Unit 3 Hardware Audit
Unit 3 Hardware Audit
Competence to be assessed:
and standards for a hardware audit that should be considered to determine the level of
application in the administration, installation, operation, security, as well as the responsible
personnel.
Its importance is necessary not only to plan and execute actions or protocols but also to carry out
control procedures that are aimed at ensuring that the activities have been executed according to
the parameters that have been previously established in an audit.
This information must be verified with those responsible for computer security, with those
responsible for the computing center, communications and users that the auditor considers
relevant.
If the company has predefined aspects for hardware evaluation, those guidelines will be taken into
account.
Its purpose is to seek the evaluation of the security in the operation of the hardware where the
main vulnerabilities of the hardware are identified, which are:
Inappropriate operation
Maintenance failures
Inadequate physical security
Natural disasters
It is important to know the cost of materials (central unit, peripherals, support, among others)
during the last 5 years. It is also necessary to analyze the use of each hardware element of the
configuration, calculating it in hours/month, ensuring that the configuration used corresponds to
the lowest use/cost value, and examining its coherence.
The IT audit team must have an adequate reference of the environment in which it will operate.
Hardware Review:
Within the audit there are various questions that can help in carrying out the evaluation of the
security of the company's hardware.
Review and document the existing hardware configuration of each planned domain
controller.
Use this information to identify the domain controllers in your environment that you can
upgrade, as well as the domain controllers that do not meet the necessary hardware
requirements.
Requirements that do not meet the hardware requirements will need to be rolled back.
It is to review and evaluate whether the methods, systems and procedures followed in all phases
of the administrative process ensure compliance with policies, plans, programs, laws and
regulations that may have a significant impact on the operation of the reports and ensure that the
organization is complying with and respecting them. Administrative Auditing is a methodical and
orderly examination of a company's objectives, its organic structure and the use of the human
element in order to report the investigated facts.
Its importance: it provides the managers of an organization with an overview of how it is being
managed by the different hierarchical and operational levels, pointing out successes and
deviations in those areas whose revealed administrative problems require greater or prompt
attention.
Objective of an Audit: to point out faults and problems; to present suggestions and solutions; and
to support company members in carrying out their activities. To this end, the Audit provides
analysis, evaluations, recommendations, advice and information concerning the activities
reviewed.
Control: They guide efforts in their application and can evaluate organizational behavior in relation
to pre-established standards.
Productivity: They direct actions to optimize the benefit of resources in accordance with the
administrative dynamics established by the organization.
Organization: They determine that their course supports the definition of the competence,
functions and processes through the effective management of the delegation of authority and
teamwork.
Service: They represent the way in which it can be verified that the organization has a process that
qualitatively and quantitatively links it to the expectations and satisfaction of its clients.
Quality: They aim to raise the organization's performance levels in all its contents and areas - in
order to produce highly competitive goods and services.
Change: They become an instrument that makes the organization more transparent and receptive
(flexibility.)
Learning: They allow it to become an institutional learning mechanism so that the organization can
assimilate its experiences and capitalize on them to turn them into opportunities for
improvement.
In these times, it is not only a matter of establishing quality standards in the execution of a new
installation, but also of ensuring that existing installations continue to be appropriate for the risk
they protect.
To determine the characteristics of an already assembled installation, we carry out the process we
call “Reverse Engineering”.
On-site inspection of facilities: In this phase, the characteristics of the installation are inspected,
such as: dimensions, components, quality of elements, coverage, among others, in order to gather
all the information that allows us to recalculate the installation.
Installation Recalculation: With the data collected and the most up-to-date calculation tools, we
determine the functional parameters of the installation. We then compare them with those that
would be required by current regulations for the type of risk being protected.
Proposal for Improvements: If there were deviations between the calculated parameters of the
installation and those that would be necessary for risk protection, through the hiring of
organizations that can make proposals for corrective actions such as CEPRETEC. Corrective actions
would be proposed from an objective and common sense perspective, and would be presented in
order of priority.
We can define security as that activity aimed at giving data processing reasonable protection. And
we say reasonable because there is never absolute certainty. The topic is fundamental because
today, the systems area constitutes the point where most of the company's information is
concentrated.
It is clear that the information used by entities in general has varied in recent decades. The needs
for generating that information and the means to process it have changed as well. Although there
are certain differences between computerized and conventional systems, it can be stated that
electronic data processing does not affect the objectives of internal control, management
responsibility and the limitations inherent to the internal control system, but it does affect the
approach to its evaluation and the type of audit evidence obtained.
Systems Security
The objective is, then, the security of that information, so we must implement controls to reduce
or avoid the risks. These controls will determine the degree of reliability of the information
provided.
Organizations, especially small and medium-sized ones, lack documentation, standards for
preparation, as well as internal controls.
The internal control structure to be evaluated should not be differentiated according to the size of
the company. The difference lies in the intensity of some controls, especially those of:
Separation of duties
Archives
Physical security
Security of systems with real-time processing
The controls seen above must also be applied in real-time processes, but others that are specific to
this type of processing must also be added.
Regarding the process An application may become more expensive if it does not
necessarily need to be updated in real time (Salaries)
In the real system, real transactions and simulated transactions are entered. The technique is
called ITF (integrated test facilities or mini company).
Special audit records are generated within the main processing records (and must be properly
identified).
The technique is only applicable in organizations that have supervisory bodies that allow it,
otherwise it could be considered fraud.
It requires little technical expertise and provides the auditor with the element of surprise, but it
may have problems in its implementation or control if the simulated transactions are not properly
identified.
Physical security and logical security are related to preventive measures against impacts on the
organization. The information must be classified according to its main characteristics and the
impact of different events must be considered (quantitatively if possible). Additionally, the
probability of occurrence of each fortuitous event must be considered in order to try to minimize
all risks.
Logical security
For this reason, logical security measures must be implemented that ensure:
Contingency plan
The organization must be prepared for the occurrence of accidental events, natural disasters or
intentional acts that endanger its normal operations. COB (continuity of business) must always be
ensured. The main causes of lack of prevention are:
All risks must be analyzed, critical resources established, a project drawn up, the plan developed
and the relevant tests performed.
Emergency phase: If a serious event occurs, the reconstruction and recovery environment must be
established and the damage that has occurred must be minimized (prevention measures will be
essential to avoid serious damage).
Linkage Phase: Processing alternatives must be provided to maintain operational capacity and
environmental recovery tasks must be facilitated.
Backup phase: it is necessary to continue operating with alternative processing by providing the
necessary backup copy sets for this.
Recovery Phase: The IS must be fully restored to normal operation by discontinuing operation with
alternate processing and converting operations and files from link mode to normal mode
3.6 Personnel responsible for the area
The main objective of the auditor is to evaluate and follow up in a timely manner the set of IT
audit projects that will be executed within a given period in order to support business strategies,
considering the various internal and external factors that relate to the organization.
Each of these projects must be framed within the limits defined for the function, that is, it must
focus on the control, security and auditing of the different elements that maintain direct or
indirect contact with information technology.
IT auditors will direct and enthusiastic involvement of IT staff and users involved during the audit.
The person responsible for the IT audit function (external or internal) who reviews the different IT
areas must coordinate with the person responsible for traditional auditing, senior management
and the IT manager through formal and periodic meetings in order to achieve common objectives
for the good of the business.
Minimum functions
A. Evaluation and verification of controls and procedures related to the IT function within the
organization.
B. Validation of the controls and procedures used to ensure stable and efficient use of IT
resources within the organization.
C. Evaluation, verification and timely implementation of the controls and procedures
required to ensure proper use and exploitation of the IT function.
D. Permanent assurance of the existence and compliance of controls and procedures that
regulate the activities and use of IT resources in accordance with the organization's
policies.
E. Develop IT auditing in accordance with national and international standardized norms and
policies.
F. Evaluate the risk areas of the IT function and justify your assessment with senior business
management.
G. Prepare an IT audit plan within the timeframes determined by the person responsible for
the function
H. Obtain formal approval of the plan's projects and disseminate them among those involved
in the plan.
I. Efficiently manage or execute the projects contemplated in the IT audit plan.
Once the function is formalized in any of the organizational situations indicated, a mechanism for
administering and controlling the function is defined.
This mechanism will ensure that the resources and projects involved in the performance and
management process of IT auditing comply with the basic principles of an administrative process.
Among others, the most important and indispensable elements are planning, personnel, control
and performance monitoring.
Main objectives of IT audit management, once it begins to perform its functions, are to make it an
efficient and value-added area.
Ensure that the audit function covers and protects against the greatest risks and exposures
existing in the IT environment in the business.
Ensure that IT resources (hardware, software, telecommunications, services, personnel, etc.) are
geared towards achieving the organisations' objectives and strategies.
Ensure the formal formulation, development and dissemination of policies, controls and
procedures inherent to IT auditing that guarantee the optimal and efficient use and exploitation of
each of the IT resources in the business.
Ensure formal compliance with the policies, controls and procedures defined in each IT audit
project through timely monitoring.
Ensure that the business achieves the expected results through coordination and mutual support
with:
Audit
Computing
External advisors
Senior management.
In order for the objectives and goals of the IT audit function to be successfully achieved, the
following must be considered:
3.7 Determine the level of application of any of the standards considered for the hardware
audit.
In a financial audit based on risk analysis, the study and review of the information systems on
which the management of an entity is based (public company or foundation, city council,
autonomous community administration, etc.) has become an activity of growing importance, to
the extent that this management is fundamentally based on information systems that, in general,
have been acquiring increasing complexity, which has generated a series of new audit risks
(inherent and control) that must be considered in the audit strategy.
Entity level
Controls at this level reflect the way an organization operates, and include high-level policies,
procedures, and other practices that set the guidelines for the organization. They are a
fundamental component of the COSO model and must take into account the IT operations that
support financial information.
The control environment and commitment to ethical behavior is a work “philosophy” that must
emanate from the top down, from senior management positions to the rest of the organization. It
is essential that the appropriate tone for control is set by the organization's top management,
sending a message to the entire organization that controls must be taken seriously.
Entity-level controls have significant influence on the rigor with which the internal control system
is designed and operates across all processes. The existence of rigorous IT governance at this level,
such as well-defined and communicated policies and procedures, often suggests a more reliable IT
operating environment.
Conversely, organizations with weak controls at this level are more likely to have difficulty
performing control activities regularly. Consequently, the strength or weakness of entity-level
controls will have an effect on the nature, extent and timing of audit testing.
IT systems level
Information technology services form the foundation of operations and are delivered throughout
the organization. They typically include network management, database management, operating
system management, storage management, facilities and services management, and security
administration. All of this is usually managed by a centralized IT department.
Controls at the IT system level consist of processes that manage specific IT system resources
related to its general support or to the main applications; they are more specific than those
established at the entity level and are normally related to a particular type of technology.
Management processes (or business processes) are the mechanisms that an entity uses to develop
its mission and provide a service to its recipients or users.
Inputs, processing and outputs are aspects of management processes that are increasingly
automated and integrated into complex computer systems.
If the auditor reaches a favourable conclusion on the IT controls at the entity and IT systems level,
the effectiveness of the IT controls in the significant applications to be reviewed should be
assessed and verified before reviewing their application controls.
http://auditoriainformaticaritaneoletyivan.blogspot.mx/2015/04/unidad-3-auditoria-del-
hardware.html
http://ing-informatica.esy.es/uncategorized/unidad-3/