Application controls help ensure the privacy and security of data used by applications. They include validity, completeness, identification, authentication, and authorization checks. Application controls can be preventive, detective, or corrective. Organizations benefit from the reliability and time/cost savings of application controls. Risk assessments are used to identify vulnerabilities and determine the scope of application control reviews. Controls are then tested using methods like inspection, reperformance, and access listings.
Application controls help ensure the privacy and security of data used by applications. They include validity, completeness, identification, authentication, and authorization checks. Application controls can be preventive, detective, or corrective. Organizations benefit from the reliability and time/cost savings of application controls. Risk assessments are used to identify vulnerabilities and determine the scope of application control reviews. Controls are then tested using methods like inspection, reperformance, and access listings.
Application controls help ensure the privacy and security of data used by applications. They include validity, completeness, identification, authentication, and authorization checks. Application controls can be preventive, detective, or corrective. Organizations benefit from the reliability and time/cost savings of application controls. Risk assessments are used to identify vulnerabilities and determine the scope of application control reviews. Controls are then tested using methods like inspection, reperformance, and access listings.
Application controls help ensure the privacy and security of data used by applications. They include validity, completeness, identification, authentication, and authorization checks. Application controls can be preventive, detective, or corrective. Organizations benefit from the reliability and time/cost savings of application controls. Risk assessments are used to identify vulnerabilities and determine the scope of application control reviews. Controls are then tested using methods like inspection, reperformance, and access listings.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 20
Application Controls
Defining Application Controls
Application controls are those controls that pertain to the scope of individual processes or application systems. Application control is a security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk. They include data edits, separation of business functions, balancing of processing totals, transaction logging, and error reporting. The main objective of application control is to help ensure the privacy and security of data used by and transmitted between applications. Objectives of Application Controls Input data is accurate, complete, authorized, and correct Data is processed in an acceptable time period Data stored is accurate and complete Outputs are accurate and complete A record is maintained to track the process of data from input to storage and the the eventual output Components of application controls Completeness checks – controls ensure records processing from initiation to completion. Validity checks – controls ensure only valid data is input or processed. Identification – controls ensure unique, irrefutable identification of all users. Authentication – controls provide an application system authentication mechanism. Authorization – controls ensure access to the application system by approved business users only. Forensic controls – controls ensure scientifically and mathematically correct data, based on inputs and outputs Components continues Application controls ensure proper coverage and the confidentiality, integrity, and availability of the application and its associated data. With the proper application controls, businesses and organizations greatly reduce the risks and threats associated with application usage because applications are prevented from executing if they put the network or sensitive data at risk. Application Controls vs. General Controls Application controls are those controls that pertain to the scope of individual processes or application systems (specific to a given application)
General controls are controls that apply to all systems
components, processes, and data present in an organization or systems environment Types of Application Controls Input Controls - check the integrity of data entered into a business application
Processing Controls - ensure processing is complete, accurate,
and authorized
Output Controls -compare output results with expected results
by checking the output against the input
Management Trial (Audit Trail) Controls - monitors the
effectiveness of other controls and identifies errors as close as possible to their sources Preventive, Detective, and Corrective Controls Preventive: keep undesirable events from occurring Detective: should identify expected error types, as well as those that are not expected to occur Corrective: cause or encourage a desirable event or corrective action to occur after an undesirable event has been detected Benefits of Relying on Application Reliability Controls Once an application control is established, and there is little change to the application, database, or supporting technology, the organization can rely on the application control until a change occurs. An application control will continue to operate more effectively if the general controls that have a direct impact on its programmatic nature are operating effectively as well. As a result, the auditor will be able to test the control once and not multiple times during the testing period. Benefits of Relying on Application Benchmarking Controls If general controls that are used to monitor program changes, access to programs, and computer operations are effective and continue to be tested on a regular basis, the auditor can conclude that the application control is effective without having to repeat the previous year’s control test. Auditor should evaluate the appropriate use of benchmarking or an automated control by considering how frequently the application changes. (If application changes frequently, auditor should not rely on benchmarking) Benefits of Relying on Application Controls Time and Cost Saving Application controls generally take less time to test than general controls Application controls are typically tested one time as long as the general controls are effective Features of Application Controls Automatically identify trusted software that has authorization to run. Prevent all other, unauthorized applications from executing – they may be malicious, untrusted, or simply unwanted. Eliminate unknown and unwanted applications in your network to reduce IT complexity and application risk. Reduce the risks and costs associated with malware. Improve your overall network stability Protect against exploits of unpatched OS and third-party application vulnerabilities DATA ENVIRONMENT WITH APPLICATION CONTROL Application control gives companies and organizations knowledge about key areas regarding applications, web traffic, threats, and data patterns. Users can also benefit from application control by gaining a better understanding of applications or threats, applications’ key features and behavioral characteristics, details on who uses an application, and details on those affected by a threat. Organizations also gain knowledge about traffic source and destination, security rules, and zones to get a complete picture of application usage patterns, which in turn allows them to make more informed decisions on how to secure applications and identify risky behavior Risk Assessment The auditor should use Risk assessment techniques to identify critical vulnerabilities pertaining to the organization’s reporting, operational and compliance requirements when developing the risk assessment review plan. These techniques include: The review’s nature, timing, and extent. The critical business functions supported by application controls. The extent of time and resources to be expended on the review. Risk Assessment Approach
Identify applications, databases, and supporting technology that
uses application controls Define the risk factors associated with each application control Weigh all risks to determine rankings by importance Evaluate risk assessment results Create review plan based on the risk assessment and ranked risk areas Scoping of Application Controls Following are two methods for determining the review scope of application controls. Business Process Method : The business process scoping method is a top-down review approach used to evaluate the application controls present in all the systems that support a particular business process. Single Application Method: The single application scoping method is used when the auditor wants to review the application controls within a single application or module, as opposed to taking a business process scoping approach Scoping of Application Controls Business Process Method Top-down review approach used to evaluate the application controls present in all the systems that support a particular business process. Single Application Method Used to review the application controls within a single application Business Process Method Testing Application Controls Are application controls working? Substantive testing Information technology general controls review Ways to test: Inspection of system configurations Inspection or re-performance of reconciliations with supporting details Re-Performance of the control activity using system data Inspection of user access listings Re-Performance of the control activity in a test environment Sources Auditing Application Controls Christine Bellino, Jefferson Wells & Steve Hunt; Enterprise Controls Consulting LP www.theiia.org/download.cfm?file=21838
Information Technology Audits-Application Controls