74945bos60526 cp12
74945bos60526 cp12
74945bos60526 cp12
12
7
DIGITAL AUDITING AND
ASSURANCE
LEARNING OUTCOMES
After studying this chapter, you will be able to:
❑ Understand the key features of digital auditing and auditing digitally.
❑ Understand IT environment and its complexity.
❑ Know how to identify the IT dependencies impacting the audit.
❑ Gain the knowledge of how to identify IT related risks and controls that
exists in an automated environment.
❑ Learn key considerations to assess the cyber risks and remote audit.
❑ Learn the control objectives that auditor should consider in performing IT
audit.
❑ Know the types and tools available to perform digital audit.
❑ Learn the usage of data analytics in assessing and analysing the key data.
CHAPTER OVERVIEW
Auditing digitally is using the advancements in technology for conducting an effective and
efficient audit. With a rapidly growing IT environment, adaptation of technology in auditing
practices is imminent requirement. Use of data analytics, artificial intelligence and robotics
process automation can go a long way in improving quality of audit. Data analytics involves
analysing large sets of data to find actionable insights, trends and drawing of conclusions
for informed decision making. Currently, audit approach is based upon sampling. This is
undergoing transformation and process is likely to be accelerated in times to come.
Robotics Process Automation (RPA) involves use of programs to perform repetitive tasks.
Such computer coded software is useful in many business processes like payroll
generation, order processing, invoice processing and a host of other business functions
involving repetitive tasks. RPA can help auditor in automating classification for risk
assessment process with the help of bots. Bots can even be used to prepare report on
automated controls configured on ERP!
He was also reading an article as to how disruptive blockchain technology could b e as
internet was in 90s and its impact on auditing profession. Blockchain as a technology takes
the connectivity of the internet one step further. It offers users the internet of value.
Blockchain is a shared immutable ledger and is replicated across several systems in almost
real time. It is put together in encrypted blocks. It was further opined that Blockchain will
do for transactions what the Internet did for information.
With emerging technologies like Blockchain and its combination with data analyt ics, big
data and robotics, it is going to be possible to audit all of information. Since blockchain
allows access to transaction history, it is going to revolutionize audit approach and work.
The information stored on a blockchain is likely to be available to the auditor as soon as it
is generated. How exciting outcomes of such a scenario could be? The dependency on the
client to provide information may become redundant in coming future. Another important
application of it is use of “smart contracts” which can be embedded in a blockchain to
automate business processes. It is likely to lead to more emphasis on “tests of controls”
than “tests on details”.
His discerning mind was quickly realizing that with advancements in technology, cyber-
attacks are also bound to grow. It is not an IT issue alone. It affects an entity’s reputation
and theft of sensitive information like intellectual property rights, personally identifiable
information and disruptions in automated operations. Auditor should consider whethe r
cyber risk represents a risk of material misstatement to the financial statement as part of
the audit risk assessment activities. Focus should be on understanding the cyber risks
affecting the entity and the actions being taken to address these risks.
1. DIGITAL AUDIT
1.1 What is a Digital Audit?
Digital Audit is placing assurance on the effectiveness of the IT systems implemented in an
organization. Technology is becoming an integral part of day-to-day business operations. It is
essential that organizations review their technology-related controls to identify gaps and risks for
continuous improvement and to ensure regulatory compliance. A strong controls and security
position will allow organizations to build trust with their stakeholders.
• A digital audit improves the quality of opinion. This consequently leads to a more reliable
audit report
• Digital Audit leads to savings in time, cost and human effort which can be utilized
towards more productive tasks. Many of today’s digitally enabled processes can be
orchestrated to operate autonomously 24x7, driving real-time transactions.
• The digital audit will help organization gain a more comprehensive overview of end-to-
end processes and how technologies are utilized, controlled and optimized against
standards set.
• The digital audit will help create a future for a digital strategy and paves way for adopting
new technologies such as AI and Robotic, usage of analytics and automation.
Technology
Advancement
Savings in
More Reliable
time cost and
Audit Report
human effort
Features of a
Digital Audit
Standardise
Process
(ii) Better Audit Quality: Technology can correctly evaluate massive volumes of data quickly.
This can assist auditors in determining the areas that require more testing, lowering the
chance that serious misstatements or other problems would go unnoticed.
(iii) Lower Costs: By automating processes that were previously done manually, technology can
assist with the cost of auditing. This may shorten the time needed to complete an audit, which
may lower the audit's overall cost.
(iv) Better Analytics: Improved analytics capabilities can aid management and auditors in seeing
trends and patterns that may be challenging to spot manually. For instance, AI can examine
a lot of financial data to spot possible fraud, which is hard for auditors to spot manually.
(v) Improved Risk Assessment: Creating a number of automations to assist with the audit
process and streamlined testing improves the risk assessment procedure. Management and
auditors put their testing efforts on sites with a higher risk of material misstatement and make
informed decisions.
• Changes in the way the entity’s systems are developed and maintained and whether these
changes introduce new risks and require new controls to respond to those risks
• The impact the new technology as how the organization obtains or generates and uses
relevant, quality information to support the functioning of internal control.
2. AUDITING DIGITALLY
2.1 What is the concept of auditing digitally?
Auditing Digitally is using advancements in technology for conducting an effective and efficient audit.
With a rapidly growing IT environment it is essential to adapt technology in auditing practices.
Using Sampling Tools for selection of a sample size from a population based on materiality
or using Bot for analysis of statutory payments compliance as part of an audit assignment.
It is time to digitize the way an audit is delivered through automation and innovation. There are new
technologies to help capture data, automate procedures, analyse information and focus on the real
risks of the client. The opportunity is in understanding how technology can help and then applying it
to the auditing challenges.
Expectations from an Auditor
Audit teams need to involve the experts on different software applications and technologies. Having
the right level of expertise of new technology (such as RPA, AI, blockchain technology allows
auditors to provide the highest quality of audit. Investment in digitally upskilling the people is th e real
secret to quality technology audit. Investment in technology across the profession has largely been
focused on developing and using tools to automate and enhance existing processes, such as
data analytics and collaboration and sharing tools, which help to drive quality in audits today. While
this will remain core to the role of technology in the audit, there are many opportunities where more
advanced technologies such as AI and drones could have an even bigger impact. Such technologies
may also play a role in evolving the scope of the audit (e.g., in using data analytics and machine
learning to help identify fraud).
A manager on a weekly basis performs a manual control to review if vendor master
additions and changes in the system are done post appropriate approvals.
This control can be tested and reperformed by the auditor using RPA technology – BOTs can
login into the system and generate the report and write the output to an Excel file. Based on the
population the BOT will select the samples of changes to be tested. Further BOT will pull the
correct file with approved changes from SharePoint. Then it will perform the testing wherein it
will populate the details of approvals (date, approved by) and identify if changes made without
approvals. Lastly BOT will summarise the results for all the selected samples in an excel file.
The auditor will then review the final results file to check if there are any exceptions (changes made
without approvals) noted in the selected samples.
Due to the usage of BOT manual intervention has been reduced, more accurate results are
populated, it results in saving auditors time as well and exceptions highlighted can be readily
reviewed.
Better risk assessment: With usage of automation and technology in audit, auditor may focus
on the real challenges and assess the potential risk precisely. It gives time to auditors to
focus on the bigger picture rather than being involved with repetitive tasks. Dashboards,
visual presentations and other tools helps in understanding where the risk lies and what all
areas need more attention.
2.3.3 How will you upskill your people to make best use of the technology available?
Technology is only as good as the people using it. Training and development are critical to en sure
teams understand how and why they are using the technology. Reluctance to change is obvious,
however continuous training help them to get better.
Intelligent Process
Robotic Process
Business Process Automation (IPA)
Automation (RPA)
Macros and Scripts Automation (BPA) Combining RPA with
Automating labour-
Rules-based
based automation Reengineering artificial intelligence
intensive, repetitive
within a specific existing business technologies to
activities across
application processes identify patterns,
multiple systems
e.g. workflows learn over time, and
and interfaces
optimize workflows
The auditor’s understanding of the automated environment should include the following:
The illustration below is an example of how an auditor can document details of an automated
environment:
4. Identification of the technologies used: The need to understand the emerging technologies
implemented and the role they play in the entity's information processing or other financial
reporting activities and consider whether there are risks arising from their use.
Given the potential complexities of these technologies, there is an increased likelihood that
the engagement team may decide to engage specialists and/or auditor's experts to help
understand whether and how their use impacts the entity's financial reporting processes and
may give rise to risks from the use of IT.
Some examples of emerging technologies are:
• Blockchain, including cryptocurrency businesses (e.g., token issuers, custodial
services, exchanges, miners, investors)
• Robotics
• Artificial Intelligence
• Internet of Things
• Biometrics
• Drone
5. Assessing the complexity of the IT environment: Not all applications of the IT environment
have the same level of complexity. The level of complexity for individual characteristics differs
across applications. Complexity is based on the following factors – automation used in the
organization, entity’s reliance on system generated reports, customization in IT applications,
business model of the entity, any significant changes done during the year and
implementation of emerging technologies.
After considering the above factors for each application the over complexity is assessed of
the IT environment.
It is more likely that there will be more risks arising from the use of IT when the volume or complexity
of automated application controls is higher, and management is placing greater reliance on those
controls for effective processing of transactions or the effective maintenance of the integrity of
underlying information.
• With advancement in usage of IT the risk of regulatory compliances increases. Any change in
the law, order, guidelines or agreements will impact the business, its related costs, investments
etc. A FMCG sector will be subject to different regulatory requirements than a financial
company, however both businesses will need to manage their respective compliance risks.
Performance Issues arises with the way requests are processed in the IT systems. Heavy data load,
network usage impacts the application performance and its responsiveness. To overcome the
performance issues of IT systems, resources or hardware can be added to an existing nodes, which
is known as scaling. However, scaling can be expensive therefore an informed decision should be
made in case of adding a hardware or changing the architecture.
Type Description
Automated Automated controls are designed into the IT environment to enforce business
Controls rules. For example,
Purchase order approval via workflow or format checks (e.g., only a particular date
format is accepted), existence checks (e.g., Duplicate customer number cannot
exist), and/or reasonableness checks (e.g., maximum payment amount) when a
transaction is entered.
Reports System generated reports are information generated by IT systems. These reports
are often used in an entity's execution of a manual control, including business
performance reviews, or may be the source of entity information used by us when
selecting items for testing, performing substantive tests of details or performing a
substantive analytical procedure. E.g. (Vendor master report, customer ageing
report)
The illustration below is an overview of the Control Objectives and controls for each area of
General IT Controls:
• Access requests to the application are properly reviewed and authorized
Access Security
by management
Objective: • Access of terminated user is removed on a timely basis
To ensure that access to programs and • Access rights to applications are periodically monitored for
data is authenticated and authorized to appropriateness
meet financial reporting objectives • Transactions of administrative and sensitive generic IDs are monitored
• Security policies are procedures are maintained
• Access to operating system and database is restricted.
• Change Management policy and procedures are maintained.
Program Change • Development, testing and production environments are segregated for
Objective changes to application configurations
To ensure modified systems continue to • Changes are adequately tracked and recorded.
meet financial reporting objectives • Changes to application configurations are adequately tested and approved
before being migrated into production
• Emergency changes are approved.
• Segregation of duties is mainatined between developer and implementor.
Data Centre and network operations • Policies and procedures for data back and recovery is maintained.
Objective • Data is appropriately backed up and recoverable
To ensure production systems are • Restoration testing is perfomed
appropriately backed up to meet financial • Monitoring and complaince of service level agreements.
reporting objectives • Batch job scheduled are monitored for failures and access is restricted.
IT dependencies may also affect the design of the entity's controls and how they are implemented.
Therefore, auditors consider IT dependencies relevant to audit and evaluate the related risks .
Auditor should scope in ITGCs to tests when there are IT dependencies identified in the system. If
the controls around IT environment are not implemented or operating effectively it will result in not
relying on ITGCs which means the IT dependencies could not be relied upon.
Regulators across the globe have placed the topic of cyber risk management under increasing
scrutiny, requiring financial institutions to assess the maturity of their cybersecurity program,
manage cyber risks, and enhance resiliency against cyber-attacks. Most common types of cyber-
attacks are:
• Malware : Malware or malicious software is any program or code that is created with the
intent to do harm to a computer, network or server. Malware is the most common type of
cyberattack, its subsets are ransomware, fileless Malware trojans, viruses etc.
Type Description
Ransomware In a ransomware attack, an adversary encrypts a victim’s data and
offers to provide a decryption key in exchange for a payment.
Ransomware attacks are usually launched through malicious links
delivered via phishing emails, but unpatched vulnerabilities and policy
misconfigurations are used as well.
Fileless Malware Fileless malware is a type of malicious activity that uses native,
legitimate tools built into a system to execute a cyber-attack. Unlike
traditional malware, fileless malware does not require an attacker to
install any code on a target’s system, making it hard to detect.
Trojan A trojan is malware that appears to be legitimate software disguised as
native operating system programs or harmless files like free downloads.
Trojans are installed through social engineering techniques such as
phishing or bait websites.
Mobile Malware Mobile malware is any type of malware designed to target mobile
devices. Mobile malware is delivered through malicious downloads,
operating system vulnerabilities, phishing, smishing, and the use of
unsecured Wi-Fi.
• Identity-Based Attacks : When a valid user’s credentials have been compromised and an
adversary is pretend to be that user. For e.g., people often use the same user ID and password
across multiple accounts. Therefore, possessing the credentials for one account may be able to
grant access to other, unrelated account.
• Insider Threats : When current or former employees that pose danger to an organization
because they have direct access to the company network, sensitive data, and intellectual
property (IP), as well as knowledge of business processes, company policies or other
information that would help carry out such an attack.
• DNS Tunneling : DNS Tunneling is a type of cyberattack that leverages domain name system
(DNS) queries and responses to bypass traditional security measures and transmit data and
code within the network. This tunnel gives the hacker a route to unleash malware and/or to
extract data, IP or other sensitive information by encoding it bit by bit in a series of DNS
responses.
• IoT-Based Attacks: An IoT attack is any cyberattack that targets an Internet of Things
(IoT) device or network. Once compromised, the hacker can assume control of the device,
steal data, or join a group of infected devices
1. Stage 1 - Assessing the cyber risk: No organization is completely immune to a cyber risk.
Different clients will have different levels of risks, even with the same industry. Every organization
should consider at least the common threats-
• Ransomware disabling their organization (including their plants and manufacturing facilities)
• Common criminals using email phishing and hacks for fraud and theft.
• Insiders committing malicious activities or accidental activities resulting in unintended
discourse of information theft and frauds.
2. Stage 2 - Impact of cyber risk: Cyber-attack can impact one, two or more types of risks. The
impact of the attack would vary from organization to organization and most importantly from an
attack to attack. Some of the indicative areas can be –
• Regulatory costs
• Intellectual property theft which may not only take the competitive advantage, but we may
also result in any impairment/impediment charge because of the loss of IP.
• Incident response cost which could be for investigations & remediations
• Breach of Privacy, if personal data of a consumer is hacked it could have a significant
impact on the organization.
• Fines and penalties
3. Stage 3 - Managing the cyber risk: A strategic approach to cyber risk management can help
an organization to:
• Gain a holistic understanding of the cyber risks, threats facing their organization and other
financial institutions
• Assess existing IT and cybersecurity program and capabilities against the relevant
regulatory requirements
• Align cybersecurity and IT transformation initiatives with strategic objectives and critical
risks
• Understand accepted risks & documented compensating controls
The entity should classify and prioritize protection of their information assets based on sensitivity
and business value and periodically reviews the systems connected to the network on which digital
assets reside.
From the governance perspective management should review how cybersecurity risks affect
internal controls over financial reporting. In case of adverse attack how management is going to
assess the impact on the recoverability of financial data and impact on revenue recognition.
To determine overall responsibility for cybersecurity in the business environment entity should
establish roles and responsibilities over cybersecurity (CISO, CIO). Further the risk assessment
should be discussed with those charged with governance (e.g., the Audit Committee or Board of
Directors).
Formal training should be conducted to make the teams aware of the risk associated with cyber-
attacks. Entity should implement effective controls for data security. Entity should have a process
& procedures in place for identifying material digital/electronic assets on the balance sheet subjec t
to cybersecurity risk (e.g., intellectual property, patents, copyrighted material, trade secrets) and
prioritizing their protection based on criticality.
controls, improved technology in terms of firewall, anti-virus, tools etc needs to be implemented to
safeguard the entity.
Sukanya, a CA final student, is of the view that cyber risks are issues of IT and result only in
information loss to an entity. She also feels that many cyber-attacks are not directly targeted at
financial systems and do not pose risk of material misstatements to financial statements of an entity.
Is her view proper?
CASE STUDY
What has happened:
The CEO of a hotel realized their business had become the victim of wire fraud when the accounts
payable executive began to receive insufficient fund notifications for regularly recurring bills.
A review of the accounting records exposed a serious problem. Upon investigating it was noted that
the CEO had clicked on a link in an email that he thought was from the trusted source. However, it
wasn’t and when he clicked the link and entered his credentials, the cyber criminals captured the
CEO’s login information, giving them full access to intimate business and personal details.
Type of Attack: Social engineering, phishing attack.
A phishing attack is a form of social engineering by which cyber criminals attempt to trick individuals
by creating and sending fake emails that appear to be from an authentic source, such as a business
or colleague. The email might ask you to confirm personal account information such as a password
or prompt you to open a malicious attachment that infects your computer with malware.
Result: The hotel’s cash reserves were depleted. The fraudulent transfers amounted to more than
₹1 million. The hotel also contacted a cybersecurity firm to help them mitigate the risk of a repeat
attack.
Impact: The business lost ₹1 million, and the funds were not recovered. Further there was loss of
business reputation too.
Lessons Learned:
− Train the staff about the dangers of clicking on unsolicited email links and attachments, and
the need to stay alert for warning signs of fraudulent emails. Engage in regular email security
training.
− Implement stringent wire transfer protocols and include a secondary form of validation (Multi
Factor Authentication)
− Have a cyber incident response plan ready to implement.
− What systems and technologies are used to initiate, authorize and process requests
related to changes to vendor master data?
− Are authentication protocols defined to verify modifications to vendor master data
(e.g., call back procedures, multi-factor authentication)?
2) Controls around electronic transfer of funds:
Wire transfers or electronic funds transfers, similar to vendor changes noted above, cyber
schemes pertaining to fraudulent requests for wire transfers are made relating to business
transactions and vendor payments, as well as fraudulent requests appearing to come from
financial institutions requesting disbursement from customer asset accounts.
− Are personnel responsible for wire transfers educated on the relevant threats and
information related to common phishing scams associated with fraudulent requests for
wire transfers?
− Are authentication protocols defined to verify wire transfer requests (e.g., call back
procedures, dual-authentication procedures)?
− What systems and technologies are used to facilitate the request/initiation,
authorization and release of 0 wire transfers?
3) Controls around patch management:
Cyber and ransomware attacks exploit known security vulnerabilities resulting in the
manipulation or the destruction of data. Exploitations of known security vulnerabilities are
often caused by unapplied patches or upgrades.
Auditors must develop tailored strategies to ensure the remote audit meets the requirements and
deliver results equivalent to traditional onsite audits.
Feasibility and Planning
• Planning should involve agreeing on audit timelines, meeting platform (Zoom calls/ Microsoft
Teams/Google Meet) to be used for audit sessions, data exchange mechanisms, any access
authorization requests. Ensure feasibility is determining what technology may be used, if
auditors and auditees have competencies and that resources are available.
• The execution phases of a remote audit involve video/tele conferencing with auditees. The
documentation for audit evidence should be transferred through a document sharing platform.
Confidentiality, Security and Data Protection
• To ensure data security and confidentiality, access to document sharing platform should be
sufficiently restricted and secured by encrypting the data that is sent across the network. The
information, once reviewed and documented by auditor, is removed from the platform, and
stored according to applicable archiving standards and data protection requirements.
Auditors should take into consideration legislation and regulations, which may require
additional agreements from both sides (e.g., there will be no recording of sound and images,
or authorizations to using people’s images). Auditors should not take screenshots of auditees
as audit evidence. Any screenshots of documents or records or other kind of evidence should
be previously authorized by the audited organization. In case of accessing the auditee’s IT
system auditor should use VPN (Virtual private network). VPN is a service which creates safe
and encrypted online connection. It prevents unauthorized users to enter into network and
allows the users to perform work remotely.
Risk assessment
• The communication from auditor as well as auditees need to clear and consistent, and this
becomes crucial during remote audit. The risks for achieving the audit objectives are
identified, assessed and managed. The assessment if remote audit would be sufficient to
achieve the audit objectives should be done and documented for each audit involving all
members of the audit team and the audited organization representative.
ADVANTAGES DISADVANTAGES
Cost and time effective: No travel time and Due to network issues, interviews and meetings
travel costs involved. can be interrupted.
Comfort and flexibility to the audit team as Limited or no ability to visualize facility culture of
they would be working from home the organization, and the body language of the
environment, auditees. Time zone issues could also affect the
efficiency of remote audit session
Time required to gather evidence can spread The opportunity to present doctored documents
over several weeks, instead of concentrated and to omit relevant information is increased. This
into a small period that takes personnel from may call for additional planning, some
their daily activities. additional/different audit procedures,
Security and confidentiality violation.
Auditor can get first-hand evidence directly Remote access to sensitive IT systems may not
from the IT system as direct access may be be allowed. Security aspects related to remote
provided. access and privacy needs to be assessed
Widens the selection of auditors from global Cultural challenges for the auditor. Lack of
network of experts. knowledge for local laws and regulations could
impact audit. Audit procedures like physical
verification of assets and stock taking cannot be
performed.
Remote auditing plays a vital part, and provide assurance when unprecedented circumstances, like
COVID. It provides an opportunity for organisations and auditors to leverage communication
technology tools. In addition, management perception about remote audits is changing as it provides
flexibility in terms of time ensuring that day-to-day business activities are not impacted, along with
the reductions in cost.
Auditor should also consider while performing audit using remote means, if access to system and
network is provided post appropriate approvals both to employees who are working remotely and to
auditors who are auditing remotely and if data is transferred through encrypted means to maintain
data privacy. Management should maintain and review the list of people who are working remotely
and make sure they access the system and network through VPN (Virtual Private Network) only and
such accesses should be approved. Further once the employee leaves the organisation or audit is
completed such VPN access should be terminated timely. Auditors can test such controls while
performing remote audit.
As a result, businesses will be able to create strategies based on verifiable data and professional
assumptions and auditors can improve the audit quality. It allows auditors to more effectively audit
the large amounts of data held and processed in IT systems in larger clients.
The data analytics methods used in an audit are known as Computer Assisted Auditing Techniques
or CAATs. It involves use of multiple data analytical tool or visualization tools that can help the
auditor to deep dive into the problem statement and hence increase the audit quality. This also
minimizes the scope of missing out on key attributes that might be of a higher risk to the organization
and its respective business.
Auditor performing audit analytics can make use of various applications and tools that help them to
analyse large data sets and obtain insights that help them to make the quality of the audit better.
Some of the popular tools used across the industry as part of CAATs are listed below:
1. ACL - Audit Command Language (ACL) Analytics is a data extraction and analysis software
used for fraud detection and prevention, and risk management. It samples large data sets to
find irregularities or patterns in transactions that could indicate control weaknesses or fraud.
ACL (Audit Command Language) is used to analyse and check complete data
sets to perform Trial Balance reconciliations during the Audits. In such case
scenarios, the entity provided the General Ledger dump and system Trial
Balance. Using ACL, the completeness of the data can be ensured as the data set
exceeded beyond the capacity of the excel and basic functions like record count, sum,
pivoting can be performed within ACL where excel could not perform such actions.
implement functions, auditors could perform re-computation for all the transactions entry
and noted that the revenue was being understated as the expected revenue was more
than the actual calculated. This was due the fact that the addendum between the logistic
company and the client was not revised in the system and old versions of rates were
used to compute the revenue. Alteryx helped in analysing and recomputing the huge data
set and to focus on actual risk.
4. CaseWare – CaseWare is a data analysis software & provide tools that helps in conducting
audit and assurance engagements quickly, accurately and consistently. It shares analytical
insights which help in taking better informed decisions. It helps in streamlining processes and
eliminating the routine tasks. Used by accounting firms, governments and corporations
worldwide, this trusted platform integrates everything you need to conduct assurance and
reporting engagements.
CaseWare provides the solutions to build accounting software which turns any
document, including financial statements into cost effective client ready report.
It automatically links to client data and securely communicate with the client in
real time. Regardless of location, all authorized users have access to the same
documents. Consistency of data is ensured. Refer screenshot below to illustrate audit,
review and compilation process maintained on-screen.
Based on managements and auditors’ independent risk assessment procedures, the audit’s scope
may need to include peripheral systems, as well as testing general IT and application controls
relative to those systems due to the increased use of technology that is relevant to fin ancial
reporting.
Audit Implications
A shift to connected devices and systems may result in auditors not being able to rely only on manual
controls. Instead, auditors may need to scope new systems into their audit. Audit firms may need to
train and upskill auditors to evaluate the design and operating effectiveness of automated controls.
Consumer-facing tools that connect to business environments in new ways can impact the flow of
transactions and introduce new risks for management and auditors to consider. Consider payment
processing tools that allow users to pay via credit card at a retail location through a mobile device.
This could create a new path for incoming payments that may rely, in part, on a new service provider
supplying and routing information correctly. Auditors would need to consider the volume of those
transactions and the processes and controls related to it.
Siri to help find your Air Pods or told Amazon Alexa to turn off the lights, quick commands to open
a phone camera or start a particular playlist, AI to predict when to book the lowest prices for flights,
hotels, car and vacation home rentals. Using historical flight and hotel data, AI will also recommend
to the user whether the booking has reached its lowest price point or if the user should hold out a
bit longer for the price to drop.
Auditor Implications
Given the invisible nature of algorithms, audits must focus on the logical flow of processes. A review
of AI should ascertain whether unintended bias has been added to the algorithms. Auditors should
assess the effectiveness of algorithms and whether their output is appropriately reviewed and
approved. Because AI is built on software modules, auditors must also consider cybersecurity and
search for possible bugs and vulnerabilities that can be exploited to impact AI functionality. Auditors
should confirm their understanding of how the use of AI affects the entity’s flows of transactions,
including the generation of reports or analytics used by management. Auditors also should con sider
whether the AI is making decisions—or being utilized by management as part of the decision-making
process.
If management shifts its focus on oversight by relying on AI, auditors should understand what shift
occurred, how new risks might be addressed, and whether existing risks may not be getting the
same level of attention. Understanding these changes could drive changes in the audit approach.
7.3 Blockchain
Blockchain is based on a decentralized and distributed ledger that is secured through encryption.
Each transaction is validated by the blockchain participants, creating a block of information that is
replicated and distributed to all participants. All blocks are sequenced so that any modification or
deletion of a block disqualifies the information.
Despite resistance, the benefits associated with blockchain technology are being recognized across
a variety of other industries.
Audit Implications
Auditors should consider the appropriate governance and security transactions around the
transactions. Although blockchain’s core security premise rests on cryptography, there are risk
factors associated with it. As blockchain interacts with legacy systems and business partners,
concerns related to insecure application programming interfaces (APIs), data confidentiality and
privacy cannot be ignored.
Weak blockchain application development protocols are something auditors cannot overlook.
Similarly, data privacy laws and regulations may be area of concern as data are communicated
across geographic boundaries. Auditors must be able to determine whether the data put on
blockchain will expose the enterprise to liability for noncompliance with applicable laws and
regulations.
Common risks for blockchain technology
The strengths of blockchain can also be its weaknesses. The inability to reverse transactions and to
access data without the required keys make the system secure, but also mean that organisations
need specific protocols and management processes to ensure that they are not locked out and have
clear contingency plans. Operating through network nodes could also expose the organisation to
cyber-attacks and data hacks, so security issues are important. Auditors should also ensure that the
organisation has the necessary data management processes and complies with regulation s. The
regulatory landscape is still evolving for blockchain, so audit teams should check that compliance
managers are following developments constantly and adapting processes accordingly.
CASE STUDY
XY Bank, headquartered in New York, offers a broad range of financial services including asset
management, commercial banking, investment banking, and treasury and securities services.
The Five Indian banks in partnership with XY bank, provide a comprehensive range of banking
services and products encompassing retail banking, corporate banking, international banking, and
other financial services. All these banks have been significant contributors to the digitalization of
banking services in India.
Under the pilot programme, the Indian banks will open on-chain Nostro accounts with XY Bank
branch in Gift City. The blockchain-based system is expected to facilitate instant, 24×7 settlement
between the accounts held at the US bank. Essentially, it will create a private intra-correspondent
banking network, redefining the traditional banking hours and enabling seamless money transfer.
Following are the illustrative steps for performing audit of above said block chain:
(a) Obtain a comprehensive understanding of the blockchain-based pilot program, including its
objectives, scope, and key processes involved.
(b) Review the partnership agreements, contracts, and legal documentation governing the
relationship between the Indian banks and XY Bank.
(c) Identify the specific blockchain technology used, its functionalities, and the underlying smart
contracts.
(d) Assess Internal Controls:
Review policies and procedures related to the on-chain Nostro accounts, settlement processes, and
money transfer mechanisms.
Assess the governance framework, risk management practices, and compliance procedures
established by the Indian banks and XY Bank.
(e) Review Security Measures:
Assess encryption methods, cryptographic key management, and secure transmission protocols
used for data protection.
Review measures taken to prevent unauthorized access, cyber threats, and potential vulnerabilities
in the blockchain network.
(f) Test Transaction Validity and Accuracy:
Validate that transactions are recorded and settled accurately on the blockchain, ensuring
adherence to relevant regulations and contractual obligations.
Perform reconciliations between on-chain Nostro accounts and the corresponding accounts held at
XY Bank to confirm the accuracy of balances and transactions.
(g) Evaluate Compliance and Regulatory Requirements:
Review documentation and procedures related to customer due diligence, transaction monitoring,
and reporting obligations.
Ensure that the pilot program adheres to industry-specific standards and best practices.
(h) Assess Business Continuity and Disaster Recovery:
Evaluate the adequacy of backup and recovery procedures, redundancy measures, and failover
mechanisms to ensure uninterrupted operations.
Test the effectiveness of these plans by conducting simulations or examining historical incidents and
response procedures.
Communicate the audit results to the relevant stakeholders, highlighting areas of concern and
suggesting remedial actions.
CASE STUDY
A large passenger carrier is having an AI bot for passenger ticket booking with following processes:
User Interaction: The bot interacts with passengers through various channels such as a website,
mobile app, or messaging platforms. Passengers can initiate a conversation with the bot by providing
their travel details, preferences, and other required information.
Natural Language Processing (NLP): The bot utilizes natural language processing techniques to
understand and interpret the passenger's queries and requests. It can process text or voice inputs
and extract relevant information to facilitate ticket booking.
Query Handling: The bot responds to passenger queries related to ticket availability, fares, train
schedules, seat preferences, and other relevant information. It can provide real -time updates and
answers to common passenger questions.
Booking Process: Upon receiving a booking request, the bot collects the necessary details from
the passenger, including travel dates, destinations, class preferences, and passenger information.
It validates the inputs, checks seat availability, and calculates fares based on t he carrier's pricing
structure.
Integration with Booking Systems: The bot interfaces with the carrier's booking systems to check
seat availability, reserve seats, and process payment transactions. It securely communicates with
the backend systems to initiate the booking process.
Payment Processing: The bot facilitates secure payment transactions, allowing passengers to
provide payment details and complete the booking. It may integrate with various payment gateways
or services to process credit card payments, net banking, or other payment methods.
Confirmation and Ticket Generation: Once the booking is successfully processed, the bot
generates a booking confirmation along with a unique ticket number. It provides the passenger with
the necessary information, including the ticket details, train information, and any other relevant
instructions.
Ancillary Services: The bot may offer additional services such as seat upgrades, meal selection,
travel insurance, or other ancillary offerings. It can provide information and assist passengers in
availing these services during the booking process.
Post-Booking Support: The bot can assist passengers with post-booking support, including
itinerary changes, cancellations, or ticket modifications. It handles these requests, che cks the
carrier's policies, and processes the necessary changes as per the passenger's requirements.
Integration with Customer Support: The bot may be integrated with customer support systems to
escalate complex queries or issues to human agents when necessary. It can provide a seamless
transition from automated assistance to human interaction, ensuring a high level of customer
service.
Following are the illustrative steps to audit ticket booking bot system:
• Identify the objectives and goals of auditing the IRCTC ticket booking bot.
• Determine the scope of the audit, including the specific aspects of the bot's functionality and
operations to be evaluated.
• Review relevant regulatory and compliance standards applicable to the ticket booking
process, such as data protection and privacy regulations, payment card industry standards,
and any specific industry guidelines.
• Identify and assess potential risks associated with the ticket booking bot, such as
unauthorized access to customer data, system failures, or inaccurate booking information.
• Develop a comprehensive set of audit procedures to assess the effectiveness, efficiency, and
compliance of the ticket booking bot. This may include:
• Reviewing the system architecture, design, and documentation.
• Evaluating the security measures in place, including authentication, access controls, and
encryption.
• Testing the bot's functionality by simulating booking scenarios and verifying the accuracy of
the results.
• Assessing the performance of the bot, such as response times and scalability.
• Analyzing logs and audit trails to detect any unusual or suspicious activities.
• Examining the data handling processes, ensuring proper encryption, storage, and protection
of customer data.
• Verifying compliance with relevant regulations, policies, and procedures.
• Present the report to relevant stakeholders, such as management, IT teams, and compliance
officers.
• Track the implementation of recommended actions and ensure appropriate measures are
taken to address any identified weaknesses.
• Periodically review and monitor the bot's performance, security, and compliance to ensure
ongoing effectiveness.
Audit Implications:
It is of utmost importance for auditors to understand RPA processes, which include data extraction,
aggregation, sanitization and cleansing. Unless auditors understand these processes, they will not
be in a position to initiate an audit.
A comprehensive assurance process might demand review of the source code. To perform
substantive testing, auditors must have an understanding of the tools used to develop and maintain
RPA. This will be helpful when auditors review logs, configuration controls, privileged access
controls and the like. General IT controls are applicable as always.
Common Risks of RPA:
Operational and execution risks - Robots are deployed without proper operating model. Buying
the wrong tool, making wrong assumptions, taking shortcuts, and jeopardizing security and
compliance. Assigning proper responsibilities, training and clearly stating about changing roles also
can help you reduce operational risk to a great extent.
Change management risks: Not following the change management implementation lifecycle,
improper and incomplete testing (not covering all scenarios) leads to inaccurate results.
RPA Strategy Risk: Setting wrong expectations, improper KPIs, and unrealistic business goals
creates an environment of uncertainty. Management should discuss, and analyse the complete
working characteristics, potential, and limitations of RPA before drafting a robotic process
automation.
RPA to check IND AS, IFCoFR and Standards on Auditing.
Incorporating Standards on Auditing, IFCoFR, IND AS (para-wise details of | Para reference |
Accounting policy | Relevant data to be captured | Relevant calculation to be made | Presentation in
financial statements | IFCoFR | Audit procedures as per Standards on auditing |) in audit practices
ensures accurate financial reporting, effective internal controls, and reliable audit procedures.
Leveraging RPA in conjunction with these frameworks can significantly enhance audit efficiency,
accuracy, and compliance. RPA developers and auditors should collaborate to align RPA workflows
with relevant standards and guidelines, ultimately improving the effectiveness of audits and
enhancing client assurance given below:
Columnar Presentation of IND AS 16 - Property, Plant & Equipment with IFCoFR
and Audit Procedures
Para Accounting Relevant data Relevant Presentation IFCoFR Audit
ref. policy to be calculation to in financial procedures as
captured be made statements per Standards
on auditing
6 Define PPE as Identify PPE Apply Disclose PPE Establish Verify the
tangible items and their recognition items and their internal existence,
assets that cost criteria and carrying controls over ownership,
are held for components. measurement amounts, the valuation, and
use in the principles. depreciation identification, disclosure of PPE
production or methods and recognition, by inspection,
supply of rates, useful measurement, confirmation,
goods or lives, depreciation, vouching,
services, for impairment impairment, analytical
rental to losses, etc. and disclosure procedures, etc.
others, or for of PPE.
administrative
purposes; and
are expected
to be used
during more
than one
period.
7 Recognize an Assess the Apply cost Disclose the Establish Verify the
item of PPE as probability and model or basis of internal recognition
an asset if it is reliability of revaluation recognition controls over criteria and
probable that future model for and the measurement
future economic subsequent measurement assessment of basis of PPE
economic benefits and measurement of PPE items. probability and items by
benefits cost of PPE of PPE items. reliability of inspection,
associated items. future confirmation,
with the item economic vouching,
will flow to the benefits and analytical
entity; and the cost of PPE procedures, etc.
cost of the items.
item can be
measured
reliably.
8 Measure the Identify the Calculate the Disclose the Establish Verify the cash
cost of an item cash price present value cash price internal price equivalent
of PPE as the equivalent and of deferred equivalent and controls over and present
cash price the present payments the present the value of deferred
equivalent at value of using an value of identification payments for
the deferred appropriate deferred and calculation PPE items by
recognition payments for discount rate. payments for of cash price inspection,
date. If PPE items. PPE items. equivalent and confirmation,
payment is present value vouching,
deferred of deferred analytical
beyond payments for procedures, etc.
normal credit PPE items.
terms,
measure the
cost at the
present value
of all future
payments.
9 Include in the Identify the Allocate the Disclose the Establish Verify the
cost of an item directly directly directly internal directly
of PPE any attributable attributable attributable controls over attributable costs
costs directly costs and the costs to PPE costs and the the and non-
attributable to non- items based on non- identification attributable costs
bringing the attributable a rational and attributable and allocation for PPE items by
asset to the costs for PPE consistent costs for PPE of directly inspection,
location and items. basis. Exclude items. attributable confirmation,
condition any non- costs and non- vouching,
necessary for attributable attributable analytical
it to be costs from costs for PPE procedures, etc.
capable of PPE items. items.
operating in
the manner
intended by
management.
Exclude any
costs that are
not directly
attributable to
bringing the
asset to that
location and
condition.
10 Include in the Identify the Allocate the Disclose the Establish Verify the
cost of an item borrowing borrowing borrowing internal borrowing costs
of PPE any costs and the costs to costs and the controls over and qualifying
borrowing qualifying qualifying qualifying the assets for PPE
costs that are assets for PPE assets based assets for PPE identification items by
directly items. on a rational items. and allocation inspection,
attributable to and consistent of borrowing confirmation,
the basis. costs and vouching,
acquisition, qualifying analytical
construction assets for PPE procedures, etc.
or production items.
of a qualifying
asset as part
of the cost of
that asset in
accordance
with Ind AS 23
Borrowing
Costs. A
qualifying
asset is an
asset that
necessarily
takes a
substantial
period of time
to get ready
for its
intended use
or sale.
11 Exclude from Identify the Deduct the Disclose the Establish Verify the trade
the cost of an trade trade trade internal discounts and
item of PPE discounts and discounts and discounts and controls over rebates for PPE
any trade rebates for rebates from rebates for the items by
discounts and PPE items. the cost of PPE items. identification inspection,
rebates PPE items. and deduction confirmation,
of trade vouching,
discounts and analytical
rebates for procedures, etc.
PPE items.
15 Recognize the Identify the Apply the Disclose the Establish Verify the self-
cost of a self- self- same self- internal constructed
constructed constructed principles as constructed controls over assets and their
asset as the assets and for an acquired assets and the costs by
cost of an item their cost asset. their costs. identification inspection,
of PPE. components. and confirmation,
measurement vouching,
of self-
constructed analytical
assets. procedures, etc.
31 Review the Identify the Assess Adjust the Establish Verify the
residual value, residual value, whether there depreciation internal residual value,
useful life and useful life and is any charge controls over useful life and
depreciation depreciation indication of accordingly the review and depreciation
method of an method of PPE change in and disclose adjustment of method of PPE
asset at least items. expectations the nature and residual value, items by
at each from previous effect of the useful life and inspection,
financial year- estimates. change in depreciation confirmation,
end and, if estimate. method of PPE vouching,
expectations items. analytical
differ from procedures, etc.
previous
estimates,
account for
the change as
a change in an
accounting
estimate in
accordance
with Ind AS 8
Accounting
Policies,
Changes in
Accounting
Estimates and
Errors.
41 Recognize the Identify the Assess the Allocate the Establish Verify the
cost of replacement probability and cost of internal replacement
replacing part parts and their reliability of replacement controls over parts and their
of an item of costs for PPE future parts to PPE the recognition costs for PPE
PPE as an items. economic items and and items by
asset if it is benefits and remove the measurement inspection,
probable that cost of carrying of replacement confirmation,
the future replacement amount of parts for PPE vouching,
economic parts. replaced parts. items. analytical
benefits Disclose the procedures, etc.
embodied replacement
within the part parts and their
will flow to the costs for PPE
entity; and the items.
cost of the
item can be
measured
reliably.
Derecognize
the carrying
amount of the
replaced part.
57 Derecognize Identify the Calculate the Recognize the Establish Verify the
an item of disposed or gain or loss on gain or loss on internal disposed or
PPE on retired PPE derecognition derecognition controls over retired PPE items
disposal or items and their as the in profit or loss. the and their gain or
when no carrying difference Disclose the identification loss on
future amounts. between net disposed or and calculation derecognition by
economic disposal retired PPE of gain or loss inspection,
benefits are proceeds and items and their on confirmation,
expected from carrying gain or loss on derecognition vouching,
its use or amount. derecognition. of PPE items. analytical
disposal. Gain procedures, etc.
or loss arising
from
derecognition
is included in
profit or loss
when the item
is
derecognized.
Some examples of technology risks where auditors should test the appropriate controls
for relying on the digital systems
• Understand how the technologies impact the flow of transactions, assess the completeness
of the in-scope ICFR systems, and design a sufficient and appropriate audit response.
• Assess the appropriateness of management’s processes to select, develop, operate, and
maintain controls related to the organization’s technology based on the extent the technology
is used.
We live in an era of fast technological progress, with new digital devices, applications, and tools
being developed almost on a daily basis. 3D printing, augmented reality (AR) and virtual reality (VR),
biotechnology, auditing through drones (also known as an ‘Unmanned Aerial Vehicle’ (UAV)and
quantum technology are some of the most rapidly advancing areas, with many implications for
society.
Drone Technology: Using drone technology in the remote locations for stock
counts. Drones have great payload capacity for carrying sensors and cameras, thus
they can photograph and physically examine the count of large quantities of fixed
assets and inventory.
Drone captured audit information can be combined with various alternative sources of information
such as QR code readers, handheld bar scanners, manual counts etc. to optimise quality of
deliverables, consolidate audit information and enhance the execution speed while ensuring
correctness and completeness of data.
Drone Technology: Using drone technology in the remote locations for stock counts. Drones have
great payload capacity for carrying sensors and cameras, thus they can photograph and physically
examine the count of large quantities of fixed assets and inventory.
Drone captured audit information can be combined with various alternative sources of information
such as QR code readers, handheld bar scanners, manual counts etc. to optimise quality of
deliverables, consolidate audit information and enhance the execution speed while ensuring
correctness and completeness of data.
Augmented reality: The technology allows users to view the real-world environment with
augmented (added) elements, generated by digital devices.
One famous example was Pokémon Go, a game for mobile devices in which players chase imaginary
digital creatures (visible on their mobile phones) around physical locations.
Virtual reality: VR goes a step forward and replaces the real world entirely with a simulated
environment, created through digitally generated images, sounds, and even touch and smell. Using
special equipment, such as a custom headset, the user can explore a simulated world or simulate
experiences such as flying or skydiving.
Examples of augmented and virtual reality? In architecture and engineering businesses, AR and
VR allow architects to see their building plans come to life before being built. In the business sector,
these technologies allow products to be previewed or customised, thus improving productivity and
offering new marketing possibilities.
In the health sector, AR can provide surgeons with additional information when operating on a
patient, such as heartbeat and blood pressure monitoring and virtual x-rays. Vision Pro is essentially
an augmented-reality (AR) headset that “seamlessly” blends the real and digital worlds . The device
can switch between augmented and full virtual reality (VR) using a dial.
Metaverse: The metaverse is the emerging 3-D digital space that uses virtual reality, augmented
reality, and other advanced internet technology to allow people to have lifelike personal and business
experiences online. It represents a convergence of digital technology to combine and extend the
reach and use of Cryptocurrency, Artificial Intelligence (AI), Augmented Reality (AR) and Virtual
Reality (VR)
The internet offers many experiences today, but tomorrow’s Metaverse will feel more interconnected
than ever before. We are heading towards mature landscape of virtual spaces with transferable
identities and assets enabled by blockchains (NFTs) that are interoperable or interchangeable. It
further includes highly automated systems, immersive interfaces, hyperconnected networks and
digital reflections.
Some considerations for future –
• Beyond cryptocurrencies, coins, and exchanges, players in the Metaverse will need to
consider how to build digital monetary systems and apply economic principles to things like
digital land.
• Governance models will become ever more difficult to balance openness and user
contribution with strategic direction and innovation.
• Identity in the digital world has historically been different based on the platform utilized. The
practical challenge of identity will also have to be considered in the Metaverse (e.g., KYC)
• Synchronicity is the ability for aspects of the Metaverse to be multiplayer, simultaneous, and
real-time. This includes transactions and actions happening in the Metaverse and are
dependent on the infrastructure of digital economies, networking and computing power
required to operate a digital world.
Case scenarios to illustrate the potential application of the metaverse in the financial domain:
• Virtual Banking and Transactions: A forward-thinking financial institution, establishes a
presence in the metaverse to offer virtual banking services. Users can create virtual ba nk
accounts, access personalized financial dashboards, and perform transactions using virtual
currencies. Customers can seamlessly transfer funds, make virtual purchases, and engage
in virtual commerce, all within the immersive environment of the metaverse. XYZ Bank
leverages the metaverse to provide a convenient and interactive banking experience,
attracting tech-savvy customers who value digital innovation.
• Digital Asset Management: A digital asset management company, recognizes the growing
popularity of virtual assets in the metaverse. They launch a virtual asset trading platform
within the metaverse, allowing users to buy, sell, and trade NFTs and other digital assets.
Investors can diversify their portfolios, participate in virtual auctions, and even showcase their
virtual art collections in virtual galleries. Crypto Investments Ltd. leverages the metaverse's
decentralized and secure infrastructure to facilitate transparent and efficient transactions of
virtual assets.
• Virtual Financial Education and Training: A Financial Learning Academy aims to enhance
financial literacy using the metaverse. They create a virtual classroom environment where
participants can attend interactive financial education sessions. Students can engage in
simulated investment activities, learn about budgeting and financial planning, and gain hands-
on experience through virtual trading simulations. Financial Learning Academy leverages the
immersive nature of the metaverse to provide an engaging and practical financial education
platform, preparing individuals for real-world financial challenges.
• Virtual Meetings and Conferences: For a leading industry even an organisation hosts a
virtual conference within the metaverse. Participants from around the world can access the
conference through their virtual avatars. They can attend keynote speeches, panel
discussions, and networking events in virtual conference halls. Attendees can interact with
industry experts, explore virtual exhibition booths, and establish valuable connections in the
financial sector. Global Finance Summit leverages the metaverse to create a global and
inclusive conference experience, fostering collaboration and knowledge sharing.
• Data Visualization and Analytics: A company utilizes the metaverse to offer advanced data
visualization and analytics tools to financial professionals. Their virtual analytics platform
allows users to visualize complex financial data in interactive and immersive 3D
environments. Users can explore data trends, conduct simulations, and analyze fi nancial
performance through intuitive interfaces within the metaverse. Analytics Solutions Inc.
leverages the metaverse's immersive capabilities to enhance data-driven decision-making,
enabling financial professionals to gain deeper insights into market trends and make informed
investment decisions.
auditors have to think of the controls around privacy, data security, governance to make it more
regulated.
10. CONCLUSION
Emerging technologies bring opportunities to organizations, but they also expose the enterprise to
new risk. Auditors are expected to identify the right balance between cost and benefit of internal
controls for mitigating these risk factors. This includes understanding how technology integrates with
business, how it is governed, which activities are automated and how they are controlled, what the
business impacts are as a result of this automation, and how negative impacts are controlled and
monitored. Though auditors are not expected to be experts in every technology, they should be able
to identify the risk inherent with these technologies. This includes understanding the technology
architecture, the internal control framework embedded in the technology and its integration with
business.
[E] CA X is planning for audit of an entity. The timelines are agreed in a meeting with key
management person on an electronic meeting platform. The entity also agrees to provide data
electronically. Video-conference meetings are to be held from time to time with the client.
Keeping in view above situations, answer the following questions: -
1 In respect of situation regarding working of insurance company in health insurance sector,
which of following technologies has likely been used?
(a) Internet of things
(b) Data analytics
(a) Ransomware
(b) Trojan
(c) Denial of service attacks
(d) Time zone issues could also affect the efficiency of audits.
Key Takeaways
➢ A digital audit improves the quality of opinion. This consequently leads to a more reliable
audit report. It leads to savings in time, cost and human effort which can be utilized towards
more productive tasks.
➢ Auditing digitally is using the advancements in technology for conducting an effective and
efficient audit. With a rapidly growing IT environment it is essential to adapt technology in
auditing practices.
➢ It is necessary for an auditor to understand key areas of automated environment. Such key
areas include understanding flow of transaction, identification of significant systems,
identification of manual and automated controls and identification of technologies used.
➢ It is also imperative upon an auditor to identify the risks arising from the use of IT. The
auditor may consider the nature of the identified IT application.
➢ Applicable risks arising from the use of IT may also be identified related to cybersecurity. It
is more likely that there will be more risks arising from the use of IT when the volume or
complexity of automated application controls is higher, and management is placing greater
reliance on those controls for effective processing of transactions or the effective
maintenance of the integrity of underlying information.
➢ Cyber risks have to considered like a business risk. It is necessary for an auditor to
understand cyber risk strategy of an entity. It should include gaining some knowledge about
cybersecurity framework of an entity.
➢ Cybersecurity framework includes how management is identifying the risk, protecting and
safeguarding its assets (including electronic assets) from the risk, management preparedness
to detect the attacks, anomalies and responsiveness to the adverse event.
➢ Apart from having the cyber security policies, procedures, framework and regular assessment
in place, management should have a strong and updated internal controls to ensure they are
covered from cyber risks. Such controls could include controls over vendor setup, electronic
fund transfer and patch management etc.
➢ Emerging technologies in business are also transforming auditing landscape. Data analytics,
artificial intelligence (AI), robotic process automation, and blockchain are some of such
technologies.
➢ Auditing digitally also has to assess technology risk considerations like relying upon programs
which are inaccurately processing the data, issue of technological personnel gaining access
privileges beyond those necessary to perform their duties, inability to access data as required,
cybersecurity risks etc.
Theoretical Questions
1. Briefly describe the advantages and challenges of Auditing digitally.
2. What are the stages involved in understanding the IT environment and what key
considerations auditor should consider?
3. Auditor should scope in ITGCs to tests when there are IT dependencies identified in the
system. Briefly describe the types of IT dependencies.
4. What does cyber risk explain it with some examples.
5. Briefly describe the cyber security Framework.
6. What are the advantages and disadvantages of remote audit?
7. In an automated environment, the data stored and processed in systems can be used to get
various insights into the way business operates. This data can be useful for preparation of
management information system (MIS) reports and electronic dashboards that give a high-
level snapshot of business performance. In view of above you are required to briefly discuss
the meaning of data analytics and example of such data analytics techniques.
8. Enterprises are adopting emerging technologies at a rapid pace to create synergies and harness
the latest technologies. Give 3 examples of automated tools used as a part of emerging
technologies along with the risk and audit considerations associated with these tools.
9. Emerging technologies can bring great benefits, but they also come with a varied set of
substantial risks. Give some examples of technology risks of digital system and the control
considerations to consider while assessing technology risk.
10. Give example of emerging technologies available for Next Generation Audit along with the
risks associated with it.
2. (i) Identify exceptions: Identify exceptional transactions based on set criteria. For
example, cash transactions above ` 10,000.
(ii) Identify errors: Identify data, which is inconsistent or erroneous. For e.g.: account
number which is not numeric.
(iii) Verify calculations: Re-perform various computations in audit software to confirm the
results from application software confirm with the audit software. For e.g.: TDS rate
applied as per criteria.
(iv) Existence of records: Identify fields, which have null values. For example: invoices
which do not have vendor name.
(v) Data completeness: Identify whether all fields have valid data. For example: null
values in any key field such as date, invoice number or value or name.
(vi) Data consistency: Identify data, which are not consistent with the regular format. For
example: invoices which are not in the required sequence.
(vii) Duplicate payments: Establish relationship between two or more tables as required.
For example, duplicate payment for same invoice.
(viii) Accounts exceeding authorized limit: Identify data beyond specified limit. For
example, transactions entered by user beyond their authorized limit or payment to
vendor beyond amount due or overdraft allowed beyond limit.
3. RPA can be used to streamline hiring process in a company. The tentative steps could include: -
➢ Place advertisements on social media/career advice sites.
➢ Link redirects candidate to a career site.
➢ Career site pulls information of candidate.
➢ An algorithm scans applicants for desired and suitable roles.
➢ Selected candidates may be asked to play online games to assess their skills.
➢ A certain percentage of those applicants are called for a video interview using an
interview software.
The automated hiring process will reduce full time effort involvement, provide with a wider assessment
range, reduce the impact of recruiter biases, increase the efficiency of mapping of interested
candidates, reduce recruiting costs, increase hire yield, reduce time to hire, increase diversity.