SlideShare a Scribd company logo
1 of 188
Certified Information Systems Auditor is a registered trademark of ISACA
ISACA® is a registered trade mark of Information Systems Audit and Control Association.
© Simplilearn. All rights reserved.
Introduction to CISA
Certified Information Systems Auditor (CISA®)
Learning Objectives
By the end of this introductory domain, you will be able to:
• Describe CISA
• Demonstrate your understanding of the ISACA organization
• Discuss the history of CISA
• Understand the current CISA syllabus
• Describe the value of CISA
• List the requirements for certification and how to maintain the certification
• Outline the structure of CISA exams
Introduction to CISA
Introduced by ISACA in 1978, CISA has grown both in stature,
professional offering, and global influence. It is a widely recognized
certification because of the following features:
● CISA is the preferred certification for information systems control,
assurance, and security professionals.
● CISA is designed with the aim of attracting information systems
auditors, people concerned with technology security, educators,
and even CIOs.
CISA®
CERTIFIED INFORMATION SYSTEMS AUDITORTM
ISACA
ISACA formerly stood for Information Systems Audit and Control Association. However, the organization is known by
the acronym ISACA only to reflect the range of governance professionals within IT that it caters for. ISACA was
founded in 1969 as a nonprofit organization and currently (in 2019) has over 159,000 members in 188 countries.
Following are the certifications provided by ISACA:
Certified Information Systems Auditor®
(CISA®)
Certified Information Security Manager®
(CISM®)
Certified in the Governance of Enterprise
IT® (CGEIT®)
Certified in Risk and Information Systems
Control (CRISC®)
ISACA has developed COBIT 5, RISK IT
, and Val IT
, which it continually updates.
!✔
History of CISA
Introduced in 1978
First exam monitored in 1981
• Approved by the United States Defense Department as part of its assurance framework
In 2011, there
was a change in
curriculum: six
domains to five
domains
Current CISA Syllabus
The CISA syllabus (2019) is divided into five domains. The exam has 150 multiple choice questions. The duration of the exam is four hours.
Beginning June 2019, ISACA is offering continuous testing, with a 365-day exam eligibility period to take your exam. Following is a summary
of the CISA domains:
Domain Topic
Exam
Weightage
Domain 1 Information Systems Auditing Process 21%
Domain 2 Governance and Management of IT 17%
Domain 3 Information Systems, Acquisition, Development, and Implementation 12%
Domain 4 Information Systems Operations and Business Resilience 23%
Domain 5 Protection of Information Assets 27%
Total 100%
Value of CISA
Numerous benefits of a CISA
designation
Globally accepted
and recognized
certification
Increased value at
workplace
Achieve a high professional
standard
Higher earnings and greater career
growth
Increased
confidence
Trust and
recognition for
expertise
CISA Certification
The steps to obtain a CISA certification are:
• Pass CISA exam:
Pass the exam with a minimum of 450 marks
• Apply for certification:
• Minimum five years experience needed in IS Audit Domain areas
Note: Certification Application has to be within five years of sitting for the exam
• Waivers possible. See ISACA website for details.
• Agree to the Code of Professional Ethics
• Cohere with the Continuing Professional Education (CPE) Program
• Comply with the IS auditing standards
CISA Examination
CISA exams are prepared with the aim of gauging and testing hands-on skills in Information System Control and Audit.
Exam title Certified Information Systems Auditor (CISA®)
Exam duration Four hours to answer 150 multiple-choice questions covering five practice areas
Exam type Computer-based
Question type Multiple-choice questions
Pass requirements A candidate must receive a score of 450 or higher to pass the exam
Scaled score
A scaled score is a conversion of a candidate’s raw score on an exam to a common scale.
A candidate’s scores are reported as a scaled score.
ISACA uses and reports scores on a common scale from 200 to 800.
!✔
Thank You
© Simplilearn. All rights reserved.
© Simplilearn. All rights reserved.
Certified Information Systems Auditor is a registered trademark of ISACA
ISACA® is a registered trade mark of Information Systems Audit and Control Association.
Information System Auditing Process
Certified Information Systems Auditor (CISA®)
Learning Objectives
By the end of this domain, you’ll be able to:
Plan an audit to determine whether information systems are protected, controlled, and provide
value to the organization
Conduct an audit in accordance with IS audit standards and a risk‐based IS audit strategy
Communicate audit progress, findings, results, and recommendations to stakeholders
Conduct an audit follow‐up to evaluate whether risks have been sufficiently addressed
Evaluate IT management and monitoring of controls
Utilize data analytics tools to streamline an audit process
Provide consulting services and guidance to the organization in order to improve the quality and
control of information systems
Identify opportunities for process improvement in the organization's IT policies and practices
Part A: Planning
Part A: Planning
The following topics are covered in Part A:
• IS Audit standards, guidelines, and codes of ethics
• Business processes
• Types of controls
• Risk-based audit planning
• Types of audits and assessments
IS Audit Standards, Guidelines, and Codes of Ethics
Information System Auditing Process
Part A: Planning 1.1
IS Audit Standards, Guidelines,
and Codes of Ethics
IS Audit Standards, Guidelines, and Codes of Ethics
Introduction
Credibility of an audit is based, in part, on use of commonly accepted standards.
ISACA is the global pioneer of IS Assurance and Audit guidelines, Tools and Techniques, Standards, and Code of
Professional Ethics.
ISACA standards provide a benchmark for IS audit.
Main Areas of Coverage
The main areas covered under this knowledge statement include:
The CISA Exam will test your understanding of the application of Standards and Guidelines.
ISACA IS Audit
and Assurance
Tools and
Techniques
ISACA IS
Audit and
Assurance
Guidelines
ISACA IS
Audit and
Assurance
Standards
Framework
ISACA Code
of
Professional
Ethics
The main
areas of
coverage
Relationship
between
Guidelines, Tools
and Techniques,
and Standards
Categories of Standards and Guidelines
□ This category applies
to all assignments and
contains guiding
principles for IS
assurance.
□ It covers:
o Ethics
o Independence
o Objectivity
o Due care
o Knowledge
o Competence
o Skill
□ This category deals
with the conduct of the
IS audit and assurance
assignments.
□ It covers:
o Planning
o Scoping
o Risk
o Materiality
o Supervision
o Exercise of
professional
judgement
o Due care
□ This category covers:
o Reports
o Information
o Means of
communication
General
Performance Reporting
ISACA IS Audit and Assurance Standards
1001 Audit Charter
1002 Organizational
Independence
1003 Professional
Independence
1004 Reasonable Expectation
1005 Due Professional Care
1006 Proficiency
1007 Assertion
1008 Criteria
1201 Engagement Planning
1202 Risk Assessment in
Planning
1203 Performance and
Supervision
1204 Materiality
1205 Evidence
1206 Using the Work of Other
Experts
1207 Irregularity and Illegal Acts
1401 Reporting
1402 Follow up Activities
General Performance Reporting
ISACA ISAudit and Assurance Guidelines
Independence
2003 Professional
Independence
2004 Reasonable Expectation
2005 Due Professional Care
2006 Proficiency
2007 Assertion
2008 Criteria
2001 Audit Charter 2201 Engagement Planning
2002 Organizational 2202 Risk Assessment in
Planning
2203 Performance and
Supervision
2204 Materiality
2205 Evidence
2206 Using the Work of Other
Experts
2207 Irregularity and Illegal Acts
2208 Sampling
2401 Reporting
2402 Follow up Activities
General Performance Reporting
ISACA Code of Professional Ethics
ISACA set forth a code governing the professional conduct and ethics of all certified IS auditors and members of the
association. The members and certification holders shall:
Support the implementation and encourage
compliance with appropriate standards,
procedures, and controls for information systems.
Perform their duties with due diligence and
professional care in accordance with professional
standards and best practices
Maintain the privacy and confidentiality of
information obtained in the course of their duties
unless disclosure is required by a legal authority.
Such information shall not be used for personal
benefit or released to inappropriate parties.
Maintain competency in their respective fields
and agree to undertake only those activities that
they reasonably expect to complete with
professional competence.
Inform appropriate parties about the results of
work performed, revealing all significant facts
known to them
Support the professional education of stakeholders
to enhance their understanding of information
systems security and control.
Serve in the interest of stakeholders in a lawful
and honest manner while maintaining high
standards of conduct and character and not
engage in acts discreditable to the profession.
ISACA Code of Professional Ethics
Failure to comply with the code of professional ethics can result in an investigation into a
member’s and/or certification holder's conduct and, ultimately, in disciplinary measures.
ISACA IT Audit and Assurance Standards Framework Objective
The objectives of IS audit and assurance standards are to inform:
IS auditors
of the bare minimum level of
performance required to meet the
professional responsibilities set in
the Professional Code of Ethics
The management
of the profession’s requirement
regarding the work of audit
practitioners
The CISA certification
holders
that failure to meet these
standards results in a review of
their conduct by the ISACA board
of directors, which may ultimately
result in a disciplinary action
ISACA ISAudit and Assurance Guidelines
• ISACA IS Audit and Assurance guidelines provide additional information on how to comply with
the ISACA Information Technology Assurance and Audit Standards.
• The IS Auditor should use professional judgment and be able to justify any differences.
• Guideline documents are identified by a prefix G, followed by the number, for example, “G10.”
There are 42 categories of guidelines.
ISACA ISAudit Guidelines
Using the Work of Other
Auditors
Audit Evidence Requirement
Use of Computer-Assisted
Audit Techniques (CAATs)
Outsourcing of IS Activities to
Other Organizations
Audit Charter
Materiality Concepts for
Auditing Information Systems
Due Professional Care
Audit Documentation
Audit Considerations for
Irregularities and Illegal Acts
Audit Sampling
Effect of Pervasive IS Controls
Organizational Relationship
and Independence
Use of Risk Assessment in
Audit Planning
Application Systems Review
Planning
Effect of Third Parties on an
Organization’s IT Controls
Effect of Non-audit Role on
the IS Auditor’s Independence
IT Governance
Irregularities and Illegal Acts
Reporting
Enterprise Resource Planning
(ERP) Systems Review
Business-to-Consumer (B2C)
E-commerce Review
System Development Life
Cycle (SDLC) Review
Internet Banking
Responsibility, Authority, and
Accountability
Follow-up Activities
Biometric Controls
Configuration Management
Access Controls
IT Organization
Review of Security
Management Practices
Return on Security Investment
(ROSI)
Continuous Assurance
Review of Virtual Private
Networks
Business Process Reengineering
(BPR) Project Reviews
Mobile Computing
Computer Forensics
Post-implementation Review
Competence
Privacy
Business Continuity Plan (BCP)
Review from IT Perspective
General Considerations on the
Use of the Internet
ISACA IS Audit and Assurance Tools and Techniques
IS Audit and
Assurance
tools and
techniques
White
papers IS Audit
and
Assurance
programs
COBIT 5
family of
products
Tools and techniques are
listed under www.isaca.org/itaf
IS Audit and
Assurance tools and
techniques provide
additional guidance to
IS audit and assurance
professionals. Reference
books
ISACA IS Audit and Assurance Tools and Techniques
ISACA has Standards and Guidelines related to Audit (ITAF™):
Section 2200
Section 2400
Section 2600
Section 3000
Section 3200
Section 3400
Section 3600
Section 3800
General Standards
Performance Standards
Reporting Standards
IT Assurance Guidelines
Enterprise Topics
IT Management Processes
IT Audit and Assurance Processes
IT Audit and Assurance Management
Business Processes
Business Processes
Explanation
A business process is an inter-related set of cross-functional activities or events that result in the delivery of a
specific product or service to a customer.
An IS auditor must understand and evaluate the business processes they are auditing.
An Internal audit function must be independent and report to the audit committee or to the board of directors.
Audit Charter
Audit charters are high-level documents that define the purpose, authority, and responsibility of the internal audit activity.
Charter
Grants and assigns authorization, responsibility, and accountability to the auditor
Guides the auditor to get an approval
from the board of directors or the audit
committee or senior management in their
absence
Defines the scope of audit
function’s activities
Fundamental Business Processes
Explanation
Understanding the underlying business process that is audited
Understanding the role that IS play in these processes
IS auditing involves assessment of IS-related controls and understanding the control objectives
Identifying key controls that help achieve a well-controlled environment, according to standards
Audit Planning
• Gaining an understanding of the clients and its business
• Establishing priorities
• Determining an audit strategy
• Determining the type of evidence to collect, based on the risk
levels
• Assigning personnel resources for the audit
• Scheduling with the client to coordinate activities
The result of a well researched and completed audit plan is an audit program.
• Audit planning is the first step of the audit process.
The auditor’s responsibilities during the planning phase include:
Fundamental Business Processes: Transaction Examples
Examples
A bank may have various
transactions
Mobile
banking
ATM
transactions
Over the counter transactions
(For example: deposits,
withdrawals)
A chain store may have PoS (Point of Sale)
transactions with credit card information,
or cash extranet transactions with
suppliers (Electronic Data Interchange)
Using the Services of Other Auditors and Experts
IS audit and assurance professionals should:
• Consider using the work of other experts when there are constraints which would impair work performance
or potential gains in the quality of engagement.
• Assess and approve the adequacy of the other experts’ professional qualifications, competencies, relevant
experience, resources, independence, and quality‐control processes prior to the engagement.
• Assess, review, and evaluate the work of other experts as part of the engagement, and document the
conclusion on the extent of use and reliance on their work.
Risk Assessment and Risk Analysis
Part A: Planning 1.2
Business Processes
Relationship between Standards, Guidelines, Tools and Techniques
Standards
They are mandatory.
Tools and Techniques
They provide examples of
steps that the auditor may
follow in audits.
Guidelines
They provide assistance on
how Information Systems
Auditor (ISA) can
implement standards in
audits.
□ ISA must use professional judgment while applying the guidelines, tools, and techniques.
□ Legal and regulatory requirements may sometimes be more stringent than the standards.
□ The ISA should ensure compliance with the stringent legal or regulatory requirements.
Types of Controls
Control Principles
Explanation
Understand how the controls function
Explain how those control principles relate to IS
Internal Controls
They are the policies, procedures, practices, and structures incorporated by an organization to reduce risk.
They can be manual or automated.
Internal Controls are an enterprise’s internal processes implemented to achieve specific objectives while
minimizing risk.
They provide reasonable assurance to management that business objectives will be achieved and undesirable
events will be prevented, detected, and corrected.
Internal Controls
Internal controls have two broad objectives:
Internal
Control
Objectives
Increase the likelihood of an objective
or a desirable event
Decrease the likelihood of an
undesirable event occurring
• Ensure that business
requirements are clearly
documented and understood
• Ensure software delivery without
time and cost overruns
• Ensure testing before release
Examples of
Objectives
• Virus outbreak
• Unfulfilled project objectives
Examples of
Undesirable
Events
Internal Controls
Internal Controls consider two things
What can be
achieved?
What can be evaded?
Internal controls procedures have two categories
General control
procedures
Information
system control
procedures
Classification of Internal Controls
Preventive
Controls
Corrective
Controls
Detective
Controls
Classification of Internal Controls
Preventive
Controls
• Predict and prevent problems before they occur
• Monitor input controls and events as a preventive measure
• Examples:
o Segregation of duties
o Maker-checker/four-eyes principle
o Input and access controls (physical and logical)
Corrective
Controls
o Encryption of data at rest and in transit
Detective
Controls
Classification of Internal Controls
Preventive
Controls
Corrective
Controls
• Minimize the impact of a threat and rectify the cause of a problem
• Correct detected errors
• Root cause analysis, followed by changes to minimize future occurrences
• Examples:
o Disaster recovery and business continuity planning
o Incident response
o Backups, to ensure recovery by restoring data
Detective
Controls
o Reruns of failed processes
Classification of Internal Controls
Preventive
Controls
• Controls to detect and report intentional and unintentional errors after they occur
• Report incidence of errors, attacks, and omissions as they occur
• Examples:
o Logs
o Error messages
o Hash totals
Corrective
Controls
o Rechecking of calculations
o Scrutiny of reports
o Code review
o Internal audit function
o Logical and physical access logging, such as application audit trails, database
security logging, server room access control, and door logging to know details of
the person and time.
Detective
Controls
General Controls
They enable IT functioning for the achievement of corporate goals such as:
• Controls over data center and networks
• Access control
• Segregation of duties
• SDLC and Change Management
• Physical security
General controls are the policies and procedures involving all areas of an organization, including IT
infrastructure and support services.
General Controls
Internal
Accounting
Controls
Operational
Controls
Safeguarding
of assets and
reliability of
financial
records
Day-to-day
functions and
activities to
accomplish
business
objectives
Supports
operational
controls,
operational
efficiency, and
adherence to
management
Safeguarding
of assets and
ensuring
proper
utilization of
resources
Facilities, data
centers,
servers, IT
infrastructure,
and access
control
policies
Administrative
Controls
Organizational
policies and
procedures
Physical and
logical security
policies
ISControl Objectives
IS control objectives
are high-level
objectives that
management may
use for effective
control of IT
processes
A statement of the preferred purpose
or result to be attained by applying
controls around information system
processes
Made of procedures, policies,
organizational structures, and
practices
Intended to reasonably assure that
enterprise objectives will be achieved
while undesired events are detected,
corrected, or prevented
ISControl Objectives
Confidentiality
Integrity
Availability
Effectiveness
Efficiency
Compliance
Reliability
Overarching
principles of IS
controls
The first three are the
basic principles of
information systems
security.
Effectiveness is getting the
job done with a high degree
of certainty.
Efficiency is getting it done
with optimal use of
resources.
ISControl Objectives
Management plays an important role in regulating IS control objectives:
Selecting the control
objectives that can be
easily implemented and
are most appropriate to
the organization’s policies Cognizant of the risk
involved in
non-implementation of
some of the applicable
control objectives
Manner of implementation
ISControl Objectives: Examples
Ensure integrity of the
system such as Operating
System integrity
Ensure integrity of the sensitive
and critical application systems
Ensure safeguarding of assets
Ensure effectiveness and
efficiency of operations
Ensure proper authentication
process for users
Ensure availability of service
through Disaster Recovery
Plan and Business
Continuity Planning
ISControl Objectives: Examples
Ensure availability of IT assets
by having BCP and DR plans
Ensure integrity of application systems by input authorization, input
validation, accuracy and completeness of data processing, database
integrity, accuracy, completeness, and security of output controls
Protect computer systems
from improper access
Ensure that inputs are
validated
Ensure database
confidentiality, integrity,
and availability
ISControl Objectives: Examples
Ensure outsourced IT processes and services
have clearly defined SLAs, organizational assets
are protected, and business objectives are met
Ensure integrity of the sensitive
and critical application systems
Safeguard information assets
by implementing physical and
logical access controls
Ensure SDLC processes are established,
maintained, and followed for repeatable
and reliable development of software
applications to meet business objectives
Ensure integrity and reliability of systems by
implementing change management controls
Ensure availability of IT services by
developing effective and efficient
Disaster Recovery and Business
Continuity plans
ISControls
• IS control procedures include the following:
Strategy and
direction of the IT
function
General
organization and
management of
the IT function
System
development
procedures
Operation
procedures
System
programming and
system support
departments
Quality Assurance
(QA) processes
Physical access
controls
Business
Continuity
(BCP)
Communications
and networks
Access to
Information
Technology
programs, data
and resources
Database administration
Database
administration
Detective and
protection
mechanisms
Fundamental Business Processes
Part A: Planning 1.3
Types of Controls
Enterprise Architecture
Source: http://searchcio.techtarget.com/definition/enterprise-architecture
It determines if IT is
aligned with
enterprise
objectives and
delivers value to
business, keeping in
view the complexity
of an organization.
It determines how
an organization can
most effectively
achieve its current
and future
objectives.
An Enterprise
Architecture (EA) is a
conceptual blueprint
that defines the
structure and
operations of an
organization.
Zachman FrameworkTM
• It is a method to define an enterprise.
Two classifications are combined:
The first is what,
how, when, who,
where, and why
The second is
identification,
definition,
representation,
specification,
configuration, and
instantiation
First classification
includes
fundamentals of
communication of
the primitive
interrogatives.
Second
classification is
derived from
reification, the
transformation of
an abstract idea
into an
instantiation,
initially postulated
by ancient Greek
philosophers.
It is a schema with an intersection between two
historical classifications.
Zachman FrameworkTM for Enterprise Architecture
It includes:
• What
• How
• When
• Who
• Where
• Why
It includes:
• Identification
• Definition
• Representation
• Specification
• Configuration
• Instantiation
(Source: https://www.zachman.com/about-the-zachman-framework)
The Zachman framework is not a methodology, but it is a structure.
It is a two-dimensional framework that combines six basic interrogatives (What, How, Where, Who, When, and Why).
The framework intersects with different perspectives: Executives, Business Managers, System Architects, Engineers,
and Technicians.
It enables holistic understanding of the enterprise by looking at the organization from various viewpoints.
Zachman FrameworkTM for Enterprise Architecture
Security architecture
with a layered
framework, similar to
Zachman
Each layer expands in
detail to move from a
policy to the
implementation of
technology
The primary
characteristic of the
SABSA model is that
everything must be
derived from an analysis
of the business
requirements for
security
Ongoing “manage
and measure”
phases of the
lifecycle
Sherwood Applied Business Security Architecture
(SABSA)
Provides a chain of
traceability through the
various layers:
contextual, conceptual,
logical, physical,
component and
operational
Risk-driven enterprise
information security
architectures
SOMF
Service-oriented
modeling
framework
Devised by
Michael Bell
Modeling business
and software
systems to specify
service orientation
Can be used to design
any application,
business, and
technological
environment, either
local or distributed
Used with a
number of
architectural
approaches
Risk-Based Audit Planning
Risk-based Audit Planning
Explanation
Identification of key enterprise risks requires understanding of the organization, its environment, and control
objectives
Type and nature of transactions the entity engages in
Flow of this transaction and how it is captured into information systems
Risk Assessment Terms
Asset Risk Vulnerability Impact
Valuable
resource you
are trying to
protect
The potential
that a chosen
action or
activity will
lead to a loss
Negative
action that
may harm a
system
Weakness that
allows a threat
to cause harm
The severity of
the damage,
sometimes
expressed in
dollars
Threat
Inherent, Control, Detection, and Overall Audit Risk
Different types of risk:
Inherent
Risk
Probability of an
error existing
that might be
material
assuming
compensating
controls do not
exist. It
• exists
irrespective
of an audit
• is contributed
by the nature
of a business
Control
Risk
Probability that
a material
error exists
which will not
be prevented
or detected on
a timely basis
by the system
of internal
controls
Detection
Risk
Probability
that the
Information
Systems
Auditor (ISA)
used
inadequate
checks and
surmises that
material
errors are
absent, when
in fact, they
are present
Overall
Audit Risk
Summation of
all audit risk
groups for
each control
objective
Gap Analysis
Gap Analysis
Usage gap
Product
gap
Following are the two issues in Gap Analysis:
Assurance Definitions
• Target of evaluation (TOE): This is the information security deliverable, the object for which assurances are
made.
• Assurance activities: These activities depend on the method of assessment. Various methods of assessment
are discussed later.
• Security target (ST): This is the set of security specifications and requirements used to evaluate the target of
evaluation.
• Security protection profile (SPP): Similar to a security target, this profile is much broader in scope. Unlike an
ST, an SPP does not apply to any one particular deliverable but represents the security needs of a given
individual or group of individuals.
Risk-based Audit Definitions
Contro
l
IT Control Objective
Risk
Evidence
IT Governance
Risk Assessment and Risk Analysis
Explanation
Overall audit plan should focus on business risks related to use of IT.
Area under audit represents the audit scope.
Auditor to use risk-analysis techniques to establish critical area to focus on in the audit scope (focus to be on
high-risk areas).
Limited audit resources require this kind of focus in drawing the audit plan.
A proper audit report is critical.
Follow up on issues found in the audit is also critical.
Main Areas of Coverage
Risk Analysis
Audit
Methodology
Risk-Based
Auditing
Audit Risk
and
Materiality
Risk
Assessment
and Treatment
Risk
-Assessment
techniques
Reporting
techniques Follow-up
The main
areas of
coverage
Risk Analysis
1
2
3
Risk is defined as the mixture of the likelihood of an
event and its magnitude (ISO/IEC 73)
IT Risk is specifically the enterprise risk associated with
the ownership, use, operation, influence, involvement
and adoption of Information Technology within a
business (ISACA’s IT Risk Framework).
Risk analysis assists an auditor in recognizing
vulnerabilities and risks, and how they can define
controls to be put in place to ensure such risks are
mitigated.
Definitions of Risk
The probable
frequency and
probable magnitude
of future loss
(source: An
Introduction to
Factor Analysis of
Information Risk
(FAIR), Risk
Management Insight,
LLC)
The potential that a
given threat will
exploit
vulnerabilities of an
asset or group of
assets and thereby
cause harm to the
organization (source:
ISO 27005)
Factor Analysis of Information Risk (FAIR)
Loss
• Productivity
• Resources utilized (for adverse
events)
• Replacement of damaged and
defective assets
• Legal and regulatory costs
• Loss of competitive advantage
• Reputational loss
Value
• Criticality (impact on
smooth functioning)
• Cost
• Sensitivity
Threat agents
• Access
• Misuse
• Disclosure
• Unauthorized modification
□ FAIR is a probabilistic approach.
□ It focuses on what is probable, rather than what is possible.
□ It can be used to complement other methodologies.
Risk Analysis
● It helps the auditor identify threats and
risks within the IS environment.
● It assists in planning the audit by
evaluating controls in place.
● The helps an auditor be in a position to
know the audit objective.
● Decision making is easier as a risk-based
methodology is used.
From the Information System audit’s view, risk analysis aids in the following:
Perform
Periodic Risk
Reevaluation
(BO/RA/RM/RT)
Identify
Business
Objectives
(BO)
Identify
information
assets
supporting
the BOs
Perform Risk
Assessment (RA)
[Threat
–Vulnerability
–Impact]
Perform Risk
Management
(RM) [Map
Risks with
controls in
place]
Perform Risk
Treatment (RT)
[Treat significant
risks not
mitigated by
existing controls]
Calculating Risk
Exposure Factor The Exposure Factor (EF) is the percentage of value an asset lost due to an incident
Single Loss Expectancy The Single Loss Expectancy (SLE) is the cost of a single loss. SLE is the Asset Value (AV) times the Exposure Factor (EF)
Annual Rate of Occurrence The Annual Rate of Occurrence (ARO) is the number of losses you suffer per year
Annualized Loss Expectancy The Annualized Loss Expectancy (ALE) is your yearly cost due to a risk. It is calculated by multiplying the Single Loss
Expectancy (SLE) times the Annual Rate of Occurrence (ARO)
Calculating Risk
Risk Formulas
SL
E
Asset Value
(AV)
Ris
k
AL
E
Exposure Factor
(EF)
Probability of
the Risk
Cost of the
Eventuality
Single Loss
Expectancy (SLE)
Annual Rate of
Occurrence (ARO)
Risk-based Audit Approach
The risk-based audit approach is based on a concept in which
determination of areas that should be audited is based on
the perceived level of risk.
Residual Risk – This represents management’s risk appetite.
Normally, controls would be implemented to mitigate risk to
acceptable levels (i.e. residual risk).
A report or
information
might contain
an error that is
material
Might be
undetected
through the
audit period
Audit risk is the risk that
Risk-based Auditing
Risk Assessment
Risk Assessment Risk Evaluation
● Risk assessment drives the audit process.
● The identification of risk, prioritization of audit areas, and allocation of audit
resources should be based on risk assessment.
● Evaluation of the risk management process must be conducted at every stage to
ensure that risk is being managed within the risk appetite of the organization.
Risk Assessment and Treatment
Risk Assessment
Risk Assessment Risk Treatment
● Risks assessments involve identifying, prioritizing, and quantifying risks
against criteria for risk tolerance and objectives relevant in the organization.
● Risk assessments should be carried out regularly to ensure it addressed
changes in security, risk situation, and environment, especially when key
changes takes place.
Risk Assessment and Treatment
Risk Assessment Risk Treatment
Risk Assessment Risk Treatment
● Risk Mitigation – Applying adequate controls to lower the risks
● Risk acceptance – Objectively and knowingly not taking action
● Risk avoidance – Evading risks by ensuring actions that cause the risk are prevented
● Risk transfer/sharing – Sharing the risk with third parties such as suppliers or insurance companies
Risk Assessment Methods
• Different methods are employed to perform risk assessments. Examples: Scoring System Method and Judgmental
Method
A combination of methods may
be used
Methods may develop and change
over time
All methods depend on subjective judgment
Auditor should evaluate appropriateness
of any chosen risk methodology
Scoring System Method
and Judgmental
Method
Control Principles
Part A: Planning 1.4
Risk-Based Audit Planning
Types of Audits and Assessments
Types of Audits
Knowledge Statement 1.11
Knowledge of various types of audits (e.g., internal, external, financial) and methods
for assessing and placing reliance on the work of other auditors or control entities.
Types of Audits
Explanation
Internal vs. External
Specific domain (i.e. financial)
Reliance on other auditors
Following are the various types of audits:
Internal vs. External Audits
Internal
● Pre-audits
● Compliance audits
● Post incident
● Often targeted
External
● Compliance
● Regulatory
● General
Specific Domain
Specific Domain Audits
PCI DSS
Network Systems
IT
Regulatory
Financial
Web or E-commerce
Systems
Database Systems
Reliance on Other Auditors
• Past audit results
• Incorporating other
audits
• Comparison
Audit Factors
Audit Subject
The area to be
audited
Audit Objective
The purpose of
the audit
Audit Scope
Constrains the audit
to a specific system,
function, or unit, or
period of time
Part B: Execution
Part B: Execution
The following topics are covered in Part B:
• Audit Project Management
• Sampling Methodology
• Audit Evidence Collection Techniques
• Data Analytics
• Reporting and Communication Techniques
• Quality Assurance and Improvement of the Audit Process
Audit Project Management
Audit Project Management
Plan the audit
engagement
Build the audit plan Execute the plan
Monitor project
activity
Audit Objectives
Audit objectives are the specific goals that the audit process must accomplish.
The audit objectives assure the following:
• Compliance with legal and regulatory requirements
• Protection of the confidentiality, integrity, and availability of information and IT resources
Audit Phases
The whole auditing process can generally be divided into the following three different phases:
Planning
Fieldwork and
documentation
Reporting and
follow-up
Planning Phase
Determine audit
subject
Determine audit
objective
Set audit scope
Perform preaudit
planning
Determine
procedures
Fieldwork and Documentation Phase
Acquire data Test controls
Discover and validate
issues
Document results
Reporting Phase
Gather report
requirements
Draft report Issue report Follow-up
Audit Program
• An Audit Work Program represents the audit plan and strategy. It has audit procedures, scope and
objectives.
• The Audit Work Program:
• Is a guide for documenting various audit steps performed and the types and extent of evidential matters
reviewed;
• Provides a trail of the process used; and
• Provides accountability for performance.
• IS Audit Process Steps:
• Plan – assess risks, develop audit program: objectives, procedures (Guidance 5)
• Obtain and evaluate evidence – strengths and weaknesses of controls
• Prepare and present report – draft and final report
• Follow-up – corrective actions taken by management (Guidance 35)
Audit Methodology
Audit
Methodology
Components
Scope
Audit
objectives
Work
programs
It is a documented approach
for performing the audit in a
continuous and recurring
manner to achieve the
planned audit objectives.
Audit Methodology
refers to standard
audit procedures to be
used to achieve the
planned audit
objectives.
Audit Working Papers
•
Audit Project Management
Part B: Execution 1.6
Audit Project Management
Applicable Laws and Regulations for IS Audit
Part B: Execution 1.6
Knowledge of the applicable laws
and regulations that affect the
scope, evidence collection and
preservation, and frequency of
audit.
Fraud Irregulaties and Illegal Acts
Explanation
Fraud investigations or legal proceedings require the integrity of the evidence be maintained throughout its
life cycle (called chain of custody in forensic evidence).
Legal requirements include law, regulation and/or contractual agreements placed on Audit (or IS Audit) or the
Auditee. Management and audit personnel in an organization should be aware of external requirements for
computer system practices and controls, and how data is processed, transmitted and stored. There is a need to
comply with different laws raising legal requirements that impact on audit objectives and audit scope.
Main Areas of Coverage
The main areas covered under this knowledge statement include:
Eviden
ce
Audit Documentation
Continuous Auditing Legal Requirements
HIPAA and HITECH
The Health Insurance Portability
& Accountability Act of 1996
(HIPAA)
PHI (Personal Health
Information)
Health Information Technology
for Economic and Clinical Health
Act (HITECH)
Redefining what a breach is
Creating stricter notification
standards
Sarbanes-Oxley and PCI
Sarbanes-Oxl
ey
Public companies
must keep
electronic records
for 5 years
PCI-DSS (Payment
Card Industry-Data
Security Standards)
1
2
3
Cryptography Standards
ISO/IEC
7064 Data processing – Check character systems Published 2003
ISO/IEC
9796
Digital signature schemes giving message recovery 3 parts published 2002 2006, under revision
ISO/IEC
9797 Message authentication codes (MACs) 2 parts published 1999 2002, under revision, 3rd part is upcoming
ISO/IEC
9798 Entity authentication | 6 parts published 1997 2005
ISO/IEC
10116
Modes of operation for an n-bit block cipher algorithm | Published 2006
ISO/IEC
10118
Hash-functions | 4 parts published 1998 2004 (2006), under revision
ISO/IEC
11770
Key management 4 parts published 1996 2006, under revision
Balanced Score Card
A type of
structured report
used as a
performance
management tool
Used to track
execution of
activities
Actually
measures
performance
against an
expected value
Should define
measurements
from four
perspectives
Financial
Customer
Internal
Process
Innovation/
Learning
Sampling Methodology
Sampling Methodology
Knowledge Statement 1.8
Knowledge of different sampling
methodologies and other
substantive/data analytical procedures.
Sampling Methodologies
Compliance testing involves gathering evidence to test the enterprise’s compliance with control procedures.
Substantive testing is evidence gathered to evaluate the integrity of individual transactions, data, or other
information.
Presence of adequate internal controls (established through compliance testing) minimizes the number of
substantive tests that have to be done.
Conversely, weaknesses in internal controls will increase the need or number of substantive tests.
Sampling is done when it is not logical to test or verify all transactions by the consideration of the time and cost
needed. (i.e. the population which consists of all items in the area being examined).
Sampling Methodologies
Main Areas of Coverage:
Compliance vs. Substantive testing Sampling
Sampling
A sample is a subset of population members used to infer characteristics about a population based on the
results of examining the characteristics of a sample of the population.
A basic understanding of sampling is necessary for the ISA.
A population consists of the entire
group of items that need to be
examined.
The sample must represent as
closely as possible the
characteristics of the whole
population.
Sampling is done, when verifying all
transactions or events (population)
in the audit scope is not feasible.
The sample drawn must be a correct
representation of the population,
since all the conclusions are drawn
from the sample.
General Approaches to Sampling
Sampling can either be statistical or non-statistical.
Statistical
Sampling
● Uses objective judgment to determine:
o Sample size
o Selection criteria
o Sample precision
o Reliability or confidence level
● This can be used to infer population
characteristics from the sample and is
the preferred method.
Non-statis
tical
Sampling
● Uses subjective judgment to
determine:
o Method of sampling
o Sample size
o Sample selection
● This cannot be used to not infer
population characteristics from the
sample and is not a preferred method
of sampling.
General Approaches to Sampling
Statistical
Sampling
● Uses statistical principles of probability
and confidence level to draw a sample
representative of the population
● ISA decides the sample precision (how
closely the sample should represent
the population) and the confidence
level (the number of times in 100 that
the sample will represent the
population)
Non-statis
tical
Sampling
● Uses the judgment of the ISA to
determine the sample selection and
size
● Increased possibility of sampling
risk—the risk that the analysis /
conclusions will be wrong because the
sample is not representative of the
population
● This technique may be used when
drawing an inference about the
population is not necessary; say, when
a handful of large-value credit limits
are picked up for scrutiny from a
population of extremely low-value
credit limits
Attribute and Variable Sampling
Sampling methods are of two types, attribute sampling and variable sampling.
Attribute
sampling
● Also known as proportional sampling
● Deals with the presence or absence of
an attribute
● Generally applied for compliance
testing, to detect the presence or
absence of an attribute and draw
conclusions from the rate of incidence.
● Conclusions expressed in rates of
incidence
Types:
● Attribute sampling or fixed sample size
attribute sampling or frequency
estimation
● Stop-or-go sampling
● Discovery sampling
Variable
sampling
● Used to estimate the value of some
variable, example verification of
transactions, review of processing in
programs used in the preparation of
financial statements.
● Also known as dollar estimation or Mean
value estimation sampling or Quantitative
sampling
● Applied in substantive testing and deals
with characteristics that vary, monetary
values, measures and in drawing
conclusions regarding deviations from the
norm.
● Provides conclusions related to deviations
from the norm.
Types:
● Stratified mean per unit
● Un-stratified mean per unit
● Difference estimation
Attribute Sampling
Fixed Sample-Size
Attribute /
Frequency-Estimat
e Sampling
Stop-or-go
Sampling
• Aim is to
determine the
rate of
occurrence: How
many, how often?
• Example:
Approval
signature on user
account creation
forms
Discovery
Sampling
• Adopted when
the auditor
expects less
number of errors
• Sample size is
small and can be
kept to minimum
• Adopted when
errors are
expected to be a
rare occurrence
• Aim is to
discover:
o fraud
o bypassing rules
by manipulation
(by splitting a
large order value
into several
smaller ones to
avoid having to
obtain approval
of a higher
authority)
Variable Sampling
Stratified sampling produces a higher confidence level for the same sample size, or may result in a lower sample size
for the same confidence level, while other attributes are kept equal.
Stratified Mean
Per Unit
Unstratified
Mean Per
Unit
• Population is
divided into
strata, and
samples are
drawn from
various strata
• Stratification, if
properly applied,
reduces the
sample size
relative to
unstratified mean
per unit
Difference
Estimation
• Mean is
calculated for the
entire sample,
without
stratification and
extrapolated to
the entire
population
• It increases the
sample size
• Technique used
to estimate the
difference
between the
audited values
and the book
values, on the
basis of
differences
observed in the
sample
Sampling Terms
• The probability that the sample is representative of the
population, in relation to the characteristic observed,
expressed as a percentage
• 95% confidence coefficient implies 95% chance that the
sample is representative of the population
• Depending on assessment of the effectiveness of
internal controls, the ISA will vary the sample size
• The greater the confidence level the ISA desires, the
larger will be the sample size
• The opposite of the confidence coefficient, the risk that the
sample is not representative of the population
• If the confidence coefficient is 95%, the level of risk is 5%
Confidence Coefficient / Level / Reliability Factor Level of Risk
(Applicable to both attribute and variable sampling)
Sampling Terms
• The range of difference between the sample and
population acceptable to the ISA
• This is expressed in percentage for attribute sampling
and as a numerical value for variable sampling
• The higher the precision level, the lower the sample size
and vice versa
• A measure of the variance or spread of values around the
mean
Precision Sample / Population Standard Deviation
(Applicable to both attribute and variable sampling)
Sampling Terms
• The expected error in percentage
• Applied only to attribute sampling, not variable
sampling
• If the expected error rate is high, the sample size will
have to be increased
• Expressed as a percentage, it represents the maximum
degree of error that can exist, without the result being
materially misstated
• Define maximum precision using tolerable error rate, within
permissible limits
Expected Error Rate Tolerable Error Rate
• (Applicable to both attribute and variable sampling)
Audit Evidence Collection Techniques
Evidence Collection Techniques
Knowledge Statement 1.7
Knowledge of the evidence collection
techniques (e.g., observation, inquiry,
inspection, interview, data analysis,
forensic investigation techniques,
computer-assisted audit techniques
[CAATs]) used to gather, protect and
preserve audit evidence.
Evidence Collection Techniques
Explanation
Audit findings must be supported by objective evidence
Know techniques to gather and preserve evidence
Information gathered through inquiry, observation, interview, analysis using CAATs (Computer Assisted
Auditing Techniques) such as, ACL, IDEA among others
Electronic media may be used to retain audit evidence to support audit findings
Retention policies should meet requirements for such evidence to support audit findings
Main Areas of Coverage
Computer
Assisted Audit
Techniques
(CAATs)
Evidence
Interviewing and
Observing Personnel
in Performance of
their Duties
Continuous
Auditing
Audit
Documentation
1 2 3 4 5
Evidence
Is the information the
Information Systems
Auditor (ISA) gathers while
performing an IS audit to
meet the audit objectives
by supporting the audit
findings
Must directly relate to
the objectives of review
Is key to the audit
process
Is mandatory under
standard “S6
Performance of Audit
Work”
Should be appropriately
organized and
documented to support
the findings and
conclusion(s)
Reliability of Evidence
Determinants for the reliability of evidence include:
Independence
of the provider
of the
evidence
Qualification
of the individual
providing the
information/
evidence
Objectivity
of the
evidence
Timing of the
evidence
Given an audit scenario in the exam, a candidate should be able to determine which type of
evidence gathering technique would be best.
Evidence Characteristics and Types
• The confidence level of evidence is based on its value; audit evidence is considered
• Sufficient if it is complete, adequate, convincing, and would lead another ISA to form the same
conclusions
• Useful if it assists ISAs in meeting their audit objectives
• Reliable if in the auditor’s opinion, it is valid, factual, objective and supportable
• Relevant if it pertains to the audit objectives and has a logical relationship to the findings and
conclusions it is used to support
Techniques for Gathering Evidence
Techniques for gathering evidence include the following:
Reviewing IS
organizational
structures
Reviewing IS
documentation
Reviewing IS standards Reviewing IS policies
and procedures
Walkthroughs
Re-performance
Observing processes
and employee
performance
Interviewing
appropriate personnel
Audit
document-atio
n related
to document
identification
and dates
Audit
findings,
conclusions,
and
recommend-
ations
Use of
services of
other
auditors or
experts
Audit steps
performed
and audit
evidence
gathered
Audit
program
Description
and/or
walkthroughs
on the scoped
audit area
Planning
and
preparation
of audit
scope and
objectives
Audit Documentation
Audit documentation should include a record of
Data Analytics
Data Analytics
Explanation
Audit findings must be supported by objective evidence
Know techniques to gather and preserve evidence
Information gathered through inquiry, observation, interview, analysis using CAATs (Computer Assisted
Auditing Techniques) such as, ACL, IDEA among others
Electronic media may be used to retain audit evidence to support audit findings
Retention policies should meet requirements for such evidence to support audit findings
Computer Assisted Audit Techniques (CAATs)
• Automated tools and techniques used for gathering and analyzing data from computer systems to meet a
predetermined audit objective.
CAATs
CAATs process involves;
● Understanding the client
● Obtaining effective evidence
● Data analysis
● Reporting
● CAATs necessitated by differences
in HW, SW environments, data
structures, record formats,
processing functions
Examples
of CAATs
● Generalized audit software e.g.
IDEA, ACL
● Utility software e.g. DBMS report
writers
● Debugging and scanning software
● Test Data
● Expert systems
● SQL commands
● Third party access control software
● Application software tracing and
mapping
● Options and reports build in a
system
(CAATs
)
Collate and analyze diverse data.
Information systems employ
diverse hardware, software,
databases, data structures, and
formats for audit evidence
Provide means of analyzing
data to achieve audit objectives
Enable the ISA to work
independently, eliminating
continuous assistance from the
IT function
Types of CAATs:
• GAS (Generalized Audit
Software)
• Utility software
• Industry-specific audit
software
• Fourth-generation languages
like SQL
• Expert systems
• Neural networks
• Application software tracing
• Mapping
Computer-Assisted Auditing Techniques
Types of CAATs
Generalized
Audit
Software
(GAS)
• Standard, off-the-shelf software which can read data from diverse database platforms,
flat files, and ASCII formats
• ISA can utilize the in-built functions of the software
• Functions of GAS include:
o File access and reorganization
o Sampling
o Filtration
Utility o Statistical analysis
Software o Stratification and frequency analysis
o Report generation
o Duplicate checking
o Recomputation
Industry-specific
Audit Software
• Limitations of GAS include:
o Not suitable for concurrent auditing
o Can only conduct post-event audit
o Limited capabilities to verify processing logic
Types of CAATs
Generalized
Audit
Software
(GAS)
Utility • Is a part of a suite of programs like: copy, sort programs, report generators, disk search
Software utility, and fourth-generation languages, like SQL (structured query language).
Industry-specific
Audit Software
Types of CAATs
Generalized
Audit
Software
(GAS)
Utility
Software
• While GAS is generic in nature, audit software specific to some industries like financial
Industry-specific
Audit Software
services, insurance, and health care is also available.
• They include built-in queries to perform audit functions in specific industries, say check
kiting in banking.
• Constructing similar queries in GAS would need more effort and skills.
Types of CAATs
Expert
System
• This is a type of artificial intelligence and incorporates a knowledge base that contains
the knowledge of human experts in the concerned domain.
• The inference engine in the expert system compares the data presented against the
knowledge base to draw conclusions.
• Expert systems can be used for:
o Risk analysis
o Evaluation of internal controls and assessing if provisions on doubtful debts are
Neural adequate
Networks
Continuous
Online Audit
Types of CAATs
Expert
System
Neural
• These are designed to mimic the neurons of the human brain.
• They can be “trained” to recognize patterns that indicate certain occurrences, like a
Networks fraud.
Continuous
Online Audit
Types of CAATs
Expert
System
Neural
Networks
Continuous
Online Audit
• CAATs can be used to implement ongoing monitoring.
• They can be configured to continuously analyze data either in real or near real time
intervals, in furtherance of preset audit objectives.
Computer Assisted Audit Techniques (CAATs)
Functional capabilities of Generalized Audit Software (GAS) are as follows:
File access: reading different file
structures and record formats
File reorganization: indexing,
sorting, merging, linking
Data selection: filtration
conditions, selection criteria
Statistical functions: sampling,
stratifications, frequency analysis
Arithmetic functions: arithmetic
operators and functions
Reporting and Communication Techniques
Reporting and Communication Techniques
Knowledge Statement 1.9
Knowledge of reporting and communication
techniques (e.g., facilitation, negotiation,
conflict resolution, audit report structure,
issue writing, management summary, result
verification).
Reporting and Communication Techniques
Explanation
Communication needs to be effective and clear to improve the quality of the audit and maximize results.
When an argument ensues between the auditor and the auditee during the final IS audit findings report
presentation over the accuracy of the findings in the report, it makes the audit process counterintuitive and
quickly dilutes the audit process and its value.
Audit findings reported to stakeholders need to have appropriate buy-in from the auditees for the audit
process to be successful and value adding.
Communication and negotiation skills are required throughout the audit activity.
Communication skills determine the effectiveness of the audit reporting process.
Audit Report Objectives
The objectives of audit reporting are:
• Formally presenting the audit report to the auditee or client
• Providing statements of assurance of controls
• Identifying areas that require corrective actions
• Providing recommendations
• Formally seeking closure of the audit engagement
Main Areas of Coverage
Information Technology Assurance
Framework (ITAF) (Section 2600 –
Reporting Standards)
Communicating Audit Results
The main areas of coverage:
Communication of Audit Results
Presentation techniques include:
● Executive summary Easy to read, concise report that presents the summary of the entire report
● Visual presentation: May include slides or computer graphics
Before communicating the results of an audit to senior management, the IS audit should discuss the findings with
management staff of the audited entity. This is to ensure an agreement is reached for both the findings and the
corrective action to be taken.
The CISA candidate should become familiar with the ISACA S7 Reporting and S8 Follow-up Activities standard.
Ensure recommendations are
realistic and cost-effective
Recommend implementation
dates for agreed-on
recommendations
Ensure facts presented in the
report are accurate
During exit interviews, the IS auditor should:
Communication Skills
Facilitation Negotiation Conflict resolution Issue writing
The Report
Identify and Include:
• Organization, recipients, restriction on circulation
• Scope, objectives, period of coverage, nature, timing, and extent
• Findings, conclusions, recommendations/follow up, and reservations
or qualifications
o Grouped by materiality or intended recipient
o Mention faults and constructive corrections
• Evidence to support results (may be separate)
• Overall findings, conclusion, and opinion
• Signed and dated
Audit Report Basics
An audit report includes the following features:
Audit
Report
Features
Organization, recipients and
restriction on circulation
Scope, objectives, period of
coverage, nature, timing, and extent
Signature and date
Evidence to support results
Findings, conclusions,
recommendations/follow- ups, and
reservations/qualifications
Overall findings, conclusion, and
opinion
Grouped by materiality or
intended recipient
Mention faults and
constructive corrections
Follow-Up Activities
• An IS auditor should conduct a follow-up program to determine whether the management has
implemented the agreed-on corrective actions.
• The results of the follow-up should be communicated appropriately.
Quality Assurance and Improvement of the Audit Process
Audit Assurance Systems and Frameworks
Knowledge Statement 1.10
Knowledge of audit quality assurance
(QA) systems and frameworks.
Quality Assurance and Improvement of the Audit Process
Explanation
Auditing standards are the minimum parameters to be taken into account when performing an audit.
An IS auditor has to understand the impact of the IS environment on traditional auditing practices and
techniques to ensure the audit objective is achieved.
Control Self Assessment (CSA) is a process in which an IS auditor can act in the role of a facilitator to business
process owners to help them define and assess appropriate controls (taking into consideration the risk
appetite of the organization).
Process owners are best placed to define appropriate controls due to their process knowledge.
IS auditors help process owners understand the need for controls based on business risk.
Main Areas of Coverage
The main areas covered under this knowledge statement are as follows:
Audit
programs
Audit
methodology
Audit
objectives
Evaluation of
audit strengths
and weakness
Control Self
Assessment
(CSA)
Objectives,
advantages, and
disadvantages of
CSA
Auditors Role
in CSA
Using services
of other
Auditors and
Experts
Traditional vs.
CSA Approach
Control Self Assessment (CSA)
CSA is a methodology used to
review key business objectives,
risks involved in achieving the
business objectives, and
internal controls designed to
manage these business risks in
a formal, documented
collaborative process.
CSA is a management technique
that assures stakeholders,
customers, and other parties that
the internal control system of the
organization is reliable.
It ensures employees are aware of
business risk and that they conduct
periodic, proactive reviews of
controls.
CSA involves a series of tools on a
continuum of sophistication,
ranging from simple questionnaires
to facilitated workshops.
Objectives of a CSA
Control Objectives for Information and Related Technology (COBIT provides guidance on development of a CSA
Following are the objectives of a CSA:
Leverage the internal
audit function by
shifting some of the
control monitoring
responsibilities to the
functional areas
Ensure Line
managers are in
charge of monitoring
controls
Educate
management on
control design and
monitoring
COBIT
Some important facts about COBIT are:
• Control Objectives for Information and related Technology
• ISACA first released COBIT in 1996
• Revised in 2005 to become ISO 17799:2005
• ISACA published the current version, COBIT 5, in 2012
• Contains 134 detailed information security controls based on 11 areas
Benefits of a CSA
Benefits of a CSA include the following:
• Early detection of risk
• More effective and improved internal controls
• Create cohesive teams – employee involvement
• Develops sense of ownership of controls in employees and process owners
• Improved audit rating process
• Reduction in control cost
• Increased communication between operations and top management
• Highly motivated employees
• Assurance provided to stakeholders and customers
CSA Disadvantages and Role of Auditor
Disadvantages of a CSA
● Might be mistaken as an audit function
replacement
● May be taken as additional workload (e.g.
writing reports to management)
● Failure to act on improvement suggestions
could damage employee morale
● Inadequate motivation limits effectiveness in
the discovery of weak controls
Auditor’s role in CSA
● Internal control professional and
assessment facilitator (management staff
participates in the CSA process, not the
auditor)
Traditional Vs. CSA Approach
The following table compares the traditional audit approach with CSA:
Traditional Audit Approach
Assigns tasks
Policy-driven
Limited employee participation
Limited stakeholder focus
Auditors and other specialists
CSA
Empowered and accountable employees
Continuous improvement learning curve
Extensive employee participation and training
Broad stakeholder focus
Staff at all levels and in all functions are the
primary control analysts
Domain One Exam Quick Pointers
1.
2.
3.
4.
5.
6.
7.
8.
The auditor is a facilitator in a Control Self Assessment.
Examples of substantive tests include testing samples of an inventory of backup tapes.
Control self Assessment (CSA) enhances audit responsibility as one of its key objectives.
Accountability cannot be enforced without authentication and identification in an access control.
IS Auditors are likely to perform compliance tests of internal controls if, after their initial evaluation of
the controls, they conclude that control risks are within acceptable limits.
Identification of high-risk areas is the most important step in an audit plan.
The auditor should be aware of data flows within an enterprise when assessing corrective, preventive,
or detective controls.
Responsibility and accountability can be established by the use of audit trails.
Domain One Exam Quick Pointers
9.
10.
11.
12.
13.
14.
Knowledge
Check
a.
b.
c.
d.
An audit charter should .
summarize the responsibilities, authority and scope of an internal audit
department.
define audit processes
outline audit goals and how to achieve them
keep track with the change in information technology
QUIZ
1
a.
b.
c.
d.
An audit charter should .
summarize the responsibilities, authority and scope of an internal audit
department
define audit processes
outline audit goals and how to achieve them
keep track with the change in information technology
The correct answer is a.
An audit charter should summarize the responsibility, authority, and scope of an audit department.
QUIZ
1
a.
b.
c.
d.
An audit report prepared by the information systems auditor should be
corroborated by .
supporting statements from IS management
work-papers of senior auditors
control self-assessment from the organization
appropriate, relevant, and sufficient audit evidence
QUIZ
2
a.
b.
c.
d.
An audit report prepared by the information systems auditor should be
corroborated by .
supporting statements from IS management
work-papers of senior auditors
control self-assessment from the organization
appropriate, relevant, and sufficient audit evidence
The correct answer is a.
An IS auditor should have statements from IS Management to ensure that they are in agreement with the
findings as well the corrective action to be taken.
QUIZ
2
a.
b.
c.
d.
An IS auditor reviews the previous audit plan implemented for a client and finds that it was
designed to review the company network and e-mail systems, but not the e-commerce Web
server. The IT manager indicates that the preferred focus for audit is the newly implemented
ERP application. How should the auditor respond?
Determine the highest-risk systems and plan the audit based on the results
Audit the new ERP application as requested by the IT manager
Audit both the e-commerce server and the ERP application
Audit the e-commerce server since it was not audited last year
QUIZ
3
a.
b.
c.
d.
An IS auditor reviews the previous audit plan implemented for a client and finds that it was
designed to review the company network and e-mail systems, but not the e-commerce Web
server. The IT manager indicates that the preferred focus for audit is the newly implemented
ERP application. How should the auditor respond?
Determine the highest-risk systems and plan the audit based on the results
Audit the new ERP application as requested by the IT manager
Audit both the e-commerce server and the ERP application
Audit the e-commerce server since it was not audited last year
The correct answer is c.
The best course of action is to conduct a risk assessment and design the audit plan to cover the areas of
highest risk. The IS auditor should not rely on the prior-year audit plan since it may not have been
designed to reflect a risk-based approach.
QUIZ
3
a.
b.
c.
d.
When testing program change requests, an IS auditor found that the population
of changes was too small to provide a reasonable level of assurance. What is
the most appropriate action for the IS auditor to take?
Report the finding to management as a deficiency.
Create additional sample changes to programs.
Develop an alternate testing procedure.
Perform a walk-through of the change management process.
QUIZ
4
a.
b.
c.
d.
When testing program change requests, an IS auditor found that the population
of changes was too small to provide a reasonable level of assurance. What is
the most appropriate action for the IS auditor to take?
Report the finding to management as a deficiency.
Create additional sample changes to programs.
Develop an alternate testing procedure.
Perform a walk-through of the change management process.
The correct answer is a.
If a sample size objective cannot be met with the given data, the IS auditor would not be able to provide
assurance regarding the testing objective. In this instance, the IS auditor should develop (with audit
management approval) an alternate testing procedure.
QUIZ
4
a.
b.
c.
d.
The main advantage derived from an enterprise employing control
self-assessment (CSA) process is that it:
enables management to delegate responsibility.
can replace the traditional audit methods.
allows the auditor to independently assess risks.
identifies high-risk areas that require a detailed review later.
QUIZ
5
a.
b.
c.
d.
The main advantage derived from an enterprise employing control
self-assessment (CSA) process is that it:
enables management to delegate responsibility.
can replace the traditional audit methods.
allows the auditor to independently assess risks.
identifies high-risk areas that require a detailed review later.
The correct answer is d.
Control Self Assessment is based on the review of high-risk areas that will need a more thorough review at
a later date or either an immediate attention.
QUIZ
5
Case Study
Case Study 1
The IS auditor has been asked to perform a pre-audit review to assess the company’s readiness for a regulatory
compliance audit. The regulatory requirements include management taking an active role in IT management including
managerial review and testing of IT controls.
The areas to assess in the upcoming regulatory compliance audit include physical controls, logical controls, end-user
computing, and change management. The IS Auditor has only two weeks to complete the pre-audit review. Previous
audits found no issues with physical controls or end-user computing but did find issues with logical controls and change
management.
Previous issues found include inadequate password management and not all changes where reviewed by a change
approval board.
a.
b.
c.
d.
Which of the following would be the most important item for the IS auditor to
check first?
Password management
Change approval
Patch management
Physical security
QUIZ
1
a.
b.
c.
d.
Which of the following would be the most important item for the IS auditor to
check first?
Password management
Change approval
Patch management
Physical security
The correct answer is a.
Password management and change approval were both identified as issues in previous audits. However,
password management is a more critical issue, and it is less time consuming to check. It may not be
possible to review change management within the time allotted.
QUIZ
1
a.
b.
c.
d.
If time permits, should the IS auditor review physical controls and end-user
computing, even though there were no problems noted in previous audits?
Yes, check both if time permits
No, as there were no previous issues
If possible, check physical controls but not end-user computing
If possible, check end-user computing then physical controls
QUIZ
2
a.
b.
c.
d.
If time permits, should the IS auditor review physical controls and end-user
computing, even though there were no problems noted in previous audits?
Yes, check both if time permits
No, as there were no previous issues
If possible, check physical controls but not end-user computing
If possible, check end-user computing then physical controls
The correct answer is a.
Simply because there have not been issues in the past does not mean an area should not be reviewed
during an audit. If time permits, every area that will be addressed in the regulatory compliance audit
should be reviewed.
QUIZ
2
Case Study 2
An IS auditor has been tasked to audit a financial application used by a bank to process loan applications. The application
can be accessed via a Web interface from anywhere in the world. The company maintains the Web server internally (that
is. it is not outsourced) as well as the back end database. The auditor has limited time and may not be able to do a
complete audit.
a.
b.
c.
d.
Which of the following tools would be most helpful in this audit?
General audit software application tool
Statistical analysis tool
Web vulnerability testing tool
General vulnerability assessment tool
QUIZ
1
a.
b.
c.
d.
Which of the following tools would be most helpful in this audit?
General audit software application tool
Statistical analysis tool
Web vulnerability testing tool
General vulnerability assessment tool
The correct answer is c.
Since the application is accessed via the Web, the most critical item to audit is the Web interface. This is
where most security issues would be helpful in an audit.
QUIZ
1
a.
b.
c.
d.
In this scenario, what is the order of importance of items checked?
Firewall, VPN, Web server, Database server
VPN, Firewall, Database server, Web server
Database server, VPN, Web server, Firewall
Web server, Firewall, Database server, VPN
QUIZ
2
a.
b.
c.
d.
In this scenario, what is the order of importance of items checked?
Firewall, VPN, Web server, Database server
VPN, Firewall, Database server, Web server
Database server, VPN, Web server, Firewall
Web server, Firewall, Database server, VPN
The correct answer is d.
The Web server is the most important as it is the publically facing interface most vulnerable to attack. The
database is protected by the firewall, so the next item to check is the firewall. VPN connections need not be
checked, as there is no VPN used in this scenario.
QUIZ
2
Key Takeaways
You’ are now able to:
Plan an audit to determine whether information systems are protected, controlled, and provide
value to the organization
Conduct an audit in accordance with IS audit standards and a risk‐based IS audit strategy
Communicate audit progress, findings, results, and recommendations to stakeholders
Conduct an audit follow‐up to evaluate whether risks have been sufficiently addressed
Evaluate IT management and monitoring of controls
Utilize data analytics tools to streamline an audit process
Provide consulting services and guidance to the organization in order to improve the quality and
control of information systems
Identify opportunities for process improvement in the organization's IT policies and practices

More Related Content

Similar to 538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx

InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdfInfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdfpriyanshamadhwal2
 
About ASIS International
About ASIS InternationalAbout ASIS International
About ASIS InternationalPeggy OConnor
 
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomCRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomBharathi Grover
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
Secrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsSecrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsChristopher Foot
 
Asis 2013 april updates
Asis 2013 april updatesAsis 2013 april updates
Asis 2013 april updatesPeggy OConnor
 
ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...
ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...
ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...Egyptian Engineers Association
 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxInfosectrain3
 
Top Cybersecurity Certs
Top Cybersecurity CertsTop Cybersecurity Certs
Top Cybersecurity CertsRiya Kapoor
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
CISA Certification : How To Prepare For The Exam?
CISA Certification : How To Prepare For The Exam?CISA Certification : How To Prepare For The Exam?
CISA Certification : How To Prepare For The Exam?InfosecTrain Education
 

Similar to 538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx (20)

InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdfInfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
ASIS International: Join Us!
ASIS International: Join Us!ASIS International: Join Us!
ASIS International: Join Us!
 
About ASIS International
About ASIS InternationalAbout ASIS International
About ASIS International
 
Cissp classroom program ievision
Cissp classroom program ievisionCissp classroom program ievision
Cissp classroom program ievision
 
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomCRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
 
Value of IT Certifications (BDPA Cincinnati)
Value of IT Certifications (BDPA Cincinnati)Value of IT Certifications (BDPA Cincinnati)
Value of IT Certifications (BDPA Cincinnati)
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Secrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsSecrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance Projects
 
Asis 2013 april updates
Asis 2013 april updatesAsis 2013 april updates
Asis 2013 april updates
 
ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...
ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...
ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...
 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptx
 
CISSP Training Program
CISSP Training ProgramCISSP Training Program
CISSP Training Program
 
Top Cybersecurity Certs
Top Cybersecurity CertsTop Cybersecurity Certs
Top Cybersecurity Certs
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
CISA Certification : How To Prepare For The Exam?
CISA Certification : How To Prepare For The Exam?CISA Certification : How To Prepare For The Exam?
CISA Certification : How To Prepare For The Exam?
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
 

More from ssuserde23af

Ch1-201ASasASAsaSAsasaSAsaSAsaaa0_CISA.ppt
Ch1-201ASasASAsaSAsasaSAsaSAsaaa0_CISA.pptCh1-201ASasASAsaSAsasaSAsaSAsaaa0_CISA.ppt
Ch1-201ASasASAsaSAsasaSAsaSAsaaa0_CISA.pptssuserde23af
 
Advanced_SQL_ISASasASasaASnjection (1).ppt
Advanced_SQL_ISASasASasaASnjection (1).pptAdvanced_SQL_ISASasASasaASnjection (1).ppt
Advanced_SQL_ISASasASasaASnjection (1).pptssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.pptssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.pptssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.pptssuserde23af
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptssuserde23af
 

More from ssuserde23af (6)

Ch1-201ASasASAsaSAsasaSAsaSAsaaa0_CISA.ppt
Ch1-201ASasASAsaSAsasaSAsaSAsaaa0_CISA.pptCh1-201ASasASAsaSAsasaSAsaSAsaaa0_CISA.ppt
Ch1-201ASasASAsaSAsasaSAsaSAsaaa0_CISA.ppt
 
Advanced_SQL_ISASasASasaASnjection (1).ppt
Advanced_SQL_ISASasASasaASnjection (1).pptAdvanced_SQL_ISASasASasaASnjection (1).ppt
Advanced_SQL_ISASasASasaASnjection (1).ppt
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.pptchsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
chsadsadasdasdasdasdsadsadsadsadsadasda10.ppt
 

Recently uploaded

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx

  • 1. Certified Information Systems Auditor is a registered trademark of ISACA ISACA® is a registered trade mark of Information Systems Audit and Control Association. © Simplilearn. All rights reserved. Introduction to CISA Certified Information Systems Auditor (CISA®)
  • 2. Learning Objectives By the end of this introductory domain, you will be able to: • Describe CISA • Demonstrate your understanding of the ISACA organization • Discuss the history of CISA • Understand the current CISA syllabus • Describe the value of CISA • List the requirements for certification and how to maintain the certification • Outline the structure of CISA exams
  • 3. Introduction to CISA Introduced by ISACA in 1978, CISA has grown both in stature, professional offering, and global influence. It is a widely recognized certification because of the following features: ● CISA is the preferred certification for information systems control, assurance, and security professionals. ● CISA is designed with the aim of attracting information systems auditors, people concerned with technology security, educators, and even CIOs. CISA® CERTIFIED INFORMATION SYSTEMS AUDITORTM
  • 4. ISACA ISACA formerly stood for Information Systems Audit and Control Association. However, the organization is known by the acronym ISACA only to reflect the range of governance professionals within IT that it caters for. ISACA was founded in 1969 as a nonprofit organization and currently (in 2019) has over 159,000 members in 188 countries. Following are the certifications provided by ISACA: Certified Information Systems Auditor® (CISA®) Certified Information Security Manager® (CISM®) Certified in the Governance of Enterprise IT® (CGEIT®) Certified in Risk and Information Systems Control (CRISC®) ISACA has developed COBIT 5, RISK IT , and Val IT , which it continually updates. !✔
  • 5. History of CISA Introduced in 1978 First exam monitored in 1981 • Approved by the United States Defense Department as part of its assurance framework In 2011, there was a change in curriculum: six domains to five domains
  • 6. Current CISA Syllabus The CISA syllabus (2019) is divided into five domains. The exam has 150 multiple choice questions. The duration of the exam is four hours. Beginning June 2019, ISACA is offering continuous testing, with a 365-day exam eligibility period to take your exam. Following is a summary of the CISA domains: Domain Topic Exam Weightage Domain 1 Information Systems Auditing Process 21% Domain 2 Governance and Management of IT 17% Domain 3 Information Systems, Acquisition, Development, and Implementation 12% Domain 4 Information Systems Operations and Business Resilience 23% Domain 5 Protection of Information Assets 27% Total 100%
  • 7. Value of CISA Numerous benefits of a CISA designation Globally accepted and recognized certification Increased value at workplace Achieve a high professional standard Higher earnings and greater career growth Increased confidence Trust and recognition for expertise
  • 8. CISA Certification The steps to obtain a CISA certification are: • Pass CISA exam: Pass the exam with a minimum of 450 marks • Apply for certification: • Minimum five years experience needed in IS Audit Domain areas Note: Certification Application has to be within five years of sitting for the exam • Waivers possible. See ISACA website for details. • Agree to the Code of Professional Ethics • Cohere with the Continuing Professional Education (CPE) Program • Comply with the IS auditing standards
  • 9. CISA Examination CISA exams are prepared with the aim of gauging and testing hands-on skills in Information System Control and Audit. Exam title Certified Information Systems Auditor (CISA®) Exam duration Four hours to answer 150 multiple-choice questions covering five practice areas Exam type Computer-based Question type Multiple-choice questions Pass requirements A candidate must receive a score of 450 or higher to pass the exam Scaled score A scaled score is a conversion of a candidate’s raw score on an exam to a common scale. A candidate’s scores are reported as a scaled score. ISACA uses and reports scores on a common scale from 200 to 800. !✔
  • 10. Thank You © Simplilearn. All rights reserved.
  • 11. © Simplilearn. All rights reserved. Certified Information Systems Auditor is a registered trademark of ISACA ISACA® is a registered trade mark of Information Systems Audit and Control Association. Information System Auditing Process Certified Information Systems Auditor (CISA®)
  • 12. Learning Objectives By the end of this domain, you’ll be able to: Plan an audit to determine whether information systems are protected, controlled, and provide value to the organization Conduct an audit in accordance with IS audit standards and a risk‐based IS audit strategy Communicate audit progress, findings, results, and recommendations to stakeholders Conduct an audit follow‐up to evaluate whether risks have been sufficiently addressed Evaluate IT management and monitoring of controls Utilize data analytics tools to streamline an audit process Provide consulting services and guidance to the organization in order to improve the quality and control of information systems Identify opportunities for process improvement in the organization's IT policies and practices
  • 14. Part A: Planning The following topics are covered in Part A: • IS Audit standards, guidelines, and codes of ethics • Business processes • Types of controls • Risk-based audit planning • Types of audits and assessments
  • 15. IS Audit Standards, Guidelines, and Codes of Ethics
  • 16. Information System Auditing Process Part A: Planning 1.1 IS Audit Standards, Guidelines, and Codes of Ethics
  • 17. IS Audit Standards, Guidelines, and Codes of Ethics Introduction Credibility of an audit is based, in part, on use of commonly accepted standards. ISACA is the global pioneer of IS Assurance and Audit guidelines, Tools and Techniques, Standards, and Code of Professional Ethics. ISACA standards provide a benchmark for IS audit.
  • 18. Main Areas of Coverage The main areas covered under this knowledge statement include: The CISA Exam will test your understanding of the application of Standards and Guidelines. ISACA IS Audit and Assurance Tools and Techniques ISACA IS Audit and Assurance Guidelines ISACA IS Audit and Assurance Standards Framework ISACA Code of Professional Ethics The main areas of coverage Relationship between Guidelines, Tools and Techniques, and Standards
  • 19. Categories of Standards and Guidelines □ This category applies to all assignments and contains guiding principles for IS assurance. □ It covers: o Ethics o Independence o Objectivity o Due care o Knowledge o Competence o Skill □ This category deals with the conduct of the IS audit and assurance assignments. □ It covers: o Planning o Scoping o Risk o Materiality o Supervision o Exercise of professional judgement o Due care □ This category covers: o Reports o Information o Means of communication General Performance Reporting
  • 20. ISACA IS Audit and Assurance Standards 1001 Audit Charter 1002 Organizational Independence 1003 Professional Independence 1004 Reasonable Expectation 1005 Due Professional Care 1006 Proficiency 1007 Assertion 1008 Criteria 1201 Engagement Planning 1202 Risk Assessment in Planning 1203 Performance and Supervision 1204 Materiality 1205 Evidence 1206 Using the Work of Other Experts 1207 Irregularity and Illegal Acts 1401 Reporting 1402 Follow up Activities General Performance Reporting
  • 21. ISACA ISAudit and Assurance Guidelines Independence 2003 Professional Independence 2004 Reasonable Expectation 2005 Due Professional Care 2006 Proficiency 2007 Assertion 2008 Criteria 2001 Audit Charter 2201 Engagement Planning 2002 Organizational 2202 Risk Assessment in Planning 2203 Performance and Supervision 2204 Materiality 2205 Evidence 2206 Using the Work of Other Experts 2207 Irregularity and Illegal Acts 2208 Sampling 2401 Reporting 2402 Follow up Activities General Performance Reporting
  • 22. ISACA Code of Professional Ethics ISACA set forth a code governing the professional conduct and ethics of all certified IS auditors and members of the association. The members and certification holders shall: Support the implementation and encourage compliance with appropriate standards, procedures, and controls for information systems. Perform their duties with due diligence and professional care in accordance with professional standards and best practices Maintain the privacy and confidentiality of information obtained in the course of their duties unless disclosure is required by a legal authority. Such information shall not be used for personal benefit or released to inappropriate parties. Maintain competency in their respective fields and agree to undertake only those activities that they reasonably expect to complete with professional competence. Inform appropriate parties about the results of work performed, revealing all significant facts known to them Support the professional education of stakeholders to enhance their understanding of information systems security and control. Serve in the interest of stakeholders in a lawful and honest manner while maintaining high standards of conduct and character and not engage in acts discreditable to the profession.
  • 23. ISACA Code of Professional Ethics Failure to comply with the code of professional ethics can result in an investigation into a member’s and/or certification holder's conduct and, ultimately, in disciplinary measures.
  • 24. ISACA IT Audit and Assurance Standards Framework Objective The objectives of IS audit and assurance standards are to inform: IS auditors of the bare minimum level of performance required to meet the professional responsibilities set in the Professional Code of Ethics The management of the profession’s requirement regarding the work of audit practitioners The CISA certification holders that failure to meet these standards results in a review of their conduct by the ISACA board of directors, which may ultimately result in a disciplinary action
  • 25. ISACA ISAudit and Assurance Guidelines • ISACA IS Audit and Assurance guidelines provide additional information on how to comply with the ISACA Information Technology Assurance and Audit Standards. • The IS Auditor should use professional judgment and be able to justify any differences. • Guideline documents are identified by a prefix G, followed by the number, for example, “G10.” There are 42 categories of guidelines.
  • 26. ISACA ISAudit Guidelines Using the Work of Other Auditors Audit Evidence Requirement Use of Computer-Assisted Audit Techniques (CAATs) Outsourcing of IS Activities to Other Organizations Audit Charter Materiality Concepts for Auditing Information Systems Due Professional Care Audit Documentation Audit Considerations for Irregularities and Illegal Acts Audit Sampling Effect of Pervasive IS Controls Organizational Relationship and Independence Use of Risk Assessment in Audit Planning Application Systems Review Planning Effect of Third Parties on an Organization’s IT Controls Effect of Non-audit Role on the IS Auditor’s Independence IT Governance Irregularities and Illegal Acts Reporting Enterprise Resource Planning (ERP) Systems Review Business-to-Consumer (B2C) E-commerce Review System Development Life Cycle (SDLC) Review Internet Banking Responsibility, Authority, and Accountability Follow-up Activities Biometric Controls Configuration Management Access Controls IT Organization Review of Security Management Practices Return on Security Investment (ROSI) Continuous Assurance Review of Virtual Private Networks Business Process Reengineering (BPR) Project Reviews Mobile Computing Computer Forensics Post-implementation Review Competence Privacy Business Continuity Plan (BCP) Review from IT Perspective General Considerations on the Use of the Internet
  • 27. ISACA IS Audit and Assurance Tools and Techniques IS Audit and Assurance tools and techniques White papers IS Audit and Assurance programs COBIT 5 family of products Tools and techniques are listed under www.isaca.org/itaf IS Audit and Assurance tools and techniques provide additional guidance to IS audit and assurance professionals. Reference books
  • 28. ISACA IS Audit and Assurance Tools and Techniques ISACA has Standards and Guidelines related to Audit (ITAF™): Section 2200 Section 2400 Section 2600 Section 3000 Section 3200 Section 3400 Section 3600 Section 3800 General Standards Performance Standards Reporting Standards IT Assurance Guidelines Enterprise Topics IT Management Processes IT Audit and Assurance Processes IT Audit and Assurance Management
  • 30. Business Processes Explanation A business process is an inter-related set of cross-functional activities or events that result in the delivery of a specific product or service to a customer. An IS auditor must understand and evaluate the business processes they are auditing. An Internal audit function must be independent and report to the audit committee or to the board of directors.
  • 31. Audit Charter Audit charters are high-level documents that define the purpose, authority, and responsibility of the internal audit activity. Charter Grants and assigns authorization, responsibility, and accountability to the auditor Guides the auditor to get an approval from the board of directors or the audit committee or senior management in their absence Defines the scope of audit function’s activities
  • 32. Fundamental Business Processes Explanation Understanding the underlying business process that is audited Understanding the role that IS play in these processes IS auditing involves assessment of IS-related controls and understanding the control objectives Identifying key controls that help achieve a well-controlled environment, according to standards
  • 33. Audit Planning • Gaining an understanding of the clients and its business • Establishing priorities • Determining an audit strategy • Determining the type of evidence to collect, based on the risk levels • Assigning personnel resources for the audit • Scheduling with the client to coordinate activities The result of a well researched and completed audit plan is an audit program. • Audit planning is the first step of the audit process. The auditor’s responsibilities during the planning phase include:
  • 34. Fundamental Business Processes: Transaction Examples Examples A bank may have various transactions Mobile banking ATM transactions Over the counter transactions (For example: deposits, withdrawals) A chain store may have PoS (Point of Sale) transactions with credit card information, or cash extranet transactions with suppliers (Electronic Data Interchange)
  • 35. Using the Services of Other Auditors and Experts IS audit and assurance professionals should: • Consider using the work of other experts when there are constraints which would impair work performance or potential gains in the quality of engagement. • Assess and approve the adequacy of the other experts’ professional qualifications, competencies, relevant experience, resources, independence, and quality‐control processes prior to the engagement. • Assess, review, and evaluate the work of other experts as part of the engagement, and document the conclusion on the extent of use and reliance on their work.
  • 36. Risk Assessment and Risk Analysis Part A: Planning 1.2 Business Processes
  • 37. Relationship between Standards, Guidelines, Tools and Techniques Standards They are mandatory. Tools and Techniques They provide examples of steps that the auditor may follow in audits. Guidelines They provide assistance on how Information Systems Auditor (ISA) can implement standards in audits. □ ISA must use professional judgment while applying the guidelines, tools, and techniques. □ Legal and regulatory requirements may sometimes be more stringent than the standards. □ The ISA should ensure compliance with the stringent legal or regulatory requirements.
  • 39. Control Principles Explanation Understand how the controls function Explain how those control principles relate to IS
  • 40. Internal Controls They are the policies, procedures, practices, and structures incorporated by an organization to reduce risk. They can be manual or automated. Internal Controls are an enterprise’s internal processes implemented to achieve specific objectives while minimizing risk. They provide reasonable assurance to management that business objectives will be achieved and undesirable events will be prevented, detected, and corrected.
  • 41. Internal Controls Internal controls have two broad objectives: Internal Control Objectives Increase the likelihood of an objective or a desirable event Decrease the likelihood of an undesirable event occurring • Ensure that business requirements are clearly documented and understood • Ensure software delivery without time and cost overruns • Ensure testing before release Examples of Objectives • Virus outbreak • Unfulfilled project objectives Examples of Undesirable Events
  • 42. Internal Controls Internal Controls consider two things What can be achieved? What can be evaded? Internal controls procedures have two categories General control procedures Information system control procedures
  • 43. Classification of Internal Controls Preventive Controls Corrective Controls Detective Controls
  • 44. Classification of Internal Controls Preventive Controls • Predict and prevent problems before they occur • Monitor input controls and events as a preventive measure • Examples: o Segregation of duties o Maker-checker/four-eyes principle o Input and access controls (physical and logical) Corrective Controls o Encryption of data at rest and in transit Detective Controls
  • 45. Classification of Internal Controls Preventive Controls Corrective Controls • Minimize the impact of a threat and rectify the cause of a problem • Correct detected errors • Root cause analysis, followed by changes to minimize future occurrences • Examples: o Disaster recovery and business continuity planning o Incident response o Backups, to ensure recovery by restoring data Detective Controls o Reruns of failed processes
  • 46. Classification of Internal Controls Preventive Controls • Controls to detect and report intentional and unintentional errors after they occur • Report incidence of errors, attacks, and omissions as they occur • Examples: o Logs o Error messages o Hash totals Corrective Controls o Rechecking of calculations o Scrutiny of reports o Code review o Internal audit function o Logical and physical access logging, such as application audit trails, database security logging, server room access control, and door logging to know details of the person and time. Detective Controls
  • 47. General Controls They enable IT functioning for the achievement of corporate goals such as: • Controls over data center and networks • Access control • Segregation of duties • SDLC and Change Management • Physical security General controls are the policies and procedures involving all areas of an organization, including IT infrastructure and support services.
  • 48. General Controls Internal Accounting Controls Operational Controls Safeguarding of assets and reliability of financial records Day-to-day functions and activities to accomplish business objectives Supports operational controls, operational efficiency, and adherence to management Safeguarding of assets and ensuring proper utilization of resources Facilities, data centers, servers, IT infrastructure, and access control policies Administrative Controls Organizational policies and procedures Physical and logical security policies
  • 49. ISControl Objectives IS control objectives are high-level objectives that management may use for effective control of IT processes A statement of the preferred purpose or result to be attained by applying controls around information system processes Made of procedures, policies, organizational structures, and practices Intended to reasonably assure that enterprise objectives will be achieved while undesired events are detected, corrected, or prevented
  • 50. ISControl Objectives Confidentiality Integrity Availability Effectiveness Efficiency Compliance Reliability Overarching principles of IS controls The first three are the basic principles of information systems security. Effectiveness is getting the job done with a high degree of certainty. Efficiency is getting it done with optimal use of resources.
  • 51. ISControl Objectives Management plays an important role in regulating IS control objectives: Selecting the control objectives that can be easily implemented and are most appropriate to the organization’s policies Cognizant of the risk involved in non-implementation of some of the applicable control objectives Manner of implementation
  • 52. ISControl Objectives: Examples Ensure integrity of the system such as Operating System integrity Ensure integrity of the sensitive and critical application systems Ensure safeguarding of assets Ensure effectiveness and efficiency of operations Ensure proper authentication process for users Ensure availability of service through Disaster Recovery Plan and Business Continuity Planning
  • 53. ISControl Objectives: Examples Ensure availability of IT assets by having BCP and DR plans Ensure integrity of application systems by input authorization, input validation, accuracy and completeness of data processing, database integrity, accuracy, completeness, and security of output controls Protect computer systems from improper access Ensure that inputs are validated Ensure database confidentiality, integrity, and availability
  • 54. ISControl Objectives: Examples Ensure outsourced IT processes and services have clearly defined SLAs, organizational assets are protected, and business objectives are met Ensure integrity of the sensitive and critical application systems Safeguard information assets by implementing physical and logical access controls Ensure SDLC processes are established, maintained, and followed for repeatable and reliable development of software applications to meet business objectives Ensure integrity and reliability of systems by implementing change management controls Ensure availability of IT services by developing effective and efficient Disaster Recovery and Business Continuity plans
  • 55. ISControls • IS control procedures include the following: Strategy and direction of the IT function General organization and management of the IT function System development procedures Operation procedures System programming and system support departments Quality Assurance (QA) processes Physical access controls Business Continuity (BCP) Communications and networks Access to Information Technology programs, data and resources Database administration Database administration Detective and protection mechanisms
  • 56. Fundamental Business Processes Part A: Planning 1.3 Types of Controls
  • 57. Enterprise Architecture Source: http://searchcio.techtarget.com/definition/enterprise-architecture It determines if IT is aligned with enterprise objectives and delivers value to business, keeping in view the complexity of an organization. It determines how an organization can most effectively achieve its current and future objectives. An Enterprise Architecture (EA) is a conceptual blueprint that defines the structure and operations of an organization.
  • 58. Zachman FrameworkTM • It is a method to define an enterprise. Two classifications are combined: The first is what, how, when, who, where, and why The second is identification, definition, representation, specification, configuration, and instantiation
  • 59. First classification includes fundamentals of communication of the primitive interrogatives. Second classification is derived from reification, the transformation of an abstract idea into an instantiation, initially postulated by ancient Greek philosophers. It is a schema with an intersection between two historical classifications. Zachman FrameworkTM for Enterprise Architecture It includes: • What • How • When • Who • Where • Why It includes: • Identification • Definition • Representation • Specification • Configuration • Instantiation (Source: https://www.zachman.com/about-the-zachman-framework)
  • 60. The Zachman framework is not a methodology, but it is a structure. It is a two-dimensional framework that combines six basic interrogatives (What, How, Where, Who, When, and Why). The framework intersects with different perspectives: Executives, Business Managers, System Architects, Engineers, and Technicians. It enables holistic understanding of the enterprise by looking at the organization from various viewpoints. Zachman FrameworkTM for Enterprise Architecture
  • 61. Security architecture with a layered framework, similar to Zachman Each layer expands in detail to move from a policy to the implementation of technology The primary characteristic of the SABSA model is that everything must be derived from an analysis of the business requirements for security Ongoing “manage and measure” phases of the lifecycle Sherwood Applied Business Security Architecture (SABSA) Provides a chain of traceability through the various layers: contextual, conceptual, logical, physical, component and operational Risk-driven enterprise information security architectures
  • 62. SOMF Service-oriented modeling framework Devised by Michael Bell Modeling business and software systems to specify service orientation Can be used to design any application, business, and technological environment, either local or distributed Used with a number of architectural approaches
  • 64. Risk-based Audit Planning Explanation Identification of key enterprise risks requires understanding of the organization, its environment, and control objectives Type and nature of transactions the entity engages in Flow of this transaction and how it is captured into information systems
  • 65. Risk Assessment Terms Asset Risk Vulnerability Impact Valuable resource you are trying to protect The potential that a chosen action or activity will lead to a loss Negative action that may harm a system Weakness that allows a threat to cause harm The severity of the damage, sometimes expressed in dollars Threat
  • 66. Inherent, Control, Detection, and Overall Audit Risk Different types of risk: Inherent Risk Probability of an error existing that might be material assuming compensating controls do not exist. It • exists irrespective of an audit • is contributed by the nature of a business Control Risk Probability that a material error exists which will not be prevented or detected on a timely basis by the system of internal controls Detection Risk Probability that the Information Systems Auditor (ISA) used inadequate checks and surmises that material errors are absent, when in fact, they are present Overall Audit Risk Summation of all audit risk groups for each control objective
  • 67. Gap Analysis Gap Analysis Usage gap Product gap Following are the two issues in Gap Analysis:
  • 68. Assurance Definitions • Target of evaluation (TOE): This is the information security deliverable, the object for which assurances are made. • Assurance activities: These activities depend on the method of assessment. Various methods of assessment are discussed later. • Security target (ST): This is the set of security specifications and requirements used to evaluate the target of evaluation. • Security protection profile (SPP): Similar to a security target, this profile is much broader in scope. Unlike an ST, an SPP does not apply to any one particular deliverable but represents the security needs of a given individual or group of individuals.
  • 69. Risk-based Audit Definitions Contro l IT Control Objective Risk Evidence IT Governance
  • 70. Risk Assessment and Risk Analysis Explanation Overall audit plan should focus on business risks related to use of IT. Area under audit represents the audit scope. Auditor to use risk-analysis techniques to establish critical area to focus on in the audit scope (focus to be on high-risk areas). Limited audit resources require this kind of focus in drawing the audit plan. A proper audit report is critical. Follow up on issues found in the audit is also critical.
  • 71. Main Areas of Coverage Risk Analysis Audit Methodology Risk-Based Auditing Audit Risk and Materiality Risk Assessment and Treatment Risk -Assessment techniques Reporting techniques Follow-up The main areas of coverage
  • 72. Risk Analysis 1 2 3 Risk is defined as the mixture of the likelihood of an event and its magnitude (ISO/IEC 73) IT Risk is specifically the enterprise risk associated with the ownership, use, operation, influence, involvement and adoption of Information Technology within a business (ISACA’s IT Risk Framework). Risk analysis assists an auditor in recognizing vulnerabilities and risks, and how they can define controls to be put in place to ensure such risks are mitigated.
  • 73. Definitions of Risk The probable frequency and probable magnitude of future loss (source: An Introduction to Factor Analysis of Information Risk (FAIR), Risk Management Insight, LLC) The potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization (source: ISO 27005)
  • 74. Factor Analysis of Information Risk (FAIR) Loss • Productivity • Resources utilized (for adverse events) • Replacement of damaged and defective assets • Legal and regulatory costs • Loss of competitive advantage • Reputational loss Value • Criticality (impact on smooth functioning) • Cost • Sensitivity Threat agents • Access • Misuse • Disclosure • Unauthorized modification □ FAIR is a probabilistic approach. □ It focuses on what is probable, rather than what is possible. □ It can be used to complement other methodologies.
  • 75. Risk Analysis ● It helps the auditor identify threats and risks within the IS environment. ● It assists in planning the audit by evaluating controls in place. ● The helps an auditor be in a position to know the audit objective. ● Decision making is easier as a risk-based methodology is used. From the Information System audit’s view, risk analysis aids in the following: Perform Periodic Risk Reevaluation (BO/RA/RM/RT) Identify Business Objectives (BO) Identify information assets supporting the BOs Perform Risk Assessment (RA) [Threat –Vulnerability –Impact] Perform Risk Management (RM) [Map Risks with controls in place] Perform Risk Treatment (RT) [Treat significant risks not mitigated by existing controls]
  • 76. Calculating Risk Exposure Factor The Exposure Factor (EF) is the percentage of value an asset lost due to an incident Single Loss Expectancy The Single Loss Expectancy (SLE) is the cost of a single loss. SLE is the Asset Value (AV) times the Exposure Factor (EF) Annual Rate of Occurrence The Annual Rate of Occurrence (ARO) is the number of losses you suffer per year Annualized Loss Expectancy The Annualized Loss Expectancy (ALE) is your yearly cost due to a risk. It is calculated by multiplying the Single Loss Expectancy (SLE) times the Annual Rate of Occurrence (ARO)
  • 77. Calculating Risk Risk Formulas SL E Asset Value (AV) Ris k AL E Exposure Factor (EF) Probability of the Risk Cost of the Eventuality Single Loss Expectancy (SLE) Annual Rate of Occurrence (ARO)
  • 78. Risk-based Audit Approach The risk-based audit approach is based on a concept in which determination of areas that should be audited is based on the perceived level of risk. Residual Risk – This represents management’s risk appetite. Normally, controls would be implemented to mitigate risk to acceptable levels (i.e. residual risk). A report or information might contain an error that is material Might be undetected through the audit period Audit risk is the risk that
  • 79. Risk-based Auditing Risk Assessment Risk Assessment Risk Evaluation ● Risk assessment drives the audit process. ● The identification of risk, prioritization of audit areas, and allocation of audit resources should be based on risk assessment. ● Evaluation of the risk management process must be conducted at every stage to ensure that risk is being managed within the risk appetite of the organization.
  • 80. Risk Assessment and Treatment Risk Assessment Risk Assessment Risk Treatment ● Risks assessments involve identifying, prioritizing, and quantifying risks against criteria for risk tolerance and objectives relevant in the organization. ● Risk assessments should be carried out regularly to ensure it addressed changes in security, risk situation, and environment, especially when key changes takes place.
  • 81. Risk Assessment and Treatment Risk Assessment Risk Treatment Risk Assessment Risk Treatment ● Risk Mitigation – Applying adequate controls to lower the risks ● Risk acceptance – Objectively and knowingly not taking action ● Risk avoidance – Evading risks by ensuring actions that cause the risk are prevented ● Risk transfer/sharing – Sharing the risk with third parties such as suppliers or insurance companies
  • 82. Risk Assessment Methods • Different methods are employed to perform risk assessments. Examples: Scoring System Method and Judgmental Method A combination of methods may be used Methods may develop and change over time All methods depend on subjective judgment Auditor should evaluate appropriateness of any chosen risk methodology Scoring System Method and Judgmental Method
  • 83. Control Principles Part A: Planning 1.4 Risk-Based Audit Planning
  • 84. Types of Audits and Assessments
  • 85. Types of Audits Knowledge Statement 1.11 Knowledge of various types of audits (e.g., internal, external, financial) and methods for assessing and placing reliance on the work of other auditors or control entities.
  • 86. Types of Audits Explanation Internal vs. External Specific domain (i.e. financial) Reliance on other auditors Following are the various types of audits:
  • 87. Internal vs. External Audits Internal ● Pre-audits ● Compliance audits ● Post incident ● Often targeted External ● Compliance ● Regulatory ● General
  • 88. Specific Domain Specific Domain Audits PCI DSS Network Systems IT Regulatory Financial Web or E-commerce Systems Database Systems
  • 89. Reliance on Other Auditors • Past audit results • Incorporating other audits • Comparison
  • 90. Audit Factors Audit Subject The area to be audited Audit Objective The purpose of the audit Audit Scope Constrains the audit to a specific system, function, or unit, or period of time
  • 92. Part B: Execution The following topics are covered in Part B: • Audit Project Management • Sampling Methodology • Audit Evidence Collection Techniques • Data Analytics • Reporting and Communication Techniques • Quality Assurance and Improvement of the Audit Process
  • 94. Audit Project Management Plan the audit engagement Build the audit plan Execute the plan Monitor project activity
  • 95. Audit Objectives Audit objectives are the specific goals that the audit process must accomplish. The audit objectives assure the following: • Compliance with legal and regulatory requirements • Protection of the confidentiality, integrity, and availability of information and IT resources
  • 96. Audit Phases The whole auditing process can generally be divided into the following three different phases: Planning Fieldwork and documentation Reporting and follow-up
  • 97. Planning Phase Determine audit subject Determine audit objective Set audit scope Perform preaudit planning Determine procedures
  • 98. Fieldwork and Documentation Phase Acquire data Test controls Discover and validate issues Document results
  • 99. Reporting Phase Gather report requirements Draft report Issue report Follow-up
  • 100. Audit Program • An Audit Work Program represents the audit plan and strategy. It has audit procedures, scope and objectives. • The Audit Work Program: • Is a guide for documenting various audit steps performed and the types and extent of evidential matters reviewed; • Provides a trail of the process used; and • Provides accountability for performance. • IS Audit Process Steps: • Plan – assess risks, develop audit program: objectives, procedures (Guidance 5) • Obtain and evaluate evidence – strengths and weaknesses of controls • Prepare and present report – draft and final report • Follow-up – corrective actions taken by management (Guidance 35)
  • 101. Audit Methodology Audit Methodology Components Scope Audit objectives Work programs It is a documented approach for performing the audit in a continuous and recurring manner to achieve the planned audit objectives. Audit Methodology refers to standard audit procedures to be used to achieve the planned audit objectives.
  • 103. Audit Project Management Part B: Execution 1.6 Audit Project Management
  • 104. Applicable Laws and Regulations for IS Audit Part B: Execution 1.6 Knowledge of the applicable laws and regulations that affect the scope, evidence collection and preservation, and frequency of audit.
  • 105. Fraud Irregulaties and Illegal Acts Explanation Fraud investigations or legal proceedings require the integrity of the evidence be maintained throughout its life cycle (called chain of custody in forensic evidence). Legal requirements include law, regulation and/or contractual agreements placed on Audit (or IS Audit) or the Auditee. Management and audit personnel in an organization should be aware of external requirements for computer system practices and controls, and how data is processed, transmitted and stored. There is a need to comply with different laws raising legal requirements that impact on audit objectives and audit scope.
  • 106. Main Areas of Coverage The main areas covered under this knowledge statement include: Eviden ce Audit Documentation Continuous Auditing Legal Requirements
  • 107. HIPAA and HITECH The Health Insurance Portability & Accountability Act of 1996 (HIPAA) PHI (Personal Health Information) Health Information Technology for Economic and Clinical Health Act (HITECH) Redefining what a breach is Creating stricter notification standards
  • 108. Sarbanes-Oxley and PCI Sarbanes-Oxl ey Public companies must keep electronic records for 5 years PCI-DSS (Payment Card Industry-Data Security Standards) 1 2 3
  • 109. Cryptography Standards ISO/IEC 7064 Data processing – Check character systems Published 2003 ISO/IEC 9796 Digital signature schemes giving message recovery 3 parts published 2002 2006, under revision ISO/IEC 9797 Message authentication codes (MACs) 2 parts published 1999 2002, under revision, 3rd part is upcoming ISO/IEC 9798 Entity authentication | 6 parts published 1997 2005 ISO/IEC 10116 Modes of operation for an n-bit block cipher algorithm | Published 2006 ISO/IEC 10118 Hash-functions | 4 parts published 1998 2004 (2006), under revision ISO/IEC 11770 Key management 4 parts published 1996 2006, under revision
  • 110. Balanced Score Card A type of structured report used as a performance management tool Used to track execution of activities Actually measures performance against an expected value Should define measurements from four perspectives Financial Customer Internal Process Innovation/ Learning
  • 112. Sampling Methodology Knowledge Statement 1.8 Knowledge of different sampling methodologies and other substantive/data analytical procedures.
  • 113. Sampling Methodologies Compliance testing involves gathering evidence to test the enterprise’s compliance with control procedures. Substantive testing is evidence gathered to evaluate the integrity of individual transactions, data, or other information. Presence of adequate internal controls (established through compliance testing) minimizes the number of substantive tests that have to be done. Conversely, weaknesses in internal controls will increase the need or number of substantive tests. Sampling is done when it is not logical to test or verify all transactions by the consideration of the time and cost needed. (i.e. the population which consists of all items in the area being examined).
  • 114. Sampling Methodologies Main Areas of Coverage: Compliance vs. Substantive testing Sampling
  • 115. Sampling A sample is a subset of population members used to infer characteristics about a population based on the results of examining the characteristics of a sample of the population. A basic understanding of sampling is necessary for the ISA. A population consists of the entire group of items that need to be examined. The sample must represent as closely as possible the characteristics of the whole population. Sampling is done, when verifying all transactions or events (population) in the audit scope is not feasible. The sample drawn must be a correct representation of the population, since all the conclusions are drawn from the sample.
  • 116. General Approaches to Sampling Sampling can either be statistical or non-statistical. Statistical Sampling ● Uses objective judgment to determine: o Sample size o Selection criteria o Sample precision o Reliability or confidence level ● This can be used to infer population characteristics from the sample and is the preferred method. Non-statis tical Sampling ● Uses subjective judgment to determine: o Method of sampling o Sample size o Sample selection ● This cannot be used to not infer population characteristics from the sample and is not a preferred method of sampling.
  • 117. General Approaches to Sampling Statistical Sampling ● Uses statistical principles of probability and confidence level to draw a sample representative of the population ● ISA decides the sample precision (how closely the sample should represent the population) and the confidence level (the number of times in 100 that the sample will represent the population) Non-statis tical Sampling ● Uses the judgment of the ISA to determine the sample selection and size ● Increased possibility of sampling risk—the risk that the analysis / conclusions will be wrong because the sample is not representative of the population ● This technique may be used when drawing an inference about the population is not necessary; say, when a handful of large-value credit limits are picked up for scrutiny from a population of extremely low-value credit limits
  • 118. Attribute and Variable Sampling Sampling methods are of two types, attribute sampling and variable sampling. Attribute sampling ● Also known as proportional sampling ● Deals with the presence or absence of an attribute ● Generally applied for compliance testing, to detect the presence or absence of an attribute and draw conclusions from the rate of incidence. ● Conclusions expressed in rates of incidence Types: ● Attribute sampling or fixed sample size attribute sampling or frequency estimation ● Stop-or-go sampling ● Discovery sampling Variable sampling ● Used to estimate the value of some variable, example verification of transactions, review of processing in programs used in the preparation of financial statements. ● Also known as dollar estimation or Mean value estimation sampling or Quantitative sampling ● Applied in substantive testing and deals with characteristics that vary, monetary values, measures and in drawing conclusions regarding deviations from the norm. ● Provides conclusions related to deviations from the norm. Types: ● Stratified mean per unit ● Un-stratified mean per unit ● Difference estimation
  • 119. Attribute Sampling Fixed Sample-Size Attribute / Frequency-Estimat e Sampling Stop-or-go Sampling • Aim is to determine the rate of occurrence: How many, how often? • Example: Approval signature on user account creation forms Discovery Sampling • Adopted when the auditor expects less number of errors • Sample size is small and can be kept to minimum • Adopted when errors are expected to be a rare occurrence • Aim is to discover: o fraud o bypassing rules by manipulation (by splitting a large order value into several smaller ones to avoid having to obtain approval of a higher authority)
  • 120. Variable Sampling Stratified sampling produces a higher confidence level for the same sample size, or may result in a lower sample size for the same confidence level, while other attributes are kept equal. Stratified Mean Per Unit Unstratified Mean Per Unit • Population is divided into strata, and samples are drawn from various strata • Stratification, if properly applied, reduces the sample size relative to unstratified mean per unit Difference Estimation • Mean is calculated for the entire sample, without stratification and extrapolated to the entire population • It increases the sample size • Technique used to estimate the difference between the audited values and the book values, on the basis of differences observed in the sample
  • 121. Sampling Terms • The probability that the sample is representative of the population, in relation to the characteristic observed, expressed as a percentage • 95% confidence coefficient implies 95% chance that the sample is representative of the population • Depending on assessment of the effectiveness of internal controls, the ISA will vary the sample size • The greater the confidence level the ISA desires, the larger will be the sample size • The opposite of the confidence coefficient, the risk that the sample is not representative of the population • If the confidence coefficient is 95%, the level of risk is 5% Confidence Coefficient / Level / Reliability Factor Level of Risk (Applicable to both attribute and variable sampling)
  • 122. Sampling Terms • The range of difference between the sample and population acceptable to the ISA • This is expressed in percentage for attribute sampling and as a numerical value for variable sampling • The higher the precision level, the lower the sample size and vice versa • A measure of the variance or spread of values around the mean Precision Sample / Population Standard Deviation (Applicable to both attribute and variable sampling)
  • 123. Sampling Terms • The expected error in percentage • Applied only to attribute sampling, not variable sampling • If the expected error rate is high, the sample size will have to be increased • Expressed as a percentage, it represents the maximum degree of error that can exist, without the result being materially misstated • Define maximum precision using tolerable error rate, within permissible limits Expected Error Rate Tolerable Error Rate • (Applicable to both attribute and variable sampling)
  • 125. Evidence Collection Techniques Knowledge Statement 1.7 Knowledge of the evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis, forensic investigation techniques, computer-assisted audit techniques [CAATs]) used to gather, protect and preserve audit evidence.
  • 126. Evidence Collection Techniques Explanation Audit findings must be supported by objective evidence Know techniques to gather and preserve evidence Information gathered through inquiry, observation, interview, analysis using CAATs (Computer Assisted Auditing Techniques) such as, ACL, IDEA among others Electronic media may be used to retain audit evidence to support audit findings Retention policies should meet requirements for such evidence to support audit findings
  • 127. Main Areas of Coverage Computer Assisted Audit Techniques (CAATs) Evidence Interviewing and Observing Personnel in Performance of their Duties Continuous Auditing Audit Documentation 1 2 3 4 5
  • 128. Evidence Is the information the Information Systems Auditor (ISA) gathers while performing an IS audit to meet the audit objectives by supporting the audit findings Must directly relate to the objectives of review Is key to the audit process Is mandatory under standard “S6 Performance of Audit Work” Should be appropriately organized and documented to support the findings and conclusion(s)
  • 129. Reliability of Evidence Determinants for the reliability of evidence include: Independence of the provider of the evidence Qualification of the individual providing the information/ evidence Objectivity of the evidence Timing of the evidence Given an audit scenario in the exam, a candidate should be able to determine which type of evidence gathering technique would be best.
  • 130. Evidence Characteristics and Types • The confidence level of evidence is based on its value; audit evidence is considered • Sufficient if it is complete, adequate, convincing, and would lead another ISA to form the same conclusions • Useful if it assists ISAs in meeting their audit objectives • Reliable if in the auditor’s opinion, it is valid, factual, objective and supportable • Relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support
  • 131. Techniques for Gathering Evidence Techniques for gathering evidence include the following: Reviewing IS organizational structures Reviewing IS documentation Reviewing IS standards Reviewing IS policies and procedures Walkthroughs Re-performance Observing processes and employee performance Interviewing appropriate personnel
  • 132. Audit document-atio n related to document identification and dates Audit findings, conclusions, and recommend- ations Use of services of other auditors or experts Audit steps performed and audit evidence gathered Audit program Description and/or walkthroughs on the scoped audit area Planning and preparation of audit scope and objectives Audit Documentation Audit documentation should include a record of
  • 134. Data Analytics Explanation Audit findings must be supported by objective evidence Know techniques to gather and preserve evidence Information gathered through inquiry, observation, interview, analysis using CAATs (Computer Assisted Auditing Techniques) such as, ACL, IDEA among others Electronic media may be used to retain audit evidence to support audit findings Retention policies should meet requirements for such evidence to support audit findings
  • 135. Computer Assisted Audit Techniques (CAATs) • Automated tools and techniques used for gathering and analyzing data from computer systems to meet a predetermined audit objective. CAATs CAATs process involves; ● Understanding the client ● Obtaining effective evidence ● Data analysis ● Reporting ● CAATs necessitated by differences in HW, SW environments, data structures, record formats, processing functions Examples of CAATs ● Generalized audit software e.g. IDEA, ACL ● Utility software e.g. DBMS report writers ● Debugging and scanning software ● Test Data ● Expert systems ● SQL commands ● Third party access control software ● Application software tracing and mapping ● Options and reports build in a system
  • 136. (CAATs ) Collate and analyze diverse data. Information systems employ diverse hardware, software, databases, data structures, and formats for audit evidence Provide means of analyzing data to achieve audit objectives Enable the ISA to work independently, eliminating continuous assistance from the IT function Types of CAATs: • GAS (Generalized Audit Software) • Utility software • Industry-specific audit software • Fourth-generation languages like SQL • Expert systems • Neural networks • Application software tracing • Mapping Computer-Assisted Auditing Techniques
  • 137. Types of CAATs Generalized Audit Software (GAS) • Standard, off-the-shelf software which can read data from diverse database platforms, flat files, and ASCII formats • ISA can utilize the in-built functions of the software • Functions of GAS include: o File access and reorganization o Sampling o Filtration Utility o Statistical analysis Software o Stratification and frequency analysis o Report generation o Duplicate checking o Recomputation Industry-specific Audit Software • Limitations of GAS include: o Not suitable for concurrent auditing o Can only conduct post-event audit o Limited capabilities to verify processing logic
  • 138. Types of CAATs Generalized Audit Software (GAS) Utility • Is a part of a suite of programs like: copy, sort programs, report generators, disk search Software utility, and fourth-generation languages, like SQL (structured query language). Industry-specific Audit Software
  • 139. Types of CAATs Generalized Audit Software (GAS) Utility Software • While GAS is generic in nature, audit software specific to some industries like financial Industry-specific Audit Software services, insurance, and health care is also available. • They include built-in queries to perform audit functions in specific industries, say check kiting in banking. • Constructing similar queries in GAS would need more effort and skills.
  • 140. Types of CAATs Expert System • This is a type of artificial intelligence and incorporates a knowledge base that contains the knowledge of human experts in the concerned domain. • The inference engine in the expert system compares the data presented against the knowledge base to draw conclusions. • Expert systems can be used for: o Risk analysis o Evaluation of internal controls and assessing if provisions on doubtful debts are Neural adequate Networks Continuous Online Audit
  • 141. Types of CAATs Expert System Neural • These are designed to mimic the neurons of the human brain. • They can be “trained” to recognize patterns that indicate certain occurrences, like a Networks fraud. Continuous Online Audit
  • 142. Types of CAATs Expert System Neural Networks Continuous Online Audit • CAATs can be used to implement ongoing monitoring. • They can be configured to continuously analyze data either in real or near real time intervals, in furtherance of preset audit objectives.
  • 143. Computer Assisted Audit Techniques (CAATs) Functional capabilities of Generalized Audit Software (GAS) are as follows: File access: reading different file structures and record formats File reorganization: indexing, sorting, merging, linking Data selection: filtration conditions, selection criteria Statistical functions: sampling, stratifications, frequency analysis Arithmetic functions: arithmetic operators and functions
  • 145. Reporting and Communication Techniques Knowledge Statement 1.9 Knowledge of reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution, audit report structure, issue writing, management summary, result verification).
  • 146. Reporting and Communication Techniques Explanation Communication needs to be effective and clear to improve the quality of the audit and maximize results. When an argument ensues between the auditor and the auditee during the final IS audit findings report presentation over the accuracy of the findings in the report, it makes the audit process counterintuitive and quickly dilutes the audit process and its value. Audit findings reported to stakeholders need to have appropriate buy-in from the auditees for the audit process to be successful and value adding. Communication and negotiation skills are required throughout the audit activity. Communication skills determine the effectiveness of the audit reporting process.
  • 147. Audit Report Objectives The objectives of audit reporting are: • Formally presenting the audit report to the auditee or client • Providing statements of assurance of controls • Identifying areas that require corrective actions • Providing recommendations • Formally seeking closure of the audit engagement
  • 148. Main Areas of Coverage Information Technology Assurance Framework (ITAF) (Section 2600 – Reporting Standards) Communicating Audit Results The main areas of coverage:
  • 149. Communication of Audit Results Presentation techniques include: ● Executive summary Easy to read, concise report that presents the summary of the entire report ● Visual presentation: May include slides or computer graphics Before communicating the results of an audit to senior management, the IS audit should discuss the findings with management staff of the audited entity. This is to ensure an agreement is reached for both the findings and the corrective action to be taken. The CISA candidate should become familiar with the ISACA S7 Reporting and S8 Follow-up Activities standard. Ensure recommendations are realistic and cost-effective Recommend implementation dates for agreed-on recommendations Ensure facts presented in the report are accurate During exit interviews, the IS auditor should:
  • 150. Communication Skills Facilitation Negotiation Conflict resolution Issue writing
  • 151. The Report Identify and Include: • Organization, recipients, restriction on circulation • Scope, objectives, period of coverage, nature, timing, and extent • Findings, conclusions, recommendations/follow up, and reservations or qualifications o Grouped by materiality or intended recipient o Mention faults and constructive corrections • Evidence to support results (may be separate) • Overall findings, conclusion, and opinion • Signed and dated
  • 152. Audit Report Basics An audit report includes the following features: Audit Report Features Organization, recipients and restriction on circulation Scope, objectives, period of coverage, nature, timing, and extent Signature and date Evidence to support results Findings, conclusions, recommendations/follow- ups, and reservations/qualifications Overall findings, conclusion, and opinion Grouped by materiality or intended recipient Mention faults and constructive corrections
  • 153. Follow-Up Activities • An IS auditor should conduct a follow-up program to determine whether the management has implemented the agreed-on corrective actions. • The results of the follow-up should be communicated appropriately.
  • 154. Quality Assurance and Improvement of the Audit Process
  • 155. Audit Assurance Systems and Frameworks Knowledge Statement 1.10 Knowledge of audit quality assurance (QA) systems and frameworks.
  • 156. Quality Assurance and Improvement of the Audit Process Explanation Auditing standards are the minimum parameters to be taken into account when performing an audit. An IS auditor has to understand the impact of the IS environment on traditional auditing practices and techniques to ensure the audit objective is achieved. Control Self Assessment (CSA) is a process in which an IS auditor can act in the role of a facilitator to business process owners to help them define and assess appropriate controls (taking into consideration the risk appetite of the organization). Process owners are best placed to define appropriate controls due to their process knowledge. IS auditors help process owners understand the need for controls based on business risk.
  • 157. Main Areas of Coverage The main areas covered under this knowledge statement are as follows: Audit programs Audit methodology Audit objectives Evaluation of audit strengths and weakness Control Self Assessment (CSA) Objectives, advantages, and disadvantages of CSA Auditors Role in CSA Using services of other Auditors and Experts Traditional vs. CSA Approach
  • 158. Control Self Assessment (CSA) CSA is a methodology used to review key business objectives, risks involved in achieving the business objectives, and internal controls designed to manage these business risks in a formal, documented collaborative process. CSA is a management technique that assures stakeholders, customers, and other parties that the internal control system of the organization is reliable. It ensures employees are aware of business risk and that they conduct periodic, proactive reviews of controls. CSA involves a series of tools on a continuum of sophistication, ranging from simple questionnaires to facilitated workshops.
  • 159. Objectives of a CSA Control Objectives for Information and Related Technology (COBIT provides guidance on development of a CSA Following are the objectives of a CSA: Leverage the internal audit function by shifting some of the control monitoring responsibilities to the functional areas Ensure Line managers are in charge of monitoring controls Educate management on control design and monitoring
  • 160. COBIT Some important facts about COBIT are: • Control Objectives for Information and related Technology • ISACA first released COBIT in 1996 • Revised in 2005 to become ISO 17799:2005 • ISACA published the current version, COBIT 5, in 2012 • Contains 134 detailed information security controls based on 11 areas
  • 161. Benefits of a CSA Benefits of a CSA include the following: • Early detection of risk • More effective and improved internal controls • Create cohesive teams – employee involvement • Develops sense of ownership of controls in employees and process owners • Improved audit rating process • Reduction in control cost • Increased communication between operations and top management • Highly motivated employees • Assurance provided to stakeholders and customers
  • 162. CSA Disadvantages and Role of Auditor Disadvantages of a CSA ● Might be mistaken as an audit function replacement ● May be taken as additional workload (e.g. writing reports to management) ● Failure to act on improvement suggestions could damage employee morale ● Inadequate motivation limits effectiveness in the discovery of weak controls Auditor’s role in CSA ● Internal control professional and assessment facilitator (management staff participates in the CSA process, not the auditor)
  • 163. Traditional Vs. CSA Approach The following table compares the traditional audit approach with CSA: Traditional Audit Approach Assigns tasks Policy-driven Limited employee participation Limited stakeholder focus Auditors and other specialists CSA Empowered and accountable employees Continuous improvement learning curve Extensive employee participation and training Broad stakeholder focus Staff at all levels and in all functions are the primary control analysts
  • 164. Domain One Exam Quick Pointers 1. 2. 3. 4. 5. 6. 7. 8. The auditor is a facilitator in a Control Self Assessment. Examples of substantive tests include testing samples of an inventory of backup tapes. Control self Assessment (CSA) enhances audit responsibility as one of its key objectives. Accountability cannot be enforced without authentication and identification in an access control. IS Auditors are likely to perform compliance tests of internal controls if, after their initial evaluation of the controls, they conclude that control risks are within acceptable limits. Identification of high-risk areas is the most important step in an audit plan. The auditor should be aware of data flows within an enterprise when assessing corrective, preventive, or detective controls. Responsibility and accountability can be established by the use of audit trails.
  • 165. Domain One Exam Quick Pointers 9. 10. 11. 12. 13. 14.
  • 167. a. b. c. d. An audit charter should . summarize the responsibilities, authority and scope of an internal audit department. define audit processes outline audit goals and how to achieve them keep track with the change in information technology QUIZ 1
  • 168. a. b. c. d. An audit charter should . summarize the responsibilities, authority and scope of an internal audit department define audit processes outline audit goals and how to achieve them keep track with the change in information technology The correct answer is a. An audit charter should summarize the responsibility, authority, and scope of an audit department. QUIZ 1
  • 169. a. b. c. d. An audit report prepared by the information systems auditor should be corroborated by . supporting statements from IS management work-papers of senior auditors control self-assessment from the organization appropriate, relevant, and sufficient audit evidence QUIZ 2
  • 170. a. b. c. d. An audit report prepared by the information systems auditor should be corroborated by . supporting statements from IS management work-papers of senior auditors control self-assessment from the organization appropriate, relevant, and sufficient audit evidence The correct answer is a. An IS auditor should have statements from IS Management to ensure that they are in agreement with the findings as well the corrective action to be taken. QUIZ 2
  • 171. a. b. c. d. An IS auditor reviews the previous audit plan implemented for a client and finds that it was designed to review the company network and e-mail systems, but not the e-commerce Web server. The IT manager indicates that the preferred focus for audit is the newly implemented ERP application. How should the auditor respond? Determine the highest-risk systems and plan the audit based on the results Audit the new ERP application as requested by the IT manager Audit both the e-commerce server and the ERP application Audit the e-commerce server since it was not audited last year QUIZ 3
  • 172. a. b. c. d. An IS auditor reviews the previous audit plan implemented for a client and finds that it was designed to review the company network and e-mail systems, but not the e-commerce Web server. The IT manager indicates that the preferred focus for audit is the newly implemented ERP application. How should the auditor respond? Determine the highest-risk systems and plan the audit based on the results Audit the new ERP application as requested by the IT manager Audit both the e-commerce server and the ERP application Audit the e-commerce server since it was not audited last year The correct answer is c. The best course of action is to conduct a risk assessment and design the audit plan to cover the areas of highest risk. The IS auditor should not rely on the prior-year audit plan since it may not have been designed to reflect a risk-based approach. QUIZ 3
  • 173. a. b. c. d. When testing program change requests, an IS auditor found that the population of changes was too small to provide a reasonable level of assurance. What is the most appropriate action for the IS auditor to take? Report the finding to management as a deficiency. Create additional sample changes to programs. Develop an alternate testing procedure. Perform a walk-through of the change management process. QUIZ 4
  • 174. a. b. c. d. When testing program change requests, an IS auditor found that the population of changes was too small to provide a reasonable level of assurance. What is the most appropriate action for the IS auditor to take? Report the finding to management as a deficiency. Create additional sample changes to programs. Develop an alternate testing procedure. Perform a walk-through of the change management process. The correct answer is a. If a sample size objective cannot be met with the given data, the IS auditor would not be able to provide assurance regarding the testing objective. In this instance, the IS auditor should develop (with audit management approval) an alternate testing procedure. QUIZ 4
  • 175. a. b. c. d. The main advantage derived from an enterprise employing control self-assessment (CSA) process is that it: enables management to delegate responsibility. can replace the traditional audit methods. allows the auditor to independently assess risks. identifies high-risk areas that require a detailed review later. QUIZ 5
  • 176. a. b. c. d. The main advantage derived from an enterprise employing control self-assessment (CSA) process is that it: enables management to delegate responsibility. can replace the traditional audit methods. allows the auditor to independently assess risks. identifies high-risk areas that require a detailed review later. The correct answer is d. Control Self Assessment is based on the review of high-risk areas that will need a more thorough review at a later date or either an immediate attention. QUIZ 5
  • 178. Case Study 1 The IS auditor has been asked to perform a pre-audit review to assess the company’s readiness for a regulatory compliance audit. The regulatory requirements include management taking an active role in IT management including managerial review and testing of IT controls. The areas to assess in the upcoming regulatory compliance audit include physical controls, logical controls, end-user computing, and change management. The IS Auditor has only two weeks to complete the pre-audit review. Previous audits found no issues with physical controls or end-user computing but did find issues with logical controls and change management. Previous issues found include inadequate password management and not all changes where reviewed by a change approval board.
  • 179. a. b. c. d. Which of the following would be the most important item for the IS auditor to check first? Password management Change approval Patch management Physical security QUIZ 1
  • 180. a. b. c. d. Which of the following would be the most important item for the IS auditor to check first? Password management Change approval Patch management Physical security The correct answer is a. Password management and change approval were both identified as issues in previous audits. However, password management is a more critical issue, and it is less time consuming to check. It may not be possible to review change management within the time allotted. QUIZ 1
  • 181. a. b. c. d. If time permits, should the IS auditor review physical controls and end-user computing, even though there were no problems noted in previous audits? Yes, check both if time permits No, as there were no previous issues If possible, check physical controls but not end-user computing If possible, check end-user computing then physical controls QUIZ 2
  • 182. a. b. c. d. If time permits, should the IS auditor review physical controls and end-user computing, even though there were no problems noted in previous audits? Yes, check both if time permits No, as there were no previous issues If possible, check physical controls but not end-user computing If possible, check end-user computing then physical controls The correct answer is a. Simply because there have not been issues in the past does not mean an area should not be reviewed during an audit. If time permits, every area that will be addressed in the regulatory compliance audit should be reviewed. QUIZ 2
  • 183. Case Study 2 An IS auditor has been tasked to audit a financial application used by a bank to process loan applications. The application can be accessed via a Web interface from anywhere in the world. The company maintains the Web server internally (that is. it is not outsourced) as well as the back end database. The auditor has limited time and may not be able to do a complete audit.
  • 184. a. b. c. d. Which of the following tools would be most helpful in this audit? General audit software application tool Statistical analysis tool Web vulnerability testing tool General vulnerability assessment tool QUIZ 1
  • 185. a. b. c. d. Which of the following tools would be most helpful in this audit? General audit software application tool Statistical analysis tool Web vulnerability testing tool General vulnerability assessment tool The correct answer is c. Since the application is accessed via the Web, the most critical item to audit is the Web interface. This is where most security issues would be helpful in an audit. QUIZ 1
  • 186. a. b. c. d. In this scenario, what is the order of importance of items checked? Firewall, VPN, Web server, Database server VPN, Firewall, Database server, Web server Database server, VPN, Web server, Firewall Web server, Firewall, Database server, VPN QUIZ 2
  • 187. a. b. c. d. In this scenario, what is the order of importance of items checked? Firewall, VPN, Web server, Database server VPN, Firewall, Database server, Web server Database server, VPN, Web server, Firewall Web server, Firewall, Database server, VPN The correct answer is d. The Web server is the most important as it is the publically facing interface most vulnerable to attack. The database is protected by the firewall, so the next item to check is the firewall. VPN connections need not be checked, as there is no VPN used in this scenario. QUIZ 2
  • 188. Key Takeaways You’ are now able to: Plan an audit to determine whether information systems are protected, controlled, and provide value to the organization Conduct an audit in accordance with IS audit standards and a risk‐based IS audit strategy Communicate audit progress, findings, results, and recommendations to stakeholders Conduct an audit follow‐up to evaluate whether risks have been sufficiently addressed Evaluate IT management and monitoring of controls Utilize data analytics tools to streamline an audit process Provide consulting services and guidance to the organization in order to improve the quality and control of information systems Identify opportunities for process improvement in the organization's IT policies and practices