SlideShare a Scribd company logo
1 of 33
Download to read offline
Best Practices and Key Considerations in Auditing “
IT Suppliers”

Shankar Subramaniyan
ISACA Greater Houston Chapter
August 15,2013
Agenda
• Provide an overview on the “Suppliers”” environment
• ISACA Guideline for Auditing Outsourced Environment
• Discuss Key considerations/best practices
Dependency on IT SUPPLIERS
21st Century is ushering in a new kind of company…

The complex product markets of the 21st Century will demand the ability to quickly and
globally deliver a high variety of customized products. The products will be differentiated
not only by form and function but also by the services provided with the product including
the ability of the customer to be involved in the design of the product…A company will not
be an isolated facility of production, but rather a node in a complex network of suppliers,
customers, engineering and other service functions.
-William Davidow & Michael Malone
The Virtual Corporation

Increasing
dependency on
Suppliers due to
Change in Business
Model
Technology Changes

•
•
•

Gartner predicts that more than 60% of enterprises will have some form of
Cloud by 2013
Gartner estimates that by the year 2015 more than 50% of the enterprises
will be used SaaS applications for their business strategy
We should be cognizant of these implications of these new technologies for
effective IT auditing since Mission critical Apps with sensitive data (Finance
and HR) are now moving into SAAS

Increasing
dependency on
Suppliers due to
Technology Changes
IT SUPPLIERS
IT Suppliers

Outsourced Processes
IT processes

Application development
Application maintenance
Application hosting
Data center operations
Database administration
Desktop support
Disaster recovery services
Help desk services
IT security
Network operations
Web/e-commerce systems

Infrastructure Outsourcing
IT Security Outsourcing
Help Desk Outsourcing
Application Outsourcing - ERP or Custom
B2B Project Outsourcing
Business Transformation Outsourcing
Finance processes
AP, AR, Billing and Invoicing
Reconciliations
Treasury and Cash Management
Budgeting and Forecasting
Financial Planning and Reporting
Procurement processes
Spend Analysis
Sourcing Support
Supplier Performance Management
Contract Administration and Management
Custom Analytics
HR processes
Recruitment process
Employee orientation programs
Employee and manager training
Benefits administration
KEY CONCERNS

LACK OF
VISIBILITY

LOSS OF
CONTROL

CROSS
BORDER LAWS
MULTI
TENANACY

ATTACK
VECTOR

PHYSICAL
INACCESSABILITY
ISACA Outsourcing Audit Guideline

www.isaca.org/Outsourced-IT-AP
Scope
•
•
•
•
•
•

Operating infrastructure (and related processes) at the data center of the
customer or the supplier
Processing of a proprietary application by the servicer (application services
provider)
Development or maintenance of applications
Managing the network
Managing the information security infrastructure and supporting processes
A combination of any of these and other business and technology
processes
KEY COMPONENTS

Fulfillment of
assurance
charter and
compliance
requirements

Planning and
Scoping the
Audit
Achievement
of business
requirements
Governance

Functionality
and controls
of provided
services

Compliance
with contract
Relationship
management
Planning and Scoping the Audit
Audit Planning

• Having decided an audit is required, the following questions must be
answered:
–
–
–
–
–

What type of audit to be undertaken?
What particular information is required and by when?
To what depth and scope audit needs to be done?
On what dates should the audit be done?
Who should perform the audit?

Audit Charter with clear
scope and
methodology is very
critical

Audit process
should also involve
tracking the
previous audit non
conformities

• Sometimes Control Description and scope is not shared with Auditee.
• The audit scope does carry the risk of being too limited or too aggressive
Key Considerations in Audit Planning
• Type of Assurance depends on
Compliance requirement of the customer
What is the audit right mentioned in the contract
Who can decide the scope and methodology / who has the bargaining power
Type of service provided by the supplier
Criticality of the business/IT area outsourced and associated Risk assessment
Existing ISMS process/certifications of suppliers and it’s gap with Customer’s
requirements
To what depth audit needs to be done
Synchronizing audit
schedule and audit
Cost of Assessment
time period between
ISO27001
suppliers and
Customer

Supplier

SSAE16/
ISAE3402

AUP

Customer
Mapping between
Supplier and
Customer ‘s Controls
Overcoming Resistance to Audit

• Auditors
– Use audit as an improvement tool
– Explain the process to auditees
– Touch base with auditee
– Recognize their accomplishments
– Concerns and questions of auditees
– Do not do manipulative and trickery audit

Agree with
Department
Representatives
on the findings
and corrective
action

Auditee’s
Performance
appraisal has a
goal of “ZERO
DEFECT” in
Audit
Achievement of business requirements
ACHIEVEMENT OF BUSINESS REQUIREMENTS

• Review Business expectations
• Review Risk Assessment

Review the exceptions/
Step outs /
Retained IT
Components and their
control assessment

Sample List to consider in new project setup
The functional and technical requirements are identified and complete enough
Risk to the existing support levels identified (In case the applications planned to
be transitioned to XXX)
Solicited input from end user representatives
Existing support costs and desired targets identified (if sustaining opportunity)
Other sites and application systems considered to maximize cost savings
Technical issues discussed and resolved
Software and hardware purchasing/licensing requirements identified
Performance expectations regarding service levels and deliverables identified
Proposal reviewed by affected parties to ensure it addresses expectations
Proper template has been used to prepare the SOW
Acceptance criteria is clearly mentioned
Supplier Risk Management
Sample Risks are as follows :
•
Intellectual property ownership
•
Service levels not being met.
•
Deliverables not adhering to Quality norms.
•
Under/over utilization of resources.
•
Sustaining engagement scope creep
•
In-adequate transition of knowledge to new staff
•
Deliverables are not tracked and approved timely.
•
Inaccurate billing and Cost and Effort overruns.
•
In-adequate transition of knowledge and not able to transfer the ownership.
•
Right resources not available on time
•
Risk of Locking into Proprietary Supplier platforms/process
•
Key resources roll-offs in the middle of the project

Supplier
Relationship
Management

Supplier
Performance
Management

Proper process in case of Project termination

Contract

Supplier
Engagement
Guide

Recovery of all assets (Hardware/Software)
Termination of access
Knowledge Transfer
Deliverables and Process Documents
Notification of all affected parties
Contract and Accounting/Invoice activities
Compliance with contract
Compliance with contract
Whether the Contract includes
• Evaluation of supplier performance
• Rights to audit, information security requirements
• Payment schedule
• Issue monitoring
• Intellectual property ownership
• SLA, Penalty and non performance
• Clear scope and responsibilities
• Termination and transfer of services
• Legal Liabilities and Regulatory Compliance
Relationship management
RELATIONSHIP MANAGEMENT
•
•
•
•
•
•
•

Role of Relationship Managers
Adequacy of Delivery Metrics
Delivery Performance Review
New Project Initiation and management
Issue management and escalation
Billing and payment process
Relationship review
Critical Success Factors
S No
1

Description
Cultural awareness

2

Communication

3

Common Understanding
and sign-off on
Requirements (In-scope
and Out-of-scope)
Mutual Trust

4
5
6

7

Process Adherence and
following the procedures
Resolution of Issues in
time

8

Early Planning for
resources
Right Governance

9

Right usage of tools

Remarks
With cross-cultural awareness, the teams
can understand well on the expectations.
Communication is the key for any
successful engagement. Clarity and
Understanding play the key role. Ensure
that the other side understood what is
being communicated. Consider the styles
of communication as well as the accent
issues.
SOW sign-off at the beginning of the
respective project to eliminate any
uncertainties.
In the Estimates, Resources,
Management Styles and Cultural Aspects
Follow Engagement guide for all the
engagements under scope.
Efforts to resolve the issues and
understanding of any practical difficulties
in closure both the sides
Planning for People, tools, licenses,
logistics & timeframes
Reviews & feedbacks as per the laid
down procedures & practices at each of
the check points and any necessary
corrective actions.
Metrics tool, etc. for the proper tracking
of the progress and the deviations.
Functionality and controls of provided
services
Functionality and controls of provided services

•
•
•
•

Services operating as Promised
Responsibility for Controls and Processes
Review of Supplier suggested controls
Gap Assessment where full reliance is placed on the supplier

Difference between Process
narrative, SLA and Control.

Do not combine multiple controls that differ in control objective, type, characteristic or
frequency into one. Consider the cost of Implementation and Audit point of view while
documenting controls.
Fulfillment of assurance charter and
compliance requirements

Operational responsibility might
have got transferred to Supplier,
but legal and regulatory
responsibility will still be with
Customer
Fulfillment of assurance charter and compliance requirements

•
•
•

•
•

Audit rights per contract
Third Party Reviews
IT General Controls review
– Operating System
– Network
– Database
– Application support and maintenance
– Access Control and Physical Security
– Information Security
Regulatory Compliance
Assurance to Customer’s compliance Requirements

Assurance
Requirement at
Control Objective
level vs Control
level

Mapping between
different assurance
types
(SOC 1/ AUP/
ISO27001)
Audit points in Third Party reviews

•

Scope mismatch:
–
–
–

•

•
•
•
•
•

•

Application or Infrastructure in use by the Customer
Time Period
Location, people, process or service utilized by Customer

Process gap like Production application hosted in Dev server will not be
under Supplier’s audit scope since Supplier will audit only Production
server
Review subservice providers report if any
Review any significant changes in the supplier organization after the
supplier audit and before the customer’s year end review
Control owner and operator shared between Customer and supplier
Mapping of Controls between Customer and Supplier
Not clear understanding of responsibility of customer and supplier- Not clear
understanding of responsibility like encryption of archive or disposal of
backup tape containing personal sensitive data
Conflicting clauses to different customers
Governance
Governance

• Policies and Procedures
• Steering Committee oversight

Engagement
Guide

Compliance
requirements
should be included
from pre bid stage
itself and it should
be part of regular
status reviews
SUMMARY

•
•
•
•

Supplier Risk Management
Contract Management
Supplier Performance monitoring
Relationship Management
What is the Role of IT Auditor ?

Thank You

More Related Content

What's hot

Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Donald E. Hester
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8Karthik Arumugham
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties SolutionsAhmed Abdul Hamed
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
Scalable integrated program audit (sipa)
Scalable integrated program audit (sipa)Scalable integrated program audit (sipa)
Scalable integrated program audit (sipa)Vishnuvarthanan Moorthy
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesMark S. Mahre
 
Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Developmentessbaih
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsMark S. Mahre
 
The Coming Age of Continuous Auditing
The Coming Age of Continuous AuditingThe Coming Age of Continuous Auditing
The Coming Age of Continuous Auditingcarlabrut
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guideCenapSerdarolu
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsSharing Slides Training
 
Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day Martin Thompson
 
Integrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanIntegrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanCaseWare IDEA
 
DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.Nicholai Portelli
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03Mark S. Mahre
 

What's hot (20)

7 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.87 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.8
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Scalable integrated program audit (sipa)
Scalable integrated program audit (sipa)Scalable integrated program audit (sipa)
Scalable integrated program audit (sipa)
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional Services
 
Casa engl
Casa englCasa engl
Casa engl
 
Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Development
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
 
The Coming Age of Continuous Auditing
The Coming Age of Continuous AuditingThe Coming Age of Continuous Auditing
The Coming Age of Continuous Auditing
 
Test Lead_Venkat Kallagunta
Test Lead_Venkat KallaguntaTest Lead_Venkat Kallagunta
Test Lead_Venkat Kallagunta
 
Internal Controls
Internal ControlsInternal Controls
Internal Controls
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guide
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day
 
Insurance Lead Management
Insurance Lead ManagementInsurance Lead Management
Insurance Lead Management
 
Integrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanIntegrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit Plan
 
DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.DAC Tekiō by DAC Software Solutions Ltd.
DAC Tekiō by DAC Software Solutions Ltd.
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03
 

Similar to Best Practices & Considerations in “IT Suppliers Audit”

Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor managementRaminder Pal Singh
 
2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Ydemikaelyde
 
Regulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsRegulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsPaul Kuiken
 
Managing-Supplier-Performance-Key-Competitive-Advantage
Managing-Supplier-Performance-Key-Competitive-AdvantageManaging-Supplier-Performance-Key-Competitive-Advantage
Managing-Supplier-Performance-Key-Competitive-Advantageddodd
 
Draft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdfDraft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdfEnricoJohanes1
 
F & I Administration Processing Controls- An SSAE 16 Professionals Perspective
F & I Administration Processing Controls- An SSAE 16 Professionals PerspectiveF & I Administration Processing Controls- An SSAE 16 Professionals Perspective
F & I Administration Processing Controls- An SSAE 16 Professionals PerspectiveGary Pennington
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Genpact Ltd
 
Sucessful BPO Through Technology Enablement
Sucessful BPO Through Technology EnablementSucessful BPO Through Technology Enablement
Sucessful BPO Through Technology EnablementACTIVE Network
 
Governance in Outsourcing Made Simple
Governance in Outsourcing Made SimpleGovernance in Outsourcing Made Simple
Governance in Outsourcing Made SimpleRebecca Naughton
 
Yurii Chaika: Delivery Excellence in consulting model - importance, component...
Yurii Chaika: Delivery Excellence in consulting model - importance, component...Yurii Chaika: Delivery Excellence in consulting model - importance, component...
Yurii Chaika: Delivery Excellence in consulting model - importance, component...Lviv Startup Club
 
Resume - Phillip E Lucier 20150111
Resume - Phillip E  Lucier 20150111Resume - Phillip E  Lucier 20150111
Resume - Phillip E Lucier 20150111Phillip Lucier
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsOracle
 
Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Oracle
 
1 Business process Migrations
1   Business process Migrations1   Business process Migrations
1 Business process MigrationsVamseedhar SR
 
Service level management
Service level managementService level management
Service level managementYasir Karam
 

Similar to Best Practices & Considerations in “IT Suppliers Audit” (20)

Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor management
 
2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde
 
Regulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsRegulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and Models
 
Outsource.ppt
Outsource.pptOutsource.ppt
Outsource.ppt
 
Managing-Supplier-Performance-Key-Competitive-Advantage
Managing-Supplier-Performance-Key-Competitive-AdvantageManaging-Supplier-Performance-Key-Competitive-Advantage
Managing-Supplier-Performance-Key-Competitive-Advantage
 
Draft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdfDraft - Digital Transformation Rough Plan.pdf
Draft - Digital Transformation Rough Plan.pdf
 
F & I Administration Processing Controls- An SSAE 16 Professionals Perspective
F & I Administration Processing Controls- An SSAE 16 Professionals PerspectiveF & I Administration Processing Controls- An SSAE 16 Professionals Perspective
F & I Administration Processing Controls- An SSAE 16 Professionals Perspective
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
 
Sucessful BPO Through Technology Enablement
Sucessful BPO Through Technology EnablementSucessful BPO Through Technology Enablement
Sucessful BPO Through Technology Enablement
 
Info System 2
Info System 2Info System 2
Info System 2
 
Governance in Outsourcing Made Simple
Governance in Outsourcing Made SimpleGovernance in Outsourcing Made Simple
Governance in Outsourcing Made Simple
 
Sumithra_CV_R
Sumithra_CV_RSumithra_CV_R
Sumithra_CV_R
 
MS Jiji
MS JijiMS Jiji
MS Jiji
 
Yurii Chaika: Delivery Excellence in consulting model - importance, component...
Yurii Chaika: Delivery Excellence in consulting model - importance, component...Yurii Chaika: Delivery Excellence in consulting model - importance, component...
Yurii Chaika: Delivery Excellence in consulting model - importance, component...
 
Resume - Phillip E Lucier 20150111
Resume - Phillip E  Lucier 20150111Resume - Phillip E  Lucier 20150111
Resume - Phillip E Lucier 20150111
 
Project Metrics & Measures
Project Metrics & MeasuresProject Metrics & Measures
Project Metrics & Measures
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
 
Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...
 
1 Business process Migrations
1   Business process Migrations1   Business process Migrations
1 Business process Migrations
 
Service level management
Service level managementService level management
Service level management
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Best Practices & Considerations in “IT Suppliers Audit”

  • 1. Best Practices and Key Considerations in Auditing “ IT Suppliers” Shankar Subramaniyan ISACA Greater Houston Chapter August 15,2013
  • 2. Agenda • Provide an overview on the “Suppliers”” environment • ISACA Guideline for Auditing Outsourced Environment • Discuss Key considerations/best practices
  • 3. Dependency on IT SUPPLIERS
  • 4. 21st Century is ushering in a new kind of company… The complex product markets of the 21st Century will demand the ability to quickly and globally deliver a high variety of customized products. The products will be differentiated not only by form and function but also by the services provided with the product including the ability of the customer to be involved in the design of the product…A company will not be an isolated facility of production, but rather a node in a complex network of suppliers, customers, engineering and other service functions. -William Davidow & Michael Malone The Virtual Corporation Increasing dependency on Suppliers due to Change in Business Model
  • 5. Technology Changes • • • Gartner predicts that more than 60% of enterprises will have some form of Cloud by 2013 Gartner estimates that by the year 2015 more than 50% of the enterprises will be used SaaS applications for their business strategy We should be cognizant of these implications of these new technologies for effective IT auditing since Mission critical Apps with sensitive data (Finance and HR) are now moving into SAAS Increasing dependency on Suppliers due to Technology Changes
  • 6. IT SUPPLIERS IT Suppliers Outsourced Processes IT processes Application development Application maintenance Application hosting Data center operations Database administration Desktop support Disaster recovery services Help desk services IT security Network operations Web/e-commerce systems Infrastructure Outsourcing IT Security Outsourcing Help Desk Outsourcing Application Outsourcing - ERP or Custom B2B Project Outsourcing Business Transformation Outsourcing Finance processes AP, AR, Billing and Invoicing Reconciliations Treasury and Cash Management Budgeting and Forecasting Financial Planning and Reporting Procurement processes Spend Analysis Sourcing Support Supplier Performance Management Contract Administration and Management Custom Analytics HR processes Recruitment process Employee orientation programs Employee and manager training Benefits administration
  • 7. KEY CONCERNS LACK OF VISIBILITY LOSS OF CONTROL CROSS BORDER LAWS MULTI TENANACY ATTACK VECTOR PHYSICAL INACCESSABILITY
  • 8. ISACA Outsourcing Audit Guideline www.isaca.org/Outsourced-IT-AP
  • 9.
  • 10. Scope • • • • • • Operating infrastructure (and related processes) at the data center of the customer or the supplier Processing of a proprietary application by the servicer (application services provider) Development or maintenance of applications Managing the network Managing the information security infrastructure and supporting processes A combination of any of these and other business and technology processes
  • 11. KEY COMPONENTS Fulfillment of assurance charter and compliance requirements Planning and Scoping the Audit Achievement of business requirements Governance Functionality and controls of provided services Compliance with contract Relationship management
  • 12. Planning and Scoping the Audit
  • 13. Audit Planning • Having decided an audit is required, the following questions must be answered: – – – – – What type of audit to be undertaken? What particular information is required and by when? To what depth and scope audit needs to be done? On what dates should the audit be done? Who should perform the audit? Audit Charter with clear scope and methodology is very critical Audit process should also involve tracking the previous audit non conformities • Sometimes Control Description and scope is not shared with Auditee. • The audit scope does carry the risk of being too limited or too aggressive
  • 14. Key Considerations in Audit Planning • Type of Assurance depends on Compliance requirement of the customer What is the audit right mentioned in the contract Who can decide the scope and methodology / who has the bargaining power Type of service provided by the supplier Criticality of the business/IT area outsourced and associated Risk assessment Existing ISMS process/certifications of suppliers and it’s gap with Customer’s requirements To what depth audit needs to be done Synchronizing audit schedule and audit Cost of Assessment time period between ISO27001 suppliers and Customer Supplier SSAE16/ ISAE3402 AUP Customer Mapping between Supplier and Customer ‘s Controls
  • 15. Overcoming Resistance to Audit • Auditors – Use audit as an improvement tool – Explain the process to auditees – Touch base with auditee – Recognize their accomplishments – Concerns and questions of auditees – Do not do manipulative and trickery audit Agree with Department Representatives on the findings and corrective action Auditee’s Performance appraisal has a goal of “ZERO DEFECT” in Audit
  • 16. Achievement of business requirements
  • 17. ACHIEVEMENT OF BUSINESS REQUIREMENTS • Review Business expectations • Review Risk Assessment Review the exceptions/ Step outs / Retained IT Components and their control assessment Sample List to consider in new project setup The functional and technical requirements are identified and complete enough Risk to the existing support levels identified (In case the applications planned to be transitioned to XXX) Solicited input from end user representatives Existing support costs and desired targets identified (if sustaining opportunity) Other sites and application systems considered to maximize cost savings Technical issues discussed and resolved Software and hardware purchasing/licensing requirements identified Performance expectations regarding service levels and deliverables identified Proposal reviewed by affected parties to ensure it addresses expectations Proper template has been used to prepare the SOW Acceptance criteria is clearly mentioned
  • 18. Supplier Risk Management Sample Risks are as follows : • Intellectual property ownership • Service levels not being met. • Deliverables not adhering to Quality norms. • Under/over utilization of resources. • Sustaining engagement scope creep • In-adequate transition of knowledge to new staff • Deliverables are not tracked and approved timely. • Inaccurate billing and Cost and Effort overruns. • In-adequate transition of knowledge and not able to transfer the ownership. • Right resources not available on time • Risk of Locking into Proprietary Supplier platforms/process • Key resources roll-offs in the middle of the project Supplier Relationship Management Supplier Performance Management Proper process in case of Project termination Contract Supplier Engagement Guide Recovery of all assets (Hardware/Software) Termination of access Knowledge Transfer Deliverables and Process Documents Notification of all affected parties Contract and Accounting/Invoice activities
  • 20. Compliance with contract Whether the Contract includes • Evaluation of supplier performance • Rights to audit, information security requirements • Payment schedule • Issue monitoring • Intellectual property ownership • SLA, Penalty and non performance • Clear scope and responsibilities • Termination and transfer of services • Legal Liabilities and Regulatory Compliance
  • 22. RELATIONSHIP MANAGEMENT • • • • • • • Role of Relationship Managers Adequacy of Delivery Metrics Delivery Performance Review New Project Initiation and management Issue management and escalation Billing and payment process Relationship review
  • 23. Critical Success Factors S No 1 Description Cultural awareness 2 Communication 3 Common Understanding and sign-off on Requirements (In-scope and Out-of-scope) Mutual Trust 4 5 6 7 Process Adherence and following the procedures Resolution of Issues in time 8 Early Planning for resources Right Governance 9 Right usage of tools Remarks With cross-cultural awareness, the teams can understand well on the expectations. Communication is the key for any successful engagement. Clarity and Understanding play the key role. Ensure that the other side understood what is being communicated. Consider the styles of communication as well as the accent issues. SOW sign-off at the beginning of the respective project to eliminate any uncertainties. In the Estimates, Resources, Management Styles and Cultural Aspects Follow Engagement guide for all the engagements under scope. Efforts to resolve the issues and understanding of any practical difficulties in closure both the sides Planning for People, tools, licenses, logistics & timeframes Reviews & feedbacks as per the laid down procedures & practices at each of the check points and any necessary corrective actions. Metrics tool, etc. for the proper tracking of the progress and the deviations.
  • 24. Functionality and controls of provided services
  • 25. Functionality and controls of provided services • • • • Services operating as Promised Responsibility for Controls and Processes Review of Supplier suggested controls Gap Assessment where full reliance is placed on the supplier Difference between Process narrative, SLA and Control. Do not combine multiple controls that differ in control objective, type, characteristic or frequency into one. Consider the cost of Implementation and Audit point of view while documenting controls.
  • 26. Fulfillment of assurance charter and compliance requirements Operational responsibility might have got transferred to Supplier, but legal and regulatory responsibility will still be with Customer
  • 27. Fulfillment of assurance charter and compliance requirements • • • • • Audit rights per contract Third Party Reviews IT General Controls review – Operating System – Network – Database – Application support and maintenance – Access Control and Physical Security – Information Security Regulatory Compliance Assurance to Customer’s compliance Requirements Assurance Requirement at Control Objective level vs Control level Mapping between different assurance types (SOC 1/ AUP/ ISO27001)
  • 28. Audit points in Third Party reviews • Scope mismatch: – – – • • • • • • • Application or Infrastructure in use by the Customer Time Period Location, people, process or service utilized by Customer Process gap like Production application hosted in Dev server will not be under Supplier’s audit scope since Supplier will audit only Production server Review subservice providers report if any Review any significant changes in the supplier organization after the supplier audit and before the customer’s year end review Control owner and operator shared between Customer and supplier Mapping of Controls between Customer and Supplier Not clear understanding of responsibility of customer and supplier- Not clear understanding of responsibility like encryption of archive or disposal of backup tape containing personal sensitive data Conflicting clauses to different customers
  • 30. Governance • Policies and Procedures • Steering Committee oversight Engagement Guide Compliance requirements should be included from pre bid stage itself and it should be part of regular status reviews
  • 31. SUMMARY • • • • Supplier Risk Management Contract Management Supplier Performance monitoring Relationship Management
  • 32.
  • 33. What is the Role of IT Auditor ? Thank You