04 IS Audit Process
04 IS Audit Process
PROCESS
Pertemuan 2 – Sesi 3 & 4
Financial audits —assess the correctness of an organization’s financial statements. A financial audit will
often involve detailed, substantive testing. This kind of audit relates to information integrity and reliability.
Operational audits —evaluate the internal control structure in a given process or area. IS audits of
application controls or logical security systems are examples of operational audits.
Integrated audits —An integrated audit combines financial and operational audit steps. It is also
performed to assess the overall objectives within an organization, related to financial information and
assets’ safeguarding, efficiency and compliance. An integrated audit can be performed by external or
internal auditors and would include compliance tests of internal controls and substantive audit steps.
Administrative audits —assess issues related to the efficiency of operational productivity within an
organization. disebut jg audit compliance
Forensic audits —Traditionally, forensic auditing has been defined as an audit specialized in discovering,
disclosing and following up on frauds and crimes. In recent years, the forensic professional has been called
upon to participate in investigations related to corporate fraud and cybercrime.
Information systems audits —This process collects and evaluates evidence to determine whether the
information systems and related resources adequately safeguard assets, maintain data and system
integrity, provide relevant and reliable information, achieve organizational goals effectively, consume
resources efficiently, and have in effect internal controls that provide reasonable assurance.
Types of IS Audit prosedur yang disepakati
! !! %$ #
controls are assessed for the adequacy of their design and tested for their effectiveness. As
examinations, the performed audit steps and the obtained evidence serve as a basis for audit reports to
include conclusions and opinions.
Although general control audits can be limited to a single-topic area such as change control or disaster
recovery, the audits typically cover several topics reflecting an array of processes or functions. It is
recommended to use the audit report template that is provided in this guidance, especially for
extensive (lengthy) reports that contain audit findings pertaining to different control topics. The length
of a report is dependent upon the number of audit objectives and findings, requirements to explain how
work was performed, complexity of the technology, and information requirements of the readers.
Internal vs
External
Audit
Internal External
Represent the interests of internal Represent the interests of third party
organization stakeholders
Wide range of activities. Traditionally Typically in the form of Financial
focused on compliance. Audit.
Appointed by Management Appointed by third party stakeholders
ISA requirements
38.1 Components of Internal Control
The auditor shall obtain an understanding of the information
system, including the related business processes, relevant to
financial reporting, including (amongst others) how the information
system captures events and conditions, other than transactions,
that are significant to the financial statements (ISA 315.18d).
Methodology requirements
38.2 Use of an Information Technology expert
The auditor shall determine whether to use the work of an
Information Technology expert. If an Information Technology
expert is required, the auditor shall apply the requirements for
using an Auditor’s Expert.
The need of IS/IT in Internal Audit
lingkup infrastruktu/lingkungan IT
IS Auditing
Review
internal control
Perform
compliance &
substantive tests
Prepare &
present report
IS AUDIT STANDARDS
IT Assurance Framework
ISACA
ISACA Code of Professional Ethics
ISACA Audit and Assurance Standards
Standards Statements
General Standards
Performance Standards
Reporting Standards
The auditor is faced with the questions of what to audit, when and how
frequently. The answer to this is to adopt a risk-based approach.
While there are risks inherent to information systems, these risks impact
different systems in different ways. The risk of unavailability even for an hour
can be serious for a billing system at a busy retail store.
The risk of unauthorized modification can be a source of frauds and potential
losses to an online banking system. A batch processing system or a data
consolidation system may be relatively less vulnerable to some of these risks.
The technical environments on which the systems run also may affect the risk
associated with the systems.
The auditor then can draw up a yearly audit plan that lists the audits that will be
performed during the year, as per a schedule, as well as the resources required.
Audit Plan
The standards and benchmarks used to measure and present the subject
matter and against which an IS auditor evaluates the subject matter. Criteria
should be:
( !#—Free from bias
(!—Include all relevant factors to reach a conclusion
( #!— !!! "!!!
( "—Provide for consistent measurement
( !
Approval of
√ - √ -
documents
Compliance to
√ √ √ -
procedures
Comparing data √ - √ √
Reconciliation √ - √ √
Recalculation √ - √ √
Audit Evidence
Evidence is any information used by the IS auditor to determine
whether the entity or data being audited follows the established
criteria or objectives and supports audit conclusions.
Some types of evidence are more reliable than others. Reliability is
determined by:
The independence of the evidence provider
The qualifications of the evidence provider
The objectivity of the evidence
The timing of the evidence
The IS auditor must focus on the objectives of the audit and not on the
nature of the evidence.
Evidence is considered competent when it is both valid and relevant.
Sufficiency of
Evidence
Evidence is sufficient and appropriate when it provides a reasonable basis for
supporting the findings or conclusions within the context of the audit
objectives. If, in professionals’ judgement, the evidence does not meet these
criteria, they should obtain additional evidence or perform additional
procedures to reduce the limitations or uncertainties related to the evidence.
For example, a programme listing may not be adequate evidence until other
evidence has been gathered to verify that it represents the actual programme
used in the production process.
Using the work of other experts should be considered when there are
constraints that could impair the audit work to be performed, e.g., technical
knowledge required by the nature of the tasks to be performed, scarce audit
resources, time constraints and to address potential independence issues.
The use of other experts should also be considered if this results in a gain in
the quality of the engagement.
IS audit and assurance professionals shall assess, review and evaluate the
work of other experts as part of the engagement, and document the
conclusion on the extent of use and reliance on their work.
IS AUDIT COMUNNICATION
Communication of
Results
Informative
Logical Sequence
Persuasive
Sufficient Information
Audit Findings
Audit findings are provided in the audit report when action is required to correct
a deficiency in a process or its related controls. As a general rule, the audit
report includes audit findings for reports with qualified opinions or adverse
opinions. Five key elements, or attributes, need to be addressed when
presenting an audit finding
EXAMPLES – AUDIT FINDING
EXAMPLE
EXAMPLES – AUDIT FINDING (cont)
EXAMPLE
EXAMPLES – AUDIT FINDING (cont)
Fraud Reporting
Unless restricted by law, the final audit report should include occurrences of
illegal acts or fraud, or audit findings regarding deficiencies in internal control to
prevent or detect fraud. Care must be taken in the presentation of audit evidence
if the case before the court is not yet resolved.
Generally, the audit report should report the possible fraud that the evidence
indicates and to whom the possible illegal or fraudulent activity has been
reported. Internal audit reports may include reporting of any evidence of possible
illegal or fraudulent activity, including matters considered inconsequential.
Audit Documentation
Audit documentation provides the necessary evidence that support the audit
findings and conclusions.
It should be clear, complete, and easily retrievable.
It is the property of the auditing entity and should only be accessible to
authorized personnel.
All audit documentation should be:
Dated
Initialed
Page-numbered
Self-contained
Properly labeled
Kept in custody
Follow Up
Albert Einstein