Audit Program v2
Audit Program v2
Audit Program v2
(Deloitte Philippines)
Key Objectives
To determine and verify the following
Logical security tools and techniques are implemented and configured to enable restriction o
All information resources are subject to appropriate logical security.
Logical security tools and techniques are administered to restrict access to programs, data,
Testing should include:
Compliance with bank policies, procedures and regulatory requirements
Compliance to BSP Circular 808
Compliance with the ISO27001
Coverage
User Access Controls
<A> Logical security tools and techniques are implemented and configured to ena
<B> All information resources are subject to appropriate logical security.
<C> Logical security tools and techniques are administered to restrict access to p
* Covered period: April 1,2014 to March 31,2015
No.
Obj
ecurity tools and techniques are implemented and configured to enable restriction of access to application system.
mation resources are subject to appropriate logical security.
ecurity tools and techniques are administered to restrict access to programs, data, and other information resources.
eriod: April 1,2014 to March 31,2015
Detailed Objective
Preventive
Detective
Detective
Preventive
to application system.
r information resources.
Control Nature
IT Nature
Control
Rating
Manual
IT Dependent
Medium
Manual
IT Dependent
Medium
Manual
IT Dependent
Medium
Manual
IT Dependent
Medium
Automated
IT Dependent
High
Manual
IT Dependent
Medium
Testing Procedure
(Detailed and step-by-step procedures are shown in the
working papers)
WP Ref
T1.1
T1.1 Understand and document the policies and
procedures related to the authorization of user access to
data and application systems.
T1.2
T1.2 Determine completeness of request form and
timeliness of its maintenance in the system.
T1.3 Determine creation and maintenance of user access T1.3
matrix.
T1.4
T1.4 Determine appropriateness of user access given to
users for every application/system.
T1.5
T1.5 Determine appropriateness of controls over shared
accounts for every application/system.
T1.6 Determine existence and effectivity of user access T1.6
periodic review.
T3.1
T4.1
T4.2
T5.1
T5.2
T5.3
Interview Topic
(this is not limited to the specific testing procedure but rather will
cater to the specific objective as a whole)
* Access provision process
- forms used
- who initiates, approves and effects the request form.
* Creation and maintenance of User Access Matrix
- who creates, approves and reviews.
* User Access review process
- who extracts and sent to whom
- who reviews
* Policy relating to (1) user login reporting process and (2) user
access rights changes review.
* Audit trail report on the changes and login. Note on the process of
generation and distribution.
* Policy relating to (1) user login reporting process and (2) user
access rights changes review.
* Audit trail report on the changes and login. Note on the process of
generation and distribution.