Information System Auditing
Information System Auditing
By:
WAIFEM
1
INFORMATION SYSTEM AUDITING
OUTLINE
· INTRODUCT ION
· AUDITING IT INFRASTRUCTURE
· AUDITING OPERA TIONS
· DATABASE REVIEW
· LOCAL AREA NEWTWORK REV IEW
· NETW ORK OPERA TING CONTROL REVIEW
· INFORMATION SYSTEM OPERATINGS REVIEW
· PROBLE M MANAGEMENT REPORT ING REV IEWS
· HARDWARE AVAILABILITY AND UTILISATION REPORT ING
REVIEWS
· COMPUTER ASSISTED AUDITING TECHNIQUES (CAATS)
2
INTRODUCATION
a) AUDITING IT INFRASATRUCTURE
Hardware Reviews:
3
· Whether the environment is adequate for the current installed
hardware and provision made for new hardware to be added
under the approved acquisition plan.
· Whether the acquisition plan has taken into consideration
deficiencies noted in the former.
· Whether the acquisition plan has taken into consideration
technological obsolescence of the installed equipment, as well as
the new equipment in the plan.
· The adequacy of documentation for hardware and software
specifications, installation requirements and the likely lead-time
associated with planned acquisitions.
4
· Verify that the operator documentation used in the information
system department is appropriately revised prior to
implementation of changes in hardware.
· Select a sample of hardware changes that have affected the
scheduling of processing and determine if the plans for changes
were addressed in a timely manner.
· Ascertain that all hardware changes have been communicated to
the system programmers, application programmers and the
information system staff to ensure that changes and tests are
coordinated properly.
· Evaluate the effectiveness of changes to assure that they do not
interfere with normal application production processing.
iii) Review the feasibility study and selection process to determine the
following:
5
· Proposed system objectives and purposes are consistent with
the request for proposal.
· Same selection criteria are applied to all proposals.
6
vi) Review system software maintenance activities to determine the
following:
· Changes made to the system software are documented.
· Current versions of the software are supported by the vendor.
· Vendors maintenance activities are logged.
7
· Attempted violation reporting and follow-up have been
documented.
(c ) DATABASE REVIEW.
8
(i) DATABASE DESIGN
· IS Auditor should verify the existence of a database model,
that all entities have a significant name and identified
primary and foreign keys.
· Verify that the relations have explicit cardinality, coherent
and significant names and that the business rules are
expressed in the diagram.
· Finally, verify that the entity-relation model is synchronized
with the database’s physical scheme.
· Review the logical scheme to ensure all entities in the
entity-relation diagram exist as tables or views.
· All relations should be represented through primary or
foreign keys and all attributes should have a logical name,
an indicator specifying it as a primary or foreign key and an
indicator of whether null values are allowed or not.
· Nulls should not be allowed for primary keys, while nulls for
foreign keys could be with the cardinality expressed in the
entity-relation model.
· The physical scheme should be reviewed for allocation of
initial and extension space (storage) for tables, logs,
indexes, and temporary areas. Indexes by primary key and
frequency of access should exist. If the database in not
normalized, the justification should be reviewed.
9
iii) DATABASE ADMINISTRATION:
o The IT Auditor should verify that the security levels for all
users and their roles are identifiable within the database
and access rights for all users and/or group of users are
justified.
o The Auditors should also confirm that back-up and disaster
recovery procedures exist to assure the reliability and
availability of the database.
· The Auditor should also confirm that backup and disaster
recovery procedures put in place to assure the adequate
handling of consistency and integrity during concurrent
accesses should be collaborated by the IT Auditor.
v) DATABASE PORTABILITY:
· Verify that, whenever possible structured Query Language
(SQL) is used.
10
· Network topology (including internal LAN configuration as well as
interconnections to other LANs, WAN or public networks)
· LAN uses (including significant traffic types and main applications
used over the network).
· LAN administrator.
· Significant groups of LAN users.
· In the IS Auditor should gain understanding of the following:
= Functions performed by the LAN administrator
= Departmental procedures and standards relating to network design,
support, naming conventions and data security.
· LAN transmission media and techniques including bridges, routers,
gateways and switches. The IS Auditor should be able to make an
assessment of the significant threats to the LAN with good
understanding of the subjects discussed above. The IS Auditor
should evaluate the controls used to minimize the risks.
11
· Procedures were established to assure effective controls over the
hardware and software used by the departments served by the
distributed processing network.
· Adequate restart and recovery mechanisms have been installed at
every user location served by the distributed processing networks.
· The IS distributed network has been designed to assure that failure of
service at any one site will have a minimal effect on the continued
service to other sites served by the network.
· All changes made at the user sites or by IS management to the
operating systems software used by the network are controlled and
can be detected promptly by the network administrator or those
responsible for the network.
· Individuals have access only to authorized applications, transaction
processors and data sets.
· System commands affecting more than network site are restricted to
one terminal and to an authorized individual with an overall network
control responsibility and security clearance.
· Encryption is being used in the network for sensitive data.
· Appropriate security policies and procedures have been implemented
in one of the following environments:
12
(f) IS OPERATIONS REVIEW
This relate to day-today operation of the hardware and software with the
IS department, responsibility for the running of the computers including
the mounting of files located on secondary storage media, and
discontinuance of the use of devices requiring maintenance.
- SCHEDUL ING
· Operations should record jobs that are to be processed and their
required data files.
· Operations should schedule jobs for processing on a predetermined
basis and perform them using either automated scheduling software
or a manual schedule.
13
- Using exception – processing procedures to obtain written or electronic
approval from application owners to run jobs or programs in another
sequence:
· Operators should obtain written or electronic approval from owners
when scheduling on request only jobs.
· Operators should record all exception – processing requests.
· Operators should review the exception – processing request log to
determine the appropriateness of procedures performed.
14
· Librarian should handle the receipt and return of foreign media
entering the Library.
· Logs of the sign-in and sign-out of data files and media should be
maintained.
· FILE HANDLING
The IT Auditor should ensure that procedures exist to control the receipt
and release of files/secondary storage media to/from other locations.
Internal tape labels should be used to help ensure the correct tapes are
mounted for processing.
15
- Segregation of duties between the person who keys the data and
the person who reviews the keyed data for accuracy and errors.
· Job scheduling.
· Console operation.
· Report balancing and distribution.
· Re-run/re-start activities.
· Tape mounting and management.
· Storage device management.
· Environmental monitoring.
· Physical and data security.
Several control concerns arise from a lights out operation. These concerns
include the following:
16
· Contingency plans must allow for the proper identification of a
disaster in the unattended facility. In addition, the automated
operation software or manual contingency procedures must be
adequately documented and attested at the recovery site.
· Since vital IS operations are performed by software systems, proper
program change controls and access controls need to be applied to
this software. Testing of the software should also performed on a
periodic basis especially when changes or updates are applied.
· Ensure that errors are not hidden by the software and that all errors
result in operator notification.
17
· Determination that the IS department has established procedures for
handling data processing problems.
· Determination that all problems identified by IS operations are being
recorded for verification and resolution.
· Determination that significant and recurring problems have been
identified and actions are being taken to prevent their reoccurrence.
· Determination that processing problems were resolved on a timely
basis and the resolution was complete and reasonable.
· Reviews of IS management reports produced by the problem
management system to ensure evidence of proper management
review.
· Reviews of outstanding error-log entries describing problems to be
resolved for proper documentation and to ensure that they are being
addressed in a timely manner.
· Reviews of operations documentation to ensure that procedures have
been developed for the escalation of unresolved problems to a higher
level of IS management.
Reporting Reviews:
18
· Review the problem log to determine whether hardware malfunctions,
re-runs, the use of software utilities, abnormal system terminations
and operator actions have been reviewed by IS management.
· Review the preventive maintenance schedule to determine if the
prescribed maintenance frequency recommended by the respective
hardware vendors is being observed.
· Review the preventive maintenance schedule to verify that
maintenance is not done during peak workload periods, thereby
avoiding impairment of hardware availability.
· Review the preventive maintenance schedule to determine that it is
not being performed while the system is processing critical or
sensitive applications.
· Review the control and management of equipment that has the ability
to contact its manufacturer without manual intervention in case of
equipment failure.
· Review the hardware availability and utilization reports to determine
that scheduling is adequate to meet workload schedules and user
requirements.
· Review the workload schedule and the hardware availability and
utilization reports to determine that scheduling is sufficiently flexible to
accommodate required hardware preventive maintenance.
· Determine whether IS resources are readily available for processing
those application programs which require a high level of resource
availability.
19
In addition to selecting the appropriate techniques, the IS Auditor should
understand the importance of documenting the results of such tests for
audit evidence purposes.
· Expert system:
Software applications developed to hold a base of expert knowledge and
logic provided by experts in a given field. , such a software application
permits the computerized use of the decision-making process of these
experts.
· Standard utilities:
Resident in software packages that specify the status of parameters
used to install the package.
· Software Library packages:
· SNAPSHOT:
20
· System control Audit Review File:
Advantages of CAATs
· Ease of use, both for existing audit staff and future staff.
· Training requirement.
· Complexity of coding and maintenance.
· Flexibility of uses.
· Installation requirements.
· Processing efficiency (especially with a PC CAAT)
· Effort required to bring the source data into CAATs for analysis.
21
The following documentation should be retained when developing
CAATs.
22