IT-General-Controls MC MA ITOpss 11 10
IT-General-Controls MC MA ITOpss 11 10
IT-General-Controls MC MA ITOpss 11 10
► Introduction
► IT Processes
Manage change
Manage access
Manage IT operations
► Evaluating ITGCs
► Information produced by entity
► Responding to ineffective ITGCs
Page 2
IT Controls
Page 35
IT entity level controls
CONTROL ENVIRONMENT
IT Organization, IT Strategic Planning,
RISK ASSESSMENT
The entity’s identification, analysis and management
of relevant risks
CONTROL ACTIVITIES
IT Policies, Guidelines, Standards and Procedures
Page 36
Controls in an IT Environment
Transaction-level Controls
Manual controls
Manual
Objective of control
Page 37
IT general controls
Page 38
IT general controls – definition
Page 39
IT processes covered in FAIT
►Manage change
► Manage access
► Manage IT operations
Page 40
Manage change ITGCs
Page 41
Manage change
Page 42
Identifying types of change
► System Software
► New system software implementation
► System software changes
► Software upgrades
► Software patches
► Technical changes to the database
Page 43
Focus of external financial audit
Page 44
What are the risks?
► Authorization
► Inappropriate system changes may be requested
► Impact of requested change on other business units may not have
been considered
► System change may be made to perpetrate fraud
► Testing
► Undetected and uncorrected program bugs
► System change does not meet users’ requirements
► Processing errors may be introduced
► Leads to problems in other parts of the system
► Unauthorized code introduced may not detected
Page 45
Manage changes:
Recommended controls
Page 46
Authorization - What are the risks?
► Authorization
► Inappropriate system changes may be requested
Page 47
Change are authorized
Post-
Initiation Implementation
Page 48
Testing - What are the risks?
► Testing
► Undetected and uncorrected program bugs
► System change may not meet users’
requirements
► Processing errors may be introduced
► May leads to problems in other modules/
systems
► Unauthorized code introduced may not
detected
Page 49
Changes are tested
Changes are
authorized
Post-
Initiation Implementation
► Approval
► Premature migration of changed programs to production
environment
► Not all processing components (e.g., other modules, system
interfaces, system software) have been tested
► Not all exceptions have been corrected.
► Data for conversion may not have been fully cleansed or lack
integrity
Page 51
Changes are approved
Changes are
Changes are tested approved
Changes are
authorized
Post-
Initiation Implementation
► Monitoring
► Significant delays in implementation of new or changed system
may not be addressed.
Page 53
Changes are monitored
Changes are
Changes are tested approved
Changes are
Changes are monitored
authorized
Post-
Initiation Implementation
Changes are
Changes are tested approved
Changes are
Changes are monitored
authorized
Post-
Initiation Implementation
Segregation of duties
► Manage change
►Manage access
► Manage IT operations
Page 56
Manage access ITGCs
Page 57
What are the risks related to manage
access?
► Confidential/proprietary information may be disclosed to
unauthorized persons
Page 58
Manage access ITGCs
Guiding Principles in Implementing IT Security
► Principle of Least Privilege - giving a person or a process the minimal
authority necessary to accomplish the job or task
Page 59
Manage access process components
► Users
Logical Security
► System Owners
► Security Officer ► Network security*
► OS security
► System People Technology
custodians/ ► Application security*
security ► DB security
administrators ► Security devices
Policies and Procedures
Page 60
Understand the logical access path
Page 61
Logical access path
Business
users IT users
Central
DB Buffer
Central DB
Page 62
Manage access:
Recommended controls
► General system security settings are appropriate. (T, PP)
► Password settings are appropriate.(T, PP)
► Access to privileged IT functions is limited to appropriate individuals.(T,
PP)
► Access to system resources and utilities is limited to appropriate
individuals. (T, PP)
► User access is authorized and appropriately established. (T,P, PP)
► Physical access to computer hardware is limited to appropriate
individuals.
► Logical access process is monitored. (T, P)
► Segregation of incompatible duties exists within logical access
environment.(P)
Page 63
General security settings
► Security Mode
► Disable
► Enable – warning vs. active mode
► Trust mode
► Audit logging – enabled? What are logged?
► Default accounts and passwords – there are no default accounts
with default passwords or default accounts are renamed and
passwords have been changed
► Generic accounts – access is limited or none
The EY Mercury work plans provide sufficient coverage for this control. For a walkthrough, we
document any baselines, policies, or inquiry with the client and note that these settings will be
tested using EY Mercury workplans.
Page 64
Password settings
Page 65
Privileged Users
► Testing should cover privileged user rights for all relevant technical
components of the logical access path that support the key controls.
► Determine if the users’ privileged access rights are appropriate based
on their job responsibility
► Determine if the number of privileged users appears appropriate.
► Determine how system activities of privileged users are controlled
(e.g, logged, monitored?)
Page 66
System resources and utilities
Resources Utilities
Databases SQL Plus
Security files SuperZap
System DFU
configuration/
parameters
System logs
► Determine that access rights granted to these resource
sand utilities are appropriate.
Page 67
User Access Management
► New hires & transfers
► Users are granted access rights on the basis of an approved request. and
limited only to access required to carryout their job responsibilities.
► Unique user ID is assigned to each user. No group IDs exist and shared
by multiple users.
► Changes to users’ access should be approved and their role re-evaluated
to prevent “role creep” which is caused by incremental additions to access
over time, causing segregation of duties risks.
► Periodic review
► Users’ access rights should be periodically reviewed to ensure that they
remain appropriate..
► The review should cover access rights to all elements of the IT
infrastructure (i.e., computing, networking, databases).
► Frequency of the review should be assessed to determine the design
effectiveness.
Page 68
User Access Management – cont’d
► Terminations and resignations
► Access rights should be promptly disabled and/or removed once users
leave the company.
► If there is no or ineffective periodic review, extended testing of
terminations and resignations is performed
NOTE: Review and testing should cover UAM processes for BOTH
INTERNAL AND EXTERNAL SYSTEM USERS.
Page 69
Physical security
Physical access to the data center
► All access points (doors and windows) are secured
► Guards
► Access cards , biometrics
► Issuance and retrieval of security devices (e.g., access cards, tokens) are
properly controlled
► Determine if the access rights granted are appropriate based on their job
description/function
► Sensitive areas are monitored (e.g., by closed circuit television (CCTV)
► Server racks
► Secured cabling
Page 70
Monitoring
Related to assessing the system security on a recurring
basis.
► Internal review of compliance with security policies (e.g.
Vulnerability Assessment, Attack and Penetration testing,
Internal IT Audit.)
► Periodic review of security policies, guidelines, baseline
standards and procedures
► Security patch management
► Anti-virus definition updates
Page 71
Segregation of duties
► For segregation of duties, the person setting-up the
access should be different from the person requesting,
approving, and monitoring.
Security Monitoring/
Request Authorize
administration Audit
System System/ security
Security office/
User administrator/
Internal audit
owner custodian
Page 72
IT processes covered in FAIT
► Manage change
► Manage access
►Manage IT
operations
Page 73
Manage IT operations
Page 74
Manage IT operations
► PCPs:
► Financial data has been backed up and is recoverable
Page 75
Back-up and recovery
► Vital information assets for ► Degree of backup:
back up: ► Differential (from last backup)
► Data ► Incremental (from full backup)
► Databases structures ► Full
► Applications (with ► Frequency of backups:
configurations) ► Daily
► System software with
► Weekly
configurations
► Monthly
► Method of backup
► Offsiting of back up files
► Physical (e.g., tapes, discs)
► Server replication/mirroring
► Testing of back up files
► Manual vs scheduled job ► Backup site
Page 76
Job scheduling
► Scheduling
► Ability to create/change/delete job schedules should be restricted
► Monitoring
► Independent post review of job executions to ensure successful
completion of runs and note aborted runs, job failures, changes in
job schedule.
► Scheduled job failures should be handled as part of the incident
management process for successful resolution
Page 77
Problem and incident management
Page 78
Evaluating ITGCs
Page 79
Information Produced by Entity
Information Produced by the Entity (IPE) is any information created by the entity using the
entity’s IT applications, end user computing (EUC) tools or other means (including
manually prepared information).
The concepts
It is used by related to IPE
management in We use IPE as a We use IPE as also apply to
population from audit evidence information
the performance produced by
of controls we which we select for substantive service
are testing items to test tests organizations
The risks related to IPE are applicable to all audit procedures, including ITGC and
application control testing.
Page 79
Risks related to the use of IPE
Page 79
Considerations in Testing ITGCs
Centralized vs. Decentralized
Page 80
Effective IT general controls
Page 81
Ineffective ITGCs
Page 82
Ineffective ITGCs
Page 83
Compensating controls
Page 85
Substantive testing in the ITGC level
Page 86
Ineffective ITGCs
Page 87
Evaluating ITGCs with rationale indicators
IT-dependent
Manual or
application
R Control evaluation
control
Effective evaluation
Aggregate
ITGC evaluation for ITDM ITGC
or application control evaluation
Not Support
IT
processes
Manage change Logical access Other ITGCs evaluations
Ineffective Effective Effective
Page 88