CH03 - 2024 Auditing-Information-Systems
CH03 - 2024 Auditing-Information-Systems
PLANNING AN IS AUDIT
Credit: Group of Business People Working Together by Yan Krukau, used under the Pexels License.
This chapter will dive deeper into the crucial aspect of Information Systems (IS) Auditing – planning. Imagine
building a house without a blueprint or embarking on a long road trip without a map. In both cases, the lack of
planning can lead to chaos and uncertainty. Similarly, in IS auditing, planning is the blueprint that guides us in
navigating the complex landscape of information systems. It is the foundation upon which the entire IS audit
process rests.
Our discussion starts with the development of risk-based IS audit plans. In doing so, we will discuss the
intricacies of risk-based IT audit planning, aligning audit plans with organizational goals, and documenting and
gaining stakeholder approval for the IS audit plan.
Next, we will discuss the nature, role, and importance of risk assessment and materiality in IS audits. We will
explore identifying, analyzing, and evaluating IS risks. Moreover, we will discuss the IS auditor’s ongoing role in
continuous risk monitoring. This will serve as a lead-in to the discussion around the relevant elements of an IS
audit program, providing a comprehensive understanding of its structure and purpose. We will also consider
various IS auditing methodologies and procedures.
Having a plan is one thing, but executing it effectively is another. In addition to reviewing the relevance
and types of evidence-gathering techniques, we will also discuss the IS auditor’s need to obtain sufficient
and appropriate audit evidence. Sampling is a fundamental aspect of IS auditing, and in the final part of this
Learning Objectives
• Develop comprehensive risk-based IS audit plans that align with organizational goals.
• Identify, analyze, and evaluate IS risks, allowing them to prioritize audit activities effectively.
• Develop IS audit programs that outline audit procedures, methodologies, and key
considerations for different audit engagements.
• Understand the concept of materiality and its influence on decision-making during the IS audit
process.
• Apply relevant evidence-gathering techniques to effectively collect and analyze audit evidence.
• Utilize various sampling methods, including determining sample sizes, calculating confidence
intervals, and managing sampling errors.
Credit: A man in corporate attire talking at a meeting by Pavel Danilyuk, used under the Pexels License.
• How can audit planning be aligned with an organization’s strategic goals and objectives?
• How would IS Auditors go about developing multi-year audit plans?
• Who should be the key stakeholders to sign off on the multi-year audit plan?
The essence of a risk-based audit plan lies in its ability to anticipate and mitigate risks in a rapidly evolving IT
landscape. Such a plan is not merely a procedural requirement but a strategic tool instrumental in safeguarding
an organization’s digital assets and ensuring compliance with regulatory standards. It necessitates a forward-
looking perspective that aligns with the organization’s immediate and long-term goals.
The risk-based IS audit planning process is a structured approach central to effective IS auditing.
Given the ever-evolving nature and extent of the IT’s influence over the organization’s operations, assessing
enterprise-wide IT risk and controls can be daunting. While most progressive organizations and IS audit
functions aim to maintain a complete inventory of their IT infrastructure components, it is not always possible
or feasible. As an acceptable alternative, IS audit functions tend to perform the following in preparation of
developing a risk-based audit plan:
• Performing IT risk assessments annually to identify the new technologies impacting the organization.
• Becoming familiar with the IT’s short-term initiatives and analyzing how they impact the IT risk
assessment.
• Beginning each IT audit by reviewing its risk assessment component.
• Monitoring the organization’s IT-related risk profile and adapting audit procedures as it evolves.
Additionally, several organizational and technological factors should be considered when developing the risk-
based IS audit plan, such as the organization’s industry sector, revenue size, type, complexity of business
processes, and geographic locations of operations. More specifically, the following factors play a significant role
in helping IS Audit functions shape their risk-based audit plans:
• Extent of IT Use
◦ The extent of IT use needs to be considered in planning the nature, extent, and timing of audit
procedures.
◦ IT skills may be needed to understand the flow of some transactions.
◦ Nature, timing, and extent are all affected by the extent of IT use.
• Availability of Data
◦ Input data, system-generated files and other data may exist only for short periods of time or only in
computer readable form.
◦ The client may have to adopt a retention policy that preserves information for audit purposes.
◦ Complexity refers to hardware configuration and the degree of integration of common files or data.
◦ Another factor is the availability of transaction trails.
◦ Significant processing of transactions by service providers affects planning.
• Need for Specialized Skills
◦ All aspects of a client’s systems should be considered in determining the need for specialized IT skills.
◦ Audit team members should possess sufficient IT knowledge to know when to call on specialists.
• IT Organizational Structure
Developing the risk-based IS audit plan should follow a systematic process to ensure that the IS auditors
consider all fundamental business aspects and IT-service support activities. The foundation for the plan must
be rooted in the organization’s objectives, strategies, and business model.
The process begins with gaining an understanding of the business by identifying the strategies,
organizational objectives, and business models that will enable the IS Auditor team to understand the
organization’s unique business risks. The IS Audit team also must understand how existing business operations
and IT service functions support the organization. Understanding the business also involves recognizing
external factors. These include market trends, economic conditions, and technological advancements. Auditors
should be aware of how these factors impact the organization. They must also understand the organization’s
adaptability to these changes to better assess technological risks. Understanding the business is a continuous
process and requires the IS audit team to stay updated with organizational and environmental changes. They
should regularly interact with key stakeholders to gain insights to better understand changes in the business
processes, objectives, and strategies as well as identify new technologies adopted by the organization.
Next, the IS audit team needs to define the IT universe through a top-down approach that identifies key
business objectives and processes, significant IS that support the business processes, the infrastructure needed
for the business applications, the organization’s service support model for IT, and the role of common
supporting technologies such as network devices. These technical components, along with an understanding
of service support processes and system implementation projects, will allow the IS audit team to create a
comprehensive inventory of the IT environment, which forms the foundation for assessing the vulnerabilities
that may impact internal controls. The IT audit universe is dynamic and evolves as the organization’s IT
environment and business objectives change. Therefore, the IT audit universe must be periodically (at least
annually) reviewed and updated to ensure that the IT audit plan remains relevant and aligned with the
organization’s current risk profile and strategic direction. Engaging with IT management, business unit leaders,
and other relevant personnel is crucial in defining the IT universe as it helps gain insights into the IT
environment and associated risks. Stakeholder engagement also helps ensure the IT audit universe is
comprehensive and aligns with the organization’s priorities and concerns.
The next step is to perform the risk assessment — a methodology for determining the likelihood of an event
that could hinder the organization from attaining its business goals and objectives in an effective, efficient,
and controlled manner. This involves assessing the impact and likelihood of each risk regarding potential
financial loss, operational disruption, and reputational damage. The likelihood assessment also considers the
probability of each risk materializing. This prioritization helps focus audit efforts on areas that pose the greatest
threat to the organization’s objectives. It is a strategic process, balancing various risk factors to determine
the most significant areas needing attention. Incorporation of industry and regulatory standards into the
◦ Select audit subjects and bundle them into distinct audit engagements.
◦ Determine audit cycle and frequency.
◦ Add appropriate engagements based on management requests or opportunities for consulting.
◦ Validate the plan with business management.
Documenting the IS audit plan and obtaining stakeholder approval serves as a blueprint for the IS audit
function, outlining the scope, objectives, and methodology of the key assurance and consulting engagements
to be undertaken over the next few quarters.
Effective documentation starts by defining the overall scope, including identifying specific IT areas to be
audited. The scope must be comprehensive, covering all critical systems and processes. It should also be
specific, delineating the boundaries of the audit. Clear scope definition helps set realistic expectations and
avoid scope creep during the audit execution. Next, the objectives of the audit are outlined. They need to be
clear, measurable, and achievable. Each objective should address a specific risk or compliance requirement.
This clarity helps focus the audit efforts and facilitates the evaluation of audit outcomes.
The audit methodology section describes the approach and techniques, including details on risk assessment
methods, audit procedures, and evidence-gathering techniques. The methodology should be robust, ensuring
a thorough and efficient audit. It should also be flexible, allowing for adjustments in response to findings during
the audit. Resource allocation is another critical component of the audit plan, outlining the personnel and
technology resources assigned to the audit. The timeline and milestones section should provide a schedule for
the audit, including key milestones and deadlines. The timeline should be realistic, allowing sufficient time for
thorough audit activities.
Once the audit plan is documented, obtaining stakeholder approval is the next important step. This involves
presenting the plan to senior management and other key stakeholders. The presentation should be clear,
concise, and focused on how the audit supports the organization’s objectives. It should highlight the audit’s
expected value and how it aligns with the organization’s strategic goals. Securing stakeholder approval often
requires addressing concerns and answering questions. This interaction is an opportunity to refine the audit
plan based on stakeholder feedback. It ensures that the plan is not only acceptable to the audit team but also to
those who will be impacted by the audit. Effective communication is key in this stage, and the IS auditor must
articulate the importance of the audit, its potential benefits, and how it will be conducted without disrupting
normal business operations. This communication builds trust and fosters a collaborative relationship between
the audit team and stakeholders.
Once approval is obtained, the audit plan is finalized and communicated to the IS audit team. This
communication is crucial for ensuring that everyone involved understands the plan and their roles in it.
In the Spotlight
For additional context on the process of developing a risk-based IS audit plan, please read the article
titled “IS Audit Basics: Developing the IT Audit Plan Using COBIT 2019” [opens a new tab].
Key Takeaways
Let’s recap the key concepts discussed in this section by watching this video.
One or more interactive elements has been excluded from this version of the text. You can view
them online here: https://ecampusontario.pressbooks.pub/
auditinginformationsystems/?p=413#oembed-1
Source: Mehta, A.M. (2023, December 6). AIS OER ch 03 topic 01 key takeaways [Video].
https://youtu.be/AkBW_FE4urA
An interactive H5P element has been excluded from this version of the text. You can view it
online here:
https://ecampusontario.pressbooks.pub/auditinginformationsystems/?p=413#h5p-139
Review Questions
1. Explain the importance of understanding the business in the risk-based IS audit planning
process.
2. Describe how the extent of IT use influences the nature, timing, and extent of audit procedures
in a risk-based IS audit plan.
TechStream Inc., a leader in financial management software solutions, boasts a 15-year history with a
global presence. The company, headquartered in New York, commands an impressive annual revenue
of approximately $500 million and employs around 3,000 staff worldwide, with significant operations
across Europe (Germany, UK) and Asia (India, Japan). TechStream Inc.’s software solutions are diverse,
offering both on-premise installations and cloud-based services. Recently, they have started integrating
AI algorithms to enhance their financial analysis capabilities, showcasing their commitment to
technological advancement.
The company’s transition to the cloud is noteworthy, with a substantial reliance on third-party cloud
service providers for its cloud offerings and ongoing initiatives to migrate critical data storage services
to cloud platforms. This transition is coupled with exploratory ventures into IoT technology, aimed at
harnessing real-time financial data from various sources. TechStream Inc.’s clientele is broad and
includes large financial institutions, mid-sized banks, and emerging fintech startups, making the
handling of sensitive financial data, such as transaction histories and customer information, a regular
occurrence.
Operating on an international scale, TechStream Inc. must navigate a complex regulatory landscape,
adhering to various international regulations like the GDPR in Europe and other data protection laws
globally. Regular audits by financial regulators are a part of their operational norm due to the sensitive
nature of their client base. The company’s IT infrastructure presents a blend of legacy systems and
modern cloud-based solutions, recently adapting to increased remote work scenarios with greater
reliance on VPNs and cloud applications.
Despite their robust technology adoption, security remains a focal concern, especially with minor
past incidents and growing apprehensions about potential vulnerabilities, particularly in new cloud and
IoT integrations. While the company maintains an internal IT security team, it often leans on external
consultants for comprehensive security audits and assessments. Current IT challenges include the
integration of AI and machine learning for advanced data analytics and ensuring secure, seamless
integration of an increasing number of IoT devices. Alongside these technological strides, TechStream
Inc. is also planning a significant expansion of its cloud storage capabilities, further solidifying its
position as a tech-forward company in the financial software domain.
You are an IS auditor tasked with developing a risk-based IS audit plan for TechStream Inc.
Required: Develop a dynamic IS audit plan that aligns with TechStream Inc.’s risk profile and
operational priorities.
Credit: A man in corporate attire talking at a meeting in the office by Pavel Danilyuk, used under the Pexels License.
• How should IS Auditors identify, analyze, and evaluate information system risks?
• What other key considerations will help shape the focus of an IS Audit?
• How can IS Auditors help an organization’s risk profile remain up-to-date and reflective of evolving
threats?
At its core, IS auditing is intrinsically linked to the effective management of audit risks and understanding the
concept of materiality. In this section, we will discuss identifying, analyzing, and evaluating risks inherent in IS,
elucidating materiality’s role in IS audits.
It starts with gaining a thorough understanding of what constitutes IS risks through a systematic approach
IS risks are diverse, encompassing technical failures, security breaches, data integrity issues, and compliance
lapses. They emerge from various sources: internal processes, external threats, technological advancements,
and human factors. Identifying these risks requires a systematic approach by employing checklists, structured
interviews, and direct observations to unearth potential vulnerabilities that might remain hidden.
A comprehensive risk identification process is not just about listing possible risks; it’s about understanding
each organization’s unique context. Each entity has its specific set of challenges and vulnerabilities. IS auditors
are expected to uncover these unique risks, tailor our approach, and prepare for the subsequent analysis and
evaluation stages. The next step is to analyze them. This involves assessing the likelihood of each risk occurring
and its potential impact. Here, both quantitative and qualitative approaches are used. Quantitative analysis
involves assigning numerical values to the probability and impact of risks, helping create a more objective view.
Qualitative analysis, on the other hand, relies on the auditor’s judgment and experience to estimate the severity
of risks. While quantitative methods provide a semblance of objectivity, qualitative insights are invaluable. They
bring depth to the IS Auditor’s understanding of risks, especially in areas where numerical data is insufficient.
Once risks are analyzed, they must be evaluated and prioritized to determine which risks warrant more
attention. In this phase, risks are ranked based on their potential impact on the organization to guide the
allocation of auditing resources and shape the audit plan. The risk landscape constantly changes, influenced
by evolving technologies and shifting business strategies. The evaluation process should be iterative, adapting
to new information and changing circumstances. Successful risk identification, analysis, and evaluation hinge
on several key factors. First, a deep understanding of the organization’s operations, culture, and technology
landscape is vital. This knowledge allows for a more targeted and relevant risk assessment. Second, engaging
with various stakeholders – from IT personnel to executive management – provides diverse perspectives,
enriching the risk assessment process. Lastly, leveraging technology can greatly enhance our risk analysis
Materiality
Materiality is an important concept in auditing and refers to the importance of omission or misstatement of
information that, if present, could influence the decisions of stakeholders. Determining what is material in an
audit involves understanding the organization’s operations, objectives, and the specific risks it faces. Materiality
is not static; it varies from one organization to another and even from one audit to another within the same
organization. Factors such as organizational size, nature of operations, and risk tolerance play a crucial role in
defining materiality thresholds.
Establishing materiality thresholds requires a deep understanding of the business and its environment. IS
auditors consider various factors, including quantitative benchmarks and qualitative judgments. The thresholds
set the stage for the entire audit process, influencing audit procedures’ scope, depth, and nature. It involves
balancing objectivity with the auditor’s professional judgment. The aim is to focus on areas significant to the
organization’s financial and operational integrity while ensuring efficient use of audit resources.
Materiality directly impacts audit planning and execution as it helps auditors determine which areas require
more attention and which can be given less and, in turn, ensures that the audit focuses on the most significant
aspects of the organization’s IS environment. Materiality also helps make decisions about the nature, timing,
and extent of audit procedures. For instance, areas deemed more material may warrant more detailed testing
or a lower threshold for error. Conversely, fewer material areas might be subject to higher thresholds or more
limited testing. Moreover, as new information comes to light during an audit, the initial materiality assessments
may need to be revisited and adjusted to respond to evolving situations during an audit.
Materiality also plays a pivotal role in evaluating audit findings and in the reporting phase. Findings are
assessed in the context of the materiality thresholds set at the outset to guide the IS auditors in determining
which issues to report and how to present them to stakeholders. In reporting, materiality ensures that the focus
is on what truly matters to the stakeholders so that the IS audit reports are developed clearly and concisely
while avoiding the clutter of insignificant details.
Audit Risk
The Audit Risk Model is another essential framework, as it guides the IS auditors in assessing and managing
the risk of incorrect audit conclusions. The Audit Risk Model comprises three main components:
• Inherent risk refers to the susceptibility of an audit area to error or fraud before considering any related
controls. In IS auditing, the inherent risk might be high in complex, rapidly evolving tech environments.
For example, emerging technologies like blockchain or AI systems inherently carry higher risks due to their
novelty and complexity.
• Control risk, the second component, is the risk that a client’s internal controls will fail to prevent or detect
an error or fraud. In the context of IS auditing, this risk could manifest in inadequate password policies or
poor access controls. The effectiveness of these controls plays a crucial role in mitigating inherent risk.
• Detection risk, the final element, pertains to the risk that the auditors’ procedures will fail to detect an
error or fraud within the audit area. It hinges on the effectiveness of the audit procedures and the auditor’s
The interplay of these risks forms the basis of the Audit Risk Model, which states that the total audit risk is a
function of inherent, control, and detection risks. The IS auditor’s understanding and application of this model
is vital for effective risk management and audit planning as it guides us in identifying areas of higher risk and in
designing audit procedures that are both efficient and effective. The model drives IS auditors to focus on areas
with higher inherent and control risks. For instance, the inherent risk is higher in a company with outdated IT
systems, necessitating more robust control measures. If these controls are weak, the control risk rises, leading
auditors to implement more rigorous detection techniques. In devising audit strategies, auditors balance these
risks. Due to strong IT governance, we may accept a higher detection risk if the control risk is low. This balance
means we may not need to test every transaction but can rely on sampling. Conversely, if control risk is high,
auditors will aim to lower detection risk by employing more comprehensive testing methods.
Inherent risk is often outside the control of the audit team but must be thoroughly understood. For example,
a company operating in a highly regulated industry like finance or healthcare inherently faces greater risks
related to compliance and data security. Recognizing these risks enables auditors to focus on the most critical
areas. Control risk assessment is an ongoing process in IS auditing. Auditors must continually evaluate the
effectiveness of a client’s internal controls. This evaluation includes examining IT policies, access controls, and
other security measures. Regular updates to these controls are necessary to keep pace with technological
advancements and emerging threats.
Lastly, mitigating detection risk involves employing various IT audit techniques and technologies. With
advancements in data analytics and automated auditing tools, IS auditors have powerful resources at their
disposal. However, the skillful interpretation of audit findings remains a human task, underscoring the
importance of experience and judgment in this field. The IS Auditor’s aim is not only to identify risks but also
to provide insights that can enhance controls and reduce the overall risk profile. The model’s application is
both a science and an art, requiring a deep understanding of technology, business processes, and the unique
challenges of the digital age.
Collectively, materiality and the audit risk model are central to the process of developing the IS Audit Strategy.
As discussed earlier, materiality measures the significance of an error or omission within the organization’s
financial or operational landscape. The application of materiality in IS audits goes beyond the numbers and
requires a thorough understanding of the organization’s operations, the information systems in use, the context
and implications of audit findings, and the potential impact of errors, issues, and audit findings. The audit
risk model, on the other hand, is a framework used to manage and minimize the risk of reaching incorrect
conclusions in an audit and comprises of inherent risk, control risk, and detection risk.
While materiality helps prioritize audit areas and focus on what’s most important, the audit risk model guides
auditors in assessing risks across different areas, allowing them to allocate more resources and attention to
areas with higher materiality and risk. Integrating materiality into the audit risk model transforms the audit
process from a generic procedure to a targeted, value-adding activity. Auditors can tailor their approach based
on the organization’s unique environment and risks. For example, in a financial institution, the materiality of
transactions will be high, requiring a lower tolerance for risk. This necessitates rigorous audit procedures to
minimize detection risk. Conversely, in a less critical system with lower materiality, the auditor might accept a
higher level of risk. This approach allows for more efficient use of resources without compromising the overall
effectiveness of the audit.
Effective communication of materiality and risk assessments is also key. Auditors must clearly articulate the
▪ Control environment
▪ Control procedures
▪ Control and detection risk assessment
▪ Analytical procedures
▪ Substantive analytical testing
▪ Detailed tests of account balances
See the next section for more details on the IS Audit Program and its components that accomplish the above.
Continuous risk monitoring represents a shift from traditional, periodic audit practices to a more dynamic,
ongoing process. It involves the regular observation and analysis of an organization’s risk environment to
In the Spotlight
For additional context on the role of risk assessment, materiality, and audit risk on IT Audit Planning,
please read the article titled “The Impact of Poor IT Audit Planning and Mitigating Audit Risk”[opens a
new tab].
Curtis B. (2020). The impact of poor IT audit planning and mitigating audit risk.” ISACA Journal, 3.
https://www.isaca.org/resources/isaca-journal/issues/2020/volume-3/the-impact-of-poor-it-audit-
planning-and-mitigating-audit-risk
Let’s recap the key concepts discussed in this section by watching this video.
One or more interactive elements has been excluded from this version of the text. You can view
them online here: https://ecampusontario.pressbooks.pub/
auditinginformationsystems/?p=437#oembed-1
Source: Mehta, A.M. (2023, December 6). AIS OER ch 03 topic 02 key takeaways [Video].
https://youtu.be/DLXtwIk2-Ds
Knowledge Check
An interactive H5P element has been excluded from this version of the text. You can view it
online here:
https://ecampusontario.pressbooks.pub/auditinginformationsystems/?p=437#h5p-110
1. Describe the process of risk analysis in IS auditing and explain how it differs from risk
identification.
2. What is the role of materiality in determining the scope of an IS audit?
3. Explain the significance of continuous risk monitoring in IS auditing and how it impacts the
auditor’s role.
Acme Corporation, a large retail company, recently upgraded its information systems to streamline
operations. As an IS auditor, you are tasked with developing a multi-year IS audit plan. Your objectives
include identifying and evaluating the risks associated with the new system, determining materiality
thresholds for the audit, and implementing continuous risk monitoring.During the risk identification
phase, you uncover several potential risks: cybersecurity threats due to new online platforms, potential
data integrity issues from system integration, and compliance risks with data protection laws. For risk
analysis, you assess these risks for their probability and impact. The cybersecurity threat is deemed
highly likely and with significant potential impact, while compliance risks are less likely but with severe
legal implications. Data integrity issues are moderately likely, with a moderate impact.
You set materiality thresholds based on the company’s operational scale and the critical nature of the
identified risks. The threshold for cybersecurity and compliance risks is set lower due to their potential
Required: Based on the case study, evaluate how the IS auditor effectively applied the concepts of
risk identification, analysis, evaluation, materiality determination, and continuous risk monitoring in
developing the audit plan.
Credit: People working at an office by Pavel Danilyuk, used under the Pexels License.
In this section, we will discover the intricacies and methodologies in crafting an effective IS audit program,
including its elements and role in guiding auditors through the nuanced landscape of IS audits.
An IS audit program is not merely a checklist; it’s a comprehensive framework that outlines the objectives,
scope, timing, and direction of IS audits. It is a strategic guide that aligns the audit process with the
organization’s goals and risk landscape so that the audit program is not only thorough but also pertinent to the
specific needs and risk profile of the organization.
We will explore the components that form the backbone of an IS audit program, including the audit
A well-structured and thoughtfully developed IS audit program serves as a roadmap, guiding auditors through
the complex landscape of information systems. An audit program is a step-by-step set of audit procedures
and instructions that should be performed to complete an audit. It is based on the scope and objective of the
specific audit engagement. The primary purposes of an audit program are to accomplish the following:
The elements of an IS audit program are the building blocks for a successful audit as they ensure that the audit
is aligned with organizational goals, appropriately scoped, well-resourced, effectively timed, and focused on key
risk areas. A well-crafted IS audit program can enhance the audit process and contribute significantly to the
organization’s overall risk management and governance efforts.
IS auditing methodologies and procedures form the backbone of the audit process as they connect the risk-
based multi-year IS Audit plan to the execution and reporting on assurance and advisory engagements.
Imagine you are preparing for a long journey. Before embarking, you need a well-defined route, a list of
essentials, and a plan for different scenarios you might encounter. Similarly, audit program development is akin
to mapping out the journey you will undertake during the audit. It ensures that auditors are well-prepared and
that the audit process remains structured and organized.
The exact order and details of planning an engagement, including establishing the objectives and scope, may
vary according to the individual organization’s needs, audit activity, and engagement. However, the following
key components are included in an effective IS Audit Program:
The first step in developing an IS audit program is defining clear, precise audit objectives. These objectives set
the direction for the audit and ensure its alignment with the organization’s goals and regulatory requirements.
The engagement objectives articulate what the engagement is attempting to accomplish; therefore, the
objectives should have a clear purpose, be concise, and be linked to the risk assessment. Well-defined
Once the risk-based objectives have been formed, the scope of the audit engagement can be determined.
Because an engagement generally cannot cover everything, IS auditors must determine what will and will not
be included. The engagement scope sets the boundaries of the engagement and outlines what will be included
in the review. IS auditors must carefully consider the boundaries of the engagement to ensure that the scope
will be sufficient to achieve the engagement’s objectives.
The scope may define such elements as the specific processes and/or areas, geographic locations, and period
(e.g., point in time, fiscal quarter, or calendar year) that will be covered by the engagement, given the available
resources. IS auditors must carefully consider the breadth of the scope to ensure it enables timely identification
of reliable, relevant, and useful information to accomplish the identified engagement objectives. To confirm
that the scope meets the audit objectives and aligns with the organization’s annual audit plan, IT auditors must
use sound professional judgment based on relevant experience and/or supervisory assistance. They must also
consider relevant systems, records, personnel, and all physical properties.
IT auditors should consider legal factors affecting the engagement scope and approach. For example, if
the organization or area under review has nondisclosure agreements with third parties, the organization may
be required to notify regulatory authorities before starting the engagement. Pending or imminent litigation
and cases of noncompliance should also be considered. Once the audit has begun, any work program
modifications, including any scope changes, must be approved. Additionally, IT auditors should consider
whether a separate consulting engagement is warranted if significant consulting opportunities arise during
the audit. If so, a specific written understanding as to the objectives, scope, respective responsibilities, and
expectations should be reached, and the results of the consulting engagement should be communicated by
consulting standards.
A control may be defined as any action taken by management to enhance the likelihood that established
objectives and goals will be achieved. Overall, internal control objectives, at a detailed level, can be seen
to encompass reliability and integrity of information, compliance with policies, plans, procedures, laws, and
regulations, safeguarding of assets, as well as efficiency and effectiveness of operations.
An important aspect of an IS Auditor’s methodology is to identify the existing controls and assess their
design and operating effectiveness in addressing the risks faced by the organizations.
Internal controls can be classified into various types and it is the combination of these controls that go
to make up the overall system of internal controls designed to achieve the general control objectives. Such
controls can be classified into:
• Preventative controls, which occur before the fact but can never be 100% effective and therefore cannot
be wholly relied upon. These could include controls such as user restrictions, password requirements, and
separate authorization of transactions.
• Detective controls, which detect irregularities after occurrence and may be cheaper than checking every
transaction with a preventative control. Such controls could include the effective use of audit trails and the
use of exception reports.
• Corrective controls ensure the correction of problems identified by detective controls and normally
require human intervention within the IT. Controls in this area may include such processes as Disaster
Recovery Plans and transaction-reversal capabilities. Corrective controls are highly error-prone because
they occur in unusual circumstances and typically require a human decision to be made and an action
decided upon and implemented. At each stage in the process, a subsequent error will have a multiplier
effect and may compound the original mistake.
• Directive controls are designed to produce positive results and encourage acceptable behaviour. They do
not themselves prevent undesirable behaviour and are commonly used where there is human discretion.
Thus, informing all users of personal computers that it is their responsibility to ensure adequate backups
are taken and stored appropriately does not enforce compliance. Nevertheless, such a directive control can
be monitored and action taken where the power is breached.
• Compensating controls can exist where a weakness in one rule may be compensated by a power
elsewhere. They are used to limit risk exposure and may trap the unwary evaluator. This is particularly true
where the auditors are faced with complex integrated systems, and the control structures involve a
mixture of system-driven and human controls scattered over a variety of operational areas.
Controls may be manual or automated, where manual controls are implemented by manual intervention
and automated controls are implemented by the computer system itself. Controls may also be application or
general IT, with application controls having to do with the business function and general IT controls being about
the running of the IT function. See Chapter 5 and Chapter 6 for more details on these controls.
Given the overall control objectives noted in the preceding section, control structures must be designed to
ensure:
• Segregation of duties: Controls to ensure that those who physically handle assets are not those who
record asset movements. Nor are they the same people who reconcile those records nor even those who
authorize such transactions. Within a modern computer system this is normally achieved by a
combination of user identification, user authentication, and user authorization.
• Competence and integrity of people: Underpinning the control system are the people who enforce it. For
controls to be effective, those who exercise control must be capable of doing so and honest enough to
consistently do so. This means that simply having users follow procedures is inadequate in a modern
Within the information systems there are three primary software components that add to or subtract from
control. These components are as follows:
• Systems Software includes computer programs and routines controlling computer hardware, processing,
and non-user functions. This category includes the operating systems, telecommunications software, and
data-management software.
• Applications Software includes computer programs written to support business functions such as the
general ledger, payroll, stock systems, order processing, and other such line-of-business functions.
• End-User Systems are special types of application systems that are generated outside the IT organization
to meet specific user needs. These include micro-based packages as well as user-developed systems. In
many cases these systems were designed to achieve specific operational goals and may or may not have
been designed with appropriate controls implemented.
A robust control framework may include the following control types along with their objectives:
• General Control Objectives: These objectives, general in nature, cover the overall aspects of the integrity of
information, computer security, and compliance with policies, plans, rules, laws, and regulations.
• Application Control Objectives: Application systems have their own sets of built-in controls primarily
business-systems oriented. Generally, they include such control objectives as accuracy, completeness, and
authorization.
• Program Control Objectives: The development and running of computer programs are subject to their
own control objectives and procedures. Control objectives would include ensuring:
Lastly, a good internal control system must also include regular communication of updates and reminders
of policies and procedures to staff through emails, staff meetings and other communication methods.
Organizations must periodically assess risks and the level of internal control required to protect the
organization’s IT asset management and records related to those risks. Progressive organizations also
document the process for review, including when it will take place. Finally, management must take the
responsibility for making sure that all staff are familiar with policies and changes in those policies.
Audit Criteria
IS auditors select criteria against which the subject matter will be assessed that are objective, complete,
relevant, measurable, understandable, widely recognized, authoritative, and understood by, or available to, all
users of the report. Identifying such criteria ensures that assurance engagement objectives are measurable,
practical, and aligned with the organization’s objectives and the area or process under review. IS auditors must
use the criteria already established by management and/or the board if such criteria exist. IS auditors must
identify appropriate criteria through discussion with management and the board if no criteria exist. IS auditors
should also consider seeking input from subject matter experts to help develop relevant criteria.
Examples of effective audit criteria include the following:
Adequate criteria will provide a reference for IS auditors to evaluate evidence, understand findings, and assess
the adequacy of the controls in the area or process under review. The criteria, or lack thereof, should be
compared to industry benchmarks, trends, forecasts, and the organization’s policies and procedures.
Developing a realistic timeline and schedule for the audit is a critical aspect often overlooked. The timeline
should account for all phases of the audit, from planning to reporting and should include specific milestones
and be flexible enough to accommodate unforeseen delays or issues. Effective scheduling is a balancing act
– it requires careful planning to ensure that each phase of the audit receives the attention it needs without
Other Considerations
The two more important aspects of the IS Auditing methodology and procedures (apart from the ones
discussed above) are Evidence-gathering Techniques and Audit Sampling. Both these aspects are discussed in
depth in the following two sections.
Beyond these, it is vital to note that the landscape of IS auditing has seen a transformative shift from
traditional to modern techniques. Traditional methods, often manual and time-consuming, were focused on
physical verifications and paper trails. As technology advanced, these methods evolved. Modern techniques
now leverage digital tools and software, enhancing efficiency and accuracy. The transition from traditional to
modern methodologies is not just a change in tools; it’s a paradigm shift in how auditors approach data and
processes. This evolution is crucial for auditors to understand, as it reflects the dynamic nature of the field.
Emerging technologies such as Artificial Intelligence (AI), blockchain, and cloud computing are reshaping the
IS auditing landscape. These technologies present new challenges and opportunities for auditors. For instance,
with its decentralized and immutable ledger, blockchain technology requires a different auditing approach
than traditional databases. Similarly, cloud computing introduces concerns related to data sovereignty and
security. Auditors must stay informed about these developments and adapt their methodologies and
procedures accordingly. Among others, the three most relevant technological considerations for IS Auditors are
as follows:
Data analytics has become a cornerstone in modern IS auditing. It allows auditors to analyze large
datasets effectively, identifying trends and anomalies that might indicate risks or issues. My
experience has shown that the use of data analytics can significantly enhance the audit process. It
enables more comprehensive coverage and deeper insights into the audited systems. Data analytics
tools vary in complexity, from basic spreadsheet functions to advanced software capable of
sophisticated data manipulation and visualization. Auditors must be adept at selecting and utilizing
the appropriate tools for their specific audit objectives.
The documentation and standardization of audit procedures are vital for ensuring consistency and
quality in IS audits. Standardized procedures provide auditors a framework to follow, ensuring that
audits are conducted systematically and comprehensively. In my teaching and auditing career, I’ve
emphasized the importance of well-documented procedures. They serve as a reference point for
auditors, helping to maintain consistency across different audits and auditors. Moreover,
standardized procedures are essential for quality assurance and enable effective training of new
auditors.
Having a thorough understanding of the IS auditing methodologies and procedures is fundamental for
aspiring and practicing IS auditors. The shift from traditional to modern techniques, the integration of data
analytics and CAATs, the importance of standardized documentation, and the adaptation to emerging
technologies are all crucial aspects. This knowledge is not static; it evolves with technology and business
landscape. As such, auditors must be lifelong learners, continually updating their skills and understanding to
remain effective in their roles. More importantly, beyond the technical knowledge, IS Auditors must also be
cognizant of the soft skills (or enabling competencies) that will render them effective while implementing the
IS audit program. Some of the most relevant soft skills expected from effective IS Auditors include the following:
Communication
Auditors must effectively convey complex technical findings to various stakeholders, including
non-technical personnel and top management. Strong written and verbal communication skills are
essential for drafting clear audit reports, explaining audit results, and collaborating with various
teams.
Critical Thinking
IS auditors often encounter complex and ambiguous situations that require critical thinking and
problem-solving abilities. They must analyze data, identify vulnerabilities, and develop
recommendations. Critical thinking helps auditors make informed decisions and provide valuable
insights to improve information systems.
Attention to Detail
The devil is in the details, and in IS auditing, precision is paramount. Auditors must meticulously
examine systems, controls, and data to identify weaknesses and risks. Attention to detail ensures
that no crucial information is overlooked during the audit process.
Adaptability
The field of IS auditing is constantly evolving, with new technologies, threats, and regulations
emerging regularly. Auditors must be adaptable and open to learning. Being willing to embrace
change and update skills is vital to remain relevant and effective.
Time Management
IS auditors often juggle multiple projects and deadlines. Effective time management skills are
essential to prioritize tasks, meet deadlines, and maintain productivity. This skill ensures that audits
are completed efficiently without compromising quality.
Problem-solving
Teamwork
IS auditing is rarely a solo endeavor. Auditors often work in teams or alongside other departments.
Being a team player and collaborating effectively with colleagues from different backgrounds is
crucial to achieving audit objectives.
Emotional Intelligence
Understanding and managing emotions, both one’s own and those of others is a valuable soft skill.
It helps auditors navigate challenging conversations, build rapport, and make informed decisions
based on empathy and understanding.
In the Spotlight
For additional context on conducting an IS audit, please read the following articles:
Let’s recap the key concepts discussed in this section by watching this video.
One or more interactive elements has been excluded from this version of the text. You can view
them online here: https://ecampusontario.pressbooks.pub/
auditinginformationsystems/?p=486#oembed-1
Source: Mehta, A.M. (2023, December 6). AIS OER ch 03 topic 03 key takeaways [Video].
https://youtu.be/5vttCiCkiC8
Knowledge Check
An interactive H5P element has been excluded from this version of the text. You can view it
online here:
https://ecampusontario.pressbooks.pub/auditinginformationsystems/?p=486#h5p-114
1. Explain the importance of defining clear audit objectives in an IS Audit Program. What should
these objectives align with?
2. What factors should be considered when determining the scope of an IS audit?
TechStream Inc., a leader in financial management software solutions, boasts a 15-year history with a
global presence. The company, headquartered in New York, commands an impressive annual revenue
of approximately $500 million and employs around 3,000 staff worldwide, with significant operations
across Europe (Germany, UK) and Asia (India, Japan). TechStream Inc.’s software solutions are diverse,
offering both on-premise installations and cloud-based services. Recently, they have started integrating
AI algorithms to enhance their financial analysis capabilities, showcasing their commitment to
technological advancement. The company’s transition to the cloud is noteworthy, with a substantial
reliance on third-party cloud service providers for its cloud offerings and ongoing initiatives to migrate
critical data storage services to cloud platforms. This transition is coupled with exploratory ventures into
IoT technology, aimed at harnessing real-time financial data from various sources. TechStream Inc.’s
clientele is broad and includes large financial institutions, mid-sized banks, and emerging fintech
startups, making the handling of sensitive financial data, such as transaction histories and customer
information, a regular occurrence.
Despite their robust technology adoption, security remains a focal concern, especially with minor
past incidents and growing apprehensions about potential vulnerabilities, particularly in new cloud and
IoT integrations. While the company maintains an internal IT security team, it often leans on external
consultants for comprehensive security audits and assessments. Current IT challenges include the
integration of AI and machine learning for advanced data analytics and ensuring secure, seamless
integration of an increasing number of IoT devices. Alongside these technological strides, TechStream
Inc. is also planning a significant expansion of its cloud storage capabilities, further solidifying its
position as a tech-forward company in the financial software domain.
Required: Based on the risk assessment and prioritization, an audit of customer data security must
be performed during the upcoming quarter. Analyze how the audit team should approach the
development of the IS audit program for TechStream Inc., considering the concepts discussed in this
section.
Credit : Three people working in the office by Yan Krukau, used under the Pexels License.
• Why is it essential for IS Auditors to gather reliable and relevant evidence during an audit?
• Can you explain the concepts of sufficiency and appropriateness of audit evidence?
• What strategies can IS Auditors use to make sure that they collect the most reliable and comprehensive
evidence during an audit?
Comprehensive, detailed, and diligent documentation is vital in creating a robust audit trail. Documentation is
not merely about recording facts; it’s about weaving a narrative that captures the essence of the audit process.
This includes various materials, from policy documents and system logs to user manuals and transaction
Documentation and working paper management in IS auditing is far more than a collection of papers or digital
files. It is the tangible representation of the audit’s journey, encompassing various forms and functions. Effective
documentation is a meticulous process of capturing, organizing, and presenting information vital to the audit’s
success. It includes policies, procedures, system logs, correspondence, and transaction records, each serving a
unique purpose.
An audit trail is a chronological record providing a step-by-step account of the audit process, decisions, and
actions taken. It is essential for ensuring transparency and accountability. Given the extent of professional
judgment to be applied across various stages of an IS Audit, the need to create a clear, comprehensive audit
trail to justify the professional judgment applied by IS Auditors cannot be understated. It facilitates the audit
process and serves as a critical tool for any disputes or follow-up inquiries. Different types of documentation
in IS audits serve different purposes. Policy documents, for example, provide insight into the organization’s
regulatory compliance and governance standards. System logs offer a technical perspective, revealing user
activities and system performance. Transaction records are crucial for verifying the accuracy and integrity of
financial data. Each type of document contributes a piece to the puzzle, helping auditors form a complete
picture of the IS environment they are examining.
Evaluating the reliability and relevance of documentation is a skill honed with experience. IS Auditors often
encounter situations where documentation appears comprehensive but is outdated or not aligned with current
practices. Diligent auditors must critically assess every piece of documentation, ensuring it is current, accurate,
and relevant to the audit’s objectives. This evaluation forms the basis for sound audit conclusions and
recommendations. Documentation standards and best practices in IS auditing are not merely guidelines; they
are the principles that uphold the integrity of the audit process. These standards ensure that documentation is
consistent, complete, and adheres to professional and regulatory requirements.
Audit evidence is the raw material gathered during an audit to support the auditor’s observations, findings,
and opinions. A wide range of evidence may be obtained during an IS audit, each type offering unique insights
One must discern between qualitative and quantitative evidence in IS audits. Qualitative evidence, often
narrative in nature, provides context and understanding of the processes and controls within an organization.
This includes observations, interviews, and written explanations. Quantitative evidence, on the other hand, is
numerical. It is derived from data sets, financial records, and transaction logs analysis. Both types of evidence
are crucial, and a skilled auditor knows how to balance and integrate them to form a comprehensive audit
perspective. Direct and indirect evidence also play significant roles in IS audits. Direct evidence is obtained
through firsthand observation or interaction, such as inspecting a system configuration or reviewing a
transaction record. Indirect evidence, conversely, is evidence that is inferred or deduced, such as conclusions
drawn from analyzing trends in data logs. Understanding the impact of these evidence types on audit
conclusions is a critical skill. Direct evidence often carries more weight, but indirect evidence can provide crucial
corroborative support.
The digital nature of IS audits presents unique challenges, such as data volatility, systems’ complexity, and
the need for specialized tools and skills to extract and analyze evidence. Navigating these challenges requires
technical expertise and a keen understanding of the legal and ethical considerations involved in handling
digital evidence. Generally, the reliability of audit evidence must include an evaluation of:
• Independence of the evidence provider: Evidence obtained from outside sources is more reliable than
from within the organization. This is why confirmation letters are used for verification of accounts
receivable balances. Additionally, signed contracts or agreements with external parties could be
considered reliable if the original documents are available for review.
• Qualifications of the individual providing the information/evidence: IS auditors must verify whether the
providers of the information/evidence are inside or outside of the organization, an IS auditor should always
consider the qualifications and functional responsibilities of the persons providing the information.
Sufficiency and appropriateness are the two important drivers of the reliability of audit evidence.
Sufficiencyrefers to the quantity of evidence, while appropriateness pertains to the quality (reliability and
relevance) of the evidence gathered. More evidence does not necessarily equate to better evidence. The focus
should be on gathering enough relevant and reliable evidence to form a solid foundation for audit findings.
Relevance of information means there is a logical connection to the audit areas. Therefore, evidence is
considered relevant if it provides confirmation about an area most at risk. For example, if the auditor determines
that the primary assertion at risk is the security of the network firewall, it would not be appropriate to spend
more time gathering evidence about the appropriateness of data back-ups. By identifying the key risk areas for
the auditee, an IS auditor can focus on gathering more (sufficient) high-quality (appropriate) evidence where
the risk of material misstatement is believed to be most significant.
Reliability refers to whether the evidence reflects the true state of the information. In terms of the reliability of
information, the auditor should consider the following:
Balancing the quantity of evidence with audit efficiency is a challenge every auditor faces. In the fast-paced
environment of IS auditing, where technology and systems rapidly evolve, time is a precious resource. Auditors
must be adept at collecting sufficient evidence promptly, ensuring that audits are both thorough and efficient.
This requires a strategic approach to evidence gathering, prioritizing areas of higher risk and materiality. Lastly,
overcoming limitations in audit evidence is part of the auditor’s expertise. In my years as an auditor, I have
encountered various challenges, such as incomplete data, inaccessible information, or difficult to interpret
evidence. Developing the skill to navigate these limitations is essential. It involves creative problem-solving,
leveraging technology, and sometimes seeking alternative forms of evidence.
Audit procedures are the processes, techniques, and methods auditors perform to obtain audit evidence,
enabling them to conclude on the set audit objective and express their opinions. IS Auditors prepare audit
procedures at the planning stages once they identify audit objectives, scope, approach, and risks. Auditors
design audit procedures to detect all kinds of identified risks and ensure that the required audit evidence
is obtained sufficiently and appropriately. Audit procedures might be different across various functions and
periods. This is because internal controls differ from one function to another, and the controls may change from
time to time.
Having said that, IT auditors typically use the following six basic types of evidence-gathering techniques:
Inquiry is often the starting point in evidence gathering. It An IS auditor interviews the IT staff to
involves engaging with personnel to gain insights and understand the procedures for system
information. This includes formal interviews, casual updates and patches. The auditor
conversations, and questionnaires. Inquiry is more than inquires about how often these
just asking questions; it’s about listening and interpreting updates occur, how they are
Inquiry
the responses to form a broader understanding of the documented, and how they are
audit area. However, it is important to remember that approved. This helps assess the
information obtained through inquiry needs to be organization’s current approach to
corroborated with other evidence forms, as it is subject to maintaining system security and
biases and misunderstandings. software.
Observation is another fundamental technique, where the The IS auditor observes the backup
IS auditors observe processes, operations, and activities to process in real-time to ensure that
understand how systems and controls are implemented data backup procedures follow the
and functioning. Observation provides real-time evidence, policy. This includes verifying that
Observation offering a snapshot of the activities under review. It’s backups are taken at scheduled times
particularly useful in understanding workflows and and that the correct data sets are
identifying deviations from prescribed procedures. being backed up, providing IT
However, the limitation of observation is that it only assurance on data integrity and
provides evidence for the observed period. availability.
Analysis involves scrutinizing data and information to The IS auditor analyzes system logs to
identify patterns, anomalies, and trends. This often entails identify unusual or unauthorized
analyzing system logs, financial records, and transaction access attempts. By reviewing these
data in IS auditing. The power of analysis lies in its ability to logs, the auditor can spot patterns
Analysis transform raw data into meaningful insights. With that might indicate security breaches
advanced analytical tools and techniques, auditors can or attempts at data theft. This analysis
analyze large datasets more efficiently and effectively. helps in evaluating the effectiveness of
However, interpreting the results correctly requires a deep the organization’s network security
understanding of both the business and the technology. measures.
IS Auditing standards require that sufficient appropriate audit evidence must be gathered to enable an IS
auditor to draw a conclusion on which to base their opinion regarding the fair presentation of the management
IS operations. However, the decision as to what constitutes sufficient appropriate audit evidence is a matter of
professional judgement, as it is based upon an auditor’s understanding of management’s IS processes and the
significant risks identified when planning the audit and evidence gathered when executing the audit. Thus, it
This does not imply that the IS auditor would never or rarely use inquiries, broad analytical procedures, or
observation. Each of these techniques is relevant in specific situations. Applying them justly and appropriately
stems from a combination of the focus of the audit, adequate technical knowledge, a deep understanding of
management’s process, the IS auditor’s experience, and professional judgment. A snapshot of the degree of
reliability of each evidence-gathering technique is presented below for your reference.
Effectiveness Auditor’s
Types of Evidence & Independence Qualifications of Objectivity
of Auditee’s Direct
Extent of Reliability* of Provider Provider of Evidence
Internal Control Knowledge
High (Auditor
does)
Analysis (*) Varies High Not Applicable Low
Low (Client
provides)
Varies
Confirmation (***) High Not Applicable Low High
(Usually High)
In the Spotlight
For additional context on the nature, role, and types of audit evidence, please read the article “What
are the types of audit evidence?” [opens a new tab].
Key Takeaways
Let’s recap the key concepts discussed in this section by watching this video.
One or more interactive elements has been excluded from this version of the text. You can view
them online here: https://ecampusontario.pressbooks.pub/
auditinginformationsystems/?p=503#oembed-1
Source: Mehta, A.M. (2023, December 6). AIS OER ch 03 topic 04 key takeaways [Video].
https://youtu.be/9sRffp30Fto
An interactive H5P element has been excluded from this version of the text. You can view it
online here:
https://ecampusontario.pressbooks.pub/auditinginformationsystems/?p=503#h5p-115
Review Questions
1. Explain why documentation is crucial in IS auditing and list two types of documents typically
reviewed during an IS audit.
2. Distinguish between qualitative and quantitative evidence in IS auditing and give an example
of each.
3. What do ‘sufficiency’ and ‘appropriateness’ of audit evidence mean, and why are they important
in IS auditing?
4. Describe the technique of ‘Reperformance’ in IS auditing and explain its significance.
• User access controls to ensure only authorized personnel can access the ERP system.
• Change management controls for any modifications to the ERP system.
• Backup procedures to ensure data integrity and availability.
Required: Develop test of controls audit procedures using one or more evidence-gathering
techniques (Inquiry, Analysis, Observation, Inspection, Confirmation, Reperformance) discussed in this
section.
Credit: Three people working in the office by Yan Krukau, used under the Pexels License.
• Why do auditors often use sampling methods to gather evidence during audits?
• What are some common risks involved in selecting samples during an audit?
• How would an IS Auditor go about selecting samples during an audit?
In this section, we will explore the diverse range of sampling techniques available to IS auditors. We will do
so by differentiating between statistical and non-statistical sampling methods, highlighting their respective
advantages and appropriate contexts of use. We will explore judgmental sampling, a critical method where the
auditor’s professional judgment plays a pivotal role in sample selection; random sampling techniques, which
are fundamental to reducing bias and ensuring representativeness in the audit findings; as well as stratified
Audit sampling emerges as a vital tool in IS auditing, where data volumes can be massive and resources are
limited. It is a systematic technique used to examine a subset of data or transactions within a population to
conclude the entire dataset. It allows auditors to assess the effectiveness of controls, identify anomalies, and
detect errors or irregularities without the need to examine every single transaction or piece of data. This is
especially crucial when dealing with extensive datasets that would be impractical to review. By selecting a
representative sample, auditors can focus on areas of higher risk or greater significance, optimizing resource
allocation. This ensures auditors can conduct thorough audits while efficiently managing time and resources.
Audit sampling is closely linked to risk assessment and materiality considerations as it enables IS auditors
to assess the level of risk within a dataset and determine whether errors or irregularities are material enough
to impact the overall audit conclusions. High-risk areas may warrant larger sample sizes or more intensive
testing, while lower-risk areas may require less extensive sampling. As we know, materiality is a measure of the
significance of an error or omission and guides auditors in determining how much evidence is needed. The
riskier the audit area, the more evidence we require, leading to larger sample sizes. Conversely, in areas with
lower risk, smaller samples may suffice. This relationship is crucial in tailoring the audit to the specific context
of the audited entity.
The first method we encounter is statistical sampling. This approach relies on probability theory, ensuring
that each element in the population has a known chance of being selected. Its beauty lies in its ability to
provide auditors with a quantifiable measure of sampling risk. This risk, the probability that the sample may not
represent the population accurately, is a fundamental concept in auditing. The three primarily used statistical
sampling approaches include:
Random sampling stands on the principle of equal chance, where every item in the population is equally
likely to be selected, ensuring a bias-free approach. Tools and software are often employed to aid this process,
bringing in precision and efficiency that manual methods cannot match. Random sampling’s strength lies in
its simplicity and fairness, making it a widely accepted method in IS auditing.
Stratified sampling enhances audit efficiency by dividing the population into subgroups or strata. This
technique is particularly effective when dealing with heterogeneous populations as it ensures that each
stratum is adequately represented in the sample, providing a more accurate view of the entire population.
Systematic sampling, in which an interval (i) is first calculated (population size divided by sample size), and
then an item is selected from each interval by randomly selecting one item from the first interval and selecting
every ith item until one item is selected from all intervals. Efficiency is a significant advantage, especially
when auditing extensive datasets, as it enables auditors to review a sample while maintaining a structured
approach. Systematic sampling assumes a uniform data distribution without patterns or anomalies that could
skew results and is not an ideal method to use when data exhibits systematic patterns or clustering.
• Judgmental sampling heavily relies on the auditor’s experience and knowledge. In situations where
certain aspects of the system are deemed more critical, this method allows auditors to target these areas
specifically. It’s an approach where intuition, honed by years of experience, plays a key role. However,
auditors must remain vigilant to avoid biases that can skew the audit results.
• Block sampling begins with IS auditors partitioning the dataset into distinct blocks or groups based on
specific criteria such as transaction types, periods, or data categories. Rather than randomly selecting
individual items or transactions, auditors choose entire blocks for examination. The selection is guided by
auditors’ judgment, considering risk, materiality, and audit focus. It allows auditors to concentrate efforts
on specific areas of interest, making it suitable for targeted reviews of critical data subsets.
• Haphazard sampling allows auditors to select items without any predetermined pattern or criteria. The
selection process relies on auditors’ discretion and can involve simply picking items at random or based on
convenience. This approach offers a straightforward way to gather a sample for review, especially when
auditors are dealing with a limited dataset or when a formal sampling method may be unnecessary due to
the nature of the audit.
It is important to remember that sampling in IS auditing provides a reliable basis for making informed decisions
about the information system being audited. Hence, the choice of sampling method should align with the
audit’s objectives, the nature of the population, and the specific risks involved. Moreover, as technology
advances, the complexity of information systems auditing has escalated, and software tools enable auditors
to handle large volumes of data efficiently and accurately. They bring sophistication to sampling methods,
allowing auditors to perform more complex analyses and derive more nuanced insights.
Determining the sample size in an IS audit is a critical step that balances thoroughness with efficiency. The
process begins with a clear understanding of the audit’s objectives. It’s not about choosing a large sample for
comprehensiveness; it’s about choosing the right size to meet our specific IT audit objectives. Understanding
confidence intervals is integral to this process. A confidence interval is a range within which we expect the
true value of a population parameter to fall. It’s a concept that injects a degree of scientific rigour into our
audit conclusions. The width of this interval is influenced by the sample size – larger samples generally result
in narrower confidence intervals, offering greater precision. However, larger samples also mean more resources
and time. Thus, the auditor must strike a balance, ensuring the sample is sufficient to provide reliable results
without being unnecessarily large.
In testing controls (evaluating management’s processes), the IS Auditor applies the following guidance in
determining the sample size.
Application Controls
1 1
Annually
1 1
Weekly
5 2
Daily
25 – 60 10 – 20
In performing substantive testing (evaluating the underlying activities instead of relying on management’s
processes), the IS Auditor will generally test between 1% – 5% of the population with an upper cap of 500
samples. Sampling guidance may vary based on the IS Audit functions’ risk appetite and philosophy.
Sampling errors occur when the selected sample does not accurately represent the entire population. This
misrepresentation can lead to incorrect conclusions about the system being audited. The primary goal of
IS Auditors is to provide accurate and reliable insights into the systems we examine. Sampling errors pose
a significant risk to the integrity of the IS auditing work, and it is essential to recognize these errors and
understand their potential impact.
There are various types of sampling errors, each with its characteristics and implications. One common type
is the selection error, which arises when the method used to select the sample introduces bias. For example,
choosing a non-random sample that warrants random selection can lead to skewed results. Another type is the
measurement error, which occurs when there is a flaw in how information is collected or recorded. This type
of error can significantly distort audit findings. The impact of sampling errors on audit quality and reliability
cannot be overstated. When these errors are present, the audit conclusions drawn may be flawed, leading to
misguided decisions by stakeholders. This outcome can have far-reaching consequences, especially in high-
stakes environments where accurate and dependable audit results are crucial. Therefore, it is imperative for
auditors to take steps to minimize the occurrence of these errors.
Mitigating sampling errors involves several strategies. Firstly, careful planning and designing of the sampling
process are crucial. This planning includes selecting the appropriate sampling method and ensuring the
sample size is adequate for the audit objectives. Secondly, auditors must apply their professional judgment and
expertise in executing the sampling plan. This expertise involves being vigilant for signs of potential bias or
inaccuracies during the sampling process. Similarly, evaluating and reporting sampling errors is another critical
aspect. As auditors, we must identify and mitigate these errors and transparently communicate them in our
audit reports. This transparency ensures that stakeholders are aware of the limitations of the audit findings and
can interpret the results within the correct context.
For additional context on the role and importance of audit sampling, please read the article titled
“Audit Sampling” [new tab].
Key Takeaways
Let’s recap the key concepts discussed in this section by watching this video.
One or more interactive elements has been excluded from this version of the text. You can view
them online here: https://ecampusontario.pressbooks.pub/
auditinginformationsystems/?p=520#oembed-1
Source: Mehta, A.M. (2023, December 6). AIS OER ch 03 topic 05 key takeaways [Video].
https://youtu.be/os1wvwFFtqE
An interactive H5P element has been excluded from this version of the text. You can view it
online here:
https://ecampusontario.pressbooks.pub/auditinginformationsystems/?p=520#h5p-116
Review Questions
1. Explain the importance of selecting the right sampling method in IS auditing. Provide an
example of a situation where you would choose a statistical sampling method over a non-
statistical one, and vice versa.
2. Explain the concept of sample size determination in IS auditing. How does the level of risk in an
audit area influence the choice of sample size?
3. What are sampling errors in IS auditing, and how can they impact audit conclusions? Provide
an example of a sampling error and its potential consequences in an IS audit.
4. What are the key differences between statistical and non-statistical sampling methods in IS
auditing, and when would you use each?
5. How does an IS auditor determine the appropriate sample size for an audit, and what role do
confidence intervals play in this process?
Essay Question
Explain the importance of sampling in IS auditing and discuss the different sampling methods used.
Include in your explanation how each method impacts the audit process and outcomes. Additionally,
elaborate on how an IS auditor determines the appropriate sample size and the role of confidence
intervals in this process. Conclude by discussing the types of sampling errors that can occur in IS audits
and their potential impact on audit conclusions.
Credit: Woman in Black Blazer Standing Beside Woman in Blue Long Sleeve Shirt by RDNE Stock Project, used under the
Pexels License.
To put things in practical perspective, the case study in this section illustrates how to develop a
risk-based annual IS audit plan as well as a detailed IS audit program for a select audit from the plan.
Although the steps can be universally followed, the case study’s audit subjects and risk assessment
results are presented as generic in nature by design.
Company Overview
InnoTech Inc., a leader in renewable energy technologies, operates in a fast-paced and evolving industry. The
130 | 03.06. A Case Study in Developing IS Audit Plan and IS Audit Program
company, established 15 years ago, has carved a niche in developing and implementing innovative energy
solutions. Its product line is diverse, encompassing solar panels, wind turbines, and advanced energy storage
systems. Beyond manufacturing, InnoTech also extends its expertise to consulting and maintenance services,
ensuring the optimal performance of its energy solutions.
With its headquarters in the United States, InnoTech’s operations span across more than 20 countries,
including significant markets in Europe, Asia, and South America. This international presence is pivotal to the
company’s business strategy, allowing it to access varied energy markets and adapt to different regional energy
demands.
The company’s workforce of around 8,000 employees is a blend of talent, including engineers, researchers,
sales professionals, and various support roles. Organized into distinct divisions such as Research and
Development (R&D), Manufacturing, Sales and Marketing, and Customer Support, each sector contributes
uniquely to InnoTech’s overall success.
InnoTech’s IT infrastructure is a cornerstone of its operations and strategic growth. The company’s extensive
use of IT encompasses several key areas. A comprehensive Enterprise Resource Planning (ERP) system
integrates core business processes, facilitating seamless operations from production to HR management. The
Customer Relationship Management (CRM) software is integral to managing customer interactions, aiding the
sales team in efficiently tracking and servicing customers.
The R&D division relies heavily on specialized systems for developing new technologies and testing
prototypes. In manufacturing, the Manufacturing Execution Systems (MES) play a crucial role in overseeing
the production process. The adoption of cloud computing for data storage, application hosting, and analytics
represents InnoTech’s commitment to modern IT solutions. The network infrastructure, including LANs and
WANs, connects its global operations, while robust cybersecurity measures protect sensitive data and systems.
Managing such a diverse IT landscape presents unique challenges for InnoTech. The company needs to
maintain strong IT governance to manage technologies across different locations effectively. Risks such as
cybersecurity threats and system failures are constant concerns. However, these challenges also offer
opportunities for leveraging IT to spur innovation and improve decision-making processes through data
analytics.
Operating in a heavily regulated industry, InnoTech must adhere to various environmental, data protection,
and quality standards. Compliance is not just a legal requirement but also a key factor in maintaining the
company’s integrity and reputation.
As discussed in Section 03.01, a risk-based annual IS Audit plan can be developed using the following structured
approach:
03.06. A Case Study in Developing IS Audit Plan and IS Audit Program | 131
◦ Determine realistic audit subjects.
• Perform Risk Assessment
◦ Select audit subjects and bundle them into distinct audit engagements.
◦ Determine audit cycle and frequency.
◦ Add appropriate engagements based on management requests or opportunities for consulting.
◦ Validate the plan with business management.
Based on the facts provided in the case study, the following priorities have been identified as the most relevant
considerations while understanding the business:
• ERP System Integration and Efficiency: Concerns around the effectiveness and integration of the ERP
system across business processes including production, HR, and finance.
• CRM System Effectiveness: Challenges in the operational effectiveness of CRM system’s capabilities in
managing customer interactions, data accuracy, and its contribution to sales strategies.
• R&D Systems and Innovation Management: Inefficiencies in the systems supporting R&D for their
effectiveness in fostering innovation, managing prototypes, and integrating with other business units.
• Manufacturing Execution System (MES) Compliance and Performance: Instances of non-compliance
with industry standards and inefficiencies in production processes for MES.
• Cloud Computing and Data Storage Security: Issues noted with cloud services for data security,
compliance with data protection laws, and efficiency in storage and retrieval processes.
• Network Infrastructure and Security: Assess the robustness, security, and efficiency of the company’s LAN
and WAN, including vulnerability to cyber threats.
• Cybersecurity Measures and Protocols: Evaluate the effectiveness of cybersecurity measures including
firewalls and intrusion detection systems, and adherence to security protocols.
• IT Governance and Policy Compliance: Inspect the IT governance framework for its effectiveness in policy
implementation, regulatory compliance, and alignment with corporate objectives.
• Data Analytics and Decision Support Systems: Audit data analytics processes for their role in strategic
decision-making, accuracy of insights, and integration with business functions.
• Employee IT Training and Awareness Programs: Review the effectiveness of IT training programs for
employees, focusing on awareness and adherence to IT policies and cybersecurity best practices.
Consequently, the IT Audit universe for InnoTech Inc. can look like this:
132 | 03.06. A Case Study in Developing IS Audit Plan and IS Audit Program
In terms of the risk assessment, the 10 entities identified in the IT Audit universe above will be ranked on
likelihood and impact along the following five dimensions:
• High (3): There is a potential for material impact on the organization’s earnings, assets, reputation, or
stakeholders.
• Medium (2): The potential impact may be significant to the audit unit, but moderate in terms of the total
organization.
• Low (1): The potential impact on the organization is minor in size or limited in scope.
Using the IT Audit universe, scales for risk assessment ranking, as well as the definitions of rating on the
“impact” and “likelihood”, an illustrated risk assessment output can look like this (using hypothetical risk ratings
compiled from IS Audit team as well as the organization’s executive management):
F/S I/C
Confidentiality Integrity Availability
Area Impact Quality Score*
L I L I L I L I L I
IT Governance 3 2 2 2 3 3 2 1 1 3 24 (L)
Notes:
L = Likelihood; I = Impact; H = High; M = Medium; L = Low
* The final score is calculated as the sum of (likelihood * impact) for each of the five categories per line item.
Now that the risk assessment results are available, the next step is to formalize the audit plan. As discussed
earlier, the audit plan consists of risk-driven audit projects, mandatory compliance reviews, stakeholder
03.06. A Case Study in Developing IS Audit Plan and IS Audit Program | 133
requests, and follow-up audits of previously identified significant issues. Because these tasks need to be
completed using available internal audit resources, some risk-driven audit projects might not be incorporated
in the plan. Before we get to the IS audit plan, we will first prioritize the IT audit universe areas based on the net
scores as shown below:
Area Score
InnoTech Inc. has an IS audit staff of five auditors or approximately 1,000 available days for engagements after
considering exception time and training. Based on the risk assessment of available audit subjects, mandatory
activities, and stakeholder requests, the most effective IS audit plan is shown below:
IT Infrastructure Configuration
37 High Q1 175
Management
The audit plan in the table above is based on the Innotech Inc.’s IS audit department’s understanding of the
134 | 03.06. A Case Study in Developing IS Audit Plan and IS Audit Program
company’s strategies and objectives, historical knowledge of the control environment, and anticipated changes
in operations during the next audit period.
Next, we will formalize the IS audit plan for InnoTech Inc. to ensure the efficacy and thoroughness of the
auditing process by transforming the results of risk assessments and preliminary analyses into a structured
and actionable audit plan. A crucial aspect of the audit plan’s formalization is its communication and approval
by senior management and key stakeholders. This ensures that the audit objectives are aligned with the
broader organizational goals and that there is a cohesive understanding and agreement on the plan at the
highest levels of the organization. Finally, the plan includes a focus on training and preparing the audit team,
especially for the more complex and high-risk audit areas. This preparation is vital in equipping the auditors
with the necessary skills and knowledge to effectively navigate the intricacies of specific technologies, audit
methodologies, and regulatory requirements they will encounter.
Developing an IS Audit Program for the Network Administration and Security
Now that we have identified the risk-based annual IS audit plan, let’s build a detailed IS audit program for one
of the high-risk audits – Network Administration and Security Audit.
From our discussion in Section 03.03, we know that an IS Audit program contains the following elements:
Here’s an illustrated IS audit program for each of the above components in context of the Network
Administration and Security Audit.
The primary objective of the Network Administration and Security Audit for InnoTech Inc. is to
evaluate the effectiveness, reliability, and security of the company’s network infrastructure. This
includes assessing the administrative processes and security measures in place to protect against
unauthorized access, data breaches, and other cyber threats. The audit will also aim to ensure that
network administration aligns with the company’s IT policies and industry best practices, and
complies with relevant regulatory requirements.
The scope of this audit encompasses all aspects of network administration and security within
InnoTech Inc. This includes but is not limited to:
03.06. A Case Study in Developing IS Audit Plan and IS Audit Program | 135
• Physical and logical network infrastructure, including routers, switches, firewalls, and other
network devices.
• Network configuration and management processes.
• Network security policies, procedures, and practices.
• Access control mechanisms for network resources.
• Incident response and recovery procedures related to network security.
• Compliance with relevant laws and regulations, such as data protection laws.
The audit will cover all geographic locations of InnoTech Inc. where network infrastructure is
deployed.
This stage involves a comprehensive review of the existing controls InnoTech Inc. has
implemented for network administration and security. The review will focus on:
• Existing network security policies and procedures, ensuring they are up-to-date and
comprehensive.
• Implementation and effectiveness of access control systems.
• Security measures for protecting network infrastructure, including firewall configurations
and intrusion detection systems.
• Procedures for monitoring and responding to network security incidents.
• Regular maintenance and updates of network systems.
This review aims to identify any gaps or weaknesses in current controls that could expose the
company to network-related risks.
The audit criteria are the standards against which the network administration and security
practices of InnoTech Inc. will be evaluated. These criteria include the following:
• Compliance with industry standards such as ISO/IEC 27001 for information security
management.
• Adherence to internal policies and procedures of InnoTech Inc. related to network
management and security.
• Alignment with best practices in network administration and security.
• Compliance with legal and regulatory requirements pertinent to network security and data
protection.
136 | 03.06. A Case Study in Developing IS Audit Plan and IS Audit Program
Audit Schedule & Resourcing
The audit is scheduled to be conducted in Q1 and is allocated 150 audit days. The schedule is as
follows:
The audit team will consist of IT auditors experienced in network administration and security.
External experts may be consulted for specialized areas. Resources such as network diagrams, policy
documents, and access to network management systems will be required.
For the five existing controls identified in #3 (Review Client Controls) above, here are the proposed test of
controls audit procedures:
03.06. A Case Study in Developing IS Audit Plan and IS Audit Program | 137
• Evidence Gathering Technique: Inspection
• Specific Evidence to Review: Network security policy documents, including recent updates
and change logs.
• Auditor’s Actions:
◦ Examine the policies for comprehensiveness, relevance, and alignment with industry
standards.
◦ Verify the date of the last update and the frequency of reviews.
◦ Check for signatures and approvals.
• Number of Samples: Analyze access logs for 40 user accounts chosen at random.
• Evidence Gathering Technique: Analysis and Observation
• Specific Evidence to Review: Access control logs, user account details, and permission levels.
• Auditor’s Actions:
◦ Assess whether access levels are appropriate for each user’s role.
◦ Observe the process of granting, modifying, and revoking access.
◦ Verify that there are no unauthorized access instances.
138 | 03.06. A Case Study in Developing IS Audit Plan and IS Audit Program
◦ Review the incident handling process for completeness and timeliness.
◦ Inquire about the effectiveness of the response and any lessons learned or process
improvements implemented.
• Number of Samples: Audit maintenance logs for 40 network devices over the past year.
• Evidence Gathering Technique: Inspection and Analysis
• Specific Evidence to Review: Maintenance schedules, update logs, and service reports.
• Auditor’s Actions:
◦ Verify that maintenance is conducted regularly and in line with industry best practices.
◦ Analyze the logs for any missed or delayed maintenance activities.
◦ Ensure that updates are applied in a timely manner and documented.
This wraps up the case study walkthrough of developing a risk-based annual IS audit plan and an IS audit
program to give you a practical perspective on the key concepts discussed throughout this chapter. Collectively,
these concepts and the example will help you effectively evaluate the IT General Controls (Chapter 5) and
Application Controls (Chapter 6).
03.06. A Case Study in Developing IS Audit Plan and IS Audit Program | 139