Example of Systems Audit
Example of Systems Audit
http://yeberthmartinez.bligoo.com/ejemplo-de-auditoria-de-sistemas
Scope
The audit will be carried out on computer systems on personal computers that are connected to
the company's internal network.
Aim
Have an updated overview of information systems in terms of physical security, usage policies,
data transfer and asset security.
Resources
The number of people that will make up the audit team will be three, with a maximum execution
time of 3 to 4 weeks.
Stages of work
One week before the start of the audit, a questionnaire is sent to the managers or those
responsible for the different areas of the company. The objective of this questionnaire is to know
the equipment they use and the processes they perform on them.
Managers will be responsible for distributing this questionnaire to the various employees with
access to computers, so that they can also complete it. In this way, a more global view of the
system will be obtained.
It is also important to identify and meet with those responsible for the company's systems
department to gain a deeper understanding of the hardware and software used.
IT Director / Manager
IT Assistant Managers
IT Assistants
Possible risks will also include security gaps in the software itself and the correct configuration
and/or updating of critical equipment such as the firewall.
3. Control objectives
The existence and correct application of the company's security, emergency and disaster recovery
policies will be evaluated.
A review of the company's policy manuals will be carried out to ensure that their procedures are
up to date, clear and understood by staff.
The Company must have a security program to assess the risks that may exist regarding the
security of the maintenance of equipment, programs and data.
The appropriate procedures will be determined to apply to each of the objectives defined in the
previous step.
ü All purchase orders and invoices must be available in order to support the warranties offered by
the manufacturers.
ü Access to the hardware components is restricted to the direct persons who use it.
ü A maintenance plan and record of dates, problems, solutions and proposed next maintenance
must be available.
ü Each user must have a username and password to access the equipment.
ü Passwords must be secure (minimum 8 characters, alphanumeric and alternating upper and
lower case).
ü New users must be authorized through confidentiality agreements and must remain in place
after the employment relationship has ended.
5. Tests to be performed.
These are the procedures that will be carried out in order to verify compliance with the
established objectives. Among them we can mention the following techniques:
ü Verification of contracts.
At this stage, the results arising from the application of the control procedures and the tests
carried out will be obtained in order to determine whether or not the previously defined control
objectives are met. The data obtained will be recorded in tailor-made forms for each procedure in
order to have the results perfectly catalogued with the aim of facilitating their interpretation and
avoiding erroneous interpretations.
In this step, a summary of all the information obtained will be detailed, as well as what is derived
from that information, whether it be security flaws, organization or business structure. The
failures found in physical security will be exposed, whether in terms of information protection
(cases of fire, theft), management and obtaining of backup copies, in security regulations such as
password usage regulations, equipment acquisition forms, and studies prior to acquisitions to
verify the benefit that they would provide. Finally, the issues of business organization will be
discussed, such as the parties responsible for security, maintenance and supervision of other
areas.
A report of all the problems found is detailed in a concise and clear manner, noting the technical
data of each of the audited machines:
ü Brand
ü Model
ü Serial Number
ü Problem found
ü Recommended solution
The draft report will be presented to a person in charge of the IT area, as clarified in the previous
point, with as much detail as possible of all the problems and recommended possible solutions.
This report will be submitted in writing in original and copy, signing a document of compliance
with the same to acquire a strong commitment to solve them, in this way we will avoid possible
future confusion.
The conclusion will cover the auditors' results, errors, critical points and observations. While the
summary will show possible solutions to these critical points and failures, as well as
recommendations for proper use and also recommendations on the incorrect way to perform
some procedures.
This is the last part of the audit and the delivery of the final report with the results obtained in the
audit is formalized in a meeting.
Parameters are also set if required to monitor points where the result has not been satisfactory or
simply to verify that the control objectives continue to be met over time.
And here is a brief description of the controls to take into account when performing an audit.