Chapter 2: Auditing I.T Governance Controls
Chapter 2: Auditing I.T Governance Controls
t governance
controls
2.1. Information and Technology Governance
2.2. Structure of Information Technology Function
2.1. INFORMATION AND TECHNOLOGY GOVERNANCE
• Information Technology (IT) Governance is a relatively new
subset of corporate governance that focuses on the
management and assessment of strategic IT resources.
CE
AN
FIN
PRODUCTION
IT
SERVICES
DATA
DI
INFORMATION
ST
RIB
COST
UT
IO
N
G CHARGEBACK
CCOUNTIN
A
PRIMARY SERVICE AREAS OF CENTRALIZED IT SERVICES STRUCTURES
1. Database Administration
Centrally organized companies maintain their data resources in a central location
that is shared by all end user.
2. Data Processing
The data processing group manages the computer resources used to perform the
day-to-day processing of transactions.
2.1. Data Conversion - The data conversion function transcribes transaction data from hard-copy
source documents into computer input.
2.2. Computer Operations - The electronic files produced in data conversion are later processed
by the central computer, which is managed by the computer operations groups.
2.3. Data Library - The data library is a room adjacent to the computer center that provides safe
storage for the off-line data files. Those files could be backups or current data files.
3. Systems Development and Maintenance
The information systems need of users are met by two related functions: system
development and systems maintenance. The former group is responsible for analyzing
user needs and for designing new systems to satisfy those needs. The participants in
system development activities include systems professionals, end users, and
stakeholders.
Once a new system has been designed and implemented, the systems maintenance
group assumes responsibility for keeping it current with user needs. The term
maintenance refers to making changes to program logic to accommodate shifts in user
needs over time. During the course of the system's life (often several years), as much
as 80 or 90 percent of its total cost may be incurred through maintenance activities.
SEGREGATION OF INCOMPATIBLE IT FUNCTIONS
Backup Flexibility – The final argument in favor of DDP is the ability to back up
computing facilities to protect against potential disasters such as fires, floods, sabotage,
and earthquakes. The only way to back up a central computer site against such disasters
is to provide a second computer facility.
CONTROLLING THE DISTRIBUTED DATA PROCESSING ENVIRONMENT
USER SERVICES
A valuable feature of the corporate group is its user services function. This activity
provides technical help to users during the installation of new software and in
troubleshooting hardware and software problems. The creation of an electronic bulletin
board for users is an excellent way to distribute information about common problems
and allows the sharing of user-developed programs with others in the organization.
STANDARD-SETTING BODY
The relatively poor control environment imposed by the DDP model can be improved by
establishing some central guidance. The corporate group can contribute to this goal by
establishing and distributing to user areas appropriate standards for systems
development programming, and documentation.
PERSONNEL REVIEW
The corporate group is often better equipped than users to evaluate the technical
credentials of prospective systems professionals. Although the systems professional will
actually be part of the end-user group, the involvement of the corporate group in
employment, decisions can render a valuable service to the organization.
AUDIT OBJECTIVE
The auditor's objective is to verify that the structure of the function is such
that individuals in incompatible areas are segregated in accordance with the
level of potential risk and in a manner that promotes a working
environment. This is an environment in which formal, rather than casual,
relationships need to exist between incompatible tasks.
AUDIT PROCEDURES
• Verify that computer operators do not have access to the operational details of a system's
internal logic. Systems documentation, such as systems flowcharts, logic flowcharts, and
program code listings, should not be part of the operation's documentation set.
• Through observation, determine that segregation policy is being followed in practice.
Review operations room access logs to determine whether programmers enter the facility
for reasons other than system failures. The following audit procedures would apply to an
organization with a distributed IT function:
• Review the current organizational chart, mission statement, and job
descriptions for key functions to determine if individuals or groups are
performing incompatible duties.
• Verify that corporate policies and standards for systems design,
documentation, and hardware and software acquisition are published and
provided to distributed IT units.
• Verify that compensating controls, such as supervision and management
monitoring, are employed when segregation of incompatible duties is
economically infeasible.
• Review systems documentation to verify that applications, procedures, and
databases are designed and functioning in accordance with corporate
standards.