COBIT
COBIT
COBIT
It helps them show measurable results against their goals and objectives.
It helps them show compliance with relevant legal and regulatory obligations, such as the
Companies Act 2016 and GDPR.
Organizations can fulfill requirements from corporate governance and public listings.
ISO/IEC 38500:2015
ISO/IEC 38500 sets forth concepts, definitions, and a high-level framework that organizations of all
sizes may use better to align their use of information technology with organizational decisions and
satisfy their legal, regulatory, and ethical requirements.
Transparency: It enables trust by making the strategy, processes, and transactions visible to internal
and external stakeholders.
Security ensures the organization remains protected against IP theft, hacking, ransomware, data
breaches, and cyber-attacks. Without proper security measures in place, the organization cannot
function effectively and will create a lack of trust in its stakeholders.
For example, Zoom was not much popular before the COVID-19 pandemic but has seen exceptional
growth ever since. Also, the COVID-19 pandemic has significantly changed our perceptions about
communicating and connecting with each other.
The Work From Home (WFH) model, remote working, and online meetings have significantly
replaced the requirement of an onsite presence that was previously imposed upon by the
organizations.
Another example of IT reshaping organizational functions can be taken from the example of
hospitals. Instead of requiring patients to visit their physicians, many of them have introduced the
telehealth model. Through telehealth, patients can consult doctors using online video-calling
platforms. Innovations like these advocate for robust IT service management systems within
enterprises. Those organizations, businesses, and enterprise that would not upgrade themselves in
this regard cannot confront their competitors in the market.
What is COBIT?
As we mentioned in the previous topic, COBIT (Control Objectives for Information and related
Technologies) is an IT governance framework, with its latest version being released in 2019. It is
used by businesses that aim to implement, monitor, and enhance best practices in IT
management. The credit for developing the COBIT framework goes to ISACA. ISACA is a global,
independent, non-profit organization dedicated to creating, accepting, and using globally accepted
information system (IS) knowledge and practices.
Which Organizations can Implement COBIT?
Any organization willing to ensure the quality, control, and reliability of its information
system can implement COBIT. As we mentioned earlier, IT governance frameworks, like ITIL and
COBIT, can help organizations become compliant with different regulators. With COBIT, for
example, we know that US organizations use it to become compliant with the Sarbanes-Oxley Act
(SOX).
1996 - COBIT was first released to help financial auditors handle the growing complexity of IT
settings.
1998 - ISACA published a complete version that covered topics other than audit controls.
2000s - Versions 3 and 4 were released. They contained further cybersecurity management
principles.
2013 - COBIT 5 was released with the goal of offering tools, best practices, and goals that were
universally relevant to all enterprise IT operations. COBIT 5 expanded on COBIT 4 by including
associated International Organization for Standardization (ISO) standards, such as IT Infrastructure
Library (ITIL.)
2019 - This latest edition is a more generic, comprehensive, and adaptable tool that may be utilized
by any business, regardless of size or immediate goals.
The Basics of the COBIT Framework and
Principles
The COBIT framework allows businesses to meet their objectives by combining the use of IT, linked
sources, and processes. The following are the two primary parameters provided through the COBIT
framework:
Control - It contains practices, procedures, structures, and policies to provide an assurance level to
the businesses to meet their goals.
IT Control Objectives - It defines the level of acceptable results that a business can attain with
implementing the control procedures regarding a specific IT operation.
Objectives: COBIT 2019 has around 40 corporate management and governance goals. Based on
the needs of various stakeholders, IT administrators might prioritize or ignore these objectives.
Domains: All COBIT objectives have been grouped into specific domains which are concerned with
different business processes, such as planning, monitoring, and building.
Goals cascade: It explains the connections between business needs and goals.
Components (Enablers): These are generic elements, such as process descriptions, infrastructure,
skills, and IT-influencing infrastructures.
Designing factors: These are the contextual, tactical, and strategic factors defining the organizational
needs and the way to address them. The design factors opt for the technology choices, e.g., cloud
data. They also drive implementation methodologies, such as outsourcing, DevOps, ITIL4, Agile, etc.
Enhancement in the framework's alignment with global frameworks, standards, and best practices.
A new mechanism added in the 2019 version allows COBIT users to provide feedback, application
sharing, and change the framework further.
Newly added guidance and tools also allow tweaking the IT governance system to fulfill specific IT
goals and make the decision-making processes even better.
The Open Group Architecture Framework (TOGAF) is a complementary Governance, Risk, and
Compliance (GRC) framework. TOGAF was founded and is maintained by The Open Group, an
independent industry association.
Here, it is essential to know that TOGAF is based on TAFIM, or Technical Architecture Framework
for Information Management, which was developed by the United States Defense Department
(DOD).
The Open Group released TOGAF version 9 in early 2009. The Open Group and others now lead
TOGAF certification and instructional programs, and enterprise architects are typically in charge of
implementing TOGAF within enterprises.
This core model will receive input not only from external frameworks and laws but also from
company stakeholders. These requirements result in a set of objectives that must be met according
to Design Factors and Focus Areas. The results of this entire strategic design then aid in the
transition to the Tailored Enterprise Governance System, which is then implemented, monitored, and
managed to achieve the required EGIT objectives and performance.
To ensure the best possible acceptance, a number of fundamental COBIT publications, from
Foundation to Governance to Design and Implementation, were created for this new version,
including step-by-step comprehension and training guides.
One of the essential management objectives is the APO(Align, Plan, and Organize) domain. The
main focus of this COBIT objective is to help enterprises build a robust strategy. This objective
includes several important questions, such as:
The CPM assessment results show the current process, focus area capability, and maturity. They
are also used for improving the relevant governance and management components, allowing
businesses to:
Measure their progress in achieving the current and projected business goals.
Report consistently.
You will learn more about COBIT performance management in the next topic.
Grouping the COBIT 2019 Domain
Recalling from the previous topic, all the governance objectives from the COBIT framework are
collected under the EDM Domain. Here, the governing body :
Along with the EDM domain, the management objectives are grouped as under:
The APO Domain: It addresses the organizational strategy and supports the enterprise's IT activities.
The BAI Domain: It defines and helps with the acquisition and implementation of IT solutions and
their incorporation into business.
The DSS Domain: It addresses operational delivery and supports security and IT activities.
The MEA Domain: It is related to performance monitoring and conformity of IT and internal
performance targets, along with external requirements and internal control objectives.
1. Conducting the COBIT 2019 awareness sessions with the identified stakeholders.
2. Tailoring a governance system the applicable governance and management objectives of
COBIT 2019.
3. Identification of the respective process owners.
4. Obtaining evidence.
5. Performing the process activity rating.
6. Reporting the identified opportunities and strengths.
There are a lot of benefits associated with conducting the COBIT 2019 sessions with the identified
stakeholders. By conducting these sessions, an organization can ensure that all identified
stakeholders actively participate during the assessment. Their participation is essential to complete
these assessment activities and make
Proper decisions.
In order to understand the assessment scope properly, it is necessary to assess the context of the
business and its IT operations. This will be helpful for both the business and its stakeholders to
understand the important priorities and find any defects that might be encountered in their progress.
2. Designing a Governance System
There are various stages involved in the governance system workflow (shown on the next page).
They prioritize governance and management objectives and allow the organization to assign and
achieve the target capability levels.
It should be made clear that process assessments are concerned with the processes themselves
and not with the efficiency of the involved enterprise personnel. The purpose here is to improve
the processes' performance in support of clearly defined corporate goals, not to assign blame for
subpar performance of specific individuals.
While obtaining evidence, it is necessary for the organization to relate each objective with the
relevant processes, practices, and activities. This evidence can either be direct, i.e., documented or
in the form of the outcomes, or indirect, i.e., plans for producing specific outcomes. Here, the
primary evidence will be obtained from interviews, and their results will be confirmed by examining
work products and outputs from the practices whose objectives have been assessed.
4. Obtaining Evidence
Evidence should be gathered methodically using a clearly stated plan and technique that is
simple to demonstrate. All of the data should be sufficient to fulfill the assessment's objectives
and purpose, and it should be simple to connect the data to the relevant governance and
management goals.
While obtaining evidence, it is necessary for the organization to relate each objective with the relevant
processes, practices, and activities. This evidence can either be direct, i.e., documented or in the form of the
outcomes, or indirect, i.e., plans for producing specific outcomes. Here, the primary evidence will be obtained
from interviews, and their results will be confirmed by examining work products and outputs from the
practices whose objectives have been assessed.
By following these steps correctly, organizations can perform an effective capability assessment of their
governance and management system. Not only that, but this evaluation is also helpful in determining any
improvement required. Furthermore, it is important to mention that:
Process activities are associated with capability levels that manage the processes' performance.
Maturity levels are associated with focus and can be achieved after fulfilling all the required capability levels.
Transforming the Organizational IT Structure
An IT department's organizational structuring (or restructuring) often results from a number of adjustments,
trials, experiments, and political maneuvers. It is frequently changed to fit or accommodate different people. In
turn, this makes the organization occasionally inefficient, problematic, and expensive.
To avoid such problems, it is necessary to opt for an efficient, workable method that makes this transformation
process smooth and easy. In this regard, it will require some steps to be followed, i.e.
1. Selecting the standards.
COBIT 2019: It covers all the required aspects of IT in terms of processes and tasks. It also enables the
organization to ensure the alignment between the stakeholder requirements, enablers, and the enterprise's IT-
related goals.
Skills Framework for the Information Age (SFIA V6): This framework ensures gaining of the required skills
and their reflection within the job descriptions.
ISO/IEC 27001 - Dynamics of Information Security Management System (ISMS) is a vital course offered
by Alison. It explains the ISO 27001 standard regarding the creation of a robust Information Security
Management System (ISMS) within an organization.
CEO
The same can be done for the DSS and BAI sections.
Every medium-sized and large IT setup must have an IT assurance section to ensure IT governance within the
setup. This must be coordinated with the internal audit in terms of planning and technology audits. This
cooperation must also be ensured with the corporate compliance department to plan, implement, and monitor
laws, standards, codes, and good practices.
In contrast to larger organizations, smaller organizations can make their MEA section a part of the internal
audit or split it among internal audit and corporate compliance.
Step 5: Designing the Job Description
Once the organization's structure is designed, it's time to move on to designing the job descriptions. These
descriptions can either be a combination of the activities and related metrics given in COBIT and the activities
in SFIA V6.
Process management.
Risk management.
Enterprise architecture.
Many governance, risk management, and compliance (GRC) technologies have been evaluated and examined
with the goal of applying them to build organizations. A GRC tool with strong process management skills with
risk management and enterprise architecture is required. It would be excellent if that package of tools also
included a maturity evaluation.
The 6-step technique outlined in this topic has been used to restructure an organization's IT framework in
many large and small firms. In large companies, the activity may take weeks, whereas in small ones, it may
take only a week.