08 - IT AUDIT CISA-System Development
08 - IT AUDIT CISA-System Development
08 - IT AUDIT CISA-System Development
DEVELOPMENT PROCESS
1
BUSINESS APLICATION SYSTEMS
Companies often commit significant IT resources (e.g. people,
applications, facilities and technology) to develop, acquire,
integrate and maintain application systems that are critical to
the effective functioning of key business processes.
These systems are critical information assets and should be
effectively managed and controlled.
In order to develop and implement these system different
activities/phases are performed (SDLC). Each step or phase in
the life cycle is an incremental step that lays the foundation
for the next phase, for effective management control in
building and operating Business Application Systems.
2
BUSINESS APLICATION SYSTEMS
A risk in any software development project is that the final
outcome may not meet all requirements. Problems due to
translation errors arise when initially defining the
requirements for interim products.
A variant of waterfall model normally involve a life cycle
verification approach that ensures that potential mistakes are
corrected early and not solely during final acceptance testing.
The verification and validation model , sometimes called the
V model also emphasizes the relationship between
development phases and testing levels.
3
4
From an IS auditor's perspective, the V Model's defined life
cycle phases and specific points for review and evaluation
provides the following advantages:
• The IS auditors influence is significantly increased when
there are formal procedures and guidelines identifying
each phase in the business application life cycle and the
extent of auditor involvement.
• The IS auditor can review all relevant areas and phases of
the systems development project, and report
independently to management.
• The IS auditor can identify selected parts of the system
and become involved in the technical aspects on the basis
of his/her skills and abilities.
• The IS auditor can provide an evaluation of the methods
and techniques applied through the development phases
5
of the business application life cycle.
ROLE OF IS AUDITORS IN SYSTEM DEVELOPMENT
8
ROLE OF IS AUDITORS IN SYSTEM DEVELOPMENT
Participate in post implementation reviews.
Review appropriate documentation, discuss with key
personnel, and use observation to evaluate system
maintenance standards and procedures to ensure their
adequacy.
Discuss and examine supporting records to test system
maintenance procedures to ensure that they are being
applied as described in the standards.
Analyze test results and other audit evidence to
evaluate the system maintenance process to determine
whether control objectives were achieved.
Identify and test existing controls to determine the
adequacy of production library security to ensure the
9
integrity of the production resources.
FEASIBILITY STUDY
The IS auditor should perform the following functions:
Review the documentation produced in this phase for
reasonableness.
Determine whether all cost justifications/benefits are
verifiable and, showing the anticipated costs and
benefits to be realized.
Identify and determine the criticality of the need.
Determine if a solution can be achieved with systems
already in place. If not, review the evaluation of
alternative solutions for reasonableness.
Determine the reasonableness of the chosen solution.
10
REQUIREMENTS DEFINITION
The IS auditor should perform the following functions:
Obtain the detailed requirements definition document and
verify its accuracy through interviews with the relevant user
departments.
Identify the key team members on the project team and
verify that all affected user groups have/had appropriate
representation.
Verify that project initiation and cost have received proper
management approval.
Review the conceptual design specifications (e.g.
transforms, data descriptions) to ensure that they address
the needs of the user
11
REQUIREMENTS DEFINITION
12
SOFTWARE ACQUISITION PROCESS
The IS auditor should perform the following functions:
Analyze the documentation from the feasibility study to determine
whether the decision to acquire a solution was appropriate.
Review the RFP to ensure that it covers the items listed in this
section.
Determine whether the selected vendor is supported by RFP
documentation.
Attend agenda-based presentations and conference room pilots to
ensure that the system matches the vendor's response to the RFP.
Review the vendor contract prior to its signing to ensure that it
includes the items listed.
Ensure the contract is reviewed by legal counsel before it is signed.
13
DETAILED DESIGN AND DEVELOPMENT
The IS auditor should perform the following functions:
Review the system flowcharts for adherence to the
general design. Verify that appropriate approvals
were obtained for any changes and all changes were
discussed and approved by appropriate user
management.
Review the input, processing and output controls
designed into the system for appropriateness,
Interview the key users of the system to determine
their understanding of how the system will operate,
and assess their level of input into the design of
screen formats and output reports.
14
DETAILED DESIGN AND DEVELOPMENT
Assess the adequacy of audit trails to provide
traceability and accountability of system transactions.
Verify the integrity of key calculations and processes.
Verify that the system can identify and process
erroneous data correctly.
Review the quality assurance results of the programs
developed during this phase.
Verify that all recommended corrections to
programming errors were made and the
recommended audit trails or EAMs were coded into
the appropriate programs.
15
SYSTEM TESTING
Testing is crucial· in determining the user requirements have
been validated, the system ·is performing as anticipated and
internal controls work as intended. Therefore it is essential
that IS Auditor be involved in reviewing this phase and
perform the following: .
• Review the test plan for completeness; indicate evidence
of user participation such as user development of test
scenarios and/or user sign-off of results; and consider
rerunning critical tests.
• Reconcile control totals and converted data,
• Review error reports for their precision in recognizing
erroneous data and resolution of errors.
• Verify cyclical processing for correctness (month-end, year-
16
end processing, etc.).
SYSTEM TESTING
• Interview end users of the system for their understanding of
new methods, procedures and operating instructions.
• Review system and end· user documentation to determine
its completeness and verify its accuracy during the test
phase.
• Review parallel testing results for accuracy.
• Verify that system security is functioning as designed by
developing and executing access tests.
• Review unit and system test plans to determine whether
tests for internal controls are planned and performed.
• Review the user acceptance testing and ensure that the
accepted software has been delivered to the implementation
team. The vendor should not be able to replace this version.
• Review procedures used for recording and following through
17
on error reports.
IMPLEMENTATION PHASE
This phase is initiated only after a successful testing phase.
The system should be installed according to the
organization's change control procedures. The IS auditor
should verify that appropriate sign-offs have been-obtained
prior to implementation and perform the following:
• Review the programmed procedures used for scheduling
and running the system along with system parameters
used in executing the production schedule.
• Review all system documentation to ensure its
completeness and that all recent updates from the
testing phase have been incorporated.
• Verify all data conversion to ensure that they are correct
and complete before implementing the system in
production. 18
Documentation
To ensure the effective utilization and future maintenance of
a system, it is important that all relevant system
documentation be updated.
Due to light time constraints and limited resources, thorough
updates to documentation are often neglected.
Documentation requiring revision may consist of program
and/or system flowcharts, program narratives, data
dictionaries, entity relationship models, data flow diagrams
(DFDs), operator run books and end-user procedural
manuals. Keeping the internal coherence of all these items is
a challenge; software configuration management packages
can be a valuable tool.
Procedures should be in place to ensure that documentation
stored offsite for disaster recovery purposes is also updated.
19
This documentation is often overlooked.
INFORMATION SYSTEMS MAINTENANCE PRACTICES
27
Deploying Changes
After the end user is satisfied with the system
test results and the adequacy of the system
documentation, approval should be obtained
from user management.
User approval could be documented on the
original change request or in some other
fashion (memo or e- mail); however, evidence
that verifies user approval should be retained
by the system maintenance staff.
28
LIBRARY CONTROL SOFWARES
The Library Control Procedure's primary purpose is
to provide protection & security for the source code
that is under development. In order to implement
these procedures Library Control Software are
developed to allow read-only access to source
code. These Software are used to ensure that only
authorized changes after getting required approval
are reflected in the codes being used in production
environment.
29
Project Management
Project : A group of milestones or phases, activities
or tasks that support an effort to accomplish
something
• Time
• Cost
• Scope
Manage these or they will
manage you!
ROLE OF IS AUDITORS IN PROJECT MANAGEMENT
Throughout the project management process the
IS auditor should analyze the associated risks and
exposures inherent in each phase of the SDLC
and ensure that the appropriate control
mechanisms are in place to minimize these risks
in a cost-effective manner.
Caution should be exercised to avoid
recommending controls that cost more to
administer than the associated risks they are
designed to minimize.
32
ROLE OF IS AUDITORS IN PROJECT MANAGEMENT
When reviewing the SDLC process, the IS
auditor should obtain documentation from the
various phases and attend project team
meetings, offering advice to the project team
throughout the system development process.
The IS auditor should also assess the project
team’s ability to produce key deliverables by the
promised dates.
33
ROLE OF IS AUDITORS IN PROJECT MANAGEMENT
Typically, the IS auditor should review the
adequacy of the following project management
activities:
– Levels of oversight by project committee/board
– Risk management methods within the project
– Issue management
– Cost management
– Processes for planning and dependency management
– Reporting processes to senior management
– Change control processes
– Stakeholder management involvement
34
ROLE OF IS AUDITORS IN PROJECT MANAGEMENT
Sign-off process- At a minimum, signed approvals from
systems development and user management
responsible for the cost of tile project and/or use of the
system Additionally, adequate and complete
documentation of all phases of the SDLC process should
be evident. Typical types of documentation may
include, but should not be limited to the following:
– Objectives defining what is to be accomplished during that
phase Key deliverables by phases with project personnel
assigned direct responsibilities for these deliverables
– A project schedule with highlighted dates for the completion
of key deliverables
– An economic forecast for that phase, defining resources and
the cost of tile resources required to complete the phase 35
REVIEW OF THE PRACTICE OF PROJECT MANAGEMENT TOOLS
AND TECHNIQUES
36
REVIEW OF THE PRACTICE OF PROJECT MANAGEMENT TOOLS
AND TECHNIQUES
37
REVIEW OF THE PRACTICE OF PROJECT MANAGEMENT TOOLS AND
TECHNIQUES
38