CISA Review - Week 1
CISA Review - Week 1
REVIEW COURSE
Chapter 1
The IS Audit Process
Presented By: Shiva Goundar & Blesson Samuel
1
February 2, 2015
!@
What is CISA?
The CISA program is designed to assess and certify
individuals in the IS audit, control and security
profession who demonstrate exceptional skill and
judgment.
Requirements:
Successfully complete the CISA Examination
Adhere to the Information Systems Audit and Control Associations
Code of Professional Ethics
Submit evidence of a minimum of five (5) years of professional IS
auditing, control or security work experience.
February 2, 20
15
!@
February 2, 20
15
!@
Content Areas:
February 2, 20
15
!@
February 2, 20
15
!@
February 2, 20
15
!@
February 2, 20
15
!@
Audit Charter
Document clearly stating managements
overall responsibility and objectives for the
audit function (including IS audit)
Defines authorities, scope and responsibilities
of audit function
Should be approved by highest level of
management and audit committee
8
February 2, 20
15
!@
February 2, 20
15
!@
February 2, 20
15
!@
February 2, 20
15
!@
February 2, 20
15
!@
13
February 2, 20
15
!@
February 2, 20
15
!@
15
February 2, 20
15
!@
IS Audit Standards
Audit Charter
Independence
Professional Ethics and Standards
Competence / Planning
Performance of Audit Work
Reporting / Follow-up Activities
16
February 2, 20
15
!@
17
February 2, 20
15
!@
18
February 2, 20
15
!@
19
February 2, 20
15
!@
Risk Mitigation
After risks are determined, controls should be
identified to mitigate risks
Countermeasures should be assessed using
cost-benefit analysis:
Cost of control compared to benefit of minimizing risk
Managements appetite for risk
Preferred risk reduction methods (terminate risk, reduce
probability, minimize impact, insurance)
20
February 2, 20
15
!@
21
February 2, 20
15
!@
Internal Controls
Policies, procedures, practices, and
organizational structures put into place to
reduce risks
Provide reasonable assurance that business
objectives are met, and undesired risks are
prevented or detected and corrected
Controls address what should be achieved,
and what should be avoided
22
February 2, 20
15
!@
Control Classifications
Class
Preventative
Function
Detect problems before they arise
Monitor operation and inputs
Attempt to predict problems before they occur & make
adjustments
Prevent an error, omission or malicious act
Detective
Corrective
23
February 2, 20
15
!@
IS Control Objectives
Safeguarding assets
Assuring integrity of general operating system environments,
network management, and operations
Assuring integrity of sensitive critical and sensitive application
system environments
Assuring efficiency and effectiveness of operations
Complying with user requirements & organizational P&P
Developing BCP and DRP
Developing incident response and handling plans
24
February 2, 20
15
!@
February 2, 20
15
!@
IS Control Procedures
Strategy & Direction / General Organization & Management
Access to Data and Programs
Systems Development and Change Control
Data Processing Operations / Data Processing QA
Systems Programming and Technical Support
Physical Access Controls
BCP/DRP
Networks & Communication
Database Administration
26
February 2, 20
15
!@
Performing an IS Audit
Definition of auditing
Systematic process by which a competent, independent
person objectively obtains and evaluates evidence
regarding assertions about an economic entity or event
for the purpose of forming an opinion about and
reporting on the degree to which the assertion conforms
to an identified set of standards.
27
February 2, 20
15
!@
Performing an IS Audit
Classification of audits:
28
Financial audits
Operational audits
Integrated audits
Administrative audits
Information systems audits
Specialized audits
e.g. SAS70
Forensic audits
February 2, 20
15
!@
Performing an IS Audit
General audit procedures
29
February 2, 20
15
!@
Performing an IS Audit
Audit methodology/strategy
Statement of scope
Statement of audit objectives
Statement of work program
30
February 2, 20
15
!@
Performing an IS Audit
Audit risk and materiality
A risk-based audit approach is used to assess risk and assist with
an IS auditors decision to perform either compliance or substantive
testing
31
February 2, 20
15
!@
Performing an IS Audit
Risk-based approach
Emphasis on knowledge of the business and technology
Focuses on assessing the effectiveness of a combination
of controls
Linkage between risk assessment and testing focusing on
control objectives.
Focuses on the business from a management perspective
32
February 2, 20
15
!@
Performing an IS Audit
Types of risk
Inherent risk
Control risk
Detection risk
Overall audit risk
33
February 2, 20
15
!@
Performing an IS Audit
Risk Assessment Techniques
34
February 2, 20
15
!@
Performing an IS Audit
35
February 2, 20
15
!@
Performing an IS Audit
Evidence It is a requirement that the
auditors conclusions must be based on
sufficient, competent evidence.
36
February 2, 20
15
!@
Performing an IS Audit
Techniques for gathering evidence:
37
February 2, 20
15
!@
Performing an IS Audit
Sampling
General approaches to audit sampling:
Statistical sampling
Non-statistical sampling
38
February 2, 20
15
!@
Performing an IS Audit
Sampling (Continued)
Attribute sampling
Sample-size attribute sampling
Stop-or-go sampling
Discovery sampling
Variable sampling
Stratified mean per unit
Unstratified mean per unit
Difference estimation
39
February 2, 20
15
!@
Performing an IS Audit
Statistical sampling terms:
Confident coefficient
Level of risk
Precision
Expected error rate
Sample mean
Sample standard deviation
Tolerable error rate
Population standard deviation
February 2, 20
15
!@
Performing an IS Audit
Computer-assisted audit techniques
CAATs are a significant tool for IS auditors to gather
information independently
CAATs include:
Generalized audit software (ACL, IDEA, etc.)
41
Utility software
Test data
Application software for continuous online audits
Audit expert systems
February 2, 20
15
!@
Performing an IS Audit
Computer-assisted audit techniques
Need for CAATs
Evidence collection
Functional capabilities
Functions supported
Areas of concern
42
February 2, 20
15
!@
Performing an IS Audit
Computer-assisted audit techniques
Examples of CAATs used to collect evidence
Continuous online audit approach
43
February 2, 20
15
!@
Performing an IS Audit
Computer-assisted audit techniques
Development of CAATs
Documentation retention
Access to production data
Data manipulation
44
February 2, 20
15
!@
Performing an IS Audit
Evaluation of strengths and
weaknesses
45
Assess evidence
Evaluate overall control structure
Evaluate control procedures
Assess control strengths and weaknesses
February 2, 20
15
!@
Performing an IS Audit
Judging Materiality of Findings
Materiality is a key issue
Assessment requires judgment of the potential effect
of the finding if corrective action is not taken
46
February 2, 20
15
!@
Performing an IS Audit
Communicating audit results
Exit interview
Presentation techniques
47
Executive summary
Visual presentation
Oral presentation
February 2, 20
15
!@
Performing an IS Audit
Management actions to implement
recommendations
Auditing is an ongoing process
Timing of follow-up
Audit Documentation
48
February 2, 20
15
!@
Performing an IS Audit
Audit resource management
49
February 2, 20
15
!@
Control Self-Assessment
Methodology to review key business
objectives, associated risks, and controls to
manage those risks
Performed by management and/or work teams
IS auditors serve as control experts and
facilitators
50
February 2, 20
15
!@
February 2, 20
15
!@
February 2, 20
15
!@
CSA
Empowered/accountable
employees
Policy/rule driven
Reporters
Reporters
53
February 2, 20
15
!@
IT Governance
Corporate Governance Ethical corporate behavior
by directors or others charged with governance in the
creation and presentation of wealth for all
stakeholders
IT Governance Structure of relationships and
processes to direct and control enterprise to achieve
its goals by adding value while balancing risk vs.
return over IT and its processes
(See Chapter 7 for detailed information)
54
February 2, 20
15
!@
Chapter 1: Glossary
Administrative controls
Attribute sampling
Audit risk
Compliance testing
CAATs
Control risk
Embedded audit modules
Materiality
55
February 2, 20
15
!@
Chapter 1: Recap
Group discussion
Questions
56
February 2, 20
15
!@
Chapter 1: questions
1.
57
February 2, 20
15
!@
Chapter 1: Questions
2. The reason for having controls in an IS environment:
A.
B.
C.
D.
58
February 2, 20
15
!@
Chapter 1: Questions
3.
59
Control risk
Detection risk
Inherent risk
Sampling risk
February 2, 20
15
!@
Chapter 1: Questions
4.
60
February 2, 20
15
!@
Chapter 1: Questions
5.
61
February 2, 20
15
!@
Chapter 1: Questions
6.
62
February 2, 20
15
!@
Chapter 1: Questions
7.
63
B.
audit charter.
C.
D.
February 2, 20
15
!@
Chapter 1: Questions
8.
64
February 2, 20
15
!@
Chapter 1: Questions
9.
65
Business processes
Critical IT applications
Corporate objectives
Business strategies
February 2, 20
15
!@
Chapter 1: Questions
10. Which of the following is a substantive audit test?
A. Verifying that a management check has been performed regularly
B. Observing that user IDs and passwords are required to sign on
the computer
C. Reviewing reports listing short shipments of goods received
D. Reviewing an aged trial balance of accounts receivable
66
February 2, 20
15
!@