CISA Lecture Domain 2
CISA Lecture Domain 2
CISA Lecture Domain 2
3/30/16
Domain - 2
3/30/16
Exam Relevance
3/30/16
INTRODUCTION
Task & Knowledge Statements
Task and knowledge statements represent the basis from which
exam items are written.
Tasks: Tasks are the learning objectives that IS auditors/CISA
candidates are expected to know to perform their job duties. It
has 11 task statements.
knowledge statements: In order to perform all of the tasks, the
IS auditor/CISA candidate should have a firm grasp of all the
knowledge statements. There are 16 knowledge statements in
CISA Domain - 2
3/30/16
Tasks/ Objectives
11 Tasks Statements:
2.1 Evaluate the effectiveness of the IT governance structure to
determine whether IT decisions, directions and performance support the
organizations strategies and objectives.
2.2 Evaluate IT organizational structure and human resources
(personnel) management to determine whether they support the
organizations strategies and objectives.
2.3 Evaluate the IT strategy, including the IT direction, and the
processes for the strategys development, approval, implementation and
maintenance for alignment with the organizations strategies and
objectives.
3/30/16
Tasks/ Objectives
Tasks/ Objectives
Tasks/ Objectives
3/30/16
Knowledge Statements
16 Knowledge Statements
2.1 Knowledge of IT governance, management, security and control
frameworks, and related standards, guidelines, and practices
2.2 Knowledge of the purpose of IT strategy, policies, standards and
procedures for an organization and the essential elements of each
2.3 Knowledge of organizational structure, roles and responsibilities
related to IT
2.4 Knowledge of the processes for the development,
implementation and maintenance of IT strategy, policies, standards and
procedures
3/30/16
Knowledge Statements
Knowledge Statements
Governance
3/30/16
3/30/16
3/30/16
3/30/16
Governance
IT Governance
IT Governance Model
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
3/30/16
INTRODUCTION
3/30/16
3/30/16
3/30/16
INTRODUCTION
3/30/16
IT Governance
3/30/16
3/30/16
3/30/16
Content to emphasis
Information technology is now regarded as an integral part of that strategy.
Csuite executives agree that strategic alignment between IT and enterprise
objectives is a critical success factor.
Information technology is so critical to the success of enterprises that it cannot
be relegated to either IT management or IT specialists, but must receive the
attention of both, in coordination with senior management.
IT governance is the responsibility of the board of directors and executive
management.
A key element of IT governance is the alignment of business and IT, leading to
the achievement of business value.
The key IT governance practices are IT strategy committee, risk management
and standard IT balanced scorecard.
3/30/16
3/30/16
Content to Emphasize:
The IS auditor should confirm that the terms of
reference state the:
Scope of the work
Reporting line to be used
IS auditors right of access to information
3/30/16
3/30/16
Content to Emphasize:
The organizational status and skill sets of
the IS auditor should be considered for
appropriateness with regard to the nature
of the planned audit.
3/30/16
IT Strategy Committee
beyond
the
traditional
financial
3/30/16
beyond
the
traditional
financial
Content to Emphasize:
Discuss the three layered structure used in
addressing the four perspectives for an IT
Balanced Scorecard:
. Mission
. Strategies
. Measures
3/30/16
3/30/16
Policies
Content to Emphasize:
IS auditors should:
reach an understanding of policies as part of the audit process
test policies for compliance
consider the extent to which the policies apply to third parties
or outsourcers, the extent to which they comply with the
policies, or if the third parties or outsourcers policies are in
conflict with the organizations policies.
3/30/16
Policies (continued)
to
Policies (continued)
Policies (continued)
3/30/16
Policies (continued)
Content to Emphasize:
Highlevel Information Security Policy: This policy should include
statements on confidentiality, integrity and availability.
Data Classification Policy: This policy should describe the classifications,
levels of control at each classification and responsibilities of all potential users
including ownership.
Acceptable Usage Policy: There must be a comprehensive policy that includes
information for all information resources (HW/SW, Networks, Internet, etc.) and
describes the organizational permissions for the usage of IT and information
related resources.
End User Computing Policy: This policy describes the parameters and usage
of desktop tools by users.
Access Control Policies: This policy describes the method for defining and
granting access to users to various IT resources
3/30/16
Policies (continued)
Review of the information security policy document
3/30/16
Policies (continued)
Content to Emphasize:
The input to the management review should include:
Procedures (continued)
3/30/16
Procedures (continued)
Content to Emphasize:
An independent review is necessary to
ensure that policies and procedures have
been properly documented, understood and
implemented
3/30/16
3/30/16
3/30/16
3/30/16
Errors
Malicious damage/attack
Fraud
Theft
Equipment/software failure
3/30/16
3/30/16
Content to Emphasize:
Final acceptance of residual risks takes into account:
Organizational policy
Risk identification and measurement
Uncertainty incorporated in the risk assessment
approach
Cost and effectiveness of implementation
3/30/16
3/30/16
Qualitative?
Semiquantitative?
Quantitative?
Probability and expectancy?
Annual loss expectancy method?
3/30/16
Hiring
Employee handbook
Promotion policies
Training
Scheduling and time reporting
Employee performance evaluations
Required vacations
Termination policies
3/30/16
Content to Emphasize:
The IS auditor should be aware of personnel
management issues but this information is not tested
in the CISA exam due to its subjectivity and
organizationalspecific subject matter.
3/30/16
Sourcing Practices
Content to Emphasize:
3/30/16
Content to Emphasize:
Reasons for outsourcing include:
A desire to focus on core activities
Pressure on profit margins
Increasing competition that demands cost savings
Flexibility with respect to both organization and structure
The services provided by a third party can include:
Data entry
Design and development of new systems in the event that the inhouse staff does not
have the requisite skills or is otherwise occupied in higherpriority tasks, or in the event of a
onetime task in which case there is no need to recruit additional inhouse skilled staff
Maintenance of existing applications to free inhouse staff to develop new applications
Conversion of legacy applications to new platforms. For example, a specialist company may
webenable the front end of an old application.
Operating the help desk or the call center
Operations processing
3/30/16
[email protected]
Possible advantages:
Commercial outsourcing companies likely to devote more
time and focus more efficiently on a given project than inhouse staff
Outsourcing vendors likely to have more experience with a
wider array of problems, issues and techniques
Possible disadvantages:
Costs exceeding customer expectations
Loss of internal IS experience
Loss of control over IS
Vendor failure
3/30/16
Performing
periodic
competitive
reviews
and
benchmarking/bench trending
Implementing short term contracts
Forming a cross functional contract management team
Including contractual provisions to consider as many
contingencies as can reasonably be foreseen
3/30/16
Content to Emphasize:
SLAs:
are a contractual means of helping the IS department to
manage information resources under the control of a vendor.
stipulate and commit a vendor to a required level of service
and support options.
should serve as an instrument of control. Where the
outsourcing vendor is from another country, the organization
should be aware of cross border legislation.
3/30/16
Governance in outsourcing
Mechanism that allows organizations to transfer the
delivery of services to third parties
Accountability remains with the management of the
client organization
Transparency and ownership of the decisionmaking
process must reside within the purview of the client
3/30/16
3/30/16
Identify
and
apply
technology
improvements at the infrastructure and
application level
Software
development,
maintenance
implementation
Acquisition of hardware and software
Daytoday operations
Service management
Security
Human resource management
General administration
3/30/16
and
3/30/16
3/30/16
Measure products/services
Manage products/services
Assure accountability
Make budget decisions
Optimize performance
3/30/16
Organizational Structure
3/30/16
3/30/16
Data management
Quality assurance manager
Vendor and outsourcer management
Operations manager
3/30/16
Content to Emphasize:
Quality assurance manager Responsible for negotiating and
facilitating quality activities in all areas of information technology With the
increase in outsourcing, including the use of multiple vendors, dedicated
staff may be required to manage the vendors and outsourcers, including
performing the following functions:
Act as the prime contact for the vendor and outsourcer within the IS
function.
Provide direction to the outsourcer on issues and escalate internally
within the organization and IS function.
Monitor and report on the service levels to management.
Review changes to the contract due to new requirements and obtain
IS approvals.
3/30/16
Control group
Media management
Data entry
Systems administration
Security administration
Quality assurance
Database administration
Systems analyst
Security architect
Applications development and maintenance
Infrastructure development and maintenance
Network management
3/30/16
Avoids
possibility
of
misappropriations
Discourages fraudulent acts
Limits access to data
3/30/16
errors
or
3/30/16
3/30/16
Audit trails
Reconciliation
Exception reporting
Transaction logs
Supervisory reviews
Independent reviews
3/30/16
3/30/16
Content to Emphasize:
In reviewing a sample of contracts, the IS auditor should
evaluate the adequacy of the following terms and conditions:
Service levels
Right to audit or third party audit reporting
Software escrow
Penalties for noncompliance
Adherence to security policies and procedures
Protection of customer information
Contract change process
Contract termination and any associated penalties
3/30/16
Governance on a Page
3/30/16
3/30/16
3/30/16
INTRODUCTION
3/30/16
INTRODUCTION
3/30/16
INTRODUCTION
3/30/16
INTRODUCTION
3/30/16
INTRODUCTION
3/30/16
INTRODUCTION
3/30/16
INTRODUCTION
3/30/16
INTRODUCTION
3/30/16