ITGC Reference
ITGC Reference
Advanced Auditing
Week 7
Christopher Vanover
Information systems and general
computer controls
Tom Wadsworth
2
Auditing and IT 3
Who Am I?
Name: Tom Wadsworth
4
Agenda
5
Impact of Technology in Audits
6
What percentage of Audits that Involve an IT
element?
1. 0%
2. ~25%
3. ~50%
4. ~75%
5. 100%
7
What percentage of Audits that Involve an IT
element?
1. 0%
2. ~25%
3. ~50%
4. ~75%
5. 100%
8
Technology & Audit
9
Professional Standards
PCAOB AS 2110 (AS 12)
10
Professional Standards (continued)
11
Professional Standards (continued)
12
Example PCAOB Inspection Findings
13
Contribution of ITGCs to Audit Evidence
14
IT and Audit –
Overview of Process and ITGCs
15
Understanding key terminology
9
IT Audit Process Overview
Execution
Planning Design Testing Completion Reporting
Project Management
17
IT General Controls - Overview
Effective IT General Controls (ITGCs) is a key requirement for Sarbanes-Oxley (SOX)
compliance. What are ITGCs, and why are effective ITGCs important to organizations
SOX compliance?
What are the domains for Information Technology General Controls (ITGCs)?
• Currently, four (4) domains exist for ITGCs: 1) Access to Programs and Data, 2)
Program Changes, 3) Computer Operations, and 4) Program Development. Practical
examples of each are on the next slide.
IT General Controls - Domains
Program development – (Build it) Controls to help ensure that information systems are developed,
configured and implemented to meet financial reporting objectives
Access to programs and data – (Secure it) Controls to help ensure that access to the systems
resources and data is authenticated and authorized
Computer operations – (Run it) Controls to help ensure that production systems are processed as
approved and that processing problems are corrected and systems are restarted in a manner that
ensures errors are not introduced
Program changes – (Change it) Controls to help ensure that modified systems continue to meet
financial reporting objectives
19
IT General Controls – Access to Programs & Data
Appli-
Data
cation
Operating system
Internal network
Network perimeter
20
IT General Controls – Access to Programs & Data
Financial
Application
Data
Business
Users
IT Staff
21
IT General Controls - Practical Examples
Program
Changes
Computer
Operations
IT General Controls – Program Changes
Testing & QA
Implementation Construction
Change requests
Segregation of duties
23
IT General Controls – Program Changes
User
Business
Change initiates Business Change
and IT
Requests change approval specification
prioritization
request
Developer
Construction makes
change
Review for
Migrate to
Implementation appropriate
approvals Production
24
IT General Controls - Practical Examples
• Changes to applications are tested by end users (finance users), before deployment.
• Changes are not migrated to production without management’s review and approval.
Program • Users responsible for migrating changes to production are not responsible for developing changes.
Changes
Computer
perations
IT General Controls – Computer Operations
Application Application
01001011
A B
26
IT General Controls - Practical Examples
• Changes to applications are tested by end users (finance users), before deployment.
• Changes are not migrated to production without management’s review and approval.
Program • Users responsible for migrating changes to production are not responsible for developing changes.
Changes
Testing
& QA Testing
Data & QA
conversion
Construction
Implementation Construction
Implementation
VS.
Analysis
& design
Change Project
requests initiation
Segregation of duties
Segregation of duties
28
IT General Controls - Practical Examples, cont’d
29
IT General Controls - The Complete Picture
IT General Controls
31
IT Dependencies
32
Types of IT dependencies
Type Example
Automated controls ▪ Three-way match compares price and quantity between
purchase order, goods receipt and invoice.
Automated ▪ The system calculates price x quantity on an invoice.
calculations
Key Reports ▪ A/R Aging Report used in a control and in our substantive
tests
▪ Disaggregated revenue data (i.e., revenue by customer and
geography) used in a substantive analytic
Segregation of ▪ The ability to create and post journal entries is segregated.
duties and other ▪ The ability to pay cash disbursements to process payables
restricted access and add a vendor is segregated.
objectives
(Security)
Interfaces ▪ Monthly, the revenue subledger automatically posts
transactions to the general ledger system.
33
Beyond ITGCs – Automated
Application Controls (AACs)
34
Truth/Myth – Effectiveness of ITGCs
Myth
35
Truth/Myth – Effectiveness of ITGCs (continued)
Why
• ITGCs are designed to ensure the proper design and
effectiveness of automated controls and key reports, but
ITGC testing alone does not support a conclusion
that automated controls and key reports are programmed or
configured properly
• Separate tests over automated controls and key reports
are required
36
Testing automated controls – Considerations
37
Beyond ITGCs – Key Reports
38
System-generated reports or data
39
Reliability of information
When we consider the reliability of the information used, there are two
primary questions we must answer:
• Does the system-generated information (i.e., key report)
accurately and completely reflect the source data in the system?
Data Report
System
System
40
Types of key reports
41
Persuasiveness of Evidence
42
Emerging Risks in IT Audit
43
Emerging Risks in IT Audit
Cybersecurity – It is no longer “IF a hacker accesses your system”, rather, it’s “how will
we know, what do we do, and how do we react, WHEN a hacker gains access to a system”
Privacy – How is your personal data secured? If we were breached or data was lost, how
would that impact the company (financial, reputational, etc.)
Mobile – People want information, and they want it now. How do we secure mobile
devices, to give you what you want, without compromising security?
Social Media – Everyone wants to post everything. How does this affect your company’s
security? Practical example: New employee and photos.
Cloud Computing – Companies are moving from ‘on premise’ data centers, to hosted
environments to cut cost. What are you giving up with that cost-reduction?
AI/BI – Management is making their data work for them. Are you comfortable you are
making strategic decisions using artificial and business intelligence? Practical example:
Hospitals and viruses.
Cultural Differences on Risk – As companies become world-wide, are all countries
aligned on their risk tolerance? Are all industries in agreement on freedom of data?
Practical example: Higher education vs. Financial sectors.
Service Organizations – As companies look to cut cost, outsourcing is a great way to
shed a few dollars. Is that transfer of liability worth it?
44
New ways to think about IT auditing
45
Leading Audit Practices – Lines of Defense
Leading practice integrated assurance programs can be broken down into 4 levels. Level 1 being the 1st line of defense, where
policies are created and procedures are executed. Level 2 is then tasked with performing monitoring activities over Level 1. Level 3
represents IS Internal Audit, responsible for auditing Level 1 activities, while leveraging level 2 monitoring work. External auditors
and regulators sit at the top of the hierarchy at Level 4. This leading practice hierarchy can be used as a model to better align
disparate IS assurance activities.
Leading Audit Practices – Lines of Defense
Leading practice integrated assurance programs can be broken down into 4 levels. Level 1 being the 1st line of defense, where
policies are created and procedures are executed. Level 2 is then tasked with performing monitoring activities over Level 1. Level 3
represents IS Internal Audit, responsible for auditing Level 1 activities, while leveraging level 2 monitoring work. External auditors
and regulators sit at the top of the hierarchy at Level 4. This leading practice hierarchy can be used as a model to better align
disparate IS assurance activities.
1st line of defense – Policies are created, control activities are embedded into
Business business, and executed by business functions. The requirements
operations Decentralized Business Units
of controls and procedures to be executed are derived from both
internal and external requirements (e.g., internal P&Ps, SOX,
GxP, etc.)
Leading Audit Practices – Lines of Defense
Leading practice integrated assurance programs can be broken down into 4 levels. Level 1 being the 1st line of defense, where
policies are created and procedures are executed. Level 2 is then tasked with performing monitoring activities over Level 1. Level 3
represents IS Internal Audit, responsible for auditing Level 1 activities, while leveraging level 2 monitoring work. External auditors
and regulators sit at the top of the hierarchy at Level 4. This leading practice hierarchy can be used as a model to better align
disparate IS assurance activities.
2nd line of defense – Performs monitoring over the IS level controls. Integrated Assurance
Information Systems functions assist in implementing, monitoring, and validating controls
Integrated Information System
Assurance Monitoring embedded in the 1st line of defense.
Assurance Function
1st line of defense – Policies are created, control activities are embedded into
Business business, and executed by business functions. The requirements
operations Decentralized Business Units
of controls and procedures to be executed are derived from both
internal and external requirements (e.g., internal P&Ps, SOX,
GxP, etc.)
Leading Audit Practices – Lines of Defense
Leading practice integrated assurance programs can be broken down into 4 levels. Level 1 being the 1st line of defense, where
policies are created and procedures are executed. Level 2 is then tasked with performing monitoring activities over Level 1. Level 3
represents IS Internal Audit, responsible for auditing Level 1 activities, while leveraging level 2 monitoring work. External auditors
and regulators sit at the top of the hierarchy at Level 4. This leading practice hierarchy can be used as a model to better align
disparate IS assurance activities.
3rd line of defense – Represents the IS Audit function, with the objective of testing and validating
Corporate Information Systems Audit Centralized successful operation of controls, while taking into account the Integrated Assurance
Information System monitoring results provided by 2nd line of defense
Audit Function
2nd line of defense – Performs monitoring over the IS level controls. Integrated Assurance
Information Systems functions assist in implementing, monitoring, and validating controls
Integrated Information System
Assurance Monitoring embedded in the 1st line of defense.
Assurance Function
1st line of defense – Policies are created, control activities are embedded into
Business business, and executed by business functions. The requirements
operations Decentralized Business Units
of controls and procedures to be executed are derived from both
internal and external requirements (e.g., internal P&Ps, SOX,
GxP, etc.)
Leading Audit Practices – Lines of Defense
Leading practice integrated assurance programs can be broken down into 4 levels. Level 1 being the 1st line of defense, where
policies are created and procedures are executed. Level 2 is then tasked with performing monitoring activities over Level 1. Level 3
represents IS Internal Audit, responsible for auditing Level 1 activities, while leveraging level 2 monitoring work. External auditors
and regulators sit at the top of the hierarchy at Level 4. This leading practice hierarchy can be used as a model to better align
disparate IS assurance activities.
4th line of defense – External Auditor and Inspectors Represents external auditors and independent
External governmental regulatory inspectors (e.g., E&Y, FDA, MHRA, etc.)
Auditors /
Inspectors
3rd line of defense – Represents the IS Audit function, with the objective of testing and validating
Corporate Information Systems Audit Centralized successful operation of controls, while taking into account the Integrated Assurance
Information System monitoring results provided by 2nd line of defense
Audit Function
2nd line of defense – Performs monitoring over the IS level controls. Integrated Assurance
Information Systems functions assist in implementing, monitoring, and validating controls
Integrated Information System
Assurance Monitoring embedded in the 1st line of defense.
Assurance Function
1st line of defense – Policies are created, control activities are embedded into
Business business, and executed by business functions. The requirements
operations Decentralized Business Units
of controls and procedures to be executed are derived from both
internal and external requirements (e.g., internal P&Ps, SOX,
GxP, etc.)
Leading Audit Practices – Lines of Defense
Leading practice integrated assurance programs can be broken down into 4 levels. Level 1 being the 1st line of defense, where
policies are created and procedures are executed. Level 2 is then tasked with performing monitoring activities over Level 1. Level 3
represents IS Internal Audit, responsible for auditing Level 1 activities, while leveraging level 2 monitoring work. External auditors
and regulators sit at the top of the hierarchy at Level 4. This leading practice hierarchy can be used as a model to better align
disparate IS assurance activities.
4th line of defense – External Auditor and Inspectors Represents external auditors and independent
External governmental regulatory inspectors (e.g., E&Y, FDA, etc.)
Auditors /
Inspectors
2nd line of defense – Performs monitoring over the IS level controls. Integrated Assurance
Information Systems functions assist in implementing, monitoring, and validating controls
Integrated Information System
Assurance Monitoring embedded in the 1st line of defense.
Assurance Function
1st line of defense – Policies are created, control activities are embedded into
Business business, and executed by business functions. The requirements
operations Decentralized Business Units
of controls and procedures to be executed are derived from both
internal and external requirements (e.g., internal P&Ps, SOX, etc.)
*Opportunity for alignment between the 2nd and 3rd lines of defense can
increase efficiency and reduce cost of 3rd and 4th lines of defense.
Leading Practices for Auditing & Monitoring
Synergies
53
IT Auditor Careers at PwC - Risk Assurance
PROCESS ASSURANCE:
Support in delivery of Core Attest external audit service offerings
• Responsible for IT’s adherence to •Responsible for uptime, •Responsible for overseeing the
all regulatory compliance performance, resources, and process of planning, executing and
requirements, including Sarbanes- security of system to meet the needs delegating responsibilities around
Oxley (SOX) and is responsible for of the users. Acquire, install, or an organization's information
managing all audit related activities upgrade computer components and technology (IT) pursuits and goals,
for the organization. Ensure IT software; automate routine tasks; including software development.
policies, controls and processes are troubleshoot; and provide technical
sufficient, cost effective, feasible, support.
reasonable and current with
regulatory requirements.
Professional Certifications
Certification Sponsoring Work Experience / Education More Details
Organization
CPA AICPA • Must satisfy state licensure requirements (varies by http://www.aicpa.org/BecomeAC
Professional Certifications
Certified Public American Institute of state) PA/CPAExam/Pages/CPAExam.a
Accountant CPAs • Complete 150 hours (including B.A. degree) and fulfill spx
specific course requirements (CA)
• Pathway 1: 2 years Pathway 2: 1 year Both are general
experience which includes any type of service or
advice involving the use of accounting-related skills
(CA)
• Must pass California Professional Ethics Exam (CA)
CIA IIA CIA candidates with a 4 year post secondary degree must https://na.theiia.org/certification
Certified Internal Auditor Institute of Internal obtain a minimum of 24 months of internal auditing /CIA-
Auditors experience or its equivalent. A Masters degree can Certification/Pages/Eligibility-
substitute for 12 of the required 24 months Requirements.aspx
CISA ISACA Submit verified evidence of five years work experience in http://www.isaca.org/Certificatio
Certified Information Information Systems the fields of Information Systems Auditing, Control, n/CISA-Certified-Information-
Systems Auditor Audit and Control Assurance or Security (substitutions and waivers of such Systems-
Association experience, to a maximum of 3 years) Auditor/Pages/default.aspx
CISM ISACA Submit verified evidence of five (5) years of work http://www.isaca.org/Certificatio
Certified Information Information Systems experience in the field of information security. Three (3) of n/CISM-Certified-Information-
Security Manager Audit and Control the five (5) years of work experience must be gained Security-
Association performing the role of managing information security. Manager/Pages/default.aspx
CISSP (ISC)2 • Candidates must have a minimum of 5 years https://www.isc2.org/cissp/defau
Certified Information International Information cumulative paid full-time work experience lt.aspx
Systems Security Systems Security • Candidates may receive a one year experience waiver
Professional Certification Consortium with a 4-year college degree
57
Thank you!
Group Case #1 Results
High: 152
Low: 124
Average: 135
Median: 132
59
Individual Exam #1 Results
60
Feedback Discussion
Response Rate: 22/42 (52%)
61
Life in public accounting
62