03 - IT Audit 03 - 2018
03 - IT Audit 03 - 2018
03 - IT Audit 03 - 2018
Ilham
IT Audit Role
• Performing:
• Institutional Risk Area Audits
• Performing:
• Institutional Risk Area Audits
Source: ISACA
Definisi Risiko
Threat
Vurnerability RISK
Impact
(asset Value)
Definisi Risiko
• Threat
• Ancaman yang diakibatkan oleh adanya
kelemahan
• Vulnerability
• Kelemahan yang dapat dieksploitasi
sehingga menjadi sebuah ancaman
• Impact
• Dampak yang terjadi dikarenakan adanya
kelemahan yang berhasil dieksploitasi.
Tipe Risiko
Strategi
c
RISK
Operation
al
Tactical
Ruang Lingkup Risiko
IT Control
Control
Source: ISACA
Control Objectives
Source: ISACA
Control Practices
Source: ISACA
A car has brakes…
14
A car has brakes to allow it to go faster…
15
Understanding IT Controls
16
Controls Classification
Preventive
Detective
Corrective
Understanding IT Controls
IT control is a process that
provides assurance for
information and information
services, and help to
mitigate
risks associated with use of
technology.
18
Importance of IT Controls
• Needs for IT controls,
such as
• controlling cost
• protecting information
assets
• complying with laws
and regulations
• Implementing effective
IT controls will
improve efficiency,
reliability, and
flexibility.
19
Roles and Responsibilities
• Board of Directors
/Governing Body
• Management – define,
approve,
implement IT
controls
• Auditor
20
Based on Risk
• Analyzing Risk
• Identify and prioritize
risks
• Consider risk in
determining the
adequacy of IT controls
• Define risk mitigation
strategy –
accept/mitigate/share
21
Monitoring
• Monitoring IT Controls
• – Ongoing
monitoring/specia l
review/automated
continuous
auditing
22
Assessment
• Assessing IT controls is
an ongoing process
• Technology continues
to advance
• New vulnerabilities
emerge
23
IT Control: General Control
Physical Security
• Physical Access
IT Control • Temperature
Control
• Fire Protection
• UPS
Backup/Contingency
General Planning
• Data Backups
Control • Restore Procedures
• Offsite Storage
Disaster Recovery
Change Management • Business Resumption Plans
• Program Change Controls • BRP Testing
• Tracking • Alternate Processing
• Change Approvals
24
IT Control: Application Control Access Controls
• User-IDs/Passwords
• Data Security
IT Control • Network Security
• Security Administration
• Access Authorization
Input Controls
• Data Entry Controls
Application • System Edits
Control • Segregation of Duties
• Transaction Authorizatio
General
Processing Controls
Control
Output Controls • Audit Trails
• Reconciliation • Interface Controls
• Distribution • Control Total
• Access
25
Terimakasi annas vijaya 2018
h