0% found this document useful (0 votes)
3 views

ITStandards Navigating

Uploaded by

Eqbal Gubran
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

ITStandards Navigating

Uploaded by

Eqbal Gubran
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Navigating the Standards for Information Technology Controls

By Joseph B. O’Donnell and Yigal Rechtman

JULY 2005 - Pervasive use of computers, along with recent legislation such as the Sarbanes-
Oxley Act (SOA), has increased the importance of information technology (IT) in attest services.
The 2000 report of the Panel on Audit Effectiveness (see www.pobauditpanel.org) recommended
that “audit firms place a high priority on enhancing the overall effectiveness of auditors’ work on
internal control, particularly with respect to the depth and substance of their knowledge about
companies’ information systems.”

Auditors are faced with the challenge of understanding an auditee’s IT processing and control
environment. Further complicating the situation are various guidelines and standards whose
application depends on the nature of the entity: a publicly traded company, a privately held
company, or a government agency. In addition, the entity may have operations outside of the
United States. Auditing and assurance services for entities in these different situations are
regulated by different standards-setting bodies, and understanding these different requirements in
the context of information systems processing and controls is critical.

The Auditing Standards Board at the AICPA promulgated what U.S. financial auditors accept as
generally accepted audited standards (GAAS). Government auditors follow the Government
Accountability Office (GAO; formerly the General Accounting Office) auditing standards, the
“Yellow Book,” in performing audits of government agencies. The International Federation of
Accountants (IFAC) provides auditors with global guidance with its International Standards for
Auditing (ISA). Countries that maintain their own auditing standards, such as the United States,
the United Kingdom, and Canada, have been reluctant to adopt ISAs, and rely on their own
standards. The Public Company Accounting Oversight Board (PCAOB) provides standards for
audits of publicly traded companies. These standards apply to audits and assurance services
provided to domestic and international companies whose stock is publicly traded in U.S. stock
markets.

Generally, the AICPA, GAO, IFAC, and PCAOB standards that refer to IT processes and
controls emphasize the importance of IT processes and controls in accessing the client’s control
environment.

Another organization, the Information Systems Auditing and Control Association (ISACA;
www.isaca.org), provides standards and guidance on information technology and information
security (IS) assurance services for its members. ISACA issues the Control Objectives for
Information Technology (COBIT). COBIT includes IT and IS assurance standards, guidelines,
and procedures. Although this guidance is binding only for ISACA members, it could have
significant indirect impacts on CPAs. To maintain its members’ proficiency, ISACA tests and
certifies its members’ professional capabilities as a Certified Information Security Auditor
(CISA) or a Certified Information Security Manager (CISM).
IT Controls and the CPA

Statement of Auditing Standard (SAS) 94, The Effect of Information Technology on the Auditor’s
Consideration of Internal Control in a Financial Statement Audit, requires the consideration of
the importance of IT processes and controls in the preparation of financial statements. In
addition, an auditor must consider whether an IT specialist is required. This decision should be
based upon the importance of IT on financial statement processes, the level of reliance on IT
controls, and the IT knowledge of the financial auditor.

Under GAAS, auditors are responsible for gaining an understanding of the control environment
as part of the financial audit even if the auditor chooses not to rely on the controls. If IT controls
are a material component of the control environment, this understanding should include IT
controls as well. The auditor’s ability to gain the required level of understanding may vary by the
type of controls—general or application—involved in the engagement.

General IT controls include the procedures and processes that support the overall processing of
business applications of an organization. These controls include areas such as access to programs
and data, data center operations, program development, program changes, IT disaster recovery
plans, and the proper segregation of duties of information systems department personnel. The
general controls are important because they support application processing. Computerized
application controls include the controls involving the processing and storing of business
transactions. They ensure the completeness, accuracy, authorization, and validity of processed
transactions. Application controls include application security, input controls, rejected-
transaction controls, transaction-processing controls, and output controls. According to IT
Control Objectives for Sarbanes-Oxley (IT Governance Institute, April 2004; available at
www.isaca.org), both general and application controls “are needed to help ensure accurate
information processing and the integrity of the resulting information needed to manage, govern
and report on the organization.”

The Panel on Audit Effectiveness recommended the “appropriate involvement of information


technology specialists in understanding, assessing and testing the information systems and
control activities.” As Sid M. Edelstein pointed out (“Sarbanes-Oxley Compliance for
Nonaccelerated Filers,” The CPA Journal, December 2004), financial auditors are more likely to
understand application controls than general controls. The general controls tend to be of a more
technical nature and often involve operational procedures that accountants are not accustomed to;
application controls are less technical. The need for additional IT expertise commonly causes the
financial auditor to include an IT audit specialist on the engagement team. Alternatively, without
testing the IT environment, in certain audits managers can assess a high control risk with respect
to IT. This alternative, however, does not apply to all audit standards, such as the GAO’s Yellow
Book, where test of controls is generally required.

The presence of an IT auditor on the engagement team does not free the financial auditor from
responsibility for assessing the adequacy of IT controls. Accordingly, it is useful for the auditor
to have a general understanding of guidance used by IT specialist and of the framework, such as
COBIT, in which the specialist performs her conclusions.
To simplify the discussion, guidance for IT auditing from sources familiar to CPAs shall be
termed “financial auditing–based standards-setting organizations” (AICPA, GAO, PCAOB, and
IFAC). These financial auditing–based standards-setting organizations address topics that are
both similar to, and different from, ISACA’s COBIT. For example, COBIT includes audit-
quality provisions such as a due care requirement, audit planning, and management
requirements. COBIT differs from GAAS in its focus on all significant IT processes and
controls. These include processes that influence financial processing as well as those that do not.
Conversely, GAAS is interested only in IT processes and controls that influence the processing
of financial information.

Furthermore, COBIT differs from GAAS in the level of service and in the use of technical
language that is particular to IT and IS audits. Financial auditing–based standards clearly define
the difference in the type of testing and the level of assurance involved in audit and review
engagements. COBIT’s framework uses the terms “audit” and “review” interchangeably. For
CPAs familiar with GAAS, this may lead to misinterpretation of the level of assurance and type
of procedures performed. Accordingly, a financial auditor must maintain a certain understanding
of the IT auditor’s framework and assess the impact of the IT environment on the scope of the
audit and the overall assessment of the control environment. Another example of COBIT’s
difference from GAAS is the closeness of its guidelines, which are not standards, to the
standards. Guidelines elaborate on certain standards (e.g., business continuity). The GAAS
hierarchy more clearly defines the relationship between concepts, standards, and guidelines.

As mentioned above, ISACA also provides guidelines and procedures, the majority of which
focus on IT technical issues. Examples of guidelines include IT governance, the review of virtual
private networks, Systems Development Life Cycle Review, and the use of computer-assisted
auditing techniques (CAAT). IS auditing procedures, which provide more detailed steps than
guidelines, include IS risk assessment, digital signatures, intrusion detection, viruses, and
malicious applications. When relying on an IT or IS specialist, the financial auditor may lack
sufficient knowledge to understand specific components of the steps performed by the IT auditor.
By understanding and familiarizing themselves with IT controls–based standards, however,
financial auditors can understand the nature of the testing performed, and the meaning of the test
results in light of the COBIT framework and applicable GAAS standards.

COBIT, PCAOB, and GAO Standards

The bodies that regulate financial, operational, and IT audits or examinations have varying
degrees of applicability to the auditor and auditee, depending upon the type of engagement
performed. At times, two or more standards apply to an engagement; the standards that apply to
one type of audit overlap with the standards that apply to other types of audits or examinations.
Although this illustration is not authoritative, it is generally held that the GAO and the PCAOB
have similarities in their requirements for risk-based audits, while GAO and ISA auditing
standards have little in common.

The goals and challenges of public company auditors have become very visible through the
pronouncements of the PCAOB, the auditing regulatory arm of the SEC. When auditing financial
information where information technologies have any part in executing, processing, recording, or
reporting the results of a company’s activities, these standards remain a high level of guidance
for considering the IT environment. The only direct reference to IT in PCAOB Standard 2, “An
Audit of Internal Control Over Financial Reporting Performed in Conjunction with an Audit of
Financial Statements,” is that financial auditors should perform a “walkthrough” of the
information system to be satisfied with the design and operation of the applicable controls.

Performing an electronic walkthrough is not simple, because of the lack of tangible existence of
the results of financial activities. An example of this dilemma pertains to records of disbursement
activity. These records exist electronically during the approval, execution, and retention steps in
the cycle; however, the effect of each step in a disbursement cycle is simply additional
information that electronically modifies the appropriate records. Because the cycle is performed
electronically, there is ample room for erroneous or intentional duplications, deletions, and
modifications that leave no audit trail. In practice, people using these records attempt to maintain
the integrity of the underlying data because of its service to them; the substitute of a human
control may be the very weakness of the electronic controls and of the auditor’s walkthrough.

To be satisfied with the reliability of the information system, an auditor applying ISACA’s
COBIT can have a well-rounded set of auditing objectives. These objectives can be applied and
tested in the IT environment. The framework starts with audit processes that are broken down to
audit objectives (in an order of magnitude of 250). Each audit objective relates to several control
activities in a way similar to the COSO framework. Finally, each control activity’s impact is
marked as primary or secondary to the audit objectives; it is also assessed based on its maturity, a
six-level rating that ranges from nonexistent to optimal.

For example, according to the COBIT standards, a control activity that relates to software source
code modification is titled “Design Approval” and is defined as: “system development ... should
require that design specification for all information system development and modification
project[s] be reviewed and approved by management, the affected users ... and senior
management when appropriate.” This control objective applies to the following control activities
and their respective
processes:

Control Activity COBIT Process


Acquire and maintain application software Acquire and
and activity implement
Acquire and
Install and accredit systems implement
implement
Acquire and
Manage changes implement
implement
Define and manage service levels Design and support
Ensure systems’ security Design and support
Manage the configuration Design and support

Each control activity is associated with a list of impact areas. For example, the primary impacts
of the first control activity above are listed as effectiveness and efficiency; integrity and
reliability are listed as secondary impacts. In the case of financial statement audits, the auditor
must assess the risk that unauthorized software code modifications may cause material
misstatements to the financial statements, and must plan the audit engagement accordingly. Part
of this process involves mapping control activities to their impact on financial statement items.
For example, the auditor must determine if and how managing program code changes in an
accounts payable system influences the accuracy of the accounts payable balance on the financial
statements.

In a PCAOB audit or a GAO audit, the auditor then has at his disposal a well-rounded set of
control activities (with their recommended associated impacts) to select from, and control
objectives that apply to them. An auditor examining internal controls under the PCAOB
standards can choose from an extensive list of control activities, and select those that apply. The
auditor, considering the particulars of the auditee’s IT, can then test the controls to see if they
meet the objectives. The IT Governance Institute has published IT control objectives for SOA as
a recommended guide to applying COBIT to financial statement audits of public companies.
Although this guide is useful to the financial auditor, the PCAOB has not commented on its
appropriateness for audits of SEC registrants.

COBIT and GAAS Audits

The closest auditing procedure to the IT walkthrough required by the PCAOB standards can be
achieved by performing tests on the IT environment and systems. Such tests are clearly defined
and discussed in the COBIT framework and can be suitable for financial audit purposes. At the
conclusion of applying tests to the COBIT control objectives, each component in the path of the
virtual activities is well examined. This knowledge can then allow the auditor to rely on the
results of the virtual activity while performing the IT walkthrough.

Although the GAO standards do not require a walkthrough, tests of control for organization
under the Yellow Book auditing standards are required. Tests of controls are mandatory even
when control risk is assessed at the maximum. As in PCAOB-regulated audits, when reliance on
IT has any bearing on the reporting of the financial statements (as well as efficiency and
effectiveness in some Yellow Book audits), the test of controls of the IT environment is required.
Because auditing “around the computer” is no longer a viable or relevant option, the application
of COBIT in a similar fashion to the one described above could satisfy the Yellow Book
requirements for test of controls.

An auditor for a nonpublic company who is not performing a PCAOB or GAO audit can make
good use of a selection of audit objectives from the COBIT framework, applying them either to
obtain an understanding of internal controls or to test internal controls.

Operational Security and Internal Control Assurance

As summarized in the Exhibit, SAS 55, as amended by SAS 94, applies to the use of a specialist
when performing a financial audit that involves material use of the IT environment and also uses
IT for testing of controls and substantive testing. As in the GAO and PCAOB audits, COBIT’s
processes and objectives allow the IT auditor to concentrate her efforts on audit objectives
related to the controls that she tests. The financial auditor, using a specialist that adheres to
COBIT, may have a more effective approach to translating the technical manner in which IT
documentation and testing is done for control objectives that affect the reported financial
information. In PCAOB, AICPA, and GAO audits, the results of such translation (from the
technical description to the control objectives narratives) can be the basis of management reports
or internal controls’ attestations.

COBIT for Consulting Engagements

For nonattest engagements, COBIT and its related ISO 17779 (issued by the International
Standards Organization and based on British Standard 17779) can become helpful tools to
benchmark the use and policies governing a client’s IT environment. ISO 17779 is a reduced set
of “best practices” that should be adhered to in a generalized IT environment. Although some
ideas are not new—such as business continuity and information security—ISO 17779 organizes
these best practices into a coherent policy that can be modified to apply to a particular company.
COBIT represents a comprehensive set of control processes, objectives, and activities that can be
customized to an entity’s needs. COBIT’s scalability and comprehensiveness enable it to be part
of an engagement that serves an entity’s complete IT needs, whether by designing,
implementing, or reviewing them. The systematic manner in which COBIT can be presented and
used creates the opportunity to deliver an efficient and effective consulting engagement. The
added value in subscribing to ISO 17779 or to the ISACA best practices can be helpful in
creating effective engagement checklists and proving one’s technical ability.

Joseph B. O’Donnell, PhD, is an assistant professor at Canisius College, Buffalo, N.Y.


Yigal Rechtman, CPA, CFE, CITP, CISM, is a partner of Person & Company, LLP, CPAs, in
New York City. Both are members of the NYSSCPA’s Technology Assurance Committee.

You might also like