SlideShare a Scribd company logo
Suriname College of Accountancy
CISA DOMAIN 1:
THE PROCESS OF AUDITING INFORMATION SYSTEMS
1
Cyril Soeri MA RA CISA CIS LI
Gregory Tai-Apin CISA CIS LI COBIT Foundation
Day 1
Suriname College of Accountancy
CISA Program
2
The CISA program consists of the following five domains:
1. The Process of Auditing Information Systems (3 -26 Feb 2015);
2. Governance and Management of IT (17 March – 9 Apr 2015);
3. Information Systems Acquisition, Development and Implementation
(28 Apr – 21 May 2015);
4. Information Systems Operations, Maintenance and Support
(11 Jun – 2 Jul 2015);
5. Protection of Information Systems (21 Jul – 13 Aug 2015).
 September 2015: expected early registration date for CISA exam
 Exam training sessions: 5 Oct – 9 Oct (daily sessions)
 CISA Exam in December 2015
Suriname College of Accountancy
Program of Domain 1 (1a)
3
DAY 1 The Process of Auditing Information Systems
 The universe of an IT auditor
 The ISACA route
 Management of the IS Audit Function
 Organization of the IS audit function
 Audit Planning
Suriname College of Accountancy
Program of Domain 1 (1b)
4
DAY 1 (Cont’d): The Process of Auditing Information Systems
 ISACA IT audit and Assurance Standards and Guidelines
 ISACA Code of Professional Ethics
 ISACA IT Audit and Assurance Standards Framework
 Auditing Standards
 ISACA IT Audit and Assurance Guidelines
 ISACA IT Audit and Assurance Tools and Techniques
 Information Technology Assurance Framework (ITAF)
Suriname College of Accountancy
Program of Domain 1 (2)
5
DAY 2 The Process of Auditing Information Systems (cont’d)
 Risk Analysis
 Internal Controls
 Internal Control Objectives
 IS Control Objectives
 COBIT
 General Controls
 IS Controls
Suriname College of Accountancy
Program of Domain 1 (3)
6
DAY 3 The Process of Auditing Information Systems (cont’d)
 Performing an IS Audit (1):
 Classification of Audits
 Audit Programs
 Audit Methodology
 Fraud Detection
Suriname College of Accountancy
Program of Domain 1 (4)
7
Day 4 The Process of Auditing Information Systems (cont’d)
 Performing an IS Audit (2):
 Risk-based Auditing
 Audit Risk and Materiality
 Assessing & Treating Risks
 Risk Assessment Techniques
Suriname College of Accountancy
Program of Domain 1 (5)
8
Day 5 The Process of Auditing Information Systems (cont’d)
 Performing an IS Audit (3):
 Audit Objectives
 Compliance versus Substantive Testing
 Audit Evidence
 Interviewing and Observing Personnel in Performance of their Duties
 Sampling
Suriname College of Accountancy
Program of Domain 1 (6)
9
DAY 7 The Process of Auditing Information Systems (cont’d)
 Performing an IS Audit (5):
 Using Services of Other Auditors and Experts
 Computer-Assisted Audit Techniques
 Evaluation of Strengths and Weaknesses
 Communicating Audit Results
 Management Implementation of Recommendations
 Audit Documentation
Suriname College of Accountancy
Program of Domain 1 (7)
10
DAY 8 The Process of Auditing Information Systems (cont’d)
 Control Self-assessment (CSA)
 Objectives
 Benefits
 Disadvantages
 Auditor Role in CSA
 Technology drivers for CSA
 Traditional vs. CSA approach
Suriname College of Accountancy
Program of Domain 1 (8)
11
DAY 8 The Process of Auditing Information Systems (cont’d)
 The evolving IS Audit Process
 Integrated audit
 Continuous auditing
 Exam training
 CISA’s road ahead
 Closing session
Suriname College of Accountancy
OVERVIEW
CISA Domain 1: The process of IS Auditing
12
Suriname College of Accountancy
Learning objectives
13
There are five tasks within the domain covering the process of auditing information
systems:
1. Develop and implement a risk-based IT audit strategy in compliance with IT
audit standards to ensure that key areas are included.
2. Plan specific audits to determine whether information systems are protected,
controlled and provide value to the organization.
3. Conduct audits in accordance with IT audit standards to achieve planned audit
objectives.
4. Report audit findings and make recommendations to key stakeholders to
communicate results and effect change when necessary.
5. Conduct follow-ups or prepare status reports to ensure that appropriate actions
have been taken by management in a timely manner.
Suriname College of Accountancy
MANAGEMENT OF THE IS AUDIT FUNCTION
CISA Domain 1: The process of IS Auditing
14
Suriname College of Accountancy
Organization of the IS Audit function
15
 Internal IS Audit services:
 Audit charter approved by senior management;
 External IS Audit services:
 Formal contract or statement of work
Suriname College of Accountancy
Exam training
16
A1-15 (Q) Audit charter
An audit charter should:
A. be dynamic and change often to coincide with the changing nature
of technology and the audit profession.
B. clearly state audit objectives for, and the delegation of, authority to
the maintenance and review of internal controls.
C. document the audit procedures designed to achieve the planned
audit objectives.
D. outline the overall authority, scope and responsibilities of the audit
function.
Suriname College of Accountancy
Exam training
17
A1-15 (A)
 D) is the correct answer.
Justification:
A. The audit charter should not be subject to changes in technology and should not
significantly change over time. The chartcr should be approved at the highest level of
management.
B. An audit chartcr will state the authority and reporting requirements for the audit, but
not the details of maintenance of internal controls.
C. An audit charter would not be at a detailed level and, therefore, would not include
specific audit objectives or procedures.
D). An audit charter should state management's objectives for and delegation of
authority to IS auditors.
Suriname College of Accountancy
Exam training
18
 A1-72 (Q) IS audit charter
An organization's IS audit charter should specify the:
A. short- and long-term plans for IS audit engagements.
B. objectives and scope of IS audit engagements.
C. detailed training plan for the IS audit staff.
D. role of the IS audit function.
Suriname College of Accountancy
Exam training
19
 A1-72 (A)
D is the correct answer.
Justification:
 A. Short-term and long-term planning is the responsibility of audit
management.
 B. The objectives and scope of each IS audit should be agreed on in an
engagement letter. The charter would spccify the objectives and scope of
the audit function but not of individual engagements.
 C. A training plan, based on the audit plan, should be developed by audit
management.
 D). An IS audit charter establishes the role of the information systems
audit function. The charter should describe the overall authority, scope
and responsibilities of the audit function. It should be approved by the
highest level of management and, if available, by the audit committee.
Suriname College of Accountancy
IS Audit Resource Management
20
 Professional competence through continuing
professional education (CPE);
 Necessary IT resources to properly perform IS
audits of a highly specialized nature (e.g., tools,
methodology, work programs).
Suriname College of Accountancy
Audit planning (1)
21
 Annual planning:
 Short term – audit issues to be covered;
 Long term – changes in IT strategic direction;
 Individual Audit assignments – considerations:
 the results of periodic risk assessments,
 changes in the application of technology,
 evolving privacy issues and regulatory requirements,
 system implementation/upgrade deadlines,
 current and future technologies,
 requirements from business process owners,
 IS resource limitations.
Suriname College of Accountancy
Audit planning (2)
22
To perform audit planning, the IS auditor should perform the following steps:
1. Gain an understanding of the business's mission, objectives, purpose and
processes, which include information and processing requirements such
as availability, integrity, security and business technology, and
information confidentiality.
2. Identify stated contents such as policies, standards and required
guidelines, procedures and organization structure.
3. Perform a risk analysis to help in designing the audit plan.
4. Set the audit scope and audit objectives.
5. Develop the audit approach or audit strategy.
6. Assign personnel resources to the audit.
7. Address engagement logistics.
Suriname College of Accountancy
Effect of laws and regulation on
IS Audit planning (1)23
 The contents of IS legal regulations regard:
 Establishment of the regulatory requirements
 Organization of the regulatory requirements
 Responsibilities assigned to the corresponding entities
 Correlation to financial, operational and IT audit functions
 There are two major areas of concern:
 legal requirements placed on audit or IS audit;
 legal requirements placed on the auditee and its systems, data
management, reporting, etc.
Suriname College of Accountancy
Effect of laws and regulation on
IS Audit planning (2)24
The following are steps an IS auditor would perform to determine an
organization's level of compliance with external requirements (to be
continued):
 Identify those government or other relevant external requirements
dealing with:
 Electronic data, personal data, copyrights, e-commerce, e-signatures, etc.
 Computer system practices and controls
 The manner in which computers, programs and data are stored
 The organization or the activities of information technology services
 IS audits
Suriname College of Accountancy
Effect of laws and regulation on
IS Audit planning (3)25
Steps to determine an organization's level of compliance (cont’d):
 Document applicable laws and regulations;
 Assess whether the management of the organization and the IS function have
considered the relevant external requirements in making plans and in setting
policies, standards and procedures, as well as business application features;
 Review internal IS department/function/activity documents that address
adherence to laws applicable to the industry;
 Determine adherence to established procedures that address these requirements;
 Determine if there are procedures in place to ensure contracts or agreements with
external IT services providers reflect any legal requirements related to
responsibilities;
Suriname College of Accountancy
Exam training
26
 A1-99 (Q) Planning
The effect of which of the following should have priority in
planning the scope and objectives of an IS audit:
 A. Applicable statutory requirements
 B. Applicable corporate standards
 C. Applicable industry best practices
 D. Organizational policies and procedures
Suriname College of Accountancy
Exam training
27
 A1-99 (A)
A is the correct answer.
Justification:
 A. The effect of applicable statutory requirements must be factored in while
planning an IS audit— the IS auditor has no options in this respect because there
can be no limitation of scope in respect to statutory requirements.
 B. Statutory requirements always take priority over corporate standards.
 C. Industry best practices help plan an audit; however, best practices are not
mandatory and can be deviated from to meet organization objectives.
 D. Organizational policies and procedures arc important, but statutory requirements
always take priority. Organizational policies must be in alignment with statutory
requirements.
Suriname College of Accountancy
Exam training
28
 A1-101 (Q) Planning
An IS auditor is planning to evaluate the control design effectiveness
related to an automated billing process. Which of the following is the
MOST effective approach for the auditor to adopt?
 A. Process narrative
 B. Inquiry
 C. Reperformance
 D. Walk-through
Suriname College of Accountancy
Exam training
29
 A1-101 (A)
D) is the correct answer.
Justification:
 A. Process narratives may not be current or complete and may not reflect the actual
process in operation.
 B. Inquiry can be used to understand the controls in a process only if it is
accompanied by verification of evidence.
 C. Repcrformance is used to evaluate the operating effectiveness of the control
rather than the design of the control.
 D. Walk-throughs involve a combination of inquiry and inspection of evidence
with respect to business process controls. This is the most effective basis for
evaluation of the design of the control as it actually exists.
Suriname College of Accountancy
Exam training
30
A1-3 (Q) Audit plan
An IS auditor is developing an audit plan for a repeat client. The IS auditor
reviews the prior-year audit plan and finds that the previous plan was
designed to review the company's network and email systems, which were
newly implemented last year, but the plan did not include reviewing the e-
commerce web server. The company IT manager indicates that this year the
organization prefers to focus the audit on a newly-implemented enterprise
resource planning (ERP) application. How should the IS auditor respond?
A. Audit the new ERP application as requested by the IT manager.
B. Audit the e-commerce server because it was not audited last year.
C. Determine the highest-risk systems and plan the audit based on the results.
D. Audit both the e-commerce server and the ERP application.
Suriname College of Accountancy
Exam training
31
A1-3 (A)
 C is the correct answer.
Justification:
 A. Auditing the new enterprise resource planning (ERP) application does not reflect a risk-based approach.
Although ERP systems typically contain sensitive data and may present risk of data loss or disclosure to the
organization, without a risk assessment, the decision to solely audit the ERP system is not a risk-based
decision.
 B. Auditing the e-commerce server because it was not audited last year does not reflect a risk-based
approach. In addition, the IT manager may know about problems with the e-commerce server and may be
intentionally trying to steer the audit away from that vulnerable area. Although at first glance e-commcrce
may seem to be the most risky area, an assessment must be conducted rather than relying on the judgment
of the IS auditor or IT manager.
 C. The best course of action is to conduct a risk assessment and design the audit plan to cover the areas
of highest risk. ISACA IS Audit and Assurance Standard 1202 (Risk Assessment in Planning), statement
1202.1: "The IS audit and assurance function shall use an appropriate risk assessment approach and
supporting methodology to develop the overall IS audit plan and determine priorities for the effective
allocation of IS audit resources."
 D. The creation of the audit plan should be performed in cooperation with management and based on risk.
The IS auditor should not arbitrarily decide on what needs to be audited.
Suriname College of Accountancy
ISACA IT AUDIT AND ASSURANCE
STANDARDS AND GUIDELINES
CISA Domain 1: The process of IS Auditing
32
Suriname College of Accountancy
ISACA Code of Professional Ethics (1)
33
Members and ISACA certification holders shall (to be cont’d):
1. Support the implementation of, and encourage compliance
with appropriate standards, procedures and controls for
information systems.
2. Perform their duties with objectivity, due diligence and
professional care, in accordance with professional standards
and best practices.
3. Serve in the interest of stakeholders in a lawful and honest
manner, while maintaining high standards of conduct and
character, and not engage in acts discreditable to the
profession.
Suriname College of Accountancy
ISACA Code of Professional Ethics (2)
34
Members and ISACA certification holders shall (cont’d):
4. Maintain the privacy and confidentiality of information obtained in the
course of their duties unless disclosure is required by legal authority.
Such information shall not be used for personal benefit or released to
inappropriate parties.
5. Maintain competency in their respective fields and agree to undertake
only those activities that they can reasonably expect to complete with
professional competence.
6. Inform appropriate parties of the results of work performed, revealing
all significant facts known to them.
7. Support the professional education of stakeholders in enhancing their
understanding of IS security and control.
Suriname College of Accountancy
ISACA IT Audit and Assurance Standards Framework
35
The framework for the ISACA IT audit and assurance standards provides
for multiple levels as follows:
 Standards define mandatory requirements for IT audit and assurance
and reporting.
 Guidelines provide guidance in applying IT audit and assurance
standards. The IS auditor should consider them in determining how to
achieve implementation of the above standards, use professional
judgment in their application and be prepared to justify any difference.
 Tools & Techniques: Procedures provide examples of processes an IS
auditor might follow in an audit engagement. The procedure documents
provide information on how to meet the standards when completing IS
auditing work, but do not set requirements.
Suriname College of Accountancy
ISACA IS Auditing Standards
36
S1AuditCharter S9IrregularitiesandIllegal Acts
S2Independence S10ITGovernance
S3Professional EthicsandStandards S11Use ofRiskAssessmentinAuditPlanning
S4Professional Competence S12AuditMateriality
S5Planning S13Usingthe WorkofOtherExperts
S6Performance ofAuditWork S14AuditEvidence
S7Reporting S15ITControls
S8FollowupActivities S16Ecommerce
Suriname College of Accountancy
ISACA IT Audit and Assurance Guidelines
37
G1Using the Work of Other Auditors G22Businesstoconsumer (B2C) Ecommerce Review
G2Audit Evidence Requirement G23System Development Life Cycle (SDLC) Review
G3Use of ComputerAssisted Audit Techniques (CAATs) G24Internet Banking
G4Outsourcing of IS Activities to Other Organizations G25Review of Virtual Private Networks
G5Audit Charter G26Business Process Reengineering (BPR) Project Reviews
G6Materiality Concepts for Auditing Information Systems G27Mobile Computing
G7Due Professional Care G28Computer Forensics
G8Audit Documentation G29Postimplementation Review
G9Audit Considerations for Irregularities G30Competence
G10Audit Sampling G31Privacy
G11Effect of Pervasive IS Controls G32Business Continuity Plan Review From IT Perspective
G12Organizational Relationship and Independence G33General Considerations on the Use of the Internet
G13Use of Risk Assessment in Audit Planning G34Responsibility, Authority and Accountability
G14Application Systems Review G35Followup Activities
G16Effect of Third Parties on Organization's IT Controls G36Biometric Controls
G17Effect of Nonaudit Role on IS Auditor's Independence G37Configuration Management
G18IT Governance G38Access Control
G19Irregularities and Illegal Acts G39IT Organizations
G20Reporting G40Review of Security Management Practices
G21Enterprise Resource Planning (ERP) Systems Review G41Return on Security Investment (ROSI)
G42Continuous Assurance
Suriname College of Accountancy
ISACA IT Audit and Assurance Tools and Techniques
38
P1 IS Risk Assessment
P2 Digital Signatures
P3 Intrusion Detection
P4 Viruses and Other Malicious Code
P5 Control Risk Selfassessment
P6 Firewalls
P7 Irregularities and Illegal Acts
P8 Security Assessment—Penetration Testing and Vulnerability Analysis
P9 Evaluation of Management Controls Over Encryption Methodologies
P10 Business Application Change Control
P11 Electronic Funds Transfer (EFT)
Suriname College of Accountancy
Information Technology Assurance Framework
(ITAF) (1)39
 General Standards—The guiding principles under which the IT assurance
profession operates.
 Performance Standards—Deal with the conduct of the assignment.
 Reporting Standards—Address the types of reports, means of
communication and the information communicated.
 Guidelines—Provide the IT audit and assurance professional with
information and direction about an audit or assurance area.
 Tools and Techniques——Provide specific information on various
methodologies, tools and templates.
Suriname College of Accountancy
Exam training
40
A1-37 (Q) Data flow diagrams
Data flow diagrams are used by IS auditors to:
A. order data hierarchically.
B. highlight high-level data definitions.
C. graphically summarize data paths and storage.
D. portray step-by-step details of data generation.
Suriname College of Accountancy
Exam training
41
A1-37 (A)
 C is the correct answer.
Justification:
A. Data flow diagrams do not order data in a hierarchy.
B. A data dictionary may be used to document data definitions, but the data flow
diagram is used to document how data move through a process.
C. Data How diagrams are used as aids to graph or chart data flow and storage.
They trace data from their origination to destination, highlighting the paths and
storage of data.
D. The purpose of a data flow diagram is to track the movement of data through a
process and is not primarily to document or indicate how data are generated.
Suriname College of Accountancy
Exam training
42
A1-39 (Q) Organizational chart
An IS auditor reviews an organizational chart PRIMARILY for:
A. an understanding of workflows.
B. investigating various communication channels.
C. understanding the responsibilities and authority of
individuals.
D. investigating the network connected to different employees.
Suriname College of Accountancy
Exam training
43
A1-39 (A)
 C is the correct answer.
Justification:
A. A workflow diagram would provide information about the roles of different
employees. This is not the purpose of an organizational chart.
B. The organizational chart is a key tool for an auditor to understand roles and
responsibilities and reporting lines, but is not used for examining communications
channels.
C. An organizational chart provides information about the responsibilities and
authority of individuals in the organization. This helps an IS auditor to know if
there is a proper segregation of functions.
D. A network diagram will provide information about the usage of various
communication channels and will indicate the connection of users to the network.
Suriname College of Accountancy
Exam training
44
 A1-88 (Q) Independence
Which of the following responsibilities would MOST likely compromise
the independence of an IS auditor when reviewing the risk
management process?
 A. Participating in the design of the risk management framework
 B. Advising on different implementation techniques
 C. Facilitating risk awareness training
 D. Performing a due diligence review of the risk management
processes
Suriname College of Accountancy
Exam training
45
 A1-88 (A)
A is the correct answer.
Justification:
 A. Participating in the design of the risk management framework involves
designing controls, which will compromise the independence of the IS auditor to
audit the risk management process.
 B. Advising on different implementation techniques will not compromise the IS
auditor's independence because the IS auditor will not be involved in the decision-
making process.
 C. Facilitating awareness training will not hamper the IS auditor's independence
because the auditor will not be involved in the decision-making process.
 D. Due diligence reviews are a type of audit generally related to mergers and
acquisitions.
Suriname College of Accountancy
CYRIL.SOERI@TAH.SR / GREGORY.TAI-APIN@BNETS.SR
MOB: 719 00 47 / 89 29 293
SURINAME COLLEGE OF ACCOUNTANCY
FLUSTRAAT 35
PARAMARIBO, SURINAME
TEL +597 - 531 330 / 531 350
FAX +597 - 531 340
WEBSITE: SURINAMECOLLEGEOFACCOUNTANCY.COM
46
Q&A

More Related Content

What's hot

CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
ShivamSharma909
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
Salih Islam
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
Mahesh Patwardhan
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
Damilola Mosaku
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
CISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | Infosectrain
InfosecTrain
 
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
InfosecTrain
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
Hafiz Sheikh Adnan Ahmed
 
Cisa domain 3
Cisa domain 3Cisa domain 3
Cisa domain 3
ShivamSharma909
 
03.1 general control
03.1 general control03.1 general control
03.1 general controlMulyadi Yusuf
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
Cicero Ray Rufino
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
Hafiz Sheikh Adnan Ahmed
 
IT Governance
IT GovernanceIT Governance
IT Governance
Carlos Chalico
 
Cisa domain 4
Cisa domain 4Cisa domain 4
Cisa domain 4
ShivamSharma909
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
Jayesh Daga
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
Mufaddal Nullwala
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
Muhammad Azmy
 

What's hot (20)

CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
CISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | Infosectrain
 
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
 
Cisa domain 3
Cisa domain 3Cisa domain 3
Cisa domain 3
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
Cisa domain 4
Cisa domain 4Cisa domain 4
Cisa domain 4
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 

Similar to CISA Domain 1 - IS Auditing (day 1)

Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Development
essbaih
 
e - Audit
e - Audite - Audit
e - Audit
MohanRajR33
 
Auditing concept
Auditing conceptAuditing concept
Auditing concept
Ganesh Sharma
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
David Julian
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Sharing Slides Training
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
sharing notes123
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templates
IT-Toolkits.org
 
IT-Governance.pptx
IT-Governance.pptxIT-Governance.pptx
IT-Governance.pptx
JayLloyd8
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
Maher Manan
 
Ch2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdfCh2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdf
DanteHayashi
 
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.pptPPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
KumarNatarajan24
 
Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9
Sazzad Hossain, ITP, MBA, CSCA™
 
module_1.pptx
module_1.pptxmodule_1.pptx
module_1.pptx
ssuser432862
 
Qi Consulting Services 2009
Qi Consulting Services 2009Qi Consulting Services 2009
Qi Consulting Services 2009
Carlos Amoranto
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
Laura Perry
 
A Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information SystemA Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information System
ijsrd.com
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
novita dewi
 

Similar to CISA Domain 1 - IS Auditing (day 1) (20)

Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Development
 
e - Audit
e - Audite - Audit
e - Audit
 
Auditing concept
Auditing conceptAuditing concept
Auditing concept
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templates
 
IT-Governance.pptx
IT-Governance.pptxIT-Governance.pptx
IT-Governance.pptx
 
It Audit
It AuditIt Audit
It Audit
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Ch2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdfCh2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdf
 
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.pptPPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
 
Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9
 
module_1.pptx
module_1.pptxmodule_1.pptx
module_1.pptx
 
Qi Consulting Services 2009
Qi Consulting Services 2009Qi Consulting Services 2009
Qi Consulting Services 2009
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Profile_Kishore Sundar
Profile_Kishore SundarProfile_Kishore Sundar
Profile_Kishore Sundar
 
A Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information SystemA Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information System
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
 

More from Cyril Soeri

Suriname ICT Vision 2020 by ICT Associatie Suriname June 2015
Suriname ICT Vision 2020 by ICT Associatie Suriname June 2015Suriname ICT Vision 2020 by ICT Associatie Suriname June 2015
Suriname ICT Vision 2020 by ICT Associatie Suriname June 2015Cyril Soeri
 
Financial Professional in Suriname
Financial Professional in SurinameFinancial Professional in Suriname
Financial Professional in SurinameCyril Soeri
 
Crowdfunding presention 13.07.16
Crowdfunding presention 13.07.16Crowdfunding presention 13.07.16
Crowdfunding presention 13.07.16Cyril Soeri
 
Presentation - Sustainability reporting (2016) NL
Presentation - Sustainability reporting (2016) NLPresentation - Sustainability reporting (2016) NL
Presentation - Sustainability reporting (2016) NLCyril Soeri
 
Doorlichting van de Financiele Administratie
Doorlichting van de Financiele AdministratieDoorlichting van de Financiele Administratie
Doorlichting van de Financiele AdministratieCyril Soeri
 
Presentatie ICT-AS Vision 2020 d.d. 3.7.15
Presentatie ICT-AS Vision 2020 d.d. 3.7.15Presentatie ICT-AS Vision 2020 d.d. 3.7.15
Presentatie ICT-AS Vision 2020 d.d. 3.7.15Cyril Soeri
 
presentatie Management letter (basic)
presentatie Management letter (basic)presentatie Management letter (basic)
presentatie Management letter (basic)Cyril Soeri
 
PPD overzicht activiteiten 2012
PPD overzicht activiteiten 2012PPD overzicht activiteiten 2012
PPD overzicht activiteiten 2012Cyril Soeri
 
ICT Association Suriname's Vision 2020
ICT Association Suriname's Vision 2020ICT Association Suriname's Vision 2020
ICT Association Suriname's Vision 2020
Cyril Soeri
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
Cyril Soeri
 
SUVA - Financial Reporting Act - July 2014 (Dutch)
SUVA - Financial Reporting Act - July 2014 (Dutch)SUVA - Financial Reporting Act - July 2014 (Dutch)
SUVA - Financial Reporting Act - July 2014 (Dutch)
Cyril Soeri
 
IFRS for SME update ICAC June 2014 Andrew Brathwaithe and Cyril Soeri
IFRS for SME update ICAC June 2014 Andrew Brathwaithe and Cyril Soeri IFRS for SME update ICAC June 2014 Andrew Brathwaithe and Cyril Soeri
IFRS for SME update ICAC June 2014 Andrew Brathwaithe and Cyril Soeri
Cyril Soeri
 
Seminar Electronische Transacties Wet
Seminar Electronische Transacties Wet Seminar Electronische Transacties Wet
Seminar Electronische Transacties Wet
Cyril Soeri
 
Due Diligence And Liability For Non Executive Board Members
Due Diligence And Liability For Non Executive Board MembersDue Diligence And Liability For Non Executive Board Members
Due Diligence And Liability For Non Executive Board Members
Cyril Soeri
 
ICT Association Suriname Presentation On eGovernment 2012
ICT Association Suriname Presentation On eGovernment 2012ICT Association Suriname Presentation On eGovernment 2012
ICT Association Suriname Presentation On eGovernment 2012
Cyril Soeri
 
ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012
Cyril Soeri
 
Presentation IFRS Seminar 2011 IFRS Compliance Analysis Suriname
Presentation IFRS Seminar 2011   IFRS Compliance Analysis SurinamePresentation IFRS Seminar 2011   IFRS Compliance Analysis Suriname
Presentation IFRS Seminar 2011 IFRS Compliance Analysis Suriname
Cyril Soeri
 
Presentation IFRS Seminar 2011 - World Bank Mission 26 May 2011
Presentation IFRS Seminar 2011 - World Bank Mission 26 May 2011Presentation IFRS Seminar 2011 - World Bank Mission 26 May 2011
Presentation IFRS Seminar 2011 - World Bank Mission 26 May 2011Cyril Soeri
 
Presentation IFRS Seminar 2011 Suriname: Situational And Needs Analysis
Presentation IFRS Seminar 2011   Suriname: Situational And Needs AnalysisPresentation IFRS Seminar 2011   Suriname: Situational And Needs Analysis
Presentation IFRS Seminar 2011 Suriname: Situational And Needs Analysis
Cyril Soeri
 

More from Cyril Soeri (19)

Suriname ICT Vision 2020 by ICT Associatie Suriname June 2015
Suriname ICT Vision 2020 by ICT Associatie Suriname June 2015Suriname ICT Vision 2020 by ICT Associatie Suriname June 2015
Suriname ICT Vision 2020 by ICT Associatie Suriname June 2015
 
Financial Professional in Suriname
Financial Professional in SurinameFinancial Professional in Suriname
Financial Professional in Suriname
 
Crowdfunding presention 13.07.16
Crowdfunding presention 13.07.16Crowdfunding presention 13.07.16
Crowdfunding presention 13.07.16
 
Presentation - Sustainability reporting (2016) NL
Presentation - Sustainability reporting (2016) NLPresentation - Sustainability reporting (2016) NL
Presentation - Sustainability reporting (2016) NL
 
Doorlichting van de Financiele Administratie
Doorlichting van de Financiele AdministratieDoorlichting van de Financiele Administratie
Doorlichting van de Financiele Administratie
 
Presentatie ICT-AS Vision 2020 d.d. 3.7.15
Presentatie ICT-AS Vision 2020 d.d. 3.7.15Presentatie ICT-AS Vision 2020 d.d. 3.7.15
Presentatie ICT-AS Vision 2020 d.d. 3.7.15
 
presentatie Management letter (basic)
presentatie Management letter (basic)presentatie Management letter (basic)
presentatie Management letter (basic)
 
PPD overzicht activiteiten 2012
PPD overzicht activiteiten 2012PPD overzicht activiteiten 2012
PPD overzicht activiteiten 2012
 
ICT Association Suriname's Vision 2020
ICT Association Suriname's Vision 2020ICT Association Suriname's Vision 2020
ICT Association Suriname's Vision 2020
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
SUVA - Financial Reporting Act - July 2014 (Dutch)
SUVA - Financial Reporting Act - July 2014 (Dutch)SUVA - Financial Reporting Act - July 2014 (Dutch)
SUVA - Financial Reporting Act - July 2014 (Dutch)
 
IFRS for SME update ICAC June 2014 Andrew Brathwaithe and Cyril Soeri
IFRS for SME update ICAC June 2014 Andrew Brathwaithe and Cyril Soeri IFRS for SME update ICAC June 2014 Andrew Brathwaithe and Cyril Soeri
IFRS for SME update ICAC June 2014 Andrew Brathwaithe and Cyril Soeri
 
Seminar Electronische Transacties Wet
Seminar Electronische Transacties Wet Seminar Electronische Transacties Wet
Seminar Electronische Transacties Wet
 
Due Diligence And Liability For Non Executive Board Members
Due Diligence And Liability For Non Executive Board MembersDue Diligence And Liability For Non Executive Board Members
Due Diligence And Liability For Non Executive Board Members
 
ICT Association Suriname Presentation On eGovernment 2012
ICT Association Suriname Presentation On eGovernment 2012ICT Association Suriname Presentation On eGovernment 2012
ICT Association Suriname Presentation On eGovernment 2012
 
ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012
 
Presentation IFRS Seminar 2011 IFRS Compliance Analysis Suriname
Presentation IFRS Seminar 2011   IFRS Compliance Analysis SurinamePresentation IFRS Seminar 2011   IFRS Compliance Analysis Suriname
Presentation IFRS Seminar 2011 IFRS Compliance Analysis Suriname
 
Presentation IFRS Seminar 2011 - World Bank Mission 26 May 2011
Presentation IFRS Seminar 2011 - World Bank Mission 26 May 2011Presentation IFRS Seminar 2011 - World Bank Mission 26 May 2011
Presentation IFRS Seminar 2011 - World Bank Mission 26 May 2011
 
Presentation IFRS Seminar 2011 Suriname: Situational And Needs Analysis
Presentation IFRS Seminar 2011   Suriname: Situational And Needs AnalysisPresentation IFRS Seminar 2011   Suriname: Situational And Needs Analysis
Presentation IFRS Seminar 2011 Suriname: Situational And Needs Analysis
 

CISA Domain 1 - IS Auditing (day 1)

  • 1. Suriname College of Accountancy CISA DOMAIN 1: THE PROCESS OF AUDITING INFORMATION SYSTEMS 1 Cyril Soeri MA RA CISA CIS LI Gregory Tai-Apin CISA CIS LI COBIT Foundation Day 1
  • 2. Suriname College of Accountancy CISA Program 2 The CISA program consists of the following five domains: 1. The Process of Auditing Information Systems (3 -26 Feb 2015); 2. Governance and Management of IT (17 March – 9 Apr 2015); 3. Information Systems Acquisition, Development and Implementation (28 Apr – 21 May 2015); 4. Information Systems Operations, Maintenance and Support (11 Jun – 2 Jul 2015); 5. Protection of Information Systems (21 Jul – 13 Aug 2015).  September 2015: expected early registration date for CISA exam  Exam training sessions: 5 Oct – 9 Oct (daily sessions)  CISA Exam in December 2015
  • 3. Suriname College of Accountancy Program of Domain 1 (1a) 3 DAY 1 The Process of Auditing Information Systems  The universe of an IT auditor  The ISACA route  Management of the IS Audit Function  Organization of the IS audit function  Audit Planning
  • 4. Suriname College of Accountancy Program of Domain 1 (1b) 4 DAY 1 (Cont’d): The Process of Auditing Information Systems  ISACA IT audit and Assurance Standards and Guidelines  ISACA Code of Professional Ethics  ISACA IT Audit and Assurance Standards Framework  Auditing Standards  ISACA IT Audit and Assurance Guidelines  ISACA IT Audit and Assurance Tools and Techniques  Information Technology Assurance Framework (ITAF)
  • 5. Suriname College of Accountancy Program of Domain 1 (2) 5 DAY 2 The Process of Auditing Information Systems (cont’d)  Risk Analysis  Internal Controls  Internal Control Objectives  IS Control Objectives  COBIT  General Controls  IS Controls
  • 6. Suriname College of Accountancy Program of Domain 1 (3) 6 DAY 3 The Process of Auditing Information Systems (cont’d)  Performing an IS Audit (1):  Classification of Audits  Audit Programs  Audit Methodology  Fraud Detection
  • 7. Suriname College of Accountancy Program of Domain 1 (4) 7 Day 4 The Process of Auditing Information Systems (cont’d)  Performing an IS Audit (2):  Risk-based Auditing  Audit Risk and Materiality  Assessing & Treating Risks  Risk Assessment Techniques
  • 8. Suriname College of Accountancy Program of Domain 1 (5) 8 Day 5 The Process of Auditing Information Systems (cont’d)  Performing an IS Audit (3):  Audit Objectives  Compliance versus Substantive Testing  Audit Evidence  Interviewing and Observing Personnel in Performance of their Duties  Sampling
  • 9. Suriname College of Accountancy Program of Domain 1 (6) 9 DAY 7 The Process of Auditing Information Systems (cont’d)  Performing an IS Audit (5):  Using Services of Other Auditors and Experts  Computer-Assisted Audit Techniques  Evaluation of Strengths and Weaknesses  Communicating Audit Results  Management Implementation of Recommendations  Audit Documentation
  • 10. Suriname College of Accountancy Program of Domain 1 (7) 10 DAY 8 The Process of Auditing Information Systems (cont’d)  Control Self-assessment (CSA)  Objectives  Benefits  Disadvantages  Auditor Role in CSA  Technology drivers for CSA  Traditional vs. CSA approach
  • 11. Suriname College of Accountancy Program of Domain 1 (8) 11 DAY 8 The Process of Auditing Information Systems (cont’d)  The evolving IS Audit Process  Integrated audit  Continuous auditing  Exam training  CISA’s road ahead  Closing session
  • 12. Suriname College of Accountancy OVERVIEW CISA Domain 1: The process of IS Auditing 12
  • 13. Suriname College of Accountancy Learning objectives 13 There are five tasks within the domain covering the process of auditing information systems: 1. Develop and implement a risk-based IT audit strategy in compliance with IT audit standards to ensure that key areas are included. 2. Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization. 3. Conduct audits in accordance with IT audit standards to achieve planned audit objectives. 4. Report audit findings and make recommendations to key stakeholders to communicate results and effect change when necessary. 5. Conduct follow-ups or prepare status reports to ensure that appropriate actions have been taken by management in a timely manner.
  • 14. Suriname College of Accountancy MANAGEMENT OF THE IS AUDIT FUNCTION CISA Domain 1: The process of IS Auditing 14
  • 15. Suriname College of Accountancy Organization of the IS Audit function 15  Internal IS Audit services:  Audit charter approved by senior management;  External IS Audit services:  Formal contract or statement of work
  • 16. Suriname College of Accountancy Exam training 16 A1-15 (Q) Audit charter An audit charter should: A. be dynamic and change often to coincide with the changing nature of technology and the audit profession. B. clearly state audit objectives for, and the delegation of, authority to the maintenance and review of internal controls. C. document the audit procedures designed to achieve the planned audit objectives. D. outline the overall authority, scope and responsibilities of the audit function.
  • 17. Suriname College of Accountancy Exam training 17 A1-15 (A)  D) is the correct answer. Justification: A. The audit charter should not be subject to changes in technology and should not significantly change over time. The chartcr should be approved at the highest level of management. B. An audit chartcr will state the authority and reporting requirements for the audit, but not the details of maintenance of internal controls. C. An audit charter would not be at a detailed level and, therefore, would not include specific audit objectives or procedures. D). An audit charter should state management's objectives for and delegation of authority to IS auditors.
  • 18. Suriname College of Accountancy Exam training 18  A1-72 (Q) IS audit charter An organization's IS audit charter should specify the: A. short- and long-term plans for IS audit engagements. B. objectives and scope of IS audit engagements. C. detailed training plan for the IS audit staff. D. role of the IS audit function.
  • 19. Suriname College of Accountancy Exam training 19  A1-72 (A) D is the correct answer. Justification:  A. Short-term and long-term planning is the responsibility of audit management.  B. The objectives and scope of each IS audit should be agreed on in an engagement letter. The charter would spccify the objectives and scope of the audit function but not of individual engagements.  C. A training plan, based on the audit plan, should be developed by audit management.  D). An IS audit charter establishes the role of the information systems audit function. The charter should describe the overall authority, scope and responsibilities of the audit function. It should be approved by the highest level of management and, if available, by the audit committee.
  • 20. Suriname College of Accountancy IS Audit Resource Management 20  Professional competence through continuing professional education (CPE);  Necessary IT resources to properly perform IS audits of a highly specialized nature (e.g., tools, methodology, work programs).
  • 21. Suriname College of Accountancy Audit planning (1) 21  Annual planning:  Short term – audit issues to be covered;  Long term – changes in IT strategic direction;  Individual Audit assignments – considerations:  the results of periodic risk assessments,  changes in the application of technology,  evolving privacy issues and regulatory requirements,  system implementation/upgrade deadlines,  current and future technologies,  requirements from business process owners,  IS resource limitations.
  • 22. Suriname College of Accountancy Audit planning (2) 22 To perform audit planning, the IS auditor should perform the following steps: 1. Gain an understanding of the business's mission, objectives, purpose and processes, which include information and processing requirements such as availability, integrity, security and business technology, and information confidentiality. 2. Identify stated contents such as policies, standards and required guidelines, procedures and organization structure. 3. Perform a risk analysis to help in designing the audit plan. 4. Set the audit scope and audit objectives. 5. Develop the audit approach or audit strategy. 6. Assign personnel resources to the audit. 7. Address engagement logistics.
  • 23. Suriname College of Accountancy Effect of laws and regulation on IS Audit planning (1)23  The contents of IS legal regulations regard:  Establishment of the regulatory requirements  Organization of the regulatory requirements  Responsibilities assigned to the corresponding entities  Correlation to financial, operational and IT audit functions  There are two major areas of concern:  legal requirements placed on audit or IS audit;  legal requirements placed on the auditee and its systems, data management, reporting, etc.
  • 24. Suriname College of Accountancy Effect of laws and regulation on IS Audit planning (2)24 The following are steps an IS auditor would perform to determine an organization's level of compliance with external requirements (to be continued):  Identify those government or other relevant external requirements dealing with:  Electronic data, personal data, copyrights, e-commerce, e-signatures, etc.  Computer system practices and controls  The manner in which computers, programs and data are stored  The organization or the activities of information technology services  IS audits
  • 25. Suriname College of Accountancy Effect of laws and regulation on IS Audit planning (3)25 Steps to determine an organization's level of compliance (cont’d):  Document applicable laws and regulations;  Assess whether the management of the organization and the IS function have considered the relevant external requirements in making plans and in setting policies, standards and procedures, as well as business application features;  Review internal IS department/function/activity documents that address adherence to laws applicable to the industry;  Determine adherence to established procedures that address these requirements;  Determine if there are procedures in place to ensure contracts or agreements with external IT services providers reflect any legal requirements related to responsibilities;
  • 26. Suriname College of Accountancy Exam training 26  A1-99 (Q) Planning The effect of which of the following should have priority in planning the scope and objectives of an IS audit:  A. Applicable statutory requirements  B. Applicable corporate standards  C. Applicable industry best practices  D. Organizational policies and procedures
  • 27. Suriname College of Accountancy Exam training 27  A1-99 (A) A is the correct answer. Justification:  A. The effect of applicable statutory requirements must be factored in while planning an IS audit— the IS auditor has no options in this respect because there can be no limitation of scope in respect to statutory requirements.  B. Statutory requirements always take priority over corporate standards.  C. Industry best practices help plan an audit; however, best practices are not mandatory and can be deviated from to meet organization objectives.  D. Organizational policies and procedures arc important, but statutory requirements always take priority. Organizational policies must be in alignment with statutory requirements.
  • 28. Suriname College of Accountancy Exam training 28  A1-101 (Q) Planning An IS auditor is planning to evaluate the control design effectiveness related to an automated billing process. Which of the following is the MOST effective approach for the auditor to adopt?  A. Process narrative  B. Inquiry  C. Reperformance  D. Walk-through
  • 29. Suriname College of Accountancy Exam training 29  A1-101 (A) D) is the correct answer. Justification:  A. Process narratives may not be current or complete and may not reflect the actual process in operation.  B. Inquiry can be used to understand the controls in a process only if it is accompanied by verification of evidence.  C. Repcrformance is used to evaluate the operating effectiveness of the control rather than the design of the control.  D. Walk-throughs involve a combination of inquiry and inspection of evidence with respect to business process controls. This is the most effective basis for evaluation of the design of the control as it actually exists.
  • 30. Suriname College of Accountancy Exam training 30 A1-3 (Q) Audit plan An IS auditor is developing an audit plan for a repeat client. The IS auditor reviews the prior-year audit plan and finds that the previous plan was designed to review the company's network and email systems, which were newly implemented last year, but the plan did not include reviewing the e- commerce web server. The company IT manager indicates that this year the organization prefers to focus the audit on a newly-implemented enterprise resource planning (ERP) application. How should the IS auditor respond? A. Audit the new ERP application as requested by the IT manager. B. Audit the e-commerce server because it was not audited last year. C. Determine the highest-risk systems and plan the audit based on the results. D. Audit both the e-commerce server and the ERP application.
  • 31. Suriname College of Accountancy Exam training 31 A1-3 (A)  C is the correct answer. Justification:  A. Auditing the new enterprise resource planning (ERP) application does not reflect a risk-based approach. Although ERP systems typically contain sensitive data and may present risk of data loss or disclosure to the organization, without a risk assessment, the decision to solely audit the ERP system is not a risk-based decision.  B. Auditing the e-commerce server because it was not audited last year does not reflect a risk-based approach. In addition, the IT manager may know about problems with the e-commerce server and may be intentionally trying to steer the audit away from that vulnerable area. Although at first glance e-commcrce may seem to be the most risky area, an assessment must be conducted rather than relying on the judgment of the IS auditor or IT manager.  C. The best course of action is to conduct a risk assessment and design the audit plan to cover the areas of highest risk. ISACA IS Audit and Assurance Standard 1202 (Risk Assessment in Planning), statement 1202.1: "The IS audit and assurance function shall use an appropriate risk assessment approach and supporting methodology to develop the overall IS audit plan and determine priorities for the effective allocation of IS audit resources."  D. The creation of the audit plan should be performed in cooperation with management and based on risk. The IS auditor should not arbitrarily decide on what needs to be audited.
  • 32. Suriname College of Accountancy ISACA IT AUDIT AND ASSURANCE STANDARDS AND GUIDELINES CISA Domain 1: The process of IS Auditing 32
  • 33. Suriname College of Accountancy ISACA Code of Professional Ethics (1) 33 Members and ISACA certification holders shall (to be cont’d): 1. Support the implementation of, and encourage compliance with appropriate standards, procedures and controls for information systems. 2. Perform their duties with objectivity, due diligence and professional care, in accordance with professional standards and best practices. 3. Serve in the interest of stakeholders in a lawful and honest manner, while maintaining high standards of conduct and character, and not engage in acts discreditable to the profession.
  • 34. Suriname College of Accountancy ISACA Code of Professional Ethics (2) 34 Members and ISACA certification holders shall (cont’d): 4. Maintain the privacy and confidentiality of information obtained in the course of their duties unless disclosure is required by legal authority. Such information shall not be used for personal benefit or released to inappropriate parties. 5. Maintain competency in their respective fields and agree to undertake only those activities that they can reasonably expect to complete with professional competence. 6. Inform appropriate parties of the results of work performed, revealing all significant facts known to them. 7. Support the professional education of stakeholders in enhancing their understanding of IS security and control.
  • 35. Suriname College of Accountancy ISACA IT Audit and Assurance Standards Framework 35 The framework for the ISACA IT audit and assurance standards provides for multiple levels as follows:  Standards define mandatory requirements for IT audit and assurance and reporting.  Guidelines provide guidance in applying IT audit and assurance standards. The IS auditor should consider them in determining how to achieve implementation of the above standards, use professional judgment in their application and be prepared to justify any difference.  Tools & Techniques: Procedures provide examples of processes an IS auditor might follow in an audit engagement. The procedure documents provide information on how to meet the standards when completing IS auditing work, but do not set requirements.
  • 36. Suriname College of Accountancy ISACA IS Auditing Standards 36 S1AuditCharter S9IrregularitiesandIllegal Acts S2Independence S10ITGovernance S3Professional EthicsandStandards S11Use ofRiskAssessmentinAuditPlanning S4Professional Competence S12AuditMateriality S5Planning S13Usingthe WorkofOtherExperts S6Performance ofAuditWork S14AuditEvidence S7Reporting S15ITControls S8FollowupActivities S16Ecommerce
  • 37. Suriname College of Accountancy ISACA IT Audit and Assurance Guidelines 37 G1Using the Work of Other Auditors G22Businesstoconsumer (B2C) Ecommerce Review G2Audit Evidence Requirement G23System Development Life Cycle (SDLC) Review G3Use of ComputerAssisted Audit Techniques (CAATs) G24Internet Banking G4Outsourcing of IS Activities to Other Organizations G25Review of Virtual Private Networks G5Audit Charter G26Business Process Reengineering (BPR) Project Reviews G6Materiality Concepts for Auditing Information Systems G27Mobile Computing G7Due Professional Care G28Computer Forensics G8Audit Documentation G29Postimplementation Review G9Audit Considerations for Irregularities G30Competence G10Audit Sampling G31Privacy G11Effect of Pervasive IS Controls G32Business Continuity Plan Review From IT Perspective G12Organizational Relationship and Independence G33General Considerations on the Use of the Internet G13Use of Risk Assessment in Audit Planning G34Responsibility, Authority and Accountability G14Application Systems Review G35Followup Activities G16Effect of Third Parties on Organization's IT Controls G36Biometric Controls G17Effect of Nonaudit Role on IS Auditor's Independence G37Configuration Management G18IT Governance G38Access Control G19Irregularities and Illegal Acts G39IT Organizations G20Reporting G40Review of Security Management Practices G21Enterprise Resource Planning (ERP) Systems Review G41Return on Security Investment (ROSI) G42Continuous Assurance
  • 38. Suriname College of Accountancy ISACA IT Audit and Assurance Tools and Techniques 38 P1 IS Risk Assessment P2 Digital Signatures P3 Intrusion Detection P4 Viruses and Other Malicious Code P5 Control Risk Selfassessment P6 Firewalls P7 Irregularities and Illegal Acts P8 Security Assessment—Penetration Testing and Vulnerability Analysis P9 Evaluation of Management Controls Over Encryption Methodologies P10 Business Application Change Control P11 Electronic Funds Transfer (EFT)
  • 39. Suriname College of Accountancy Information Technology Assurance Framework (ITAF) (1)39  General Standards—The guiding principles under which the IT assurance profession operates.  Performance Standards—Deal with the conduct of the assignment.  Reporting Standards—Address the types of reports, means of communication and the information communicated.  Guidelines—Provide the IT audit and assurance professional with information and direction about an audit or assurance area.  Tools and Techniques——Provide specific information on various methodologies, tools and templates.
  • 40. Suriname College of Accountancy Exam training 40 A1-37 (Q) Data flow diagrams Data flow diagrams are used by IS auditors to: A. order data hierarchically. B. highlight high-level data definitions. C. graphically summarize data paths and storage. D. portray step-by-step details of data generation.
  • 41. Suriname College of Accountancy Exam training 41 A1-37 (A)  C is the correct answer. Justification: A. Data flow diagrams do not order data in a hierarchy. B. A data dictionary may be used to document data definitions, but the data flow diagram is used to document how data move through a process. C. Data How diagrams are used as aids to graph or chart data flow and storage. They trace data from their origination to destination, highlighting the paths and storage of data. D. The purpose of a data flow diagram is to track the movement of data through a process and is not primarily to document or indicate how data are generated.
  • 42. Suriname College of Accountancy Exam training 42 A1-39 (Q) Organizational chart An IS auditor reviews an organizational chart PRIMARILY for: A. an understanding of workflows. B. investigating various communication channels. C. understanding the responsibilities and authority of individuals. D. investigating the network connected to different employees.
  • 43. Suriname College of Accountancy Exam training 43 A1-39 (A)  C is the correct answer. Justification: A. A workflow diagram would provide information about the roles of different employees. This is not the purpose of an organizational chart. B. The organizational chart is a key tool for an auditor to understand roles and responsibilities and reporting lines, but is not used for examining communications channels. C. An organizational chart provides information about the responsibilities and authority of individuals in the organization. This helps an IS auditor to know if there is a proper segregation of functions. D. A network diagram will provide information about the usage of various communication channels and will indicate the connection of users to the network.
  • 44. Suriname College of Accountancy Exam training 44  A1-88 (Q) Independence Which of the following responsibilities would MOST likely compromise the independence of an IS auditor when reviewing the risk management process?  A. Participating in the design of the risk management framework  B. Advising on different implementation techniques  C. Facilitating risk awareness training  D. Performing a due diligence review of the risk management processes
  • 45. Suriname College of Accountancy Exam training 45  A1-88 (A) A is the correct answer. Justification:  A. Participating in the design of the risk management framework involves designing controls, which will compromise the independence of the IS auditor to audit the risk management process.  B. Advising on different implementation techniques will not compromise the IS auditor's independence because the IS auditor will not be involved in the decision- making process.  C. Facilitating awareness training will not hamper the IS auditor's independence because the auditor will not be involved in the decision-making process.  D. Due diligence reviews are a type of audit generally related to mergers and acquisitions.
  • 46. Suriname College of Accountancy CYRIL.SOERI@TAH.SR / GREGORY.TAI-APIN@BNETS.SR MOB: 719 00 47 / 89 29 293 SURINAME COLLEGE OF ACCOUNTANCY FLUSTRAAT 35 PARAMARIBO, SURINAME TEL +597 - 531 330 / 531 350 FAX +597 - 531 340 WEBSITE: SURINAMECOLLEGEOFACCOUNTANCY.COM 46 Q&A