CISA Chapter 1
CISA Chapter 1
CORNERSTONE’S
SUPPORT
www.cornerstonetz.com/moodle
DOMAIN 1
• Learning Objectives
• Discuss Task and Knowledge Statements
• Discuss specific topics within the chapter
• Case studies
• Practice questions
• Describe an IS audit
• Explain how an IS audit function should be
managed
• List ISACA audit standards and guidelines
• Describe the risks in audit
Key concepts
•Classification of audit
•Types of audits
The IS auditor should understand the various types of audits that can
be performed, internally or externally, and the audit procedures
associated with each:
•Compliance audits
•Financial audits
•Operational audits
•Integrated audits
•Administrative audits
•IS audits
•Specialized audits
•Forensic audits
Stages of audit
-Planning
-Audit evidence
-Reporting
• Task statements
• Knowledge statements
• Organization
• Responsibilities
Quotes
• Planning
• Audit evidence
• Reporting
• Follow-up on implementation
• Internal controls
• Audit evidence
• Sampling
• Reporting
• Question and answers
House
Security light
Wall
Dog
sensor
Security Guard House
Gate
IT controls classification
• IT General controls
• Applications controls
Standards
• Must be followed by IS auditors
Guidelines
• Provide assistance on how to implement the standards
Tools and Techniques
• Provide examples for implementing the standards
1204 – Materiality
Standards
• Must be followed by IS auditors
Guidelines
• Provide assistance on how to implement the standards
Tools and Techniques
• Provide examples for implementing the standards
Audit sampling
Sampling involves looking at less than 100% of transactions
Used for tests of controls and direct substantive tests of account
balances and assertions
Sampling is used when time and cost consideration preclude a
total verification of all transactions or events.
Sampling approaches
Statistical sampling: uses application of probability theory and
statistical inference, along with auditor judgment and experience, in a
sample application
Statistical sampling:
Under SS, IS auditor decides on how closely the sample should
represent the popn (Assessing Precision) and number of times in
100 that the sample should represent the population (reliability
of confidence level)
• Error rate
• Expected error rate
• Tolerable error rate
• Confidence level- Level of reliability (possibility that sample is
a true representation of popn)
• Precision- acceptable range difference between sample and
popn. How close is sample to popn in term. The high precision
means the difference is small is small and hence low sample
size. Vice verse is true
COBIT
IT Governance
Val IT 2.0
Evolution of
Management (2008)
Control
scope
Risk IT
(2009)
Audit
Key
components
of a
governance
system
Source: COBIT® 5, figure 8. © 2012 ISACA® All rights reserved.
98
© Copyright 2014 ISACA. All rights reserved.
4. Enabling a Holistic Approach (cont.)
Principle 4. Enabling a Holistic Approach
99
© Copyright 2014 ISACA. All rights reserved.
4. Enabling a Holistic Approach (cont.)
Principle 4. Enabling a Holistic Approach:
1. Processes—Describe an organised set of practices and activities to achieve
certain objectives and produce a set of outputs in support of achieving overall
IT-related goals
2. Organisational structures—Are the key decision-making entities in an
organisation
3. Culture, ethics and behaviour—Of individuals and of the organisation; very
often underestimated as a success factor in governance and management
activities
4. Principles, policies and frameworks—Are the vehicles to translate the desired
behaviour into practical guidance for day-to-day management
5. Information—Is pervasive throughout any organisation, i.e., deals with all
information produced and used by the enterprise. Information is required for
keeping the organisation running and well governed, but at the operational level,
information is very often the key product of the enterprise itself.
6. Services, infrastructure and applications—Include the infrastructure,
technology and applications that provide the enterprise with information
technology processing and services
7. People, skills and competencies—Are linked to people and are required for
successful completion of all activities and for making correct decisions and
taking corrective actions 100
© Copyright 2014 ISACA. All rights reserved.
4. Enabling a Holistic Approach (cont).
Principle 4. Enabling a Holistic Approach:
Systemic governance and management through interconnected
enablers—To achieve the main objectives of the enterprise, it must
always consider an interconnected set of enablers, i.e., each
enabler:
Needs the input of other enablers to be fully effective,
e.g., processes need information, organisational structures
need skills and behaviour
Delivers output to the benefit of other enablers, e.g.,
processes deliver information, skills and behaviour make
processes efficient
This is a KEY principle emerging from the ISACA development
work around the Business Model for Information Security (BMIS).
101
© Copyright 2014 ISACA. All rights reserved.
5. Separating Governance From Management
COBIT 5 is not
prescriptive, but it
advocates that
organisations
implement
governance and
management
processes such
that the key areas
are covered, as
shown.
• Management’s responsibility
• Benefits of a well-designed internal control system
– Deterring fraud at the first instance
– Detecting fraud in a timely manner
• Fraud detection and disclosure
• Auditor’s role in fraud prevention and detection
• Compliance test
– Determines whether controls are in compliance with
management policies and procedures
• Substantive test
– Tests the integrity of actual processing
• Correlation between the level of internal controls and substantive testing required
• Relationship between compliance and substantive tests
116
• Actual functions
• Actual processes/procedures
• Security awareness
• Reporting relationships
• Observation drawbacks
123 123
© Copyright 2014 ISACA. All rights reserved.
1.6.17 Communicating Audit Results (cont.)
• A management technique
• A methodology
• In practice, a series of tools
• Can be implemented by various methods
• Assessment facilitators
• Traditional Approach
– Assigns duties/supervises staff
– Policy/rule driven
– Limited employee participation
– Narrow stakeholder focus
• CSA Approach
– Empowered/accountable employees
– Continuous improvement/learning curve
– Extensive employee participation and training
– Broad stakeholder focus
Process involves:
• Identification of risks faced by
organization and of relevant key
controls
• Review and understanding of the
design of key controls
• Testing that key controls are
supported by the IT system
• Testing that management controls
operate effectively
• A combined report or opinion on
control risks, design and
weaknesses
• Distinctive character
– Short time lapse between the facts to be audited and the
collection of evidence and audit reporting
• Drivers
– Better monitoring of financial issues
– Allows real-time transactions to benefit from real-time
monitoring
– Prevents financial fiascoes and audit scandals
– Uses software to determine proper financial controls
Prerequisites:
• A high degree of automation
• An automated and reliable information-producing process
• Alarm triggers to report control failures
• Implementation of automated audit tools
• Quickly informing IS auditors of anomalies/errors
• Timely issuance of automated audit reports
• Technically proficient IS auditors
• Availability of reliable sources of evidence
• Adherence to materiality guidelines
• Change of IS auditors’ mindset
• Evaluation of cost factors
• Advantages
– Instant capture of internal control problems
– Reduction of intrinsic audit inefficiencies
• Disadvantages
– Difficulty in implementation
– High cost
– Elimination of auditors’ personal judgment and evaluation
The IS auditor has been asked to perform preliminary work that will
assess the readiness of the organization for a review to measure
compliance with new regulatory requirements. These requirements
are designed to ensure that management is taking an active role in
setting up and maintaining a well-controlled environment and,
accordingly, will assess management’s review and testing of the
general IT control environment.
The MOST appropriate type of CAATs tool the auditor should use
to test security configuration settings for the entire application
system is:
A. generalized audit software.
B. test data.
C. utility software.
D. expert system.
QUESTIONS
now