InfoSystemsAuditChecklist (Version 1)
InfoSystemsAuditChecklist (Version 1)
C SYSTEM DEVELOPMENT
D PURCHASED SOFTWARE
E ACCESS TO DATA FILES
F COMPUTER PROCESSING
G ACCESS CONTROLS
H APPLICATION CONTROLS - INPUT
J VIRUSES
K INTERNET
L CONTINUITY OF OPERATIONS
Physical Protection
L.I Fire Hazard
L.II Air Conditioning
L.III Power Supply
P BACK-UP PROCEDURES
P.I Equipment (computer and ancillary)
P.II Outside Suppliers (non continuance/ disaster)
Audit Obejective
Does the organization of data processing provide for adequate segregation of duties?
Audit Procedures
Review the company organization chart, and the data processing department organization cha
Are there any key personnel within IT department whose absence can leave the
17 company within limited expertise?
18 Are there any key personnel who are being over-relied?
Is EDP audit being carried by internal audit or an external consultant to ensure
19 compliance of policies and controls established by management?
gation of duties?
No N/A
B PROGRAM MAINTENANCE AND SYSTEM DEVELOPMENT
Audit Objective
Development and changes to programs are authorized, tested, and approved, prior to being placed
ures
nly authorized individuals to access each library.
ograms.
gement software used.
N/A
C SYSTEM DEVELOPMENT
Are there adequate controls over the setting up of the standing data and
12 opening balances?
13 Is a post implementation review carried out?
Are user manuals prepared for all new systems developed and revised for
14 subsequent changes?
Audit Objective
Is access to data files restricted to authorized users and programs?
Audit Procedure
Access to Data
No. Description Yes No
Is there any formal written data security policy? Consider whether
1 the policy addresses data ownership, confidentiality of information,
and use of password.
Is the security policy communicated to individuals in the
2 organization?
3 Is physical access to off-line data files controlled in:
Computer room?
On-site library?
Off-site library?
Does the company employ a full-time librarian who is independent
4 of the operators and programmers?
5 Are libraries locked during the absence of the librarian?
6 Are requests for on-line access to off line files approved?
Are requests checked with the actual files issued and initialed by
7 the librarian?
N/A
F COMPUTER PROCESSING
Are there satisfactory procedures for reissuing passwords to users who have
2 forgotten theirs?
Audit Objective
Do controls provide reasonable assurance that for each transaction type, input is authorized, complete
that errors are promptly corrected?
N/A
I OUTPUT AND PROCESSING
Audit Objective
The controls provide reasonable assurance that transactions are properly processed by the computer
copy or other) is complete and accurate, and that calculated items have been accurately com
2 Are there adequate controls over forms that have monetary value?
N/A
J VIRUSES
Does the policy identify the specific assets that the firewall is
2 intended to protect and the objectives of that protection?
Does the policy support the legitimate use and flow of data and
3 information?
4 Is information passing through firewall is properly monitored?
Determine whether management approval of the policy has been
5 sought and granted and the date of the most recent review of the
policy by the management?
Is the policy properly communicated to the users and awareness is
6 maintained?
7 Have the company employed a Firewall Administrator?
8 Is firewall configured as per security policy?
9 Is URL screening being performed by Firewall?
10 Is anti-virus inspection enabled?
Are packets screened for the presence of prohibited words? If so,
11 determine how the list of words is administered and maintained.
Physical Protection
LI.: Fire Hazard
No. Description Yes No
1 Check the safety against fire in the following ways:
Building materials fire resistant?
Wall and floor coverings non-combustible?
Separation from hazardous areas (e.g. fire doors)?
Separation from combustible materials (e.g. paper, fuel)?
Smoking restriction?
Fire resistant safes (for tapes, disks and documentation)?
2 Check the appropriate arrangements of fire detection devices:
Smoke/ Heat-rise detectors?
Detectors located on ceiling and under floor?
Detectors located in all key EDP areas?
Linked to fire alarm system?
3 Check the appropriate arrangements for fire fighting:
Halon gas system (for key EDP areas)
Automatic sprinkler system
Portable CO2, extinguishers (electrical fires)
Ease of access for fire services
4 Check appropriate arrangements in case of fire emergency:
Fire instructions clearly posted
Fire alarm buttons clearly visible
Emergency power-off procedures posted
Evacuation plan, with assignment of roles and responsibilities
5 Check if there is training to avoid fire emergecny:
Regular fire drill and training
Regular inspection/testing of all computing equipment
Physical Protection
LII.: Air Conditioning
No. Description Yes No
Monitoring of temperature and humidity in EDP area
Heat, fire and access protection of sensitive air-conditioning
parts (eg. cooling tower)
Air intakes located to avoid undesirable pollution
Back-up air conditioning equipment
Physical Protection
LIII.: Power Supply
No. Description Yes No
Reliable local power supply
Separate computer power supply
Line voltage monitored
Power supply regulated (For voltage fluctuation)
Uninterrupted power supply (eg. Battery system) available
Alternative power supply (eg. Generator) Emergency lighting
system
Physical Protection
LIV.: Communications Network
No. Description Yes No
Physical protection of communications lines modems,
multiplexors and processors
Location of communication equipment separate from main EDP
equipment
Back-up and dial-up lines for direct lines
Physical Protection
LV.: Machine Servers Layout Room
No. Description Yes No
Printers, plotters located in separate area
Printout preparation (eg. bursting) located in separate area
Tape/Disk library in separate area Machine room kept tidy
Practical location of security devices
Emergency power off switches
Alarms
Extinguishers
Environment monitoring equipment
Physical Protection
LVI.: Assess Control
No. Description Yes No
Entrance Routes (EDP areas):
No unnecessary entrances to the computer room
Non-essential doors always shut and locked to the outside (eg,
Fire exits)
Air vent and daylight access location
Protected and controlled use of all open doors
N/A
N/A
N/A
rk
N/A
om
N/A
N/A
Is there monitoring of temperature and humidity in electronic data process (EDP) (Server rooms) and Communication closet areas?
munication closet areas?
M ACCESS CONTROL
N/A
N/A
N/A
N PERSONNEL POLICIES – MIS STAFF
PV.: Tape
No. Description
1 At least three generations of important tape files retained
2 Copies of all updating transactions for above retained
3 At least one generation and all necessary updating transactions in off-site storage
PVI.: Disc
No. Description
1 Checkpoint/restart procedures provided for
2 Audit trail (log file) of transactions updating on-line files (data base) maintained
3 Regular tape dumps of all disc files stored off-site
4 Audit trail (log file) regularly dumped and stored off-site
PVII.: Software
No. Description
1 Copies of following maintained at off-site storage: Production application programs
Major programs under development
System and program documentation
Operating procedures
Operation and system software
All copies regularly updated
Back-up copies regularly tested
PVIII.: Operations
No. Description
1 Back-up procedure manual
2 Priority assignments for all applications
3 Procedures for restoring data files and software Procedures for back-up installation
nd ancillary)
Yes No N/A
inuance/ disaster)
Yes No N/A
age
Yes No N/A
Yes No N/A
Yes No N/A
Yes No N/A
Yes No N/A
ns
Yes No N/A
Q DISASTER RECOVERY PLANS
4
Are all recovery plans approved and tested to ensure their adequacy in the event of
disaster?
5 Communicated to all management and personnel concerned
6 Critical processing priorities identified (eg. Significant accounting applications)
7 Are disaster recovery teams established to support disaster recovery plan?
8
Are responsibilities of individuals within disaster recovery team defined and time
allocated for completion of their task?
9 Operations procedures for use of equipment and software back- up
10
Has the company developed and implemented adequate plan maintenance
procedures?
11 Are priorities set for the development of critical systems?
12 Does a hardware maintenance contract exist with a reputable supplier?
13 Does the recovery plan ensure, in the event of failure:
No loss of data received but not processed
No reprocessing of data already processed
Files not corrupted by partially completed processing
14 Are recovery plans regularly tested?
No N/A