FE QFSTPOOFM NPOUIMZ CBTJT.
DPNQMFUFMZ, BDDVSBUFMZ,
BOE JO B UJNFMZ
NBOOFS.
MBjPS: ADDPVOUT 1BZBCMF
4VC: *OWPJDF 1SPDFTTJOH
ADUJWJUZ: $SFBUF
$9 $POUSPMT QSPWJEF AO JOWPJDF UIBU TIPVME AQQMJDBUJPO
SFBTPOBCMF BTTVSBODF CF QBJE CZ NBUDIJOH JU TFDVSJUZ JT TVDI
UIBU WFOEPS JOWPJDFT UP B QVSDIBTF PSEFS JT UIBU BDDFTT UP UIF
BSF DSFBUFE CZ QBJE XJUIPVU B OPO-QVSDIBTF
AMXBZT
Figure 6. Continued.
2
GTAG – Application Review Approaches and
Other Considerations – 5
&GGFDUJWFOFT
0QFSBUJPOBM
FSFRVFODZ
0CjFDUJWFT
LJLFMJIPPE
MBO⁄AVUP
3FDPSEFE
$MBTTJGJFE
ADUJWJUJFT
/VNCFS
1SF⁄%FU
*NQBDU⁄
$POUSPM
$POUSPM
K (:⁄/)
3FTVMUT
1PTUFE
7BMVFE
5JNFMZ
/PUFT
(:⁄/)
3JTLT
5FTU
3FBM
*⁄$
3A
$A
$&
T
MBjPS: ADDPVOUT 1BZBCMF
4VC: 1SPDFTT 1BZNFOUT
ADUJWJUZ: $SFBUF
AMXBZT
DPNQMFUFMZ BOE L QBZNFOUT CBTFE 9 A 1 9 9 9 9 9 9
BDDVSBUFMZ. PO UIF WBMVF PG
BQQSPWFE JOWPJDFT
BDDPSEJOH UP
WFOEPS QBZNFOU
BOE TZTUFN
UFSNT.
AMXBZT
UIBU WFOEPS QBZNFOUT SFDPSEFE. BVUIPSJ[FE
BSF QSPDFTTFE CZ ) 9 A 1 9 9 9 9
QFSTPOOFM UP
BVUIPSJ[FE QFSTPOOFM DSFBUF DIFDLT.
DPNQMFUFMZ BOE
BDDVSBUFMZ.
BVUIPSJ[FE QFSTPOOFM
DPNQMFUFMZ BOE M QVSDIBTF PSEFS 9 9 A 1 9 9 9
BDDVSBUFMZ. MJOF JUFN, UIF
SFDFJWFS, BOE UIF
JOWPJDF XIFO A1
JOWPJDFT BSF
QSPDFTTFE.
LJTU PG BDSPOZNT VTFE JO UIF DIBSU: CONTROL ATTRIBUTES
C/3/ COMPONENTS 3. CA: CONTROL ACTIVITIES 6. +: KEY CONTROL
1. CE: CONTROL ENVIRONMENT 4. )/C: INFORMATION AND COMMUNICATION 7. MAN/AUT: MANUAL OR AUTOMATIC
2. 2A: RISK ASSESSMENT 5. M: MONITORING 8. 0RE/$ET: PREVENT OR DETECT
Figure 6. Continued.
2
GTAG – Appendices – 6
17 Taken from AXA Group’s Common Application Controls and Suggested Testing.
2
GTAG – Appendices – 6
Processing Controls
These controls are designed to provide reasonable assurance real-time processing systems, but are used during the
that data processing has been performed as intended without processing phases. These controls include run-to-run totals,
any omission or double-counting. Many processing controls control-total reports, and file and operator controls, such
are the same as the input controls, particularly for online or as external and internal labels, system logs of computer
operations, and limit or reasonableness tests.
Processing Controls
These controls ensure that valid input data has been processed accurately and completely.
Output Controls
These controls are designed to provide reasonable assurance input and run-to-run control totals produced during
that processing results are accurate and distributed to processing. Computer-generated change reports for master
authorized personnel only. Control totals produced as output files should be compared to original source documents to
during processing should be compared and reconciled to assure information is correct.
2
GTAG – Appendices – 6
Output Controls
These controls ensure that output is complete, accurate, and distributed appropriately.
Domain Control Possible Tests
General ledger posting • All individual and summarized • Sample of input and subledger summary
transactions posting to general transactions traced to the general
ledger. ledger.
Subledger posting • All successful transactions • Sample of input transactions
posting to subledger. traced to subledger.
2
GTAG – Appendices – 6
Appendix B: Sample Audit Program Here are the steps to achieve the above objectives:
Internal auditors should develop and record a plan for each • Step 1. Perform a risk assessment (see page 7 of
audit engagement, including objectives, scope, resource this guide).
con- siderations, and audit work program. Objectives allow • Step 2. Determine the scope of the review (see page 9
the auditor to determine whether the application controls of this guide).
are appropriately designed and operating effectively to • Step 3. Develop and communicate the detailed review
manage financial, operational, or regulatory compliance plan (see page 10 of this guide).
risks. The objectives of application controls include the • Step 4. Determine the need for specialized
following, as outlined on page two of this guide: resources (see page 10 of this guide).
• Input data is accurate, complete, authorized, and correct. • Step 5. Determine whether computer-assisted audit
• Data is processed as intended in an acceptable time period. techniques will be required (see page 13 of this
• Data stored is accurate and complete. guide).
• Outputs are accurate and complete. • Step 6. Conduct the audit (see the following sample
• A record is maintained that tracks the process of audit program). Please note that the sample pro-
data input, storage, and output. gram is not intended to cover all tests applicable to
your organization.
2
GTAG – Appendices – 6
Input controls are designed and Obtain data input procedures for handling rejected trans-
operating effectively to ensure that actions and subsequent error correction and determine
all rejected transactions have been whether personnel responsible for error correction and data
identified and reprocessed appro- reentry have been adequately trained.
priately and completely.
Verify a mechanism is in place for notifying the process owner
when transactions have been rejected or errors have occurred.
2
GTAG – Appendices – 6
Verify that files and data created for use by other applica-
tions or that are transferred to other applications are pro-
tected from unauthorized modification during the entire
transfer process.
Controls are designed and operating ef- Validate that the test data and programs are segregated
fectively to ensure that correct data files from production.
and databases are used in processing.
Processing controls are designed Obtain procedures for handling rejected transactions and
and operating effectively to ensure subsequent error correction and determine whether person-
that all rejected transactions have nel responsible for error correction and data reentry have
been identified and reprocessed in a been adequately trained.
timely manner.
Verify a mechanism is in place for notifying the process owner
when transactions have been rejected or errors have occurred.
2
GTAG – Appendices – 6
Controls are designed and operat- Verify proper approval of user account creation and modi-
ing effectively to ensure that data fication is obtained prior to granting or changing access.
backups are accurate, complete, and (Users include privileged users, employees, contractors, ven-
occur in a timely manner. dors, and temporary personnel.)
Controls are designed and operat- Verify that mechanisms are in place to store data offsite in
ing effectively to ensure that data is a secured and environmentally-controlled location.
physically stored in a secured,
offsite, environmentally-controlled
location.
2
GTAG – Appendices – 6
Output controls are designed and Obtain data output procedures and gain an understanding
operating effectively to ensure that of the review process and verify that individuals responsible
all transaction outputs are complete for data entry have been trained on the review and
and accurate. verification of data output.
Output controls are designed and Review existing data output procedures and determine wheth-
op- erating effectively to ensure that er they document which personnel receive the data output
all transaction output has been and how the data will be protected during distribution.
distribut- ed to appropriate
personnel and that sensitive and
confidential information is protected
during distribution.
Output controls are designed and Verify that an output report was created and identify that
operating effectively to ensure that the date and time on the report is the designated time.
an output report is created at the
designated time and covers the des- Identify that the report covers the designated period via
ignated period. recon- ciliation against source documents from that period.
Objective 5: A record is maintained that tracks the process of data input, storage, and output.
Controls are designed and operating Verify processing audit trails and logs exist that assure all
effectively to ensure that an audit re- cords have been processed and allow for tracing of the
trail is generated and maintained for trans- action from input to storage and output.
all transactional data.
Verify audit reports exist that track the identification and
reprocessing of rejected transactions. Reports should con-
tain a clear description of the rejected transaction, date,
and time identified.
3
GTAG – Glossary – 7
Glossary
Application controls: Application controls are specific to each Risk: The possibility of an event occurring that will have an
application and relate to the transactions and data pertaining impact on the achievement of objectives. Risk is measured
to each computer-based application system. The objectives in terms of impact and likelihood.19
of application controls are to ensure the completeness and
accuracy of records and the validity of the entries made Segregation of duties: Controls that prevent errors and
resulting from programmed processing activities. Examples of irregularities by assigning responsibility to separate
application controls include data input validation, agreement individuals for initiating transactions, recording
of batch totals, and encryption of transmitted data. transactions, and overseeing assets. Segregation of duties is
commonly used in organizations with a large number of
Data input controls: Data input controls ensure the accuracy, employees so that no single person is in a position to commit
completeness, and timeliness of data throughout its conversion fraud without detection.
after it enters a computer or application. Data can be
entered into a computer application through a manual online
input or automated batch processing.
3
GTAG – References – 8
References
• GTAG 4: Management of IT Auditing.
• GTAG 1: Information Technology Controls.
• ISACA, IS Auditing Guideline — Application
Systems Review, Document G14.
• COSO’s Internal Control over Financial Reporting
— Guidance for Smaller Public Companies.
• PCAOB, Auditing Standard No. 5,
An Audit of Internal Control Over Financial
Reporting That is Integrated with An Audit of
Financial Statements, paragraphs B29 - 30.
• IIA Standard 1220: Due Professional Care.
• IIA Standard 1210.A3.
• IIA Standard 1130.C1
• AXA Group, Common Application Controls
and Suggested Testing.
• ISACA Certified Information Systems
Auditor Glossary.
• The IIA’s International Professional Practices
Framework.
3
GTAG – About the Authors – 9
3
GTAG 8: Auditing Application Controls
Application controls are those controls that pertain to the scope of individual business processes or
application systems, such as data edits, separation of business functions, balancing of processing
totals, transaction logging, and error reporting. Effective application controls will help your
organization to ensure the integrity, accuracy, confidentiality, and completeness of your data and
systems. This guide
provides chief audit executives (CAEs) with information on application control, its relationship with general
controls, scope a risk-based application control review, the steps to conduct an application controls review,
a list of key application controls, and a sample audit plan.
We’d like your feedback! Visit the GTAG 8 page under www.theiia.org/gtags to rate this Practice Guide and
submit your comments.
What is GTAG?
Prepared by The Institute of Internal Auditors, each Global Technology Audit Guide (GTAG) is written
in straightforward business language to address a timely issue related to information technology management,
control, and security. The GTAG series serves as a ready resource for CAEs on different technology-associated
risks and recommended practices.
GTAG 1: Information Technology Controls
GTAG 2: Change and Patch Management Controls: Critical for Organizational Success
GTAG 3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment
GTAG 4: Management of IT Auditing
GTAG 5: Managing and Auditing Privacy Risks
GTAG 6: Managing and Auditing IT Vulnerabilities
GTAG 7: Information Technology Outsourcing
For more information and resources regarding technology-related audit guidance, visit
www.theiia.org/technology.
ISBN 978-0-89413-613-9
www.theiia.org
07526