Types of System Audits 160864
Types of System Audits 160864
K. Paul Jayakar
IT General Controls (ITGC) are the basic controls that can be applied to IT systems
such as applications, operating systems, databases, and supporting IT infrastructure.
The objectives of ITGCs are to ensure the integrity of the data and processes that the
systems support. The most common ITGCs are as follow:
➢ Logical access controls over applications, data and supporting infrastructure
➢ Program change management controls
➢ Backup and recovery controls
➢ Computer operation controls
➢ Data center physical security controls
➢ System development life cycle controls
2. Application Audit
This is a review of the resources, project plans, timelines, central design, blueprints
and implementation plans, and data conversion techniques prior to the commencement
of the implementation activities to provide reasonable assurance about the project
success prior to commencement.
Early involvement of the audit function ensures that important internal controls are
implemented and that legal and supervisory requirements are taken into consideration
during the initial development of a new concept. Potential procedural errors or points
of economic vulnerability already can be identified and eliminated in advance.
This review cum audit consists of conducting a gap analysis, determining whether the
project goals were achieved, determining the satisfaction of stakeholders, evaluating
the project's costs and benefits, identifying areas for further development, document
lessons learned and report findings and recommendations.
6. Security Audit
A security audit is the high-level description of the many ways organizations can test
and assess their overall security posture, including cyber-security. There are many
types of security audits like Risk Assessments to prioritize risks, Vulnerability
Assessment to identify security weaknesses in an information system, Penetration
Tests which are an authorized simulated cyberattack on a computer system, performed
to evaluate the security of the system and Compliance Audits to achieve the desired
results and meet the business and regulatory objectives.
➢ Security Audit
A data center audit focusing on physical security will document and ensure that the
appropriate procedures and technology are in place to avoid downtime, disasters,
unauthorized access and breaches. It will revolve around things like, fire suppression
systems, screening of employees and contractors who access equipment, biometrics or
other forms of access control, video surveillance amongst others.
➢ Energy Efficiency/Power Audit
A data center energy efficiency audit helps to pinpoint potential ways to reduce energy
usage and utility bills. By examining the consumption of power, the thermal
environment and lighting levels, the audit can uncover things such as malfunctioning
equipment, incorrect HVAC settings and lighting which can be avoided. Power usage
effectiveness (PUE) can also be calculated (based on dividing total power usage by IT
equipment power). By tracking this number, it can be used to benchmark and
determine whether data center performance is improving or declining over time.
➢ Asset Audit
An audit that involves inventory of assets creates a library of accurate, up-to-date
information about all of the equipment in the data center – from servers and cabinets to
storage devices. The information documented in an asset audit could include
manufacturer, model number, equipment age, current performance level, maintenance
records and requirements.
➢ Standards-Compliance Audit
There are many standards and guidelines to follow depending on the types of data the
data center processes and stores. A few examples:
PCI-DSS: to ensure that acceptable practices are in place to protect credit card data
HIPAA: to ensure that protected health information is stored and hosted online in
accordance with HIPAA hosting standards, and that stored data is protected and
available only to people who are authorized to view them
Sarbanes-Oxley (SOX): to ensure proper management of electronic records and to
protect shareholders and the general public from accounting errors and fraudulent
practices in enterprises, and to improve the accuracy of corporate disclosures.
Audits for other standards can also be conducted:
SSAE 16: to measure data center controls relevant to financial reporting
SOC 1: to measure data center controls relevant to financial reporting (similar to
SSAE 16)
SOC 2: to measure security, availability, processing integrity, confidentiality and
privacy controls
SOC 3: documentation of SOC 2 compliance along with a seal of approval for use on
websites and other marketing materials and documents
➢ Design Audit
This type of data center audit focuses on design and comparing the facility’s actual
design to applicable standards (like ISO/IEC TS 22237-1:2018)
8. Third party Information Risk Assessment
9. Process Audit
Documents such as work instructions, software menus, control plans, and routing are
used to control individual processes. ISO 9000 defines a process as a set of interrelated
or interacting activities that use inputs to deliver an intended result.
Processes that are typically carried by a manufacturing organisation include filling,
washing, reacting, drilling, cutting, treating, sorting, transporting, informing, ordering,
and opening. This is the level at which work takes place. When an audit of any of
these individual processes is conducted, it’s called a process audit.
When auditing processes, auditors should be familiar with the type of process they’re
auditing and must follow process steps. The closest thing to a checklist would be a
flow chart or work instruction. Using either of those tools, auditors can follow one
process to the next until they are assured the process is effective. Process audits
identify weaknesses and risks while also identifying areas for improvement. Process
audits go beyond the limited control elements defined in a standard. The conformity
and compliance standards contain minimum controls.
Data integrity checks are conducted by the migration team to check for completeness
and accuracy of data and the decommissioning of the original source of data. The type
of migration audits can be:
Legacy To New Solution involving: Validation of the transfer of data from multiple
legacy systems, legacy and core system data integrity, vendor management, techno
functional issues, data backup strategy, preparation / validation of the migration
strategy documents and its Versions and the project management.
Core Version X To New Version involving: high volume of data to be transferred,
limits on post migration window time, online data migration, identification of business
critical data, pre-migration assurance, preparation / vetting of migration strategy
documents and its versions and project management.
Core DB To Data Ware House involving: vetting of multiple inputs to a centralized
system, high volume and online migration strategy, capacity and performance analysis,
migration strategy document preparation / vetting and project management.
ICR (Internal Control Risks) is an overall assessment of the internal control system to
address the relevant risks and its adequacy in each business area in an organization.
Through control review, an organization's resources are directed, monitored, and
measured in an effective manner. There are three main types of internal controls:
detective, preventative, and corrective. All organizations are subject to the occurrence
of threats that adversely impact the organization and cause the loss of assets.
Unfortunately, processes and control activities are not perfect, and mistakes and
problems will be found.
In order to achieve these objectives an internal control framework needs to be applied
and followed throughout the organization. The five components of the internal control
framework (as per the COSO framework) are the control environment, risk
assessment, control activities, information and communication, and monitoring
In brief the SOX Audit Process consists of the following steps:
Defining the scope using a risk assessment approach; determining materiality and risks
- accounts, statements, locations, processes, and major transactions; identifying SOX
controls - non-key & key, ITGC, and other entity-level controls; performing a fraud
risk assessment; managing process and control documentation; testing key controls;
assessing deficiencies; and delivering management’s report on controls