0% found this document useful (0 votes)
224 views40 pages

Gtag 8 Auditing Application Controls

Uploaded by

SaiVishal Nuni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
224 views40 pages

Gtag 8 Auditing Application Controls

Uploaded by

SaiVishal Nuni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 40

IPPF – Practice Guide

Auditing
Application
Controls
Global Technology Audit Guide (GTAG) 8:
Auditing Application Controls

Authors

Christine Bellino, Jefferson Wells


Steve Hunt, Crowe Horwath
LLP

Original print date: July 2007.


Revised for consistency with the International Professional Practices Framework (IPPF) January 2009.
Copyright © 2007 by The Institute of Internal Auditors (IIA), 247 Maitland Ave., Altamonte Springs, FL 32701-4201 USA.
All rights reserved. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system,
or transmitted in any form by any means — electronic, mechanical, photocopying, recording, or otherwise — without prior written
permission from the publisher.

The IIA publishes this document for informational and educational purposes. This document is intended to provide information,
but is not a substitute for legal or accounting advice. The IIA does not provide such advice and makes no warranty as to any legal or
accounting results through its publication of this document. When legal or accounting issues arise, professional assistance should
be sought and retained.
GTAG – Table of Contents

1. Executive Summary...............................................................................................................................................................1

2. Introduction....................................................................................................................................................................2

Defining Application Controls.......................................................................................................................................2

Application Controls Versus IT General Controls........................................................................................................2

Complex Versus Non-complex IT Environments.........................................................................................................3

Benefits of Relying on Application Controls................................................................................................................3

The Role of Internal Auditors........................................................................................................................................4

3. Risk Assessment.....................................................................................................................................................................7

Assess Risk....................................................................................................................................................................7

Application Control: Risk Assessment Approach.........................................................................................................8

4. Scoping of Application Control Reviews...............................................................................................................................9

Business Process Method.......................................................................................................................................9

Single Application Method............................................................................................................................................9

Access Controls.............................................................................................................................................................9

5. Application Review Approaches and Other Considerations................................................................................................10

Planning................................................................................................................................................................10

Need for Specialized Audit Resources........................................................................................................................10

Business Process Method.....................................................................................................................................10

Documentation Techniques..................................................................................................................................12

Testing..........................................................................................................................................................................13

Computer-assisted Audit Techniques..................................................................................................................13

6. Appendices...................................................................................................................................................................18

Appendix A: Common Application Controls and Suggested Tests............................................................................18

Appendix B: Sample Audit Program............................................................................................................................21

7. Glossary................................................................................................................................................................................26

8. References....................................................................................................................................................................27

9. About the Authors................................................................................................................................................................28


GTAG – Executive Summary – 1

Over the last several years, organizations around the world However, the degree of successful risk management is directly
have spent billions of dollars upgrading or installing new dependent upon:
business application systems for different reasons, ranging • The organization’s risk appetite, or tolerance.
from tactical goals, such as year 2000 compliance, to • The thoroughness of the risk assessment related
strategic activities, such as using technology as an enabler to the application.
of company differentiation in the marketplace. An • The affected business processes.
application or application system is a type of software that • The effectiveness of general
enables users to perform tasks by employing a computer’s information technology (IT) controls.
capabilities directly. According to The Institute of • The design and ongoing extent of operating
Internal Auditors’ (IIA’s) GTAG 4: Management of IT effectiveness of the control activities.
Auditing, these types of systems can be classified as either
transactional applications or support applications. One of the most cost-effective and efficient approaches
Transactional applications process organizationwide data by: organizations use to manage these risks is through the use
• Recording the value of business of controls that are inherent or embedded (e.g., three-way
transactions in terms of debits and match on account payable invoices) into transactional and
credits. support applications as well as controls that are
• Serving as repositories for financial, configurable (e.g., accounts payable invoice tolerances).
operational, and regulatory data. These types of controls are generally referred to as
• Enabling various forms of financial and application controls
managerial reporting, including the — those controls that pertain to the scope of individual
processing business processes or application systems, including data edits,
of sales orders, customer invoices, vendor separation of business functions, balancing of processing
invoices, and journal entries. totals, transaction logging, and error reporting.2
It is also important for chief audit executives (CAEs)
Examples of transactional processing systems include and their staff to understand the difference between
SAP R/3, PeopleSoft, and Oracle Financials, which are application controls and IT general controls (ITGCs). The
often referred to as enterprise resource planning (ERP) ITGCs apply to all organizationwide system components,
systems, as well as countless other non-ERP examples. processes, and data,3 while application controls are
These systems process transactions based on programmed specific to a program or system supporting a particular
logic and, in many cases, in addition to configurable tables business process. The “Application Controls Versus IT
that store unique organizational business and processing General Controls” section of this chapter will go into
rules. greater detail about these two types of controls.
On the other hand, support applications are specialized Due to the importance of application controls to risk
software programs that facilitate business activities. Examples management strategies, CAEs and their teams need to
include e-mail programs, fax software, document imaging develop and execute audits of application controls on a
software, and design software. However, these applications periodic basis to determine if they are designed appropriately
generally do not process transactions.1 and operating effectively. Therefore, the objective of this
As with any technology that is used to support business GTAG is to provide CAEs with information on:
processes, transactional and support applications may pose 1. What application controls are and their benefits.
risks to the organization, which stem from the inherent 2. The role of internal auditors.
nature of the technology and how the system is configured, 3. How to perform a risk assessment.
managed, and used by employees. With respect to 4. Application control review scoping.
transactional processing systems, risks can have a negative 5. Application review approaches
impact on the integrity, completeness, timeliness, and and other considerations.
availability of financial or operational data if they are not
mitigated appropriately. Furthermore, the business processes To further assist CAEs or other individuals who use this
themselves will have some element of inherent risk, regardless guide, we also have included a list of common application
of the application used to support them. As a result of these controls and a sample audit plan.
application technology and business process risks, many
organizations use a mix of automated and manual controls
to manage these risks in transactional and support
applications.

1
1 GTAG 4: Management of IT Auditing, p. 5.
2 GTAG 1: Information Technology Controls, p. 3.
3 GTAG 1: Information Technology Controls, p. 3.

2
GTAG – Introduction – 2

Defining Application Controls to make sure that the data entered is consistent with the
Application controls are those controls that pertain to the associated program logic and only allows correct data to be
scope of individual business processes or application systems, saved. Otherwise, incorrect or invalid data is rejected at the
including data edits, separation of business functions, time of data entry.
balancing of processing totals, transaction logging, and Detective controls also perform as the name implies — that
error reporting. Therefore, the objective of application is, they detect errors based on a predefined program logic.
controls is to ensure that: An example of a detective control is one that discovers a
• Input data is accurate, complete, favorable or unfavorable variation between a vendor invoice
authorized, and correct. price and the purchase order price.
• Data is processed as intended in an Application controls, particularly those that are detective in
acceptable time period. nature, are also used to support manual controls used in the
• Data stored is accurate and complete. en- vironment. Most notably, the data or results of a detective
• Outputs are accurate and complete. con- trol can be used to support a monitoring control. For
• A record is maintained to track the process of instance, the detective control described in the previous
data from input to storage and to the eventual paragraph can note any purchase price variances by using a
output.4 program to list these exceptions on a report. Management’s
review of these exceptions can then be considered a
Several types of application controls exist. These include: monitoring control.
• Input Controls – These controls are used mainly
to check the integrity of data entered into a
business application, whether the data is entered Application Controls Versus IT General
directly by staff, remotely by a business partner, or
through
Controls It is important for CAEs and their staff to
understand the relationship and difference between
a Web-enabled application or interface. Data input
application controls and Information Technology General
is checked to ensure that is remains within
Controls (ITGCs). Otherwise, an application control review
specified parameters.
may not be scoped appropriately, thereby impacting the
• Processing Controls – These controls provide an
quality of the audit and its coverage.
automated means to ensure processing is complete,
ITGCs apply to all systems components, processes, and
accurate, and authorized.
data present in an organization or systems environment. 6
• Output Controls – These controls address what
The objectives of these controls are to ensure the appropriate
is done with the data and should compare output
development and implementation of applications, as well
results with the intended result by checking the
as the integrity of program and data files and of computer
output against the input.
operations.7 The most common ITGCs are:
• Integrity Controls – These controls monitor data
• Logical access controls over infrastructure,
being processed and in storage to ensure it remains
applications, and data.
consistent and correct.
• System development life cycle controls.
• Management Trail – Processing history controls,
• Program change management controls.
often referred to as an audit trail, enables
• Physical security controls over the data center.
management to identify the transactions and events
they record by tracking transactions from their source • System and data backup and recovery controls.
to their output and by tracing backward. These • Computer operation controls.
controls also monitor the effectiveness of other
controls and identify errors as close as possible Because application controls relate to the transactions
to their sources.5 and data pertaining to each computer-based application
system, they are specific to each individual application. The
objectives of application controls are to ensure the
Additional application control components include
completeness and accuracy of records, as well as the
wheth- er they are preventive or detective. Although both
validity of the entries made to each record, as the result
control types operate within an application based on
of program processing.8 In other words, application
programmed or configurable system logic, preventive controls
controls are specific to a given application, whereas ITGCs
perform as the name implies — that is, they prevent an error
are not. Common application control activities include:
from occur- ring within an application. An example of a
preventive con- trol is an input data validation routine. • Determining whether sales orders are processed
The routine checks

4, 5 GTAG 1: Information Technology Controls, p. 8.


6 GTAG 1: Information Technology Controls, p. 3

3
7,8 ISACA, IS Auditing Guideline – Application Systems Review, Document G14, p. 3.

4
GTAG – Introduction – 2

within the parameters of customer credit limits.


• Lack of IT development projects.10
• Making sure goods and services are only procured
As these differences point out, there is a direct
with an approved purchase order.
correlation between the complexity of transactional and
• Monitoring for segregation of duties based
support applications and the availability, use, and reliance on
on defined job responsibilities.
inherent and configurable application controls. In other
• Identifying that received goods are words, a less complex IT infrastructure may not offer as
accrued upon receipt.
many inherent or configurable application controls for risk
• Ensuring fixed-asset depreciation is recorded management. Hence, the degree of transactional and
accurately in the appropriate accounting support application complexity will drive the scoping,
period. implementation, level of effort, and knowledge required to
• Determining whether there is a three-way execute an application control review, as well as the
match among the purchase order, degree to which internal auditors can assist in a
receiver, and vendor invoice. consulting capacity.
In addition, it is important for CAEs to note the degree
to which management can rely on application controls for
Benefits of Relying on Application Controls
risk management. This reliance depends directly on the
Relying on application controls can yield multiple benefits.
design and operating effectiveness of the ITGCs. In other
Following is a description of key benefits.
words, if these controls are not implemented or operating
effectively, the organization may not be able to rely on its
Reliability
application controls to manage risk. For example, if the
Application controls are more reliable than manual controls
ITGCs that monitor program changes are not effective, then
when evaluating the potential for control errors due to human
unauthorized, unapproved, and untested program changes can
intervention. Once an application control is established,
be introduced to the production environment, thereby
and there is little change to the application, database, or
compromising the overall integrity of the application
supporting technology, the organization can rely on the
controls.
application control until a change occurs.
Furthermore, an application control will continue to
operate effectively if the ITGCs that have a direct impact
Complex Versus Non-complex IT on its programmatic nature are operating effectively as
Environments well. This is particularly true of controls pertaining to
The sophistication or complexity of an organization’s IT
program changes and segregation of duties for IT
environment has a direct effect on the overall risk profile and
administrators. As a result, the auditor will be able to test
related management strategies available. Organizations that
the control once and not multiple times during the testing
have a more complex IT infrastructure are marked by the
period.
following characteristics:
• Changes to existing applications, databases,
Benchmarking
and systems.
Appendix B of the U.S. Public Company Accounting
• The creation of source code for critical in-house
Oversight Board’s (PCAOB) Auditing Standard No. 5, An
developed software.
Audit of Internal Control Over Financial Reporting That
• Customized pre-packaged software that is adapted to
is Integrated with An Audit of Financial Statements, states
the organization’s processing needs.
that benchmarking of application controls can be used
• Deployment of pre-packaged applications,
because these controls are generally not subject to
changes, and code into production.9
breakdowns due to human failure. If general controls that
are used to monitor program changes, access to programs, and
On the other hand, organizations that have a less complex
computer operations are effective and continue to be tested on
IT environment are marked by the following
a regular basis, the auditor can conclude that the application
characteristics:
control is effective without having to repeat the previous
• Few changes to the existing IT environment. year’s control test. This is especially true if the auditor
• Implementation of a pre-packaged financial verifies that the application control has not changed since
application with no significant modifications that the auditor last tested the application control.11
is completed in the current year.
• User-configurable options that do not significantly
alter the application’s functioning.

9 The Committee of Sponsoring Organizations of the Treadway Commission’s (COSO’s), Internal Control over Financial Reporting —
Guidance for Smaller Public Companies, Vol. III, p. 61.

5
10 COSO’s, Internal Control over Financial Reporting — Guidance for Smaller Public Companies, Vol. III, p. 56.
11 PCAOB, Auditing Standard No. 5, An Audit of Internal Control Over Financial Reporting That is Integrated with An Audit of Financial Statements, paragraph B29.

6
GTAG – Introduction – 2

In addition, the nature and extent of the evidence the


• Are ITGCs operating effectively, including logical
auditor should obtain to verify the control has not changed
access, change management, systems development,
may vary, based on circumstances such as the strength of
acquisition, and computer operation controls?
the organization’s program change controls. 12 As a result,
• Can the auditor gain a complete understanding of
when using a benchmarking strategy for a particular
the effects of changes, if any, on the applications,
control, the auditor should consider the effect of related files,
databases, or supporting technology that contain
tables, data, and parameters on the application control’s
the application controls?
functionality. For example, an application that calculates
• Were changes implemented to the business process
interest income might depend on the continued integrity of
relying on the application control that could impact
a rate table that is used by the automated calculation.13
the design of the control or its effectiveness?
The auditor should evaluate the appropriate use of
benchmarking of an automated control by considering how
Time and Cost Savings
frequently the application changes. Therefore, as the
Application controls typically take less time to test than
frequency of code change increases, the opportunity to rely
manual controls. This is because sample sizes for manual
on an application control’s benchmarking strategy decreases.
controls are tied to the frequency with which the controls
Additionally, the auditor should evaluate the reliability of
are performed (e.g., daily, weekly, monthly, quarterly, or
the information regarding the changes made to the system.
annually), while the sample size of the application controls
Hence, if there is little to no verifiable information or
often does not depend on the frequency of the control’s
reports available for the changes made to the application,
performance (i.e., application controls are either operating
database, or supporting technology, the application control is
effectively or not). In addition, application controls are
less likely to qualify for benchmarking.
typically tested one time, as long as the ITGCs are effective.
However, benchmarking is particularly effective when
As a result, all of these factors can potentially accumulate to
companies use pre-packaged software that doesn’t allow for a significant savings in the number of hours required to test
any source code development or modification. In cases like
an application control versus a manual control.
these, the organization needs to consider more than just
the code change. An application control within a complex
application, such as SAP or Oracle Financials, can be
The Role of Internal Auditors
changed, disabled, or enabled easily without any code
Knowledge
change.
Today, organizations are relying more on application controls
Finally, parameter changes and configuration changes
than in the past to manage risk due to their inherent
have a significant impact on most application controls. For
efficient nature, cost effectiveness, and reliability.
example, tolerance levels can be manipulated easily to disable
Traditionally, any kind of technology-related control was
tolerance-level controls, and purchase approval controls
tested by an experienced IT auditor, while financial,
can be manipulated when their release strategy is modified
operational, or regulatory controls were tested by a non-IT
— once again, without requiring any code changes.
auditor. Although the demand for IT auditors has grown
Organizations need to evaluate each application control
substantially in the past few years and shows no signs of
to determine how long benchmarking can be effective. Once
subsiding, all internal auditors need to be able to evaluate
the benchmark is no longer effective, it is important to re-
all business process controls from end-to-end.
establish the baseline by re-testing the application control.
In addition, according to The IIA’s International Standards
Auditors should ask the following questions when identifying
for the Professional Practice of Internal Auditing (Standards) —
if the application control is still operating effectively and as
specifically Standards 1220 and 1210.A3 — internal
originally benchmarked:
auditors need to apply the care and skill of a reasonably
• Have there been changes in the risk level associated
prudent and competent auditor14, as well as have the
with the business process and the application control
necessary knowledge of key IT risks, controls, and audit
from when it was originally benchmarked (i.e., does
techniques to perform their assigned work, although not
the business process provide substantially greater
all internal auditors are expected to have the expertise of an
risk to financial, operational, or regulatory
auditor whose primary responsibility is IT auditing.15 In
compliance than when the application control was
other words, every internal auditor needs to be aware of
originally benchmarked)?
IT risks and controls and be

12 PCAOB, Auditing Standard No. 5, An Audit of Internal Control Over Financial Reporting That is Integrated with An Audit of Financial Statements, paragraph B29.
13 PCAOB, Auditing Standard No. 5, An Audit of Internal Control Over Financial Reporting That is Integrated with An Audit of Financial Statements, paragraphs B29 - 30.
14 IIA Standard 1220: Due Professional Care.
15 IIA Standard 1210.A3.

7
GTAG – Introduction – 2

proficient enough to determine if implemented application


For internal auditors to provide this service, as well as
controls are appropriately designed and operating effectively
the others listed below, they need to have sufficient
to manage financial, operational, or regulatory compliance
knowledge of the application under development. The
risks.
number and type of auditors who need such knowledge
depends on the application under development, the
Consultant or Assurance implementation’s scope in terms of impacted business
Other than traditional assurance services, one of the processes, the organization’s size, and the number of
greatest opportunities for the internal audit activity to auditable entities or areas once the application has been
add value to an organization is through consultative fully deployed across the organization. CAEs can take
engagements, which can take on many forms and cover different avenues to ensure sufficient knowledge is
any part or business function. One example of a consultative obtained, including the use of books, online courses,
engagement is assisting organization personnel with the classroom training, and external consultants.
design of controls during the implementation or upgrade of
transactional or support applications.
Design of Controls
Unfortunately, many internal auditors do not assist
Another valuable service internal auditors can provide
management with understanding how risks will change when
during a new system implementation or significant upgrade
the organization implements a new transactional or support
is an extension of the independent risk assessment. More
application or conducts a major upgrade. In almost all
specifically, auditors can assist management with the design
cases, this lack of involvement is not due to a lack of desire
of controls to mitigate the risks identified during the risk
or focus, but to the fact that internal auditors are not
assessment. The internal auditors assigned to this activity
aware of any system development activity, or management
should be a part of the implementation team, not an
does not want them involved.
adjunct. Therefore, the tasks, time, and number of
No matter what the reason is, it is the responsibility of internal audit resources required for the design of application
the CAE to ensure internal auditors are aware of such controls need to be built into the overall project plan.
activities and to properly position the value, knowledge,
It is important that CAEs assign the appropriate number
and expertise of internal auditors in providing risk
of auditors, as well as auditors with the necessary skills and
management services. Also, it is important for internal
experience to perform the task. In many cases, auditors may
auditors to be involved in these kinds of system
be assigned to work on the project on a full-time basis. If
development activities to help manage the risk the
that is the case, CAEs should assign current duties of the
application presents, as well as make sure inherent and
personnel chosen to work on the project to other internal
configurable controls are operating effectively prior to the
auditors in the department so that the auditors assigned to
application’s live stage. Otherwise, it will be much more
the project can focus on the task. Furthermore, internal
costly to conduct a review after the fact, find weaknesses,
auditors working on the project should report to the project
and retrofit controls. Below are examples of how internal
manager during the system’s implementation life cycle.
auditors can provide value during system development efforts
In the event that auditors are assigned to assist management
with a focus on application controls from a consultative
in the design of application controls, CAEs should note that
perspective.
independence and objectivity may be impaired if assurance
services are provided within one year after a formal consulting
Independent Risk Assessment engagement. In addition, steps should be taken to minimize
Any time a new or significantly upgraded transactional or the effects of impairment by: assigning different auditors
support application is implemented, two things can happen. to perform each of the services, establishing independent
First, many of the automated or manual controls that were management and supervision of the auditors, defining
in place to manage risk within the legacy environment will separate accountability for project results, and disclosing
need to be replaced with new controls. Second, the presumed auditor impairment. Finally, management
application’s risk profile might change. In other words, the should be responsible for accepting and implementing
new application will bring about new inherent risks (i.e., in the recommendations.16 In other words, if an internal auditor is
form of how the application is configured) and risks that involved in the design of controls related to a transactional or
cannot be mitigated within the application itself, thus support application, he or she should not be involved in the
requiring the use of manual controls. As a result, internal evaluation of the controls’ operating effectiveness within
auditors can assist — if not lead the first 12 months of the consulting engagement’s
— the organization’s efforts to understand how current completion.
risks will change with the advent of the new application.
This is because internal auditors are skilled at providing
this level of service and are uniquely positioned to do so
due to their independence from management.

8
16 IIA Standard 1130.C1

9
GTAG – Introduction – 2

Education
The educational value internal auditors can provide to the
organization is not limited to application controls. Another
key opportunity for internal auditors to provide value to
the organization is through controls education. From an
application control perspective, internal auditors can educate
management on:
• How the risk profile will change once the new
application is brought online.
• Known inherent control weaknesses in
the applications under development.
• Prospective solutions to mitigate
identified weaknesses.
• The various services auditors can provide to
management as part of the system’s development
efforts.

Controls Testing
If the implementation team has designed and deployed
controls based on the risk assessment, or without the
benefit of one, internal auditors can provide value by
independently testing the application controls. This test
should determine if the controls are designed adequately
and will operate effectively once the application is
deployed. If any of the controls are designed
inadequately or do not operate effectively, auditors should
present this information along with any recommendations
to management to prevent the presence of unmanaged
risks when the application is deployed fully.

Application Reviews
Transactional and support applications require control
reviews from time to time based on their significance to the
overall control environment. The frequency, scope, and
depth of these reviews should vary based on the
application’s type and impact on financial reporting,
regulatory compliance, or operational requirements, and
the organization’s reliance on the controls within the
application for risk management purposes.

1
GTAG – Risk Assessment – 3

Assess Risk
The auditor should use risk assessment techniques to identify 2. Which business processes are impacted by
critical vulnerabilities pertaining to the organization’s these risks?
reporting, and operational and compliance requirements 3. Which systems are used to perform these processes?
when developing the risk assessment review plan. These 4. Where are processes performed?
techniques include:
• The review’s nature, timing, and extent.
When identifying risks, auditors may find it useful to
• The critical business functions employ a top-down risk assessment to determine which
supported by application controls. applications to include as part of the control review and
• The extent of time and resources to be what tests need to be performed. For instance, Figure 1
expended on the review. outlines an effective methodology for identifying financial
reporting risks and the scope of the review. Please note this
In addition, auditors should ask four key questions when illustration does not represent the only way to conduct all
determining the review’s appropriate scope: types of risk assessment.
1. What are the biggest organizationwide risks and
main audit committee concerns that need to be
assessed and managed while taking management
views into account?

10-K
Financial Statements

Financial Statement Assertions

FS Accounts Mapped to Processes; Processes Mapped to Business Units Non-financial Disclosures Mapped to Processes

Revenue and Receivables


Purchases
Management
and Payables
and Financial Reporting / Accounting
Payroll and Benefits
Treasury Legal Compliance Manufacturing

BU1 BU2 Corporate BU1 BU2 Corporate Corporate


BU3 BU3

Investor Relations Environmental

Risk Identification and Analysis

Risk Assessment Documents


Risk Analysis Matrix by Financial Statement Account and Disclosure. Define Risk
Prepare
Account Risk Analysis Mapped to Business and Critical Risk
Applications Assessment for
and Underlying Technology.
Control Application
Matrices Controls
(Manual and

Figure 1. Financial statement risk analysis approach. See Risk Assessment Approach in the following section.

1
GTAG – Risk Assessment – 3

Application Control: • Weigh all risk factors to determine which risks


Risk Assessment Approach need to be weighed more heavily than others.
To add value to organizationwide application control risk • Determine the right scale for ranking each
assessment activities, internal auditors: application control risk by considering
• Define the universe of applications, databases, and qualitative and quantitative scales, such as:
supporting technology that use application controls, - Low, medium, or high control risk.
as well as summarize the risk and controls using the - Numeric scales based on qualitative
risk and control matrices documented during the information (e.g., 1 = low-impact risk, 5 =
risk assessment process. high-impact risk, 1 = strong control, and 5 =
• Define the risk factors associated with inadequate control).
each application control, including: - Numeric scales based on quantitative
- Primary (i.e., key) application controls. information (e.g., 1 = < US $50,000
- The design effectiveness of the application and 5 = > US $1,000,000).
controls. • Conduct the risk assessment and rank all risk areas.
- Pre-packaged or developed applications or • Evaluate risk assessment results.
databases. Unconfigured pre-packaged or • Create a risk review plan that is based on the
developed applications as opposed to highly risk assessment and ranked risk areas.
configured in-house or purchased applications.
- Whether the application supports more Figure 2 shows an example of an application control risk
than one critical business process. assessment that uses a qualitative ranking scale (1 = low
- The classification of data processed by impact or risk and 5 = high impact or risk). Composite scores
the application (e.g., financial, private, for each application are calculated by multiplying each risk
or confidential). factor and its weight in the application and adding the
- Frequency of changes to the totals. For example, the composite score of 375 on the
applications or databases. first line is computed by multiplying the risk factor rating
- Complexity of changes (e.g., table changes times the specific application rating [(20 x 5) + (10 x 1) +
versus code changes). (10 x 5 )
- Financial impact of the application controls. +…]. For this example, the auditor may determine that
- Effectiveness of ITGCs residing within the the application control review will include all applications
application (e.g., change management, logical with a score of 200 or greater.
security, and operational controls).
- The controls’ audit history.

Risk Factor Weighting


20 10 10 10 10 10 15 15
Application Application Design Pre-packaged Application Frequency of Complexity Financial Effectiveness Composite
Contains Effectiveness or Developed Supports Change of Change Impact of the ITGCs Score
Primary of the App More Than
Controls Controls One Critical
Business
Process
APPA 5 1 5 5 3 3 5 2 375
APPB 1 1 2 1 1 1 4 2 170
APPC 5 2 2 1 5 5 5 2 245
APPD 5 3 5 1 5 5 5 2 395
APPE 5 1 1 1 1 1 3 2 225
Figure 2. Example of an application control risk assessment.

1
GTAG – Scoping of Application Control Reviews – 4

Following are two methods for determining the review


However, in an ERP or integrated environment, this
scope of application controls. Internal auditors should
method is not desirable. Although it may appear to be
keep in mind that the review’s scope, depth, approach, and
fairly easy to draw a box around the module of an ERP or
frequency depends on the results of the risk assessment and
integrated transactional system, the reality is that this
the availability of internal audit resources. No matter what
activity can be quite difficult. This is because there can be
scoping method is chosen, the review needs to cover an
multiple data feeds into and out of any given module, and
evaluation of data input controls, processing controls, and
attempting to identify them could prove to be an exercise in
output controls.
futility. Therefore, using the module approach is likely to lead
to an inadequate review; using the business process method
is a more effective scoping method in an ERP or integrated
Business Process Method environment.
The business process scoping method is a top-down
review approach used to evaluate the application controls
present in all the systems that support a particular business Access Controls
process. Over the past several years, this method has grown in
No matter what method is chosen to scope the review of
importance as the most common and widely accepted scoping
application controls, the module’s or application’s logi-
methodology. This is primarily due to an increase in ERP
cal access controls need to be reviewed periodically. In
transactional application use and a reduction in stand-
most cases, the user and administrative access rights (e.g.,
alone, “best of breed” applications.
read, write, and delete) are built using the inherent security
When using the business process method in the non-ERP
platform and tools within the application. The strategies
world, internal auditors should include within the review’s
employed to determine which logical access rights will be
scope all of the applications used by the company that are
assigned to users vary from a need-to-know basis to a need-to-
involved in the business process under review because they
withhold basis. Regardless, the access rights should be
are generally stand-alone systems. In other words, the auditor
grant- ed based on the user’s job function and
needs to include within the review’s scope the separate
responsibilities.
applications that make up the different components of the
How logical access rights are created vary from package
business process cycle. The auditor can then identify the
to package. In some cases, the logical access rights are
inbound and outbound interfaces within the application
granted based on a transaction code or a screen name or
under review and complete the scoping activity.
number, while others, such as SAP R/3, use more complex
Using the business process method to scope the review of object- based security protocols. When a review of an
application controls is different with integrated application’s logical access controls is performed, it is
applications such as an ERP system because business important to ensure that the general application security
processes cut across multiple modules. For example, controls are reviewed as well, including:
consider the procurement to payment business process. In
• The length of the user name or user identification.
an ERP environment, this process generally consists of the
• The password’s length.
procurement, inventory management, general ledger, and
• Password character combinations.
accounts payable modules or subapplications within the
• Password aging (e.g., users must change their
ERP system. Therefore, it is important to have a thorough
password every 90 days).
understanding of the modules that comprise the business
• Password rotation (e.g., users cannot use any of
process and how the data is managed and flows from one
their last five passwords).
module to the other.
• User account lockout after a certain number of
unsuccessful login attempts.
• Session timeout (e.g., the application automatically
Single Application Method logs out a user if the user has not interacted with
The single application scoping method is used when the
the application within 15 minutes).
auditor wants to review the application controls within a
single application or module, as opposed to taking a
The latest generation of applications are often created with
business process scoping approach. As discussed earlier, this
parameters that can be configured by management, such as
is the most effective scoping method in a non-ERP or non-
the ones above. In some cases, however, management may
integrated environment because the auditor can more easily
forget to activate the parameter(s), or the settings used for
“draw a box” around the application (i.e., include the
each parameter may not be representative of best practice
application within scope). In other words, the auditor can
standards. For example, the password aging parameter could
identify the inbound data inputs and outputs because data
be configured to require a password change every 90 days. In
and related processing rules are contained and used only for
addition, auditors should review administrative access rights
one application.
in development and testing environments periodically.

1
GTAG – Application Review Approaches and
Other Considerations – 5

Once the review is scoped appropriately, the next task is to this,


determine how it will be executed. Besides the standard audit
methodology chosen, the following are recommendations
that can help auditors execute a properly scoped
application controls review.

Planning
After completing the risk evaluation and determining
the scope of the review, auditors need to focus on the
development and communication of the detailed review
plan. The first step in developing the detailed review plan
is to create a planning memorandum that lists the following
application control review components:
• All review procedures to be performed.
• Any computer-assisted tools and
techniques used and how they are used.
• Sample sizes, if applicable.
• Review items to be selected.
• Timing of the review.

When preparing the memorandum, all of the required


internal audit resources need to be included on the
planning team. This is also the time when IT specialists
need to be identified and included as part of the planning
process.
After completing the planning memorandum, the auditor
needs to prepare a detailed review program. (Refer to
Appendix B page 21, for a sample audit program.) When
preparing the review program, a meeting should be held with
management to discuss:
• Management’s concerns regarding risks.
• Previously reported issues.
• Internal auditing’s risk and control assessment.
• A summary of the review’s methodology.
• The review’s scope.
• How concerns will be communicated.
• Which managers will be working on the review team.
• Any preliminary information needed (e.g., reports).
• The length of the review.

Besides completing a summary of the risk assessment


phase, an important part of this meeting is to obtain
management support. Although discussions should be held
at the beginning of the review’s planning phase, key
business processes, risks, and controls should be discussed
throughout the review to ensure management is in
agreement with the planned scope.
Management should be informed of any known concerns,
specifically, any issues identified during the risk assessment
or planning phase — even if these issues have not been
substantiated. Discussions should be held to ensure
management concurs with all identified risks and controls.
By doing so, the team can influence management to take
corrective action immediately and encourage the appropriate
risk-conscious behavior throughout the company. To do

1
auditors can send a letter to management announcing the
review. This letter should include:
• The review’s expected start date.
• The review’s timeframe.
• The key business areas under review.

Need for Specialized Audit Resources


The internal auditor should evaluate the review’s scope
and identify whether an IT auditor will be required to
perform some of the review. Adding an IT auditor to
the review team, however, does not relieve the auditor
from having to assess the adequacy of IT controls. The IT
auditor will simply assess the organization’s reliance on
IT to determine the integrity of the data and the
accuracy, completeness, and authorization of
transactions. Another factor IT auditors could review is
the number of transactions processed by the application.
Special tools may be required to assess and report on the
effectiveness of application controls. The information
collected by the IT auditors, along with the knowledge
of the internal auditor, will assist in determining if
specialized resources are required.
An example of when specialized resources are
required involves a segregation of duties review during
the instal- lation of an Oracle eBusiness Suite
application for a large manufacturing company. The
complexity of the roles and functions contained within
the application and database require the use of
personnel with knowledge of the con- figuration
capabilities of the Oracle application. Addi- tional
staff who know how to mine data from the Oracle
application and database to facilitate the review may be
needed. Furthermore, the review team may need a
specialist who is familiar with a specific computer-assisted
audit tool to facilitate data extraction and analysis.

Business Process Method


In the previous chapter, the business process method
was identified as being the most widely used for
application control review scoping. In today’s world,
many transactional applications are integrated into an
ERP system. Because business transactions that flow
through these ERP systems can touch several modules
along their life cycle, the best way to perform the
review is to use a business process or cycle approach
(i.e., identifying the transactions that either create,
change, or delete data within a business process and, at
a minimum, testing the associated input, processing,
and output application controls). The best way to
approach the review is to break down the business
processes using the four- level model shown in Figure
3:
• Mega Process (Level 1): This refers to the
complete end-to-end process, such as procure-to-pay.
• Major Process (Level 2): This refers to the
major components of the end-to-end
process, such as procurement, receiving, and
payment of goods.

1
GTAG – Application Review Approaches and
Other Considerations – 5

• Minor, or Subprocess (Level 3): This level lists


Mega Process (Level 1): Procure-to-pay
the minor, or subprocess, components of each of
the major processes, such as requisitioning and Major Process Subprocess Activity (Level 4)
purchase order creation. (Level 2) (Level 3)
• Activity (Level 4): This final level lists the Procurement Requisition Create, change, and delete
system transactions that result in the processing
creation, Purchase order Create, change, delete,
change, or deletion of data for each of the minor, or processing approval, and release
subprocess components. Receiving Goods receipt Create, change, and delete
processing
Taking a business-centric view of application controls is Goods return Create, change, and delete
essential to ensure that the review is comprehensive and processing
meaningful to the organization. From this point forward, Accounts Vendor Create, change, and delete
the review can be executed as a single engagement or as Payable management
part of an integrated review.
Invoice Create, change, and delete
processing
Credit memo Create, change, and delete
processing
Process Create, change, and delete
payments
Void payments Create, change, and delete

Figure 3. Breakdown of a business process.

Procure to Pay Process

START
C1
Resolve Issue With PR
Requisition

1. Enter Purchase Requisition Details (PR) Details

C3

No, notify
Procurement
C4C5

4. Convert PR into Purchase


5. Send Order
Yes 3. PurchaseNotify Requisition (PO)
2. Approve PR? PO to Supplier
Bu

C2
C6

6. Receive Goods
Receivi

C7 Against PO C8

7. Vendor C9 8. Enter invoice in AP application by matching to POC10


Invoice Received and
C12C13
Receiver
Accou

9. Vendor Payment END


nts

C14 C11

Triangles represent each control in the process. The number of each control ties to the activity represented on the Risk and Controls Matrix.
Figure 4. A flowchart of a procure-to-pay process.

1
GTAG – Application Review Approaches and
Other Considerations – 5

Documentation Techniques requisition has been created, the buyer will review
In addition to the documentation standards used by the purchase requisition for its appropriateness,
internal auditors, the following are suggested approaches for completeness, and accuracy. Components of the
documenting each application control. purchase requisition that are reviewed include,
but are not limited to, the vendor, item, quantity,
Flowcharts and account coding. If the review does not reveal
Flowcharts are one of the most effective techniques used any errors, the buyer will approve the purchase
to capture the flow of transactions and their associated requisition. If the buyer rejects the purchase
application and manual controls used within an end-to-end requisition for any reason, the requisitioner will
business process, because they illustrate transaction flows. be notified. Finally, if issues with the original
Figure 4 shows an example of a flowchart for a procure-to- requisition are resolved as required, the buyer
pay process. Due to the difficulty of fitting the actual control will approve the requisition.
descriptions on the flowchart, it is prudent to instead ii) All purchase requisitions are reviewed on
simply number the controls on the flowchart and have a a monthly basis to detect any
separate document, such as a risk and controls matrix (see unauthorized requisitions as well as any
Figure 6, pages 14–17), that contains the control excessive order quantities (Controls C2
descriptions and associated information. However, and C3).
flowcharts may not be practical all of the time, and a
process narrative is sometimes more appropriate. This
b) Purchase Order Processing
typically happens when an auditor is documenting the
i) Once the purchase requisition has been
areas or work performed within the IT environment. In
approved by the buyer, he or she will create a
many cases, the work performed by IT and the related
purchase order referencing the requisition in
application controls do not flow in a linear manner as do
the procurement application (Control C4).
business processes such as procure-to-pay.
The buyer will then forward a copy of the
purchase order to the supplier.
Process Narratives ii) All purchase orders are reviewed on a monthly
Process narratives are another technique available to basis to detect any unauthorized purchase orders
document business process transaction flows with their as well as any excessive order quantities
associated applications, as shown in Figure 5. These (Controls C5 and C6).
narratives are best used as a documentation tool for relatively
non-complex business processes and IT environments. 2) Receiving
This is because the more complex the business process
a) All goods are received at the shipping and
is, the more difficult it is to create a process narrative receiving dock. A warehouse employee will review
that reflects the process’ true nature adequately and
the packing slip, make note of the purchase order
accurately. Therefore, when relatively complex business number, and count the items that are physically
processes are documented, auditors should create
received. The warehouse employee then logs onto
a flowchart with a corresponding process narrative the procurement application and enters the
that numbers the controls on the process narrative.
number of items received against the appropriate
Auditors also should create a separate document, such as a line item number on the purchase order.
risk and controls matrix.
b) The appropriate member of the accounting
department reviews and reconciles the inventory
Narrative Procure-to-pay general ledger account on a monthly basis to
Primary Contact(s) determine the goods that have been received,
but not invoiced by the vendor (Control C7).
Key Components C1, C2, C3, C4, C5, C6, C7, C8, C9, c) The appropriate buyer from the purchasing
C10, C11, C12, C13, and C14.
department reviews all unmatched purchase order
Figure 5. Risk and control matrix. reports on a monthly basis (Control C8).
The following is an example process narrative that covers the
3) Accounts Payable
procure-to-pay process.
a) The accounts payable department receives invoices
from the various suppliers on a daily basis. These
1) Procurement
invoices are sorted and assigned to each accounts
a) Requisitioning
payable clerk, based on the vendor’s name. Each
i) When employees need to buy goods or services,
clerk is required to stamp each invoice with the date
they will create a purchase requisition in the
it was received by the accounts payable department.
procurement application (Control C1). Once the
Each accounts payable clerk then matches the
1
GTAG – Application Review Approaches and
Other Considerations – 5

invoice quantities and prices to the purchase order


An example of a system configuration test includes
and receiver and enters the invoice in the
reviewing the three-way match system parameters of the
accounts payable application (Controls C9 and
tested system by tracing through one transaction. Another
C14).
example of a system configuration review is to query the
b) The accounts payable application automatically gener-
underlying programming code of the application report
ates requests for payments based on the vendor
generation process for appropriate logic. Additionally, the
payment terms, and an accounts payable check run is
auditor should observe a rerun of the query to compare the
processed every Wednesday (Controls C10, C12,
report to the one that management generated.
and C13).
The auditor could test edit checks for key fields, which
c) At month-end, the accounts payable manager
can be verified by stratifying or classifying transactions on
compares the accounts payable system’s sub-ledger
the field values. In addition, by using audit software, it
total to the general ledger control total. Any
might be easy to recalculate and verify calculations made by
differences noted are then corrected (Control C11).
the system. For example, if the system uses the quantity and
unit price fields to calculate the total cost, the auditor could
Risk and control matrices should capture all relevant use audit software to perform the same calculation and
information pertaining to a given business process. In identify any transactions where his or her calculated values
addition, each of the control activities should be numbered, differ from those of the application.
and this number should be linked back to the flowcharts or
Finally, auditors can perform reasonableness checks to
process narratives. Important control activity information
examine possible value data ranges for key fields. For
that needs to be captured in the matrix includes:
example, by calculating the current age based on the
• Identified risks. date of birth field, auditors can identify ages, including
• Control objectives. negative values and values over 100 that fall outside of
• Control activities. expected ranges.
• Control attributes such as control type
(e.g., automated or manual) and
frequency (e.g., daily, weekly, monthly, Computer-assisted Audit Techniques Computer-
quarterly, annually, etc.).
assisted audit techniques (CAATs) make use of computer
• Testing information.
applications, such as ACL, IDEA, VIRSA, SAS, SQL,
Excel, Crystal Reports, Business Objects, Access, and
Word, to automate and facilitate the audit process. The use
Testing of CAATs helps to ensure that appropriate coverage is in
The auditor should assess if application controls are working place for an application control review, particularly when
or if they are being circumvented by creative users or there are thousands, or perhaps millions, of transactions
management override. Substantive testing on the efficacy of occurring during a test period. In these situations, it would be
controls is needed rather than a review of control settings. impossible to obtain adequate information in a format that
Auditors should also identify the effectiveness of ITGCs and can be reviewed without the use of an automated tool.
consider if application- generated change control logs, security Because CAATs provide the ability to analyze large volumes
logs, and administration logs need to be reviewed by the of data, a well-designed audit supported by CAAT testing
audit team. can perform a complete review of all transactions and
The auditor may test application controls using several uncover abnormalities (e.g., duplicate vendors or
methods that are based on the type of application control. transactions) or a set of predetermined control issues (e.g.,
Depending on the nature, timing, and extent of testing, a segregation of duty conflicts).
specific control or report could be tested by:
• Inspection of system configurations.
• Inspection of user acceptance testing, if
conducted in the current year.
• Inspection or re-performance of reconciliations
with supporting details.
• Re-performance of the control activity using
system data.
• Inspection of user access listings.
• Re-performance of the control activity in a test
environment (using the same programmed
procedures as production) with robust testing scripts.

1
GTAG – Application Review Approaches and
Other Considerations – 5

3JTL BOE $POUSPM MBUSJY: 1SPDVSF-UP-1BZ


B64*/&44 130$&44 & $0/530L $040 $0/530L $0/530L
$0/530L 0B+&$5*7&4 3*4K4 A$5*7*5*&4 $0M10/&/54 A553*B65&4 $LA44*F*$A5*0/ 5&45*/(

&GGFDUJWFOFT
0QFSBUJPOBM
FSFRVFODZ
0CjFDUJWFT

LJLFMJIPPE

MBO⁄AVUP

3FDPSEFE

$MBTTJGJFE
ADUJWJUJFT
/VNCFS

1SF⁄%FU
*NQBDU⁄
$POUSPM

$POUSPM

K (:⁄/)

3FTVMUT
1PTUFE
7BMVFE
5JNFMZ

/PUFT
(:⁄/)
3JTLT

5FTU
3FBM
*⁄$
3A
$&

$A

T
MBjPS: 1SPDVSFNFOU
4VC: 1VSDIBTF 3FRVJTJUJPO 1SPDFTTJOH
ADUJWJUZ: $SFBUF
$l $POUSPMT QSPWJEF %VF UP UIF MBDL $POUSPMT BSF TVDI
SFBTPOBCMF PG BQQSPQSJBUF UIBU BDDFTT JT
BTTVSBODF TFHSFHBUJPO PG EVUJFT, HSBOUFE POMZ UP
UIBU QVSDIBTF B VTFS JT BCMF UP UIPTF JOEJWJEVBMT
SFRVJTJUJPOT DSFBUF, BQQSPWF (J.F., XJUI B CVTJOFTT

AMXBZT
BSF DSFBUFE SFMFBTF), BTTJHO, BOE QVSQPTF GPS
CZ BVUIPSJ[FE DPOWFSU B QVSDIBTF ) DSFBUJOH QVSDIBTF 9 A 1 9 9 9 9 9
QFSTPOOFM SFRVJTJUJPO, SFTVMUJOH SFRVJTJUJPOT.
DPNQMFUFMZ BOE JO UIF JOBQQSPQSJBUF
BDDVSBUFMZ. SFXBSEJOH PG
CVTJOFTT UP TVQQMJFST,
PWFSQBZNFOUT, BOE
FYDFTTJWF JOWFOUPSZ
MFWFMT.

$h $POUSPMT QSPWJEF %VF UP UIF MBDL 1VSDIBTF


SFBTPOBCMF PG BQQSPQSJBUF SFRVJTJUJPOT BSF
BTTVSBODF TFHSFHBUJPO PG EVUJFT, SFWJFXFE PO B
UIBU QVSDIBTF B VTFS JT BCMF UP NPOUIMZ CBTJT
SFRVJTJUJPOT DSFBUF, BQQSPWF (J.F., UP EFUFDU BOZ

MPOUIMZ
BSF DSFBUFE SFMFBTF), BTTJHO, BOE VOBVUIPSJ[FE
CZ BVUIPSJ[FE DPOWFSU B QVSDIBTF ) QVSDIBTF 9 9 9 M % 9 9 9 9 9
QFSTPOOFM SFRVJTJUJPO, SFTVMUJOH SFRVJTJUJPOT.
DPNQMFUFMZ BOE JO UIF JOBQQSPQSJBUF
BDDVSBUFMZ. SFXBSEJOH PG
CVTJOFTT UP TVQQMJFST,
PWFSQBZNFOUT, BOE
FYDFTTJWF JOWFOUPSZ
MFWFMT.

$l $POUSPMT QSPWJEF 6OBVUIPSJ[FE PS $POUSPMT BSF TVDI


SFBTPOBCMF BTTVSBODF FYDFTTJWF QVSDIBTF UIBU BDDFTT JT
UIBU QVSDIBTF SFRVJTJUJPO RVBOUJUJFT HSBOUFE POMZ UP
AMXBZT

SFRVJTJUJPOT BSF DPVME MFBE UP UIPTF JOEJWJEVBMT


DSFBUFE CZ BVUIPSJ[FE VOGBWPSBCMF QSJDFT, M XJUI B CVTJOFTT 9 A 1 9 9 9 9 9
QFSTPOOFM DPNQMFUFMZ FYDFTTJWF JOWFOUPSZ, QVSQPTF GPS
BOE BDDVSBUFMZ. BOE VOOFDFTTBSZ DSFBUJOH QVSDIBTF
QSPEVDU SFUVSOT. SFRVJTJUJPOT.
$3 $POUSPMT QSPWJEF 6OBVUIPSJ[FE PS 1VSDIBTF
SFBTPOBCMF BTTVSBODF FYDFTTJWF QVSDIBTF SFRVJTJUJPOT BSF
UIBU QVSDIBTF SFRVJTJUJPO RVBOUJUJFT SFWJFXFE PO B
MPOUIMZ

SFRVJTJUJPOT BSF DPVME MFBE UP NPOUIMZ CBTJT


DSFBUFE CZ BVUIPSJ[FE VOGBWPSBCMF QSJDFT, M UP EFUFDU BOZ 9 9 9 M % 9 9 9 9
QFSTPOOFM DPNQMFUFMZ FYDFTTJWF JOWFOUPSZ, FYDFTTJWF PSEFS
BOE BDDVSBUFMZ. BOE VOOFDFTTBSZ RVBOUJUJFT.
QSPEVDU SFUVSOT.
LJTU PG BDSPOZNT VTFE JO UIF DIBSU: CONTROL ATTRIBUTES
C/3/ COMPONENTS 3. CA: CONTROL ACTIVITIES 6. +: KEY CONTROL
1. CE: CONTROL ENVIRONMENT 4. )/C: INFORMATION AND COMMUNICATION 7. MAN/AUT: MANUAL OR AUTOMATIC
2. 2A: RISK ASSESSMENT 5. M: MONITORING 8. 0RE/$ET: PREVENT OR DETECT

Figure 6. Risk and control matrix for a procure-to-pay process.

1
GTAG – Application Review Approaches and
Other Considerations – 5

3JTL BOE $POUSPM MBUSJY: 1SPDVSF-UP-1BZ


B64*/&44 130$&44 & $0/530L $040 $0/530L $0/530L
3*4K4 5&45*/(
$0/530L 0B+&$5*7&4 A$5*7*5*&4 $0M10/&/54 A553*B65&4 $LA44*F*$A5*0/

&GGFDUJWFOFT
0QFSBUJPOBM
FSFRVFODZ
0CjFDUJWFT

LJLFMJIPPE

MBO⁄AVUP

3FDPSEFE

$MBTTJGJFE
ADUJWJUJFT
/VNCFS

1SF⁄%FU
*NQBDU⁄
$POUSPM

$POUSPM

K (:⁄/)

3FTVMUT
1PTUFE
7BMVFE
5JNFMZ

/PUFT
(:⁄/)
3JTLT

5FTU
3FBM
*⁄$
3A
$A
$&

T
MBjPS: 1SPDVSFNFOU
4VC: 1VSDIBTF 0SEFS 1SPDFTTJOH
ADUJWJUZ: $SFBUF

$S $POUSPMT QSPWJEF %VF UP UIF MBDL $POUSPMT BSF TVDI


SFBTPOBCMF BTTVSBODF PG BQQSPQSJBUF UIBU BDDFTT JT
UIBU QVSDIBTF PSEFST TFHSFHBUJPO PG EVUJFT, HSBOUFE POMZ UP
BSF DSFBUFE CZ B VTFS JT BCMF UP UIPTF JOEJWJEVBMT
BVUIPSJ[FE QFSTPOOFM DSFBUF, BQQSPWF (J.F., XJUI B CVTJOFTT
DPNQMFUFMZ BOE SFMFBTF), BTTJHO, BOE QVSQPTF GPS

AMXBZT
BDDVSBUFMZ. DPOWFSU B QVSDIBTF ) DSFBUJOH QVSDIBTF 9 A 1 9 9 9 9 9
SFRVJTJUJPO, SFTVMUJOH PSEFST.
JO UIF JOBQQSPQSJBUF
SFXBSEJOH PG CVTJOFTT
UP TVQQMJFST,
PWFSQBZNFOUT, BOE
FYDFTTJWF JOWFOUPSZ
MFWFMT.

$t $POUSPMT QSPWJEF %VF UP UIF MBDL 1VSDIBTF PSEFST


SFBTPOBCMF PG BQQSPQSJBUF BSF SFWJFXFE PO
BTTVSBODF UIBU TFHSFHBUJPO PG EVUJFT, B NPOUIMZ CBTJT
QVSDIBTF PSEFST B VTFS JT BCMF UP UP EFUFDU BOZ

MPOUIMZ
BSF DSFBUFE DSFBUF, BQQSPWF (J.F., VOBVUIPSJ[FE
CZ BVUIPSJ[FE SFMFBTF), BTTJHO, BOE ) QVSDIBTF PSEFST. 9 9 9 M % 9 9 9 9 9
QFSTPOOFM DPOWFSU B QVSDIBTF
DPNQMFUFMZ BOE SFRVJTJUJPO SFTVMUJOH
BDDVSBUFMZ. JO UIF JOBQQSPQSJBUF
SFXBSEJOH PG
CVTJOFTT UP TVQQMJFST,
PWFSQBZNFOUT, BOE
FYDFTTJWF JOWFOUPSZ
MFWFMT.

$6 $POUSPMT QSPWJEF 6OBVUIPSJ[FE PS 1VSDIBTF PSEFST


SFBTPOBCMF FYDFTTJWF QVSDIBTF BSF SFWJFXFE PO
BTTVSBODF PSEFS RVBOUJUJFT DPVME B NPOUIMZ CBTJT
MPOUIMZ

UIBU QVSDIBTF MFBE UP VOGBWPSBCMF UP EFUFDU BOZ


SFRVJTJUJPOT QSJDFT, FYDFTTJWF M FYDFTTJWF PSEFS 9 9 9 M % 9 9 9 9 9
BSF DSFBUFE JOWFOUPSZ BOE RVBOUJUJFT.
CZ BVUIPSJ[FE VOOFDFTTBSBSZ QSPEVDU
QFSTPOOFM SFUVSOT.
DPNQMFUFMZ BOE
BDDVSBUFMZ.

LJTU PG BDSPOZNT VTFE JO UIF DIBSU: CONTROL ATTRIBUTES


C/3/ COMPONENTS 3. CA: CONTROL ACTIVITIES 6. +: KEY CONTROL
1. CE: CONTROL ENVIRONMENT 4. )/C: INFORMATION AND COMMUNICATION 7. MAN/AUT: MANUAL OR AUTOMATIC
2. 2A: RISK ASSESSMENT 5. M: MONITORING 8. 0RE/$ET: PREVENT OR DETECT

Figure 6. Continued.

2
GTAG – Application Review Approaches and
Other Considerations – 5

3JTL BOE $POUSPM MBUSJY: 1SPDVSF-UP-1BZ


B64*/&44 130$&44 & $0/530L $040 $0/530L $0/530L
3*4K4 5&45*/(
$0/530L 0B+&$5*7&4 A$5*7*5*&4 $0M10/&/54 A553*B65&4 $LA44*F*$A5*0/

&GGFDUJWFOFT
0QFSBUJPOBM
0CjFDUJWFT

FSFRVFODZ
LJLFMJIPPE

MBO⁄AVUP

3FDPSEFE

$MBTTJGJFE
ADUJWJUJFT
/VNCFS

1SF⁄%FU
*NQBDU⁄
$POUSPM

$POUSPM

K (:⁄/)

3FTVMUT
1PTUFE
7BMVFE
5JNFMZ

/PUFT
(:⁄/)
3JTLT

5FTU
3FBM
*⁄$
3A
$A
$&

T
MBjPS: 3FDFJWJOH
4VC: (PPET 3FDFJQU 1SPDFTTJOH
ADUJWJUZ: $SFBUF
$7 $POUSPMT QSPWJEF ATTPDJBUJOH B HPPET 5IF HPPET
SFBTPOBCMF BTTVSBODF SFDFJQU XJUI BO SFDFJWFE⁄OPU
UIBU HPPET SFDFJQUT BSF JODPSSFDU QVSDIBTF JOWPJDFE BDDPVOU
QSPDFTTFE CZ PSEFS PS JODPSSFDU MJOF JT SFDPODJMFE PO B

MPOUIMZ
BVUIPSJ[FE QFSTPOOFM JUFN DPVME SFTVMU JO UIF ) NPOUIMZ CBTJT. 9 9 9 M % 9 9 9 9 9
DPNQMFUFMZ, BDDVSBUFMZ, JOBDDVSBUF WBMVJOH PG
BOE JO B UJNFMZ JOWFOUPSZ BOE UIF
NBOOFS. HPPET SFDFJWFE⁄OPU
JOWPJDFE BDDPVOU,
UIFSFCZ DBVTJOH EFMBZT
JO JOWPJDF BOE
QBZNFOU QSPDFTTJOH.
$8 $POUSPMT QSPWJEF (PPET SFDFJQUT BSF 6ONBUDIFE
SFBTPOBCMF BTTVSBODF OPU SFDPSEFE QVSDIBTF PSEFS
UIBU HPPET SFDFJQUT BSF BQQSPQSJBUFMZ. SFQPSUT BSF

MPOUIMZ
QSPDFTTFE CZ M SFWJFXFE PO B 9 9 9 M % 9 9 9 9
BVUIPSJ[FE QFSTPOOFM NPOUIMZ CBTJT.
DPNQMFUFMZ, BDDVSBUFMZ,
BOE JO B UJNFMZ
NBOOFS.
MBjPS: ADDPVOUT 1BZBCMF
4VC: *OWPJDF 1SPDFTTJOH
ADUJWJUZ: $SFBUF
$9 $POUSPMT QSPWJEF AO JOWPJDF UIBU TIPVME AQQMJDBUJPO
SFBTPOBCMF BTTVSBODF CF QBJE CZ NBUDIJOH JU TFDVSJUZ JT TVDI
UIBU WFOEPS JOWPJDFT UP B QVSDIBTF PSEFS JT UIBU BDDFTT UP UIF
BSF DSFBUFE CZ QBJE XJUIPVU B OPO-QVSDIBTF
AMXBZT

BVUIPSJ[FE QFSTPOOFM SFGFSFODF UP B M PSEFS JOWPJDF 9 A 1 9 9 9 9 9


DPNQMFUFMZ, BDDVSBUFMZ, QVSDIBTF PSEFS, XIJDI FOUSZ USBOTBDUJPO
BOE JO B UJNFMZ DPVME SFTVMU JO BO JT MJNJUFE BT NVDI
NBOOFS. VOBDDFQUBCMF BT QPTTJCMF.
QBZNFOU GPS NBUFSJBM
PS TFSWJDFT, (J.F.,
VOBDDFQUBCMF BOE
VOGBWPSBCMF QSJDF
WBSJBUJPOT).
$lO $POUSPMT QSPWJEF *ODPSSFDU JOWPJDF $IFDLT BSF
SFBTPOBCMF BTTVSBODF BNPVOUT BSF FOUFSFE, NBUDIFE UP
AT 3FRVJSFE

UIBU WFOEPS JOWPJDFT SFTVMUJOH JO JODPSSFDU TVQQPSUJOH


BSF QSPDFTTFE CZ QBZNFOUT UP WFOEPST. ) EPDVNFOUT
BVUIPSJ[FE QFSTPOOFM (JOWPJDF, DIFDL 9 9 M 1 9 9 9 9
DPNQMFUFMZ, SFRVFTUT, PS
BDDVSBUFMZ, BOE JO B FYQFOTF
UJNFMZ NBOOFS. SFJNCVSTFNFOUT)
CBTFE PO B EPMMBS
UISFTIIPME.

$ll $POUSPMT QSPWJEF A1 JOWPJDF TVC-MFEHFS 5IF A1 TVC-


SFBTPOBCMF BTTVSBODF QPTUJOHT BSF OPU MFEHFS UPUBM JT
UIBU WFOEPS JOWPJDFT QPTUFE UP UIF (L. DPNQBSFE UP UIF
MPOUIMZ

BSF QSPDFTTFE CZ L (L CBMBODF BU UIF 9 9 9 M % 9 9 9 9


BVUIPSJ[FE QFSTPOOFM FOE PG UIF NPOUI
DPNQMFUFMZ, WJB BO BHJOH
BDDVSBUFMZ, BOE JO B SFQPSU. AOZ
UJNFMZ NBOOFS. EJGGFSFODFT OPUFE
BSF DPSSFDUFE.
LJTU PG BDSPOZNT VTFE JO UIF DIBSU: CONTROL ATTRIBUTES
C/3/ COMPONENTS 3. CA: CONTROL ACTIVITIES 6. +: KEY CONTROL
1. CE: CONTROL ENVIRONMENT 4. )/C: INFORMATION AND COMMUNICATION 7. MAN/AUT: MANUAL OR AUTOMATIC
2. 2A: RISK ASSESSMENT 5. M: MONITORING 8. 0RE/$ET: PREVENT OR DETECT

Figure 6. Continued.

2
GTAG – Application Review Approaches and
Other Considerations – 5

3JTL BOE $POUSPM MBUSJY: 1SPDVSF-UP-1BZ


B64*/&44 130$&44 & $0/530L $040 $0/530L $0/530L
$0/530L 0B+&$5*7&4 3*4K4 A$5*7*5*&4 $0M10/&/54 A553*B65&4 $LA44*F*$A5*0/ 5&45*/(

&GGFDUJWFOFT
0QFSBUJPOBM
FSFRVFODZ
0CjFDUJWFT

LJLFMJIPPE

MBO⁄AVUP

3FDPSEFE

$MBTTJGJFE
ADUJWJUJFT
/VNCFS

1SF⁄%FU
*NQBDU⁄
$POUSPM

$POUSPM

K (:⁄/)

3FTVMUT
1PTUFE
7BMVFE
5JNFMZ

/PUFT
(:⁄/)
3JTLT

5FTU
3FBM
*⁄$
3A
$A
$&

T
MBjPS: ADDPVOUT 1BZBCMF
4VC: 1SPDFTT 1BZNFOUT
ADUJWJUZ: $SFBUF

$lh $POUSPMT QSPWJEF %JTCVSTFNFOUT 5IF A1


SFBTPOBCMF BTTVSBODF SFDPSEFE EJGGFS GSPN BQQMJDBUJPO
UIBU WFOEPS QBZNFOUT BNPVOUT QBJE. BVUPNBUJDBMMZ
BSF QSPDFTTFE CZ XSJUFT DIFDLT PS
BVUIPSJ[FE QFSTPOOFM FMFDUSPOJD

AMXBZT
DPNQMFUFMZ BOE L QBZNFOUT CBTFE 9 A 1 9 9 9 9 9 9
BDDVSBUFMZ. PO UIF WBMVF PG
BQQSPWFE JOWPJDFT
BDDPSEJOH UP
WFOEPS QBZNFOU
BOE TZTUFN
UFSNT.

$l3 $POUSPMT QSPWJEF %JTCVSTFNFOUT ADDFTT JT


SFBTPOBCMF BTTVSBODF NBEF BSF OPU SFTUSJDUFE UP

AMXBZT
UIBU WFOEPS QBZNFOUT SFDPSEFE. BVUIPSJ[FE
BSF QSPDFTTFE CZ ) 9 A 1 9 9 9 9
QFSTPOOFM UP
BVUIPSJ[FE QFSTPOOFM DSFBUF DIFDLT.
DPNQMFUFMZ BOE
BDDVSBUFMZ.

$lS $POUSPMT QSPWJEF FJDUJUJPVT 5IF A1


SFBTPOBCMF BTTVSBODF EJTCVSTFNFOUT BQQMJDBUJPO
UIBU WFOEPS QBZNFOUT BSF SFDPSEFE. QFSGPSNT B
BSF QSPDFTTFE CZ UISFF-XBZ NBUDI
CFUXFFO UIF
AMXBZT

BVUIPSJ[FE QFSTPOOFM
DPNQMFUFMZ BOE M QVSDIBTF PSEFS 9 9 A 1 9 9 9
BDDVSBUFMZ. MJOF JUFN, UIF
SFDFJWFS, BOE UIF
JOWPJDF XIFO A1
JOWPJDFT BSF
QSPDFTTFE.
LJTU PG BDSPOZNT VTFE JO UIF DIBSU: CONTROL ATTRIBUTES
C/3/ COMPONENTS 3. CA: CONTROL ACTIVITIES 6. +: KEY CONTROL
1. CE: CONTROL ENVIRONMENT 4. )/C: INFORMATION AND COMMUNICATION 7. MAN/AUT: MANUAL OR AUTOMATIC
2. 2A: RISK ASSESSMENT 5. M: MONITORING 8. 0RE/$ET: PREVENT OR DETECT

Figure 6. Continued.

2
GTAG – Appendices – 6

Appendix A: Common Application Controls


authorized and converted into a machine-sensible form
and Suggested Tests
and that data is not lost, suppressed, added, duplicated, or
The following outlines common application controls and
improperly changed. Computerized input controls include
suggested tests for each control. The table was provided by
data checks and validation procedures such as check digits,
the AXA Group.17
record counts, hash totals, and batch financial totals, while
computerized edit routines — which are designed to detect
Input Controls
data errors — include valid character tests, missing data tests,
These controls are designed to provide reasonable assurance
sequence tests, and limit or reasonableness tests. Input
that data received for computer processing is appropriately
controls and suggested tests are identified in the table below.

Input and Access Controls


These controls ensure that all input transaction data is accurate, complete, and authorized.
Domain Control Possible Tests
Data checks and • Reasonableness and limit checks on financial values. • Conduct a sample test of each scenario.
validation • Format and required field checks; standardized input • Observe attempts to input incorrect data.
screens. • Determine who can override controls.
• Sequence checks (e.g., missing items), range checks, • If table driven, determine who can change
and check digits. edits and tolerance levels.
• Cross checks (e.g., certain policies are only valid with
certain premium table codes).
• Validations (e.g., stored table and drop-down menu
of valid items).
Automated authorization, • Authorization and approval rights (e.g., of expenses or • Conduct tests based on user access rights.
approval, and override claim payments or credit over a certain threshold) are • Test access privileges for each
allocated to users based on their roles and their need sensitive function or transaction.
to use the application. • Review access rights that set and
• Override capability (e.g., approval of unusually large amend configurable approval and
claims) is restricted by the user’s role and need to authorization limits.
use the application by management.
Automated segregation of • Individuals who set up approved vendors • Conduct tests based on user access rights.
duties and access rights cannot initiate purchasing transactions. • Review access rights that set and
• Individuals who have access to claims amend configurable roles or menu
processing should not be able to set up or structures.
amend a policy.
Pended items • Aging reports showing new policy items with • Review aging results and evidence
incomplete processing are reviewed daily or weekly of supervisor review procedures.
by supervisors. • Walk through a sample of items to and
• Pending files where there is insufficient from the aging report or pending file.
information available to process transactions.

File and Data Transmission Controls


These controls ensure that internal and external electronically transmitted files and transactions are received from an identified
source and processed accurately and completely.
Domain Control Possible Tests
File transmission controls • Checks for completeness and validity of content, • Observe transmission reports and error
including date and time, data size, volume of records, reports.
and authentication of source. • Observe validity and
completeness parameters and
settings.
• Review access to set and amend
configurable parameters on file transfers.
Data transmission controls • Application of selected input controls to validate • Test samples of each scenario.
data received (e.g., key fields, reasonableness, etc.). • Observe attempts to input incorrect data.
• Determine who can override controls.
• If table driven, determine who can change
edits and tolerance levels.

17 Taken from AXA Group’s Common Application Controls and Suggested Testing.

2
GTAG – Appendices – 6

Processing Controls
These controls are designed to provide reasonable assurance real-time processing systems, but are used during the
that data processing has been performed as intended without processing phases. These controls include run-to-run totals,
any omission or double-counting. Many processing controls control-total reports, and file and operator controls, such
are the same as the input controls, particularly for online or as external and internal labels, system logs of computer
operations, and limit or reasonableness tests.

Processing Controls
These controls ensure that valid input data has been processed accurately and completely.

Domain Control Possible Tests


Automated file identifi- • Files for processing are available and • Review process for validation and test operation.
cation and validation complete.
Automated functionality • Specific calculations conducted on one • Compare input values and output values for all
and calculations or more inputs and stored data elements scenarios by walkthrough and re-performance.
produce further data elements. • Review table maintenance controls and determine who
• Use of existing data tables (e.g., master can change edits and tolerance levels.
files or standing data such as rating
tables).
Audit trails and overrides • Automated tracking of changes made • Review reports and evidence of reviews.
to data, associating the change with • Review access to override normal processes.
a specific user.
• Automated tracking and highlighting
of overrides to normal processes.
Data extraction, filtering, • Extract routine outputs are assessed • Review design of extract routine against data files used.
and reporting for reasonableness and completeness. • Review supervisory assessment of output from extract
• Automated allocation of transactions routine for evidence of regular review and
(e.g., for reinsurance purposes, further challenges.
actuarial processes, or fund • Review sample of allocations for appropriateness.
allocation). • Review process to assess extracted data for completeness
• Evaluation of data used to and validity.
perform estimation for financial
reporting purposes.
Interface balancing • Automated checking of data received • Inspect interface error reports.
from feeder systems (e.g., payroll, claims • Inspect validity and completeness parameters and settings.
data, etc.) into data warehouses or • Review access to set and amend configurable parameters
ledger systems. on interfaces.
• Automated checking that balances • Inspect evidence of match reports, checks, and
on both systems match, or if not, an error file processing.
exception report is generated and used.
Automated functionality • File extracts from debtors listing • Test sample of listing transactions to
and aging to provide management with data validate appropriateness of aging
on aged transactions. processing.
Duplicate checks • Comparison of individual transactions • Review access to set and amend configurable parameters
to previously recorded transactions to on duplicate transactions or files.
match fields. • Review process for handling rejected files or transactions.
• Comparison of individual files to
expected dates, times, sizes, etc.

Output Controls
These controls are designed to provide reasonable assurance input and run-to-run control totals produced during
that processing results are accurate and distributed to processing. Computer-generated change reports for master
authorized personnel only. Control totals produced as output files should be compared to original source documents to
during processing should be compared and reconciled to assure information is correct.

2
GTAG – Appendices – 6

Output Controls
These controls ensure that output is complete, accurate, and distributed appropriately.
Domain Control Possible Tests
General ledger posting • All individual and summarized • Sample of input and subledger summary
transactions posting to general transactions traced to the general
ledger. ledger.
Subledger posting • All successful transactions • Sample of input transactions
posting to subledger. traced to subledger.

Master Files and Standing Data Controls


These controls ensure the integrity and accuracy of master files and standing data.
Domain Control Possible Tests
Update authorization • Access to update allocated rights to • Review access to set and amend
senior users based on their roles and need master files and standing data.
to use the application.

2
GTAG – Appendices – 6

Appendix B: Sample Audit Program Here are the steps to achieve the above objectives:
Internal auditors should develop and record a plan for each • Step 1. Perform a risk assessment (see page 7 of
audit engagement, including objectives, scope, resource this guide).
con- siderations, and audit work program. Objectives allow • Step 2. Determine the scope of the review (see page 9
the auditor to determine whether the application controls of this guide).
are appropriately designed and operating effectively to • Step 3. Develop and communicate the detailed review
manage financial, operational, or regulatory compliance plan (see page 10 of this guide).
risks. The objectives of application controls include the • Step 4. Determine the need for specialized
following, as outlined on page two of this guide: resources (see page 10 of this guide).
• Input data is accurate, complete, authorized, and correct. • Step 5. Determine whether computer-assisted audit
• Data is processed as intended in an acceptable time period. techniques will be required (see page 13 of this
• Data stored is accurate and complete. guide).
• Outputs are accurate and complete. • Step 6. Conduct the audit (see the following sample
• A record is maintained that tracks the process of audit program). Please note that the sample pro-
data input, storage, and output. gram is not intended to cover all tests applicable to
your organization.

Sample Audit Program


A review of the specific company data and the scope of the audit will determine the detailed test steps related to the following review activities.
Control Objective Controls Review Activities
Objective 1: Input data is accurate, complete, authorized, and correct.
Input controls are designed and op- Obtain data input procedures, gain an understanding of the
erating effectively to ensure that all authorization and approval process, and determine whether
transactions have been authorized a review and approval process exists and has been
and approved prior to data entry. communi- cated to users responsible for obtaining
appropriate approvals.

Verify that the application owner or process owner ensures


that all data is authorized prior to input. This may be done
through the granting of roles and responsibilities based on
job duties.

Obtain a copy of the approval levels and determine whether


responsibility is assigned for verifying that appropriate ap-
provals are consistently applied.

2
GTAG – Appendices – 6

Sample Audit Program


Control Objective Controls Review Activities
Input controls are designed and op- Obtain data input procedures and verify that individuals
erating effectively to ensure that all re- sponsible for entering data have been trained on the
entered transactions will be processed prepa- ration, entry, and control of input.
correctly and completely.
Determine whether edit routines are embedded within
the application that checks and subsequently rejects input
information that does not meet certain criteria, including
but not limited to, incorrect dates, incorrect characters,
invalid field length, missing data, and duplicate transac-
tion entries/numbers.

Verify the existence and operation of manual data entry


controls to prevent the entry of duplicate records. Manual
data entry controls may include the pre-numbering of
source documents and the marking of records as “input”
after entry.

Verify that added data is from an acceptable source and


rec- onciled to the source utilizing control totals, record
counts, and other techniques including the use of
independent source reports.

Determine whether appropriate segregation of duties exists to


prevent users from both entering and authorizing
transactions.

Verify that appropriate segregation of duties exists between


data entry personnel and those responsible for reconciling
and verifying that the output is accurate and complete.

Verify that controls exist to prevent unauthorized changes to


system programs such as calculations and tables.

Input controls are designed and Obtain data input procedures for handling rejected trans-
operating effectively to ensure that actions and subsequent error correction and determine
all rejected transactions have been whether personnel responsible for error correction and data
identified and reprocessed appro- reentry have been adequately trained.
priately and completely.
Verify a mechanism is in place for notifying the process owner
when transactions have been rejected or errors have occurred.

Verify rejected items are reprocessed appropriately in a


timely manner in accordance with the procedures, and
errors are corrected before reentering into the system.

2
GTAG – Appendices – 6

Sample Audit Program


Control Objective Controls Review Activities
Controls are designed and operating Obtain procedures and verify that detailed information is
effectively to ensure that data auto- included on how automated interfaces are authorized and
matically posted from another system what triggers the automated processing event.
is processed accurately and
completely. Verify that processing schedules are documented and prob-
lems are identified and corrected on a timely basis.

Determine whether system to system record counts and total


dollar values are systematically verified for automated inter-
faces and rejected items are prevented from posting and
are flagged for follow-up and re-processing.

Verify that files and data created for use by other applica-
tions or that are transferred to other applications are pro-
tected from unauthorized modification during the entire
transfer process.

Controls are designed and operating ef- Validate that the test data and programs are segregated
fectively to ensure that correct data files from production.
and databases are used in processing.

Objective 2: Data is processed as intended in an acceptable time period.


Processing controls are designed and Verify output is reviewed or reconciled against source
operating effectively to ensure that docu- ments for completeness and accuracy, including
all transactions are processed in a verification of control totals.
timely manner and within the cor-
rect accounting period. Determine whether routines are embedded within the ap-
plication that ensure all correctly entered transactions are
actually processed and posted as intended in the correct
ac- counting period.

Processing controls are designed Obtain procedures for handling rejected transactions and
and operating effectively to ensure subsequent error correction and determine whether person-
that all rejected transactions have nel responsible for error correction and data reentry have
been identified and reprocessed in a been adequately trained.
timely manner.
Verify a mechanism is in place for notifying the process owner
when transactions have been rejected or errors have occurred.

Verify rejected items are processed appropriately in a timely


manner in accordance with the procedures, and errors are
corrected before reentering into the system.

2
GTAG – Appendices – 6

Sample Audit Program


Control Objective Controls Review Activities
Objective 3: Data stored is accurate and complete.
Logical access controls are designed Obtain password configuration and use policies and deter-
and operating effectively to prevent mine whether requirements for strong passwords, password
unauthorized access, modification, or resets, account lockout, and password re-use are present.
disclosure of system data.
Verify that the above policy has been applied to the
application(s) under review.

Verify that remote access controls are designed and


operating effectively.

Verify that users are restricted to specific functions based on


their job responsibilities (role-based access).

Verify unique user IDs are assigned to all users, including


privileged users, and that user and administrative accounts
are not shared.

Verify proper approval of user account creation and modi-


fication is obtained prior to granting or changing access.
(Users include privileged users, employees, contractors, ven-
dors, and temporary personnel.)

Verify access is removed immediately upon termination.

Verify that the application owner is responsible for


ensuring that a semi-annual review occurs of user and system
accounts to ensure access to critical financial data,
applications, and operating systems is correct and
current.

Controls are designed and operat- Verify proper approval of user account creation and modi-
ing effectively to ensure that data fication is obtained prior to granting or changing access.
backups are accurate, complete, and (Users include privileged users, employees, contractors, ven-
occur in a timely manner. dors, and temporary personnel.)

Verify access is removed immediately upon termination.

Verify that the application owner is responsible for


ensuring that a semi-annual review occurs of user and system
accounts to ensure access to critical financial data,
applications, and operating systems is correct and
current.

Controls are designed and operat- Verify that mechanisms are in place to store data offsite in
ing effectively to ensure that data is a secured and environmentally-controlled location.
physically stored in a secured,
offsite, environmentally-controlled
location.

2
GTAG – Appendices – 6

Sample Audit Program


Control Objective Controls Review Activities

Objective 4: Outputs are accurate and complete.

Output controls are designed and Obtain data output procedures and gain an understanding
operating effectively to ensure that of the review process and verify that individuals responsible
all transaction outputs are complete for data entry have been trained on the review and
and accurate. verification of data output.

Verify output is reviewed or reconciled against source


docu- ments for completeness and accuracy, including
verification of control totals.

Output controls are designed and Review existing data output procedures and determine wheth-
op- erating effectively to ensure that er they document which personnel receive the data output
all transaction output has been and how the data will be protected during distribution.
distribut- ed to appropriate
personnel and that sensitive and
confidential information is protected
during distribution.
Output controls are designed and Verify that an output report was created and identify that
operating effectively to ensure that the date and time on the report is the designated time.
an output report is created at the
designated time and covers the des- Identify that the report covers the designated period via
ignated period. recon- ciliation against source documents from that period.

Objective 5: A record is maintained that tracks the process of data input, storage, and output.

Controls are designed and operating Verify processing audit trails and logs exist that assure all
effectively to ensure that an audit re- cords have been processed and allow for tracing of the
trail is generated and maintained for trans- action from input to storage and output.
all transactional data.
Verify audit reports exist that track the identification and
reprocessing of rejected transactions. Reports should con-
tain a clear description of the rejected transaction, date,
and time identified.

3
GTAG – Glossary – 7

Glossary
Application controls: Application controls are specific to each Risk: The possibility of an event occurring that will have an
application and relate to the transactions and data pertaining impact on the achievement of objectives. Risk is measured
to each computer-based application system. The objectives in terms of impact and likelihood.19
of application controls are to ensure the completeness and
accuracy of records and the validity of the entries made Segregation of duties: Controls that prevent errors and
resulting from programmed processing activities. Examples of irregularities by assigning responsibility to separate
application controls include data input validation, agreement individuals for initiating transactions, recording
of batch totals, and encryption of transmitted data. transactions, and overseeing assets. Segregation of duties is
commonly used in organizations with a large number of
Data input controls: Data input controls ensure the accuracy, employees so that no single person is in a position to commit
completeness, and timeliness of data throughout its conversion fraud without detection.
after it enters a computer or application. Data can be
entered into a computer application through a manual online
input or automated batch processing.

Data output controls: Data output controls are used to ensure


the integrity of output information as well as the correct
and timely distribution of any output produced. Outputs
can be in hardcopy form, such as files used as input to other
systems, or can be available for online viewing.

Data processing controls: Data processing controls are used


to ensure the accuracy, completeness, and timeliness of
data during an application’s batch or real-time processing.

Enterprise resource planning (ERP): ERP denotes the


planning and management of resources in an enterprise, as
well as the use of a software system to manage whole business
processes and integrate purchasing, inventories, personnel,
customer service activities, shipping, financial management,
and other aspects of the business. An ERP system is typically
based on a common database, integrated business process
application modules, and business analysis tools.18

IT general controls (ITGCs): These controls apply to


all systems components, processes, and data for a given
organization or IT environment. The objectives of ITGCs
are to ensure the proper development and implementation
of applications, as well as the integrity of program, data
files, and computer operations.

The following are the most common ITGCs:


• Logical access controls over infrastructure,
applications, and data.
• System development life cycle controls.
• Program change management controls.
• Data center physical security controls.
• System and data backup and recovery controls.
• Computer operation controls.

18 Taken from the ISACA’s Certified Information Systems Auditor Glossary.


19 Taken from the Glossary of The IIA’s International Professional Practices
Framework.

3
GTAG – References – 8

References
• GTAG 4: Management of IT Auditing.
• GTAG 1: Information Technology Controls.
• ISACA, IS Auditing Guideline — Application
Systems Review, Document G14.
• COSO’s Internal Control over Financial Reporting
— Guidance for Smaller Public Companies.
• PCAOB, Auditing Standard No. 5,
An Audit of Internal Control Over Financial
Reporting That is Integrated with An Audit of
Financial Statements, paragraphs B29 - 30.
• IIA Standard 1220: Due Professional Care.
• IIA Standard 1210.A3.
• IIA Standard 1130.C1
• AXA Group, Common Application Controls
and Suggested Testing.
• ISACA Certified Information Systems
Auditor Glossary.
• The IIA’s International Professional Practices
Framework.

3
GTAG – About the Authors – 9

Christine Bellino, CPA, CITP


opment initiatives. He also has several years of experience
Christine Bellino is the director of tech- configuring SAP R/3 applications and application security
nology risk management for the Jefferson and business process controls and has been a featured speaker
Wells’ Denver practice and is a member at several universities and organizations across the United
of The IIA’s Advanced Technology States.
Committee. Bellino is a member of the
organization’s Guide to the Assessment
of IT General Controls Scope based on
Risk (GAIT) core team. Her current re-
Reviewers
sponsibilities include the management of multiple business
The IIA thanks the following individuals and organizations
processes and ITGC reviews for small-, mid-, and large-
who provided valuable comments and added great value to
sized organizations.
this guide:
Bellino has more than 25 years of finance, operations,
• IT Auditing Speciality Group, The IIA–Norway.
and technology risk management experience and was co-
• The technical committees of The IIA–UK and
chair of the COSO Task Force responsible for the recently
Ireland.
released Internal Control Over Financial Reporting —
• Helge Aam, Deloitte – Norway.
Guidance for Smaller Public Companies.
• Ken Askelson, JCPenney Co. Inc. – USA.
• Rune Berggren, IBM – Norway.
Steve Hunt, CIA, CISA, CBM
• Shirley Bernal, AXA Equitable Life
Steve Hunt is a senior manager in the risk
Insurance Co. – USA.
consulting group of Crowe Horwath LLP,
• Lily Bi, The IIA.
and is a member of The IIA’s Advanced
• Claude Cargou, AXA – France.
Technology Committee, ISACA, and the
• Maria Castellanos, AXA Equitable Life
Association of Professionals in Business
Insurance Co. – USA.
Management. Hunt works with Fortune
• Nelson Gibbs, Deloitte & Touche, LLP.
1,000 mid-sized, and small-market com-
• Steven Markus, AXA Equitable Life
panies in different industries, directing
Insurance Co. – USA.
the
• Peter B. Millar, ACL Services Ltd. – Canada.
delivery of financial, operational, and IT risk management
• Stig J. Sunde, OAG – Norway.
engagements.
• Jay R. Taylor, General Motors Corp. – USA.
Hunt has more than 20 years of experience working
• Karine Wegrzynowicz, Lafarge North America.
in various industries, including accounting, internal au-
• Hajime Yoshitake, Nihon Unisys, Ltd. – Japan.
diting, and management consulting. More specifically, he
has performed in-depth Sarbanes-Oxley compliance audits • Jim Zemaites, AXA Equitable Life Insurance
and other internal and external audits, and participated in Co – USA.
business process reengineering projects and business devel- • Joe Zhou, GM Audit Services – China.

3
GTAG 8: Auditing Application Controls
Application controls are those controls that pertain to the scope of individual business processes or
application systems, such as data edits, separation of business functions, balancing of processing
totals, transaction logging, and error reporting. Effective application controls will help your
organization to ensure the integrity, accuracy, confidentiality, and completeness of your data and
systems. This guide
provides chief audit executives (CAEs) with information on application control, its relationship with general
controls, scope a risk-based application control review, the steps to conduct an application controls review,
a list of key application controls, and a sample audit plan.
We’d like your feedback! Visit the GTAG 8 page under www.theiia.org/gtags to rate this Practice Guide and
submit your comments.

What is GTAG?
Prepared by The Institute of Internal Auditors, each Global Technology Audit Guide (GTAG) is written
in straightforward business language to address a timely issue related to information technology management,
control, and security. The GTAG series serves as a ready resource for CAEs on different technology-associated
risks and recommended practices.
GTAG 1: Information Technology Controls
GTAG 2: Change and Patch Management Controls: Critical for Organizational Success
GTAG 3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment
GTAG 4: Management of IT Auditing
GTAG 5: Managing and Auditing Privacy Risks
GTAG 6: Managing and Auditing IT Vulnerabilities
GTAG 7: Information Technology Outsourcing

For more information and resources regarding technology-related audit guidance, visit
www.theiia.org/technology.

Order Number: 1033


IIA Member US $25 GTAGs are Practice Guides
Nonmember US $30 IIA aligned under the International
Event US $22.50 Professional Practices Framework.

ISBN 978-0-89413-613-9

www.theiia.org
07526

You might also like