SlideShare a Scribd company logo
IT
AUDIT
2
What is IT Audit?
⮚ An Information Technology (IT) audit is an audit of an
organization's IT systems, management, operations and
related processes.
⮚ An IT audit may be carried out in connection with a
financial regularity audit or selective audit. As the records,
services and operations of many organizations are often
highly computerized, there is a need to evaluate the IT
controls in the course of an audit of these organizations.
https://www.ago.gov.sg/docs/default-source/brochure/197b4897-87d6-477d-9bc2-d06afa225a41.pdf
3
Types of Audits:
Compliance audit - This is an
examination of the policies and procedures
of an entity or department, to see if it is in
compliance with internal or regulatory
standards. This audit is most commonly
used in regulated industries or educational
institutions.
Financial audit - This is an analysis of the
fairness of the information contained within
an entity's financial statements. It is
conducted by a CPA firm, which is
independent of the entity under review.
This is the most commonly conducted type
of audit.
4
Information systems audit - This
involves a review of the controls over
software development, data processing,
and access to computer systems. The
intent is to spot any issues that could
impair the ability of IT systems to provide
accurate information to users, as well as to
ensure that unauthorized parties do not
have access to the data
Operational audit - This is a detailed
analysis of the goals, planning processes,
procedures, and results of the operations
of a business. The audit may be conducted
internally or by an external entity. The
intended result is an evaluation of
operations, likely with recommendations
for improvement.
5
The objectives of IT audits include:
❑ Evaluating the reliability of data from IT systems which
have an impact on the financial statements of the
organizations.
❑ Ascertaining the level of compliance with the applicable
laws, policies and standards in relation to IT.
❑ Checking if there are instances of excess, extravagance,
gross inefficiency tantamount to waste in the use and
management of IT systems.
Why is IT Audit important?
Many organizations are spending
large amounts of money on IT because
they recognize the tremendous benefits
that IT can bring to their operations and
services. However, they need to ensure
that their IT systems are reliable, secure
and not vulnerable to computer attacks.
7
• IT audit is important because it gives
assurance that the IT systems are adequately
protected, provide reliable information to users
and properly managed to achieve their intended
benefits.
8
• Many users rely on IT without knowing
how the computers work. A computer error
could be repeated indefinitely, causing
more extensive damage than a human
mistake.
• IT audit could also help to reduce risks
of data tampering, data loss or leakage,
service disruption, and poor management
of IT systems.
9
How is IT Audit carried out?
Generally, IT audit is carried out as follows:
1. Establish the IT audit objectives and scope.
2. Develop an audit plan to achieve the IT audit objectives.
3. Gather information on the relevant IT controls and
evaluate them.
4. Perform audit tests, using Computer-Assisted Audit
Techniques (CAATs) such as data extraction and analysis
software or test data, where appropriate.
5. Report on the IT audit findings.
10
• In performing its IT audits, the Auditor-
General’s Office (AGO) also checks for compliance
with the Government policies, standards, laws and
regulations on information and related technology.
• Where appropriate, AGO uses the IT audit tools,
technical guides and other resources recommended
by ISACA (Information Systems Audit & Control
Association), and encourages staff to be certified as
CISA (Certified Information Systems Auditor).
11
IT Audit Process – Real-life
Example
“The auditor here has come and
gone. We don’t have the report yet –
but the things they were looking for
relate directly to the security and
integrity of the accounting and
supporting systems. Who has access
to what – how are usernames and
passwords and associated rights
assigned and reviewed (logical
security), also extending the security
of data exchanged between systems.
12
❑They also want to see that we have periodic reviews
of security and user rights in the accounting and
related systems. They are also interested in reports
generated using tools external to the accounting
system – like Crystal reports. Here, they want to see
integrity, management, and oversight in the
development and maintenance of those reports.
13
❑ Change management was also a focus – they want to see
evidence and documentation of plans for testing,
implementation, training, and the like for updates and
changes to key systems. The auditor also wanted
information on software and processes that feed
information into our accounting system – such as
timecard and production reporting. Unlike previous visits
from our auditors, there were no questions about backup,
disaster planning, or physical security. The auditor said
this would only be a focus if there were data breaches or
losses that raised a flag, and perhaps also this may be
because in prior years we had these items reviewed
14
❑Our prior auditor visits were shorter and less
formal but, they tended to focus much more
heavily on some of the things (backup, etc.) that
were not reviewed this time around. However, as
previously, they also covered the expected:
ensuring that access to the accounting and
related system was properly secured with only
key users having administrative rights, and
reviewing structure and controls in the IT
department.”

More Related Content

Similar to Overview-of-an-IT-Audit-Lesson-1.pptx

𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞
𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞
𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞
priyanshamadhwal2
 
How to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step GuideHow to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step Guide
infosecTrain
 
Task 2
Task 2Task 2
it grc
it grc it grc
it grc
9535814851
 
Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
Suman Thapaliya
 
Security audit
Security auditSecurity audit
Security audit
Rosaria Dee
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
Muhammad Azmy
 
Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Development
essbaih
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
Bharath Rao
 
Auditing information systems
Auditing information systemsAuditing information systems
Auditing information systems
Kenya Allmond
 
IT-Audit-Manual-2017-1st-Edition.pdf
IT-Audit-Manual-2017-1st-Edition.pdfIT-Audit-Manual-2017-1st-Edition.pdf
IT-Audit-Manual-2017-1st-Edition.pdf
JacobYeboa1
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
Marc Vael
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
Anne ndolo
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
Piyush Jain
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
Rabia Jabeen
 
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
Barun Kumar
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
Mufaddal Nullwala
 
20 IT Auditor questions.pdf
20 IT Auditor questions.pdf20 IT Auditor questions.pdf
20 IT Auditor questions.pdf
infosec train
 
CAAT ppt.pptx (Computer Asstt. Technique)
CAAT ppt.pptx (Computer Asstt. Technique)CAAT ppt.pptx (Computer Asstt. Technique)
CAAT ppt.pptx (Computer Asstt. Technique)
rkhasua004
 

Similar to Overview-of-an-IT-Audit-Lesson-1.pptx (20)

𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞
𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞
𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞
 
How to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step GuideHow to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step Guide
 
Task 2
Task 2Task 2
Task 2
 
it grc
it grc it grc
it grc
 
Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
 
Security audit
Security auditSecurity audit
Security audit
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Development
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
 
Auditing information systems
Auditing information systemsAuditing information systems
Auditing information systems
 
IT-Audit-Manual-2017-1st-Edition.pdf
IT-Audit-Manual-2017-1st-Edition.pdfIT-Audit-Manual-2017-1st-Edition.pdf
IT-Audit-Manual-2017-1st-Edition.pdf
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
 
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
ICPAS Breakfast Talk Series - Maximising IT Audit 13 Mar 2013
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
20 IT Auditor questions.pdf
20 IT Auditor questions.pdf20 IT Auditor questions.pdf
20 IT Auditor questions.pdf
 
CAAT ppt.pptx (Computer Asstt. Technique)
CAAT ppt.pptx (Computer Asstt. Technique)CAAT ppt.pptx (Computer Asstt. Technique)
CAAT ppt.pptx (Computer Asstt. Technique)
 

Recently uploaded

Gokila digital marketing| consultant| Coimbatore
Gokila digital marketing| consultant| CoimbatoreGokila digital marketing| consultant| Coimbatore
Gokila digital marketing| consultant| Coimbatore
dmgokila
 
PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611
Shuntaro Kogame
 
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdfLuxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
KiranRai75
 
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptxFrom Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
Boston SEO Services
 
How American Bath Group Leveraged Kontent
How American Bath Group Leveraged KontentHow American Bath Group Leveraged Kontent
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Efficient Website Management for Digital Marketing Pros
Efficient Website Management for Digital Marketing ProsEfficient Website Management for Digital Marketing Pros
Efficient Website Management for Digital Marketing Pros
Lauren Polinsky
 
Yes, It's Your Fault Book Launch Webinar
Yes, It's Your Fault Book Launch WebinarYes, It's Your Fault Book Launch Webinar
Yes, It's Your Fault Book Launch Webinar
Demandbase
 
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
SemajahParker
 
Unlocking Everyday Narratives: The Power of Storytelling in Marketing - Chad...
Unlocking Everyday Narratives: The Power of Storytelling in Marketing  - Chad...Unlocking Everyday Narratives: The Power of Storytelling in Marketing  - Chad...
Unlocking Everyday Narratives: The Power of Storytelling in Marketing - Chad...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Marketing in the Age of AI - Shifting CX from Monologue to Dialogue - Susan W...
Marketing in the Age of AI - Shifting CX from Monologue to Dialogue - Susan W...Marketing in the Age of AI - Shifting CX from Monologue to Dialogue - Susan W...
Marketing in the Age of AI - Shifting CX from Monologue to Dialogue - Susan W...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Mastering SEO for Google in the AI Era - Dennis Yu
Mastering SEO for Google in the AI Era - Dennis YuMastering SEO for Google in the AI Era - Dennis Yu
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina KillgoConsumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Email Marketing Master Class - Chris Ferris
Email Marketing Master Class - Chris FerrisEmail Marketing Master Class - Chris Ferris

Recently uploaded (20)

Gokila digital marketing| consultant| Coimbatore
Gokila digital marketing| consultant| CoimbatoreGokila digital marketing| consultant| Coimbatore
Gokila digital marketing| consultant| Coimbatore
 
Mastering Email Campaign Automation Strategies and Best Practices - Michelle...
Mastering Email Campaign Automation Strategies and Best Practices  - Michelle...Mastering Email Campaign Automation Strategies and Best Practices  - Michelle...
Mastering Email Campaign Automation Strategies and Best Practices - Michelle...
 
PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611
 
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdfLuxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
 
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptxFrom Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
 
How American Bath Group Leveraged Kontent
How American Bath Group Leveraged KontentHow American Bath Group Leveraged Kontent
How American Bath Group Leveraged Kontent
 
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
 
Efficient Website Management for Digital Marketing Pros
Efficient Website Management for Digital Marketing ProsEfficient Website Management for Digital Marketing Pros
Efficient Website Management for Digital Marketing Pros
 
Yes, It's Your Fault Book Launch Webinar
Yes, It's Your Fault Book Launch WebinarYes, It's Your Fault Book Launch Webinar
Yes, It's Your Fault Book Launch Webinar
 
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
 
Unlocking Everyday Narratives: The Power of Storytelling in Marketing - Chad...
Unlocking Everyday Narratives: The Power of Storytelling in Marketing  - Chad...Unlocking Everyday Narratives: The Power of Storytelling in Marketing  - Chad...
Unlocking Everyday Narratives: The Power of Storytelling in Marketing - Chad...
 
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
 
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
 
Marketing in the Age of AI - Shifting CX from Monologue to Dialogue - Susan W...
Marketing in the Age of AI - Shifting CX from Monologue to Dialogue - Susan W...Marketing in the Age of AI - Shifting CX from Monologue to Dialogue - Susan W...
Marketing in the Age of AI - Shifting CX from Monologue to Dialogue - Susan W...
 
Mastering SEO for Google in the AI Era - Dennis Yu
Mastering SEO for Google in the AI Era - Dennis YuMastering SEO for Google in the AI Era - Dennis Yu
Mastering SEO for Google in the AI Era - Dennis Yu
 
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina KillgoConsumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
 
Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...
Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...
Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...
 
Amazing and On Point - Ramon Ray, USA TODAY
Amazing and On Point - Ramon Ray, USA TODAYAmazing and On Point - Ramon Ray, USA TODAY
Amazing and On Point - Ramon Ray, USA TODAY
 
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
 
Email Marketing Master Class - Chris Ferris
Email Marketing Master Class - Chris FerrisEmail Marketing Master Class - Chris Ferris
Email Marketing Master Class - Chris Ferris
 

Overview-of-an-IT-Audit-Lesson-1.pptx

  • 2. 2 What is IT Audit? ⮚ An Information Technology (IT) audit is an audit of an organization's IT systems, management, operations and related processes. ⮚ An IT audit may be carried out in connection with a financial regularity audit or selective audit. As the records, services and operations of many organizations are often highly computerized, there is a need to evaluate the IT controls in the course of an audit of these organizations. https://www.ago.gov.sg/docs/default-source/brochure/197b4897-87d6-477d-9bc2-d06afa225a41.pdf
  • 3. 3 Types of Audits: Compliance audit - This is an examination of the policies and procedures of an entity or department, to see if it is in compliance with internal or regulatory standards. This audit is most commonly used in regulated industries or educational institutions. Financial audit - This is an analysis of the fairness of the information contained within an entity's financial statements. It is conducted by a CPA firm, which is independent of the entity under review. This is the most commonly conducted type of audit.
  • 4. 4 Information systems audit - This involves a review of the controls over software development, data processing, and access to computer systems. The intent is to spot any issues that could impair the ability of IT systems to provide accurate information to users, as well as to ensure that unauthorized parties do not have access to the data Operational audit - This is a detailed analysis of the goals, planning processes, procedures, and results of the operations of a business. The audit may be conducted internally or by an external entity. The intended result is an evaluation of operations, likely with recommendations for improvement.
  • 5. 5 The objectives of IT audits include: ❑ Evaluating the reliability of data from IT systems which have an impact on the financial statements of the organizations. ❑ Ascertaining the level of compliance with the applicable laws, policies and standards in relation to IT. ❑ Checking if there are instances of excess, extravagance, gross inefficiency tantamount to waste in the use and management of IT systems.
  • 6. Why is IT Audit important? Many organizations are spending large amounts of money on IT because they recognize the tremendous benefits that IT can bring to their operations and services. However, they need to ensure that their IT systems are reliable, secure and not vulnerable to computer attacks.
  • 7. 7 • IT audit is important because it gives assurance that the IT systems are adequately protected, provide reliable information to users and properly managed to achieve their intended benefits.
  • 8. 8 • Many users rely on IT without knowing how the computers work. A computer error could be repeated indefinitely, causing more extensive damage than a human mistake. • IT audit could also help to reduce risks of data tampering, data loss or leakage, service disruption, and poor management of IT systems.
  • 9. 9 How is IT Audit carried out? Generally, IT audit is carried out as follows: 1. Establish the IT audit objectives and scope. 2. Develop an audit plan to achieve the IT audit objectives. 3. Gather information on the relevant IT controls and evaluate them. 4. Perform audit tests, using Computer-Assisted Audit Techniques (CAATs) such as data extraction and analysis software or test data, where appropriate. 5. Report on the IT audit findings.
  • 10. 10 • In performing its IT audits, the Auditor- General’s Office (AGO) also checks for compliance with the Government policies, standards, laws and regulations on information and related technology. • Where appropriate, AGO uses the IT audit tools, technical guides and other resources recommended by ISACA (Information Systems Audit & Control Association), and encourages staff to be certified as CISA (Certified Information Systems Auditor).
  • 11. 11 IT Audit Process – Real-life Example “The auditor here has come and gone. We don’t have the report yet – but the things they were looking for relate directly to the security and integrity of the accounting and supporting systems. Who has access to what – how are usernames and passwords and associated rights assigned and reviewed (logical security), also extending the security of data exchanged between systems.
  • 12. 12 ❑They also want to see that we have periodic reviews of security and user rights in the accounting and related systems. They are also interested in reports generated using tools external to the accounting system – like Crystal reports. Here, they want to see integrity, management, and oversight in the development and maintenance of those reports.
  • 13. 13 ❑ Change management was also a focus – they want to see evidence and documentation of plans for testing, implementation, training, and the like for updates and changes to key systems. The auditor also wanted information on software and processes that feed information into our accounting system – such as timecard and production reporting. Unlike previous visits from our auditors, there were no questions about backup, disaster planning, or physical security. The auditor said this would only be a focus if there were data breaches or losses that raised a flag, and perhaps also this may be because in prior years we had these items reviewed
  • 14. 14 ❑Our prior auditor visits were shorter and less formal but, they tended to focus much more heavily on some of the things (backup, etc.) that were not reviewed this time around. However, as previously, they also covered the expected: ensuring that access to the accounting and related system was properly secured with only key users having administrative rights, and reviewing structure and controls in the IT department.”