DSS04-Manage-Continuity Icq Eng 1214

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 29
At a glance
Powered by AI
The key takeaways are that ISACA is a global nonprofit focused on governance, security, assurance and risk management. It offers various credentials and resources like COBIT and aims to help professionals and organizations succeed.

The main goals of ISACA are to help business and IT leaders build trust in information systems and offer knowledge, standards, networking and career development for information security professionals.

Some of the credentials offered by ISACA include Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control (CRISC).

DSS04 Manage Continuity

Audit/Assurance Program

ISACA®
With more than 115,000 constituents in 180 countries, ISACA (www.isaca.org) helps business and IT leaders build trust in, and value
from, information and information systems. Established in 1969, ISACA is the trusted source of knowledge, standards, networking,
and career development for information systems audit, assurance, security, risk, privacy and governance professionals. ISACA
offers the Cybersecurity Nexus™, a comprehensive set of resources for cybersecurity professionals, and COBIT®, a business
framework that helps enterprises govern and manage their information and technology. ISACA also advances and validates
business-critical skills and knowledge through the globally respected Certified Information Systems Auditor ® (CISA®), Certified
Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information
Systems Control™ (CRISC™) credentials. The association has more than 200 chapters worldwide.

Disclaimer
ISACA has designed and created DSS04 Manage Continuity Audit/Assurance Program (the ‘Work’) primarily as an educational
resource for assurance professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The
Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other information, procedures
and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information,
procedure or test, assurance professionals should apply their own professional judgement to the specific circumstances presented
by the particular systems or information technology environment.

Reservation of Rights
© 2014 ISACA. All rights reserved. For usage guidelines, see www.isaca.org/COBITuse .

ISACA
3701 Algonquin Road, Suite 1010
Rolling Meadows, IL 60008 USA
Phone: +1.847.253.1545
Fax: +1.847.253.1443
Email: [email protected]
Web site: www.isaca.org

Provide feedback: www.isaca.org/DSS-APs


Participate in the ISACA Knowledge Center: www.isaca.org/knowledge-center
Follow ISACA on Twitter: https://twitter.com/ISACANews
Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial
Like ISACA on Facebook: www.facebook.com/ISACAHQ

ISBN 978-1-60420-359-2
DSS04 Manage Continuity Audit/Assurance Program

© ISACA 2014 All rights reserved. 2


DSS04 Manage Continuity
Audit/Assurance Program

Acknowledgments

ISACA wishes to recognize:

Development Team
Stefanie Grijp, PwC, Belgium
Bart Peeters, CISA, PwC, Belgium
Dirk Steuperaert, CISA, CGEIT, CRISC, IT In Balance BVBA, Belgium
Sven Van Hoorebeeck, PwC, Belgium

Expert Reviewers
Steven De Haes, University of Antwerp - Antwerp Management School, Belgium
John Jasinski, CISA, CGEIT, ISO 20K, ITIL Exp, SSBB, ITSMBP, USA
Joanna Karczewska, CISA, Poland
Patricia Prandini, CISA, CRISC, Universidad de Buenos Aires, Argentina
Abdul Rafeq, CISA, CGEIT, CIA, FCA, Wincer Infotech Limited, India
Claus Rosenquist, CISA, CISSP, Nets Holding, Denmark
Lily Shue, CISA, CISM, CGEIT, CRISC, LMS Associates LLC, USA
David A. Williams, CRISC, PMP, OceanFirst Bank, USA
Nikolaos Zacharopoulos, CISA, CRISC, CISSP, Merck KGaA, Germany
Daniel Zimerman, CISA, CRISC, CISSP, CEPT, CIH, GCIH, IQ Solutions, USA
Tichaona Zororo, CISA, CISM, CGEIT, CRISC, CIA, CRMA, EGIT I Enterprise Governance of IT (Pty) Ltd., South Africa

ISACA Board of Directors


Robert E Stroud, CGEIT, CRISC, CA, USA, International President
Steven A. Babb, CGEIT, CRISC, ITIL, Vodafone, UK, Vice President
Garry J. Barnes, CISA, CISM, CGEIT, CRISC, BAE Systems Detica, Australia, Vice President
Robert A. Clyde, CISM, Adaptive Computing, USA, Vice President
Ramses Gallego, CISM, CGEIT, CCSK, CISSP, SCPM, Six Sigma Black Belt, Dell, Spain, Vice President
Theresa Grafenstine, CISA, CGEIT, CRISC, CGAP, CGMA, CIA, CPA, US House of Representatives, USA, Vice President
Vittal R. Raj, CISA, CISM, CGEIT, CRISC, CFE, CIA, CISSP, FCA, Kumar & Raj, India, Vice President
Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, Queensland Government, Australia, Past International President
Gregory T. Grocholski, CISA, SABIC, Saudi Arabia, Past International President
Debbie A. Lew, CISA, CRISC, Ernst & Young LLP, USA, Director
Frank K.M. Yam, CISA, CIA, FHKCS, FHKIoD, Focus Strategic Group Inc., Hong Kong, Director
Alexander Zapata Lenis, CISA, CGEIT, CRISC, ITIL, PMP, Grupo Cynthus S.A. de C.V., Mexico, Director

Knowledge Board
Steven A. Babb, CGEIT, CRISC, ITIL, Vodafone, UK, Chairman
Rosemary M. Amato, CISA, CMA, CPA, Deloitte Touche Tohmatsu Ltd., The Netherlands
Neil Patrick Barlow, CISA, CISM, CRISC, CISSP, Capital One, UK
Charlie Blanchard, CISA, CISM, CRISC, CIPP/US, CIPP/E, CISSP, FBCS, ACA, Amgen Inc., USA
Sushil Chatterji, CGEIT, Edutech Enterprises, Singapore
Phil J. Lageschulte, CGEIT, CPA, KPMG LLP, USA
Anthony P. Noble, CISA, Viacom, USA
Jamie Pasfield, CGEIT, ITIL V3, MSP, PRINCE2, Pfizer, UK
Ivan Sanchez Lopez, CISA, CISM, ISO 27001 LA, CISSP, DHL Global Forwarding & Freight, Germany

Guidance and Practices Committee


Phil J. Lageschulte, CGEIT, CPA, KPMG LLP, USA, Chairman
John Jasinski, CISA, CGEIT, ISO 20K, ITIL Exp, SSBB, ITSMBP, USA
Yves Marcel Le Roux, CISM, CISSP, CA Technologies, France
Aureo Monteiro Tavares Da Silva, CISM, CGEIT, Brazil
Jotham Nyamari, CISA, CISSP, PwC, USA
James Seaman, CISM, CRISC, A. Inst. IISP, CCP, CLAS, QSA, Sysnet Global Solutions, UK
Gurvinder Singh, CISA, CISM, CRISC, Australia
Siang Jun Julia Yeo, CISA, CRISC, CPA (Australia), MasterCard Asia/Pacific Pte. Ltd., Singapore
Nikolaos Zacharopoulos, CISA, CRISC, CISSP, Merck KGaA, Germany

© ISACA 2014 All rights reserved. 3


DSS04 Manage Continuity
Audit/Assurance Program

Table of Contents
Page
Introduction.................................................................................................................................................................... 5
Assurance Engagement Approach Based on COBIT 5.................................................................................................5
Generic Audit/Assurance Program................................................................................................................................ 6
Customization of the Audit/Assurance Program.....................................................................................................6
About the Example Audit/Assurance Program: DSS04 ...............................................................................................6
Assurance Engagement: Manage Solutions Identification and Build...........................................................................7
Assurance Topic..................................................................................................................................................... 7
Goal of the Review................................................................................................................................................. 7
Scoping................................................................................................................................................................... 7
COBIT 5-based Assurance Engagement Approach......................................................................................................7
Phase A—Determine Scope of the Assurance Initiative........................................................................................8
Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment.....................12
Phase C—Communicate the Results of the Assessment....................................................................................31

© ISACA 2014 All rights reserved. 4


DSS04 Manage Continuity
Audit/Assurance Program

Introduction
This document contains an example audit/assurance program for a COBIT 5 process, based on the generic structure
developed in section 2B of COBIT 5 for Assurance1.

Figure 1—Generic COBIT 5-based Assurance Engagement Approach

Important Note
The engagement approach is based on, but differs slightly from the generic approach described in COBIT 5 for
Assurance:
 The order in which the enablers are discussed is different: the engagement approach described here is a
process audit/assurance program; consequently the Process enabler is discussed first.
 The remaining six enablers are also included in the program, because they are relevant for a process assurance
engagement as well. They have been grouped together to make the program more compact.

Assurance Engagement Approach Based on COBIT 5


The COBIT 5 framework explains that the enablers are interconnected, e.g., processes use Organisational Structures
as well as Information items (inputs [I] and outputs [O]). When developing the audit/assurance program, it will become
clear that when all possible entities of all enablers are included in the scope and reviewed in detail, there is potential
for duplication.

In the development of this audit/assurance program, care has been taken to avoid or minimize duplication, meaning
that:

1
See www.isaca.org/COBIT/Pages/Assurance-product-page.aspx for more information on COBIT 5 for Assurance.

© ISACA 2014 All rights reserved. 5


DSS04 Manage Continuity
Audit/Assurance Program

 Some aspects of a process also relate to another enabler and are assessed there, e.g., inputs and outputs can
also be classified under the Information enabler heading and covered in detail there.
 Some aspects relating to Skills and Competencies are to a large extent covered by process APO07 Manage
human resources.

In practice, assurance professionals will have to use their own professional judgment when developing their own
customized audit/assurance programs, to avoid duplication of work.

In addition, while audit/assurance programs will be available for each process, in practice, a group of processes are
often selected for audit. Therefore, a relevant set of audit/assurance programs of the applicable processes will need to
be selected for conducting assurance.

Generic Audit/Assurance Program


The assurance approach depicted in figure 1 is described in more detail and developed into a generic
audit/assurance program—including guidance on how to proceed during each step—in section 2B of COBIT 5 for
Assurance. This audit/assurance program is:
 Fully aligned with COBIT 5:
It explicitly references all seven enablers. In other words, it is no longer exclusively process-focused; it also
uses the different dimensions of the enabler model to cover all aspects contributing to the performance of the
enablers.
It references the COBIT 5 goals cascade to ensure that detailed objectives of the assurance engagement
can be put into the enterprise and IT context, and concurrently it enables linkage of the assurance objectives
to enterprise and IT risk and benefits.
 Comprehensive yet flexible. The generic program is comprehensive because it contains assurance steps
covering all enablers in quite some detail, yet it is also flexible because this detailed structure enables clear and
well-understood scoping decisions to be made. That is, the assurance professional can decide to not cover a set
of enablers or some enabler instances and, while the decision will reduce the scope and related assurance
engagement effort, the issue of what is or is not covered will be quite transparent to the assurance engagement
user.
 Easy to understand, follow and apply because of its clear structure:
The table follows the flow described in figure 1, but splits each phase into different steps and substeps.
For each step, a short description is included, as is guidance for the assurance professional on how to
proceed with the step (text in italics).

Additional guidance on how to use other IT assurance-related standards for performing assurance can be found in
section 3 of COBIT 5 for Assurance.

Customization of the Audit/Assurance Program

Customization and completion of the example audit/assurance program in this document is required, and consists of
refining the scope by selecting goals and enabler instances—the lists included in the example are comprehensive, yet
still are examples (i.e., different strategic priorities of the enterprise may dictate a different scope). The lists can also
be considered prohibitive by some, as they can lead to a very broad scope, and therefore a very expensive assurance
engagement; selection and prioritization will be required. The assurance professional will need to consider the
following steps:
 Determine the stakeholders of the assurance initiative and their stake.
 Determine the assurance objectives based on assessment of the internal and external environment/context,
including the strategic objectives, goals (figures 40 and 41 of COBIT 5 for Assurance) and priorities of the
enterprise.
 Determine the enablers in scope and the instance(s) of the enablers in scope.

About the Example Audit/Assurance Program: DSS04


In the next section, the assurance topic at hand—process DSS04 Manage continuity—is fully addressed based on the
generic audit/assurance program. The detailed program contains the following additional information:
 In the Guidance column, the shaded text is specific to the example and provides practical guidance, e.g.,
examples of the Organisational Structures to include in scope, setting assessment criteria for the different
enablers and actually assessing the different enablers.

© ISACA 2014 All rights reserved. 6


DSS04 Manage Continuity
Audit/Assurance Program

 Two additional columns are included, in which the assurance professional can identify and cross-reference issues
and record comments.

Assurance Engagement: Manage continuity

Assurance Topic

The topic covered by this document is process DSS04 Manage continuity.

Goal of the Review

The goal of the review is to provide assurance over the DSS042 process that ensures:
 Critical business operations and availability of information at a level acceptable to the enterprise are continued in
the event of a significant disruption.

Scoping
The scope of the assurance engagement is expressed as a function of the seven COBIT 5 enablers, with a focus on
the Process enabler. The process content is taken directly from the detailed process descriptions in COBIT 5:
Enabling Processes, i.e., these are standard COBIT 5 processes. Other enablers are also directly based on the same
process descriptions, e.g., the Organisational Structures and Information items.

Other enablers are described in a more generic way and may require customization before the audit/assurance
program can be applied.

COBIT 5-based Assurance Engagement Approach

The audit/assurance program is divided into three sections:


 Phase A—Determine Scope of the Assurance Initiative—In phase A of the assurance workflow, the auditor
scopes the assurance engagement. This process defines the scope in the COBIT 5 terms of enterprise goals, IT-
related goals and enablers.
 Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment—In phase
B of the assurance workflow, the auditor:
– Builds an understanding of the subject matter over which assurance needs to be provided. The subject
matter is expressed in terms of COBIT 5 enablers.
– Obtains agreement over the assessment criteria that will be used during the assurance engagement.
– Assesses the design and outcomes of the enablers.
 Phase C—Communicate the Results of the Assessments—In phase C of the assurance workflow, the auditor
communicates the observations to the initiative stakeholders. This includes carefully documenting all weaknesses
or exceptions found and communicating them to stakeholders effectively and efficiently, with a view to initiating
the appropriate response.

2
Additional related guidance for DSS04 can be found in COBIT 5: Enabling Processes, p. 189.

© ISACA 2014 All rights reserved. 7


DSS04 Manage Continuity
Audit/Assurance Program

Phase A—Determine Scope of the Assurance Initiative


Issue Cross-
Ref. Assurance Step Guidance Comment
reference
Determine the stakeholders of the
A-1
assurance initiative and their stake.
A-1.1 Identify the intended user(s) of the assurance Intended user(s) of Describe the users of the assurance report and their
report and their stake in the assurance the assurance report stakes.
engagement. This is the assurance objective.
A-1.2 Identify the interested parties, accountable Accountable and Describe the accountable and responsible parties for the
and responsible for the subject matter over responsible parties subject matter over which assurance is to be provided;
which assurance needs to be provided. for the subject matter COBIT 5 includes a summary description of a
comprehensive set of roles that can be used as starting
point for this audit step (COBIT 5 framework, appendix 6,
p.76); COBIT 5 for Assurance also provides a summary
description of a comprehensive set of assurance roles, see
section 2A, chapter 4, p.37.
Determine the assurance objectives based Assurance objectives are essentially a more detailed and tangible expression of those
on assessment of the internal and external enterprise objectives relevant to the subject of the assurance engagement.
environment/context and of the relevant risk
and related opportunities (i.e., not achieving Enterprise objectives can be formulated in terms of the generic enterprise goals
A-2 the enterprise goals). (COBIT 5 framework) or they can be expressed more specifically.

Objectives of the assurance engagement can be expressed using the COBIT 5


enterprise goals, the IT-related goals (which relate more to technology),
information goals or any other set of specific goals.
Understand the enterprise strategy and Inquire with executive management or through available documentation (corporate
A-2.1 priorities. strategy, annual report…) about the enterprise strategy and priorities for the coming
period, and document them to the extent the process under review is relevant.
A-2.2 Understand the internal context of the Identify all internal environmental factors that could influence the performance of the
enterprise. process under review.
A-2.3 Understand the external context of the Identify all external environmental factors that could influence the performance of the
enterprise. process under review.
A-2.4 Given the overall assurance objective, The following goals can be retained as key goals to be supported, in reflection of
translate the identified strategic priorities into enterprise strategy and priorities.3
concrete objectives for the assurance Key goals Enterprise goals:
engagement.  EG07 Business service continuity and availability

IT-related goals:
 ITG04 Managed IT-related business risk
 ITG07 Delivery of IT services in line with business
requirements
 ITG14 Availability of reliable and useful information for
decision making

3
The suggested set of enterprise goals can and should vary with enterprise strategy and priorities. However, in this generic program the following logic was applied: first the mapping table between
IT processes and IT-related goals (COBIT 5: Enabling Processes, appendix B, p.227-229) was used. The mappings between the process at hand and the IT goals listed as ‘P’ are retained as key
IT-related goals. The mappings listed as ‘S’ are retained as additional IT-related goals. Next, the mapping table between enterprise goals and IT-related goals (COBIT 5: Enabling Processes,
appendix B, p.226) is used. The previously selected key IT-related goals are looked up, and those enterprise goals that support half or more of the IT-related goals as ‘P’ are retained as key
enterprise goals. The remaining enterprise goals listed as ‘P’ are retained as additional enterprise goals. Again, after application of the logic described here, the resulting set of goals should
be reviewed and tailored if necessary.
© ISACA 2014 All rights reserved. 8
DSS04 Manage Continuity
Audit/Assurance Program

Phase A—Determine Scope of the Assurance Initiative


Issue Cross-
Ref. Assurance Step Guidance Comment
reference
Additional goals Enterprise goals:
 EG01 Stakeholder value of business investments
 EG02 Portfolio of competitive products and services
 EG03 Managed business risk (safeguarding of assets)
 EG06 Customer-oriented service culture
A-2.4  EG08 Agile responses to a changing business environment
Cont.  EG09 Information-based strategic decision making
 EG10 Optimisation of service delivery costs
 EG11 Optimisation of business process functionality

IT-related goals:
 ITG01 Alignment of IT and business strategy
 ITG02 IT compliance and support for business compliance
with external laws and regulations
 ITG05 Realised benefits from IT-enabled investments and
services portfolio
 ITG08 Adequate use of applications, information and
technology solutions
 ITG09 IT agility
 ITG10 Security of information, processing infrastructure and
applications
 ITG11 Optimisation of IT assets, resources and capabilities
 ITG12 Enablement and support of business processes by
integrating applications and technology into business
processes
 ITG15 IT compliance with internal policies
 ITG16 Competent and motivated business and IT personnel
 ITG17 Knowledge, expertise and initiatives for business
innovation
A-2.5 Define the organisational boundaries of the Describe the organisational boundaries of the assurance engagement, i.e., to which
assurance initiative. organisational entities the review is limited. All other aspects of scope limitation are
identified during phase A-3.
The scope of this assurance engagement is a process. Nevertheless, as per the
Determine the enablers in scope and the
A-3 COBIT 5 enabler model, all related enablers will have to be considered for inclusion in
instance(s) of the enablers in scope.
the scope as well.
A-3.1 Define the Process in scope of the review. The following process as defined in COBIT 5: Enabling Processes is in scope of this
assurance engagement: DSS04 Manage continuity.

© ISACA 2014 All rights reserved. 9


DSS04 Manage Continuity
Audit/Assurance Program

Phase A—Determine Scope of the Assurance Initiative


Issue Cross-
Ref. Assurance Step Guidance Comment
reference
A-3.2 Define the related enablers. Principles, Policies and Frameworks: In the context of this process review, and
taking into account the goals identified in A-2.4, the following Principles, Policies and
Frameworks could be considered in scope of the review4:
Related enablers include:
 <list here relevant Principles, Policies and Framework elements>
 Principles, Policies and Frameworks
 Organisational Structures Organisational Structures: Based on the process under review, the following
 Culture, Ethics and Behaviour Organisational Structures and functions are considered to be in scope of this
 Information assurance engagement, and available resources will determine which ones will be
 Services, Infrastructure and reviewed in detail: 5
Applications  Chief operating officer (COO)
 Peoples, Skills and Competencies  Business process owners
 Audit
 Chief information officer (CIO)
 Head architect
 Head of development
 Head IT operations
 Head IT administration
 Service manager
 Business continuity manager

CuIture, Ethics and Behaviour: In the context of this process review, the following
enterprise-wide Behaviours are in scope:
 <list here the most relevant Behaviour elements>

Information items: Based on the process under review, the following Information
items are considered to be in scope of this assurance engagement, and available
resources will determine which ones will be reviewed in detail. 6

DSS04.01:
 SLAs (I)
 Policy and objectives for business continuity (O)
 Disruptive incident scenarios (O)
 Assessments of current continuity capabilities and gaps (O)

DSS04.02:
 Risk-related root causes (I)
A-3.2  Risk impact communications (I)
Cont.  Business impact analyses (O)
 Continuity requirements (O)
 Approved strategic options (O)

4
The logic applied here is the following: if there are any Policies or Frameworks identified as inputs or outputs of any of the process practices of the process under review, they will be included
here.
5
Only those roles that have an ‘A’ or ‘R’ in the RACI chart of the process are included here. Roles are taken from the RACI charts in COBIT 5: Enabling Processes; some more specific roles may
be taken from COBIT 5 for Assurance, COBIT 5 for Risk or COBIT 5 for Information Security.
6
Leverage the inputs and outputs (also referred to as work products) described for each process practice in COBIT 5: Enabling Processes to identify the most relevant or important information
items. All inputs and outputs are listed here, with those work products written in italic font to be dealt with (in more detail) as part of the Information enabler.
© ISACA 2014 All rights reserved. 10
DSS04 Manage Continuity
Audit/Assurance Program

Phase A—Determine Scope of the Assurance Initiative


Issue Cross-
Ref. Assurance Step Guidance Comment
reference

DSS04.03:
 OLAs (I)
 Incident response actions and communications (O)
 BCP (O)

DSS04.04:
 Test objectives (O)
 Test exercises (O)
 Test results and recommendations (O)

DSS04.05:
 Results of reviews of plans (O)
 Recommended changes to plans (O)

DSS04.06:
 List of personnel requiring training (I)
 Training requirements (O)
 Monitoring results of skills and competencies (O)

DSS04.07:
 Test results of backup data (O)

DSS04.08:
 Post-resumption review report (O)
 Approved changes to the plans (O)

Services, Infrastructure and Applications: In the context of this process review,


and taking into account the goals identified in A-2.4, the following Services and related
Infrastructure or Applications could be considered in scope of the review:
 <list here the most relevant Services, Infrastructure and Applications components
in scope>

People, Skills and Competencies: In the context of this process review, taking into
account key processes and key roles, the following Skill sets are included in scope:
 Availability management
 <list here other relevant Skill sets required>

© ISACA 2014 All rights reserved. 11


DSS04 Manage Continuity
Audit/Assurance Program

© ISACA 2014 All rights reserved. 12


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
Agree on metrics and criteria for enterprise goals and IT-related goals.
B-1
Assess enterprise goals and IT-related goals.
B-1.1 Obtain (and agree on) metrics for enterprise goals and expected values of the metrics and assess whether enterprise goals in scope are
achieved.
Leverage the list of suggested metrics for the enterprise goals to define, discuss and agree on a set of relevant, customized metrics for
the enterprise goals, taking care that the suggested metrics are driven by the performance of the topic of this assurance initiative.

Next, agree on the expected values for these metrics, i.e., the values against which the assessment will take place.
The following metrics and expected values are agreed on for the key enterprise goals defined in step A-2.4.
Enterprise Goal Metric Expected Outcome (Ex) Assessment Step
EG07 Business service  Number of customer service Agree on the expected In this step, the related metrics
continuity and interruptions causing significant values for these metrics, for each goal will be reviewed
availability incidents i.e., the values against and an assessment will be made
 Business cost of incidents which the assessment will whether the defined criteria are
 Number of business processing take place. achieved.
hours lost due to unplanned service
interruptions
 Percent of complaints as a function
of committed service availability
targets
B-1.2 Obtain (and agree on) metrics for IT-related goals and expected values of the metrics and assess whether IT-related goals in scope are
achieved.
The following metrics and expected values are agreed on for the key IT-related goals defined in Step A-2.4.
IT-related Goal Metric Expected Outcome (Ex) Assessment Step
ITG04 Managed IT-  Percent of critical business Agree on the expected In this step, the related metrics
related business risk processes, IT services and IT- values for the IT-related for each goal will be reviewed
enabled business programmes goal metrics, i.e., the and an assessment will be made
covered by risk assessment values against which the whether the defined criteria are
 Number of significant IT-related assessment will take place. achieved.
incidents that were not identified in
risk assessment
 Percent of enterprise risk
assessments including IT-related
risk
 Frequency of update of risk profile
ITG07 Delivery of IT  Number of business disruptions due Agree on the expected In this step, the related metrics
services in line with to IT service incidents values for the IT-related for each goal will be reviewed
business requirements  Percent of business stakeholders goal metrics, i.e., the and an assessment will be made
satisfied that IT service delivery values against which the whether the defined criteria are
meets agreed-on service levels assessment will take place. achieved.
 Percent of users satisfied with the
quality of IT service delivery
ITG14 Availability of  Level of business user satisfaction Agree on the expected In this step, the related metrics
reliable and useful with quality and timeliness (or values for the IT-related for each goal will be reviewed
information for decision availability) of management goal metrics, i.e., the and an assessment will be made
making information values against which the whether the defined criteria are
B-1.2  Number of business process assessment will take place. achieved.

© ISACA 2014 All rights reserved. 13


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
incidents caused by non-availability
of information
 Ratio and extent of erroneous
business decisions where
erroneous or unavailable
information was a key factor
Obtain understanding of the Process in scope and set suitable assessment criteria.
B-2
Assess the Process. 7
B-2.1 Understand the Process purpose.
The purpose of process DSS04 is as per the standard COBIT 5 process statement: ‘Continue critical business operations and maintain
availability of information at a level acceptable to the enterprise in the event of a significant disruption.’
B-2.2 Understand the Process goals and related metrics and define expected values (criteria), and assess whether the Process goals
(outcomes) are achieved, i.e., assess the effectiveness of the Process.

The process DSS04 Manage continuity has five standard defined process goals, as described in COBIT 5: Enabling Processes,
chapter 5, p. 185. Based on these goals and their related metrics, the subset of following goals and associated metrics are defined for
this process.
Process Goal Related Metric Criteria/Expected Value Assessment Step
Business-critical  Percent of IT services meeting Agree on the expected In this step, the related metrics
information is available uptime requirements values for the Process goal for each goal will be reviewed
to the business in line  Percent of successful and timely metrics, i.e., the values and an assessment will be made
with minimum required restoration from backup or alternate against which the whether the defined criteria are
service levels. media copies assessment will take place. achieved.
 Percent of backup media
transferred and stored securely
Sufficient resilience is in  Number of critical business systems Agree on the expected In this step, the related metrics
place for critical not covered by the plan values for the Process goal for each goal will be reviewed
services. metrics, i.e., the values and an assessment will be made
against which the whether the defined criteria are
assessment will take place. achieved.
Service continuity tests  Number of exercises and tests that Agree on the expected In this step, the related metrics
have verified the have achieved recovery objectives values for the Process goal for each goal will be reviewed
effectiveness of the  Frequency of tests metrics, i.e., the values and an assessment will be made
plan. against which the whether the defined criteria are
assessment will take place. achieved.

7
Since this is a process audit/assurance program, several of the assurance steps from COBIT 5 for Assurance have been combined or removed.
© ISACA 2014 All rights reserved. 14
DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
An up-to-date continuity  Percent of agreed-on Agree on the expected In this step, the related metrics
plan reflects current improvements to the plan that have values for the Process goal for each goal will be reviewed
business requirements. been reflected in the plan metrics, i.e., the values and an assessment will be made
 Percent of issues identified that against which the whether the defined criteria are
have been subsequently addressed assessment will take place. achieved.
B-2.2 in the plan
Cont. Internal and external  Percent of internal and external Agree on the expected In this step, the related metrics
parties have been stakeholders that have received values for the Process goal for each goal will be reviewed
trained in the continuity training metrics, i.e., the values and an assessment will be made
plan.  Percent of issues identified that against which the whether the defined criteria are
have been subsequently addressed assessment will take place. achieved.
in the training materials
The process DSS04 Manage continuity is described in COBIT 5: Each practice is typically implemented through a number of
Enabling Processes. The Process requires a number of activities, and a well-designed process will implement all these
management practices to be implemented, as described in the practices and activities.
process description in the same guide. These are:
 A sound process design
 The reference against which the process will be assessed in
phase C, with the criteria as mentioned, i.e., all management
practices are expected to be fully implemented.
Reference Assessment Step
Process Practice
DSS04.01 Define the Assess by applying appropriate audit techniques (interview, observation, testing) whether the management
business continuity practice is effectively implemented through the following typical (control) activities:
policy, objectives and
scope. 1. Identify internal and outsourced business processes and service activities that are critical to the
enterprise operations or necessary to meet legal and/or contractual obligations.
2. Identify key stakeholders and roles and responsibilities for defining and agreeing on continuity policy
and scope.
3. Define and document the agreed-on minimum policy objectives and scope for business continuity and
embed the need for continuity planning in the enterprise culture.
4. Identify essential supporting business processes and related IT services.

Compare the RACI chart as included in the reference process in COBIT 5: Enabling Processes with the
actual accountability and responsibility for this practice and assess whether:
 Accountability and responsibility are assigned and assumed.
 Accountability and responsibility are assigned at the appropriate level in the organisation.
DSS04.02 Maintain a Assess by applying appropriate audit techniques (interview, observation, testing) whether the management
continuity strategy. practice is effectively implemented through the following typical (control) activities:

1. Identify potential scenarios likely to give rise to events that could cause significant disruptive incidents.
2. Conduct a business impact analysis to evaluate the impact over time of a disruption to critical business
functions and the effect that a disruption would have on them.
3. Establish the minimum time required to recover a business process and supporting IT based on an
acceptable length of business interruption and maximum tolerable outage.
4. Assess the likelihood of threats that could cause loss of business continuity and identify measures that
will reduce the likelihood and impact through improved prevention and increased resilience.
5. Analyse continuity requirements to identify the possible strategic business and technical options.

© ISACA 2014 All rights reserved. 15


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
6. Determine the conditions and owners of key decisions that will cause the continuity plans to be
invoked.
7. Identify resource requirements and costs for each strategic technical option and make strategic
recommendations.
8. Obtain executive business approval for selected strategic options.
B-2.2
Cont. Compare the RACI chart as included in the reference process in COBIT 5: Enabling Processes with the
actual accountability and responsibility for this practice and assess whether:
 Accountability and responsibility are assigned and assumed.
 Accountability and responsibility are assigned at the appropriate level in the organisation.
DSS04.03 Develop and Assess by applying appropriate audit techniques (interview, observation, testing) whether the management
implement a business practice is effectively implemented through the following typical (control) activities:
continuity response.
1. Define the incident response actions and communications to be taken in the event of disruption. Define
related roles and responsibilities, including accountability for policy and implementation.
2. Develop and maintain operational BCPs containing the procedures to be followed to enable continued
operation of critical business processes and/or temporary processing arrangements, including links to
plans of outsourced service providers.
3. Ensure that key suppliers and outsource partners have effective continuity plans in place. Obtain
audited evidence as required.
4. Define the conditions and recovery procedures that would enable resumption of business processing,
including updating and reconciliation of information databases to preserve information integrity.
5. Define and document the resources backup requirements required to support the plans, including plans
and paper documents as well as data files, and consider the need for security and off-site storage.
6. Define and document the information back up requirements required to support the plans, including
plans and paper documents as well as data files, and consider the need for security and off-site storage.
7. Determine required skills for individuals involved in executing the plan and procedures.
8. Distribute the plans and supporting documentation securely to appropriately authorised interested
parties and make sure they are accessible under all disaster scenarios.

Compare the RACI chart as included in the reference process in COBIT 5: Enabling Processes with the
actual accountability and responsibility for this practice and assess whether:
 Accountability and responsibility are assigned and assumed.
 Accountability and responsibility are assigned at the appropriate level in the organisation.
DSS04.04 Exercise, test Assess by applying appropriate audit techniques (interview, observation, testing) whether the management
and review the BCP. practice is effectively implemented through the following typical (control) activities:

1. Define objectives for exercising and testing the business, technical, logistical, administrative,
procedural and operational systems of the plan to verify completeness of the BCP in meeting business
risk.
2. Define and agree on with stakeholders exercises that are realistic, validate continuity procedures, and
include roles and responsibilities and data retention arrangements that cause minimum disruption to
business processes.
3. Assign roles and responsibilities for performing continuity plan exercises and tests.
4. Schedule exercises and test activities as defined in the continuity plan.
5. Conduct a post-exercise debriefing and analysis to consider the achievement.
6. Develop recommendations for improving the current continuity plan based on the results of the review.

Compare the RACI chart as included in the reference process in COBIT 5: Enabling Processes with the

© ISACA 2014 All rights reserved. 16


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
actual accountability and responsibility for this practice and assess whether:
 Accountability and responsibility are assigned and assumed.
 Accountability and responsibility are assigned at the appropriate level in the organisation.
DSS04.05 Review, Assess by applying appropriate audit techniques (interview, observation, testing) whether the management
B-2.2 maintain and improve practice is effectively implemented through the following typical (control) activities:
Cont. the continuity plan.
1. Review the continuity plan and capability on a regular basis against any assumptions made and
current business operational and strategic objectives.
2. Consider whether a revised business impact assessment may be required, depending on the nature of
the change.
3. Recommend and communicate changes in policy, plans, procedures, infrastructure, and roles and
responsibilities for management approval and processing via the change management process.
4. Review the continuity plan on a regular basis to consider the impact of new or major changes to:
enterprise organisation, business processes, outsourcing arrangements, technologies, infrastructure,
operating systems and application systems.

Compare the RACI chart as included in the reference process in COBIT 5: Enabling Processes with the
actual accountability and responsibility for this practice and assess whether:
 Accountability and responsibility are assigned and assumed.
 Accountability and responsibility are assigned at the appropriate level in the organisation.
DSS04.06 Conduct Assess by applying appropriate audit techniques (interview, observation, testing) whether the management
continuity plan training. practice is effectively implemented through the following typical (control) activities:

1. Define and maintain training requirements and plans for those performing continuity planning, impact
assessments, risk assessments, media communication and incident response. Ensure that the training
plans consider frequency of training and training delivery mechanisms.
2. Develop competencies based on practical training including participation in exercises and tests.
3. Monitor skills and competencies based on the exercise and test results.

Compare the RACI chart as included in the reference process in COBIT 5: Enabling Processes with the
actual accountability and responsibility for this practice and assess whether:
 Accountability and responsibility are assigned and assumed.
 Accountability and responsibility are assigned at the appropriate level in the organisation.
DSS04.07 Manage Assess by applying appropriate audit techniques (interview, observation, testing) whether the management
backup arrangements. practice is effectively implemented through the following typical (control) activities:

1. Back up systems, applications, data and documentation according to a defined schedule, considering:
 Frequency (monthly, weekly, daily, etc.)
 Mode of backup (e.g., disk mirroring for real-time backups vs. DVD-ROM for long-term retention)
 Type of backup (e.g., full vs. Incremental)
 Type of media
 Automated online backups
 Data types (e.g., voice, optical)
 Creation of logs
 Critical end-user computing data (e.g., spreadsheets)
 Physical and logical location of data sources
 Security and access rights
 Encryption

© ISACA 2014 All rights reserved. 17


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
2. Ensure that systems, applications, data and documentation maintained or processed by third parties
are adequately backed up or otherwise secured. Consider requiring return of backups from third
parties. Consider escrow or deposit arrangements.
3. Define requirements for on-site and off-site storage of backup data that meet the business
B-2.2 requirements. Consider the accessibility required to back up data.
Cont. 4. Roll out BCP awareness and training.
5. Periodically test and refresh archived and backup data.

Compare the RACI chart as included in the reference process in COBIT 5: Enabling Processes with the
actual accountability and responsibility for this practice and assess whether:
 Accountability and responsibility are assigned and assumed.
 Accountability and responsibility are assigned at the appropriate level in the organisation.
DSS04.08 Conduct Assess by applying appropriate audit techniques (interview, observation, testing) whether the management
post-resumption review. practice is effectively implemented through the following typical (control) activities:

1. Assess adherence to the documented BCP.


2. Determine the effectiveness of the plan, continuity capabilities, roles and responsibilities, skills and
competencies, resilience to the incident, technical infrastructure, and organisational structures and
relationships.
3. Identify weaknesses or omissions in the plan and capabilities and make recommendations for
improvement.
4. Obtain management approval for any changes to the plan and apply via the enterprise change control
process.

Compare the RACI chart as included in the reference process in COBIT 5: Enabling Processes with the
actual accountability and responsibility for this practice and assess whether:
 Accountability and responsibility are assigned and assumed.
 Accountability and responsibility are assigned at the appropriate level in the organisation.
B-2.3 Agree on the Process work products (inputs and outputs as defined in the process practices description) that are expected to be
present (process design).
Assess the extent to which the process work products are available.
The Process DSS04 identifies a set of inputs and outputs for the different management practices. Criteria: All listed work products
The most relevant of these work products (and those not assessed as Information items in scope in should demonstrably exist and
section A-3.2) are identified as follows, as well as the criteria against which they will be assessed, be used.
i.e., existence and usage.
Process Practice Work Product8 Assessment Step
DSS04.01  SLAs (I) Apply appropriate auditing
 Policy and objectives for business continuity (O) techniques to determine for each
DSS04.02  Risk-related root causes (I) work product:
 Risk impact communications (I)  Existence of the work
 Continuity requirements (O) product
 Approved strategic options (O)  Appropriate use of the work
product
DSS04.03  OLAs (I)
 Incident response actions and communications (O)
 BCP (O)
DSS04.04  Test objectives (O)
 Test exercises (O)

© ISACA 2014 All rights reserved. 18


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
DSS04.05  Results of reviews of plans (O)
B-2.3  Recommended changes to plans (O)
Cont. DSS04.06  List of personnel requiring training (I)
 Training requirements (O)
 Monitoring results of skills and competencies (O)
DSS04.07  Test results of backup data (O)
DSS04.08  Post-resumption review report (O)
 Approved changes to the plans (O)
B-2.4 Agree on the Process capability level to be achieved by the process.
Process DSS04 is—given the strategic priorities—important, and will require the following Process capability level and attributes, which
is equivalent to achieving a Process capability level _____. 9
Obtain understanding of the Principles, Policies and Frameworks in scope.
B-3
Assess Principles, Policies and Frameworks.
Repeat steps B-3.1 through B-3.5 for all Principles, Policies and Frameworks in scope.
B-3.1 Understand the Principles, Policies and Frameworks context.
Obtain understanding of the overall system of internal control and the associated Principles, Policies and Frameworks.
B-3.2 Understand the stakeholders of the Principles, Policies and Frameworks
Understand the stakeholders in the policies. The stakeholders for the policies include those setting the policies and those who need to
be in compliance with the policies.
B-3.3 Understand the goals for the Principles, Policies and Frameworks, and the related metrics, and agree on expected values.
Assess whether the Principles, Policies and Frameworks goals (outcomes) are achieved, i.e., assess the effectiveness of the Principles,
Policies and Frameworks.
Goal Criteria Assessment Step
Comprehensiveness The set of policies is comprehensive in Verify that the set of policies is comprehensive in its coverage.
its coverage.
Currency The set of policies is up to date. This at Verify that the set of policies is up to date. This at least requires:
least requires:  A regular validation of all policies whether they are still up
 A regular validation of all policies to date
whether they are still up to date  An indication of the policies’ expiration date or date of last
 An indication of the policies’ expiration update
date or date of last update
Flexibility The set of policies is flexible. It is Verify the flexibility of the set of policies, i.e., that it is structured
structured in such a way that it is easy to in such a way that it is easy to add or update policies as
add or update policies as circumstances circumstances require.
require.
Availability  Policies are available to all  Verify that policies are available to all stakeholders.
stakeholders.  Verify that policies are easy to navigate and have a logical
 Policies are easy to navigate and and hierarchical structure.
have a logical and hierarchical
structure.
B-3.4 Understand the life cycle stages of the Principles, Policies and Frameworks, and agree on the relevant criteria. Assess to what extent
the Principles, Policies and Frameworks life cycle is managed.
The life cycle of the IT-related policies is managed by the Process APO01. The review of this life cycle is therefore equivalent to a
process review of process APO01 Manage the IT management framework.
B-3.5 Understand good practices related to the Principles, Policies and Frameworks and expected values. Assess the Principles, Policies and
Frameworks design, i.e., assess the extent to which expected good practices are applied.

© ISACA 2014 All rights reserved. 19


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
The assurance professional will, by using appropriate auditing techniques assess the following aspects.
Good Practice Criteria Assessment Step
Scope and validity The scope is described and the validity Verify that the scope of the framework is described and the
date is indicated. validity date is indicated.
Exception and  The exception and escalation  Verify that the exception and escalation procedure is
escalation procedure is explained and described, explained and commonly known.
commonly known.  Through observation of a representative sample, verify
 The exception and escalation that the exception and escalation procedure has not
procedure has not become de facto become de facto standard procedure.
standard procedure.
Compliance The compliance checking mechanism Verify that the compliance checking mechanism and non-
B-3.5 and non-compliance consequences are compliance consequences are clearly described and enforced.
Cont. clearly described and enforced.
Obtain understanding of the Organisational Structures in scope.
B-4
Assess the Organisational Structures.
Repeat steps B-4.1 through B-4.5 for each Organisational Structure in scope, as determined in step A-3.2.
B-4.1 Understand the Organisational Structure context.
Identify and document all elements that can help to understand the context in which the Organisational Structure/role has to operate,
including:
 The overall organisation
 Management/process framework
 History of the role/structure
 Contribution of the Organisational Structure to achievement of goals
B-4.2 Understand all stakeholders of the Organisational Structure/function.
Determine through documentation review (policies, management communications, etc.) the key stakeholders of the role, i.e.:
 Incumbent of the role and/or members of the Organisational Structure
 Other key stakeholders affected by the decisions of the Organisational Structure/role
B-4.3 Understand the goals of the Organisational Structure, the related metrics and agree on expected values. Understand how these goals
contribute to the achievement of the enterprise goals and IT-related goals.
Organisational Structure Goal Assessment Step
Determine through interviews with key stakeholders and This step only applies if specific goals are defined. In that case,
documentation review the goals of the Organisational Structures, the assurance professional will use appropriate auditing
i.e., the decisions for which they are accountable10,11. techniques to:
Note: Very often, the goals of an Organisational Structure—making  Identify the decisions made by the Organisational
decisions—are already described by some of the process practices Structure.
and/or process activities in COBIT 5: Enabling Processes.  Assess whether decisions are appropriately documented
Therefore, they will be part of the process review and should not be and communicated.
repeated here. Only when very specific decisions would be required  Evaluate the decisions by, assessing whether:
is there a need to list them explicitly in this step. They have contributed to the achievement of the IT-

8
Only the work products not already dealt with (in more detail) as part of the Information enabler are listed here.
9
This step is warranted only if the process under review is a standard COBIT 5 governance or management process to which the ISO/IEC 15504 PAM can be applied. Any other processes, for which
no reference practices, work products or outcomes are approved, cannot use this assessment method, therefore the concept capability level does not apply.
10
The RACI charts in COBIT 5: Enabling Processes can be leveraged as a starting point for the expected goals of a role or Organisational Structure.
11
The Organisational Structure/role as described may not exist under the same name in the enterprise; in that case, the closest Organisational Structure assuming the same responsibilities and
accountability should be considered.
© ISACA 2014 All rights reserved. 20
DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
related and enterprise goals as anticipated.
Decisions are duly executed on a timely basis.
B-4.4 Agree on the expected good practices for the Organisational Structure against which it will be assessed.
Assess the Organisational Structure design, i.e., assess the extent to which expected good practices are applied.
Good Practice Criteria Assessment Step
Operating principles  Operating principles are documented.  Verify whether operating principles are
 Regular meetings take place as defined in appropriately documented.
operating principles.  Verify that regular meetings take place as defined
 Meeting reports/minutes are available and in the operating principles.
are meaningful.  Verify that meeting reports/minutes are available
and are meaningful.
Composition The organisational structure’s composition is Assess whether the Organisational Structure’s
balanced and complete, i.e., all required composition is balanced and complete, i.e., all required
stakeholders are sufficiently represented. stakeholders are sufficiently represented.
Span of control  The span of control of The Organisational  Verify whether the span of control of the
B-4.4 Structure is defined. Organisational Structure is defined.
Cont.  The span of control is adequate, i.e., the  Assess whether the span of control is adequate,
Organisational Structure has the right to i.e., the Organisational Structure has the right to
make all decisions it should. make all decisions it should.
 The span of control is in line with the overall  Verify and assess whether the span of control is in
enterprise governance arrangements. line with the overall enterprise governance
arrangements.
Level of authority/  Decision rights of the Organisational  Verify that decision rights of the Organisational
decision rights Structure are defined and documented. Structure are defined and documented.
 Decision rights of the Organisational  Verify whether decision rights of the Organisational
Structure are respected and complied with Structure are complied with and respected.
(also a culture/behaviour issue).
Delegation of authority Delegation of authority is implemented in a Verify whether delegation of authority is implemented in
meaningful way. a meaningful way.
Escalation procedures Escalation procedures are defined and applied. Verify the existence and application of escalation
procedures.
B-4.5 Understand the life cycle and agree on expected values.
Assess the extent to which the Organisational Structure life cycle is managed.
Life Cycle Element Criteria Assessment Steps
Mandate  The Organisational Structure is  Verify through interviews and observations that the
formally established. Organisational Structure is formally established.
 The Organisational Structure has a  Verify through interviews and observations that the
clear, documented and well- Organisational Structure has a clear, documented and
understood mandate. well-understood mandate.
Monitoring  The performance of the  Verify whether the performance of the Organisational
Organisational Structure and its Structure and its members is regularly monitored and
members should be regularly evaluated by competent and independent assessors.
monitored and evaluated by  Verify whether the regular evaluations have resulted in
competent and independent improvements to the Organisational Structure, in its
assessors. composition, mandate or any other parameter.
 The regular evaluations should

© ISACA 2014 All rights reserved. 21


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
result in the required continuous
improvements to the Organisational
Structure, either in its composition,
mandate or any other parameter.
Obtain understanding of the Culture, Ethics and Behaviour in scope.
B-5
Assess Culture, Ethics and Behaviour.
Repeat steps B-5.1 through B-5.5 for each Culture, Ethics, and Behaviour aspect in scope.
B-5.1 Understand the Culture, Ethics and Behaviour context.
Understand the context of the Culture/Ethics/Behaviour, i.e.:
 What the overall corporate Culture is like
 Understand the interconnection with other enablers in scope:
Identify roles and structures that could be affected by the Culture.
Identify processes that could be affected by Culture, Ethics and Behaviour, including any processes in scope of the review.
B-5.2 Understand the major stakeholders of the Culture, Ethics and Behaviour.
Understand to whom the behaviour requirements will apply, i.e., understand who embodies the roles/structures expected to
demonstrate the correct set of Behaviours. This is usually linked to the roles and Organisational Structures identified in scope.
B-5.3 Understand the goals for the Culture, Ethics and Behaviour, and the related metrics and agree on expected values.
Assess whether the Culture, Ethics and Behaviour goals (outcomes) are achieved, i.e., assess the effectiveness of the Culture,
Ethics and Behaviour.
Define what constitutes desired and undesirable Behaviours and Culture and especially Behaviours are associated to individuals
why they are so classified, i.e., relate Behaviours to the and the Organisational Structures of which they are a part,
organisational ethics and values by which the enterprise wants to therefore, by using appropriate auditing techniques, the
live in support of enterprise goals. assurance professional will:
 Identify individuals who must comply with the Behaviours
under review.
 Identify the Organisational Structures involved.
 Assess whether desired Behaviours can be observed.
 Assess whether undesirable Behaviours are absent.
Desired Behaviour (Culture, Ethics and Behaviour Goal) Assessment Step

B-5.4 Understand the life cycle stages of the Culture, Ethics and Behaviour, and agree on the relevant criteria.
Assess the extent to which the Culture, Ethics and Behaviour life cycle is managed.
(This aspect is already covered by the assessment of the good practices, so no additional assurance steps are defined here.)
B-5.5 Understand good practice when dealing with Culture, Ethics and Behaviour, and agree on relevant criteria.
Assess the Culture, Ethics and Behaviour design, i.e., assess to what extent expected good practices are applied.
Good Practice Criteria Assessment Step
Communication, Existence and quality of the Apply appropriate auditing techniques to assess whether the
enforcement and rules communication good practice is adequately applied, i.e., assessment criteria
Incentives and rewards Existence and application of appropriate are met.
rewards and incentives
Awareness Awareness of desired Behaviours

© ISACA 2014 All rights reserved. 22


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
Obtain understanding of the Information items in scope.
B-6
Assess Information items.
Repeat steps B-6.1 through B-6.5 for each Information item defined in scope in A-3.2.
B-6.1 Understand the Information item context:
 Where and when is it used?
 For what purpose is it used?
 Understand the connection with other enablers in scope, e.g.:
Used by which processes?
Which Organisational Structures are involved (see also B-4.2)?
Which services/applications are involved?
B-6.2 Understand the major stakeholders of the Information item.
Understand the stakeholders for the Information item, i.e., identify the:
 Information producer
 Information custodian
 Information consumer
Stakeholders should be at the appropriate organisational level.
B-6.3 Understand the major quality criteria for the Information item, the related metrics and agree on expected values.
Assess whether the Information item quality criteria (outcomes) are achieved, i.e., assess the effectiveness of the Information item.
Leverage the COBIT 5 Information enabler model12 focussing on the quality goals The assurance professional will, by
description to select the most relevant Information quality criteria for the Information item at using appropriate auditing techniques,
hand. Document expectations regarding information criteria. The COBIT 5 Information verify all quality criteria in scope and
enabler model identifies 15 different quality criteria—although all of them are relevant, it is assess whether the criteria are met.
nonetheless possible and recommended to focus on a subset of the most important criteria
for the Information item at hand.

Mark the quality dimensions with a ‘’ that are deemed most important (key criteria), and by
consequence will be assessed against the described criteria.
Quality Dimension Key Criteria Description Assessment Step
Accuracy
Objectivity
Believability
Reputation
Relevancy
Completeness
Currency
Amount of information
Concise
representation
Consistent
representation
Interpretability
B-6.3 Understandability

12
COBIT 5 framework, appendix G, p.81-84
© ISACA 2014 All rights reserved. 23
DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
Cont. Manipulation
Availability
Restricted access
B-6.4 Understand the life cycle stages of the Information item, and agree on the relevant criteria.
Assess to what extent the Information item life cycle is managed.
The life cycle of any Information item is managed through several business and IT-related processes. The scope of this review already
includes a review of (IT-related) processes so this aspect does not need to be duplicated here.
 When the Information item is internal to IT, the process review will have covered the life cycle aspects sufficiently.
 When the Information item also involves other stakeholders outside IT or other non-IT processes, some of the life cycle aspects
need to be assessed.

Mark the life cycle stages with a ‘’ that are deemed most important (key criteria), and by consequence will be assessed against the
described criteria.
Life Cycle Stage Key Criteria Description Assessment Step
Plan
Design
Build/acquire
Use/operate
Evaluate/monitor
Update/dispose
B-6.5 Understand important attributes of the Information item and expected values.
Assess the Information item design, i.e., assess the extent to which expected good practices are applied.
Good practices for Information items are defined as a series of attributes for the Information item13. The assurance professional will, by
using appropriate audit techniques, verify all attributes in scope and assess whether the attributes are adequately defined.

Mark the attributes with a ‘’ that are deemed most important (key criteria), and by consequence will be assessed against the
described criteria.
Attribute Key Criteria Description Assessment Step
Physical
Empirical
Syntactic
Semantic
Pragmatic
Social

13
COBIT 5 framework, appendix G, p. 81-84
© ISACA 2014 All rights reserved. 24
DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
Obtain understanding of the Services, Infrastructure and Applications in scope.
B-7
Assess the Services, Infrastructure and Applications.
Repeat steps B-7.1 through B-7.5 for each Service, Infrastructure and Applications element in scope.
B-7.1 Understand the Services, Infrastructure and Applications context.
Understand the organisational and technological context of this service. Refer to step A-2.2 and A-2.3 and re-use that information to understand
the significance of this Service, Infrastructure and Application.
B-7.2 Understand the major stakeholders of the Services, Infrastructure and Applications.
Understand who will be the major stakeholders of the service, i.e., the sponsor, provider and users. Stakeholders will include a number of
organisational roles but could also link to Processes.
B-7.3 Understand the major goals for the Services, Infrastructure and Applications, the related metrics and agree on expected values.
Assess whether the Services, Infrastructure and Applications goals (outcomes) are achieved, i.e., assess the effectiveness of the Services,
Infrastructure and Applications.
Goal Criteria Assessment Step
Service description  The Service is clearly described.  Verify that the Service exists and is clearly described.
 The Service is available to all  Assess the quality of the Service description and of the Service
potential stakeholders offered.
 Verify the accessibility of the Service to all potential stakeholders.
Service level definition Service levels are defined for:  Verify that the following aspects are dealt with in the Service level
 Quality of the service deliverables definitions:
 Cost Quality of the Service deliverables
 Timeliness Cost
Timeliness
 Verify to what extent Service levels are achieved.
Contribution to related The Service contributes to the Assess to what extent the Service contributes to the achievement of the
enabler, IT-related and achievement of related enabler and IT- related enabler goals and to the overall IT-related and enterprise goals.
enterprise goals related and enterprise goals.
B-7.4 Understand the life cycle stages of the Services, Infrastructure and Applications, and agree on the relevant criteria.
Assess the extent to which the Services, Infrastructure and Applications life cycle is managed.14
B-7.5 Understand good practice related to the Services, Infrastructure and Applications and expected values.
Assess the Services, Infrastructure and Applications design, i.e., assess to what extent expected good practices are applied.
Leverage the description of Services, Infrastructure and Applications in the COBIT 5 framework15 to identify good practices related to Services,
Infrastructure And Applications. In general the following practices need to be implemented:
 Buy/build decision needs to be taken.
 Use of the Service needs to be clear.
Good Practice Criteria Assessment Step
Sourcing (buy/build) A formal decision—based on a business  Verify that a formal decision—based on a business case—was taken
case—needs to be taken regarding the regarding the sourcing of the Service.
sourcing of the Service.  Verify the validity and quality of the business case.
 Verify that the sourcing decision has been duly executed.
Use The use of the Service needs to be  Verify that the use of the Service is clear, i.e., it is known when and

14
The life cycle of a service will be governed and managed by numerous of the COBIT 5 processes. As a consequence, a subset of the BAI and APO processes may have to be added to the scope of the
assurance engagement should it be required.
15
COBIT 5 framework, appendix G, p.85-86
© ISACA 2014 All rights reserved. 25
DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
B-7.5 clear: by whom the service needs to be used.
Cont.  When it needs to be used and by  Verify that actual use is in line with requirement above.
whom  Verify that the actual Service output is adequately used.
 The required compliance levels  Verify that Service levels are monitored and achieved.
with the Service’s output

© ISACA 2014 All rights reserved. 26


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
Obtain understanding of the People, Skills and Competencies in scope.
B-8
Assess People, Skills and Competencies.
Repeat steps B-8.1 through B-8.5 for each People, Skill and Competency aspect in scope.
B-8.1 Understand the People, Skills and Competencies context.
Understand the context of the Skill/Competency, i.e.:
 Where and when is it used?
 For what purpose is it used?
 Understand the connection with other enablers in scope, e.g.:
In which roles and structures is the Skill/Competency used? (See also B-4.1.)
Which behaviours are associated with the Skill/Competency?
B-8.2 Understand the major stakeholders for People, Skills and Competencies.
Identify to whom in the organisation the skill requirement applies.
B-8.3 Understand the major goals for the People, Skills and Competencies, the related metrics and agree on expected values.
Assess whether the People, Skills and Competencies goals (outcomes) are achieved, i.e., assess the effectiveness of the People, Skills and
Competencies.

For the People, Skills and Competencies at hand, the following goals and associated criteria can be addressed.
Goal Criteria Assessment Step
Experience Apply appropriate auditing techniques to assess whether the People, Skills
Education and Competencies goals are adequately achieved, i.e., that assessment
Qualification criteria are met.
Knowledge
Technical skills
Behavioural skills
Number of people with
appropriate skill level
B-8.4 Understand the life cycle stages of the People, Skills and Competencies, and agree on the relevant criteria.
Assess to what extent the People, Skills and Competencies life cycle is managed.
For the People, Skills and Competencies at hand, the life cycle phases and associated criteria can For the People, Skills and Competencies at
be expressed in function of the process APO07. hand the assurance professional will
perform the following assessment steps.
Life Cycle Element Criteria Assessment Step
Plan Practice APO07.03, activity 1 (Define the required and currently Assess whether practice APO07.03 activity
available skills and competencies of internal and external resources to 1 is implemented in relation to this skill.
achieve enterprise, IT and process goals.) is implemented in relation to
this skill.
Design
Practice APO07.03 activity 2 (Provide formal career planning and Assess whether practice APO07.03 activity
professional development to encourage competency development, 2 is implemented in relation to this skill.
opportunities for personal advancement and reduced dependence on
key individuals.) is implemented in relation to this skill.

© ISACA 2014 All rights reserved. 27


DSS04 Manage Continuity
Audit/Assurance Program

Phase B—Understand Enablers, Set Suitable Assessment Criteria and Perform the Assessment
Issue Cross-
Ref. Assurance Steps and Guidance Comment
reference
B-8.4 Practice APO07.03 activity 3 (Provide access to knowledge repositories Assess whether practice APO07.03 activity
Cont. to support the development of skills and competencies.) is implemented 3 is implemented in relation to this skill.
in relation to this skill.
Build Practice APO07.03 activity 4 (Identify gaps between required and Assess whether practice APO07.03 activity
available skills and develop action plans to address them on an 4 is implemented in relation to this skill.
individual and collective basis, such as training [technical and
behavioural skills], recruitment, redeployment and changed sourcing
strategies.) is implemented in relation to this skill.

Operate Practice APO07.03 activity 5 (Develop and deliver training programmes Assess whether practice APO07.03 activity
based on organisational and process requirements, including 5 is implemented in relation to this skill.
requirements for enterprise knowledge, internal control, ethical conduct
and security.) is implemented in relation to this skill.
Evaluate Practice APO07.03 activity 6 (Conduct regular reviews to assess the Assess whether practice APO07.03 activity
evolution of the skills and competencies of the internal and external 6 is implemented in relation to this skill.
resources. Review succession planning.) is implemented in relation to
this skill.
Update/dispose Practice APO07.03 activity 7 (Review training materials and Assess whether practice APO07.03 activity
programmes on a regular basis to ensure adequacy with respect to 7 is implemented in relation to this skill.
changing enterprise requirements and their impact on necessary
knowledge, skills and abilities.) is implemented in relation to this skill.
B-8.5 Understand good practice related to the People, Skills and Competencies and expected values.
Assess the People, Skills and Competencies design, i.e., assess to what extent expected good practices are applied.
Good Practice Assessment Step
Skill set and Competencies are defined.  Determine that an inventory of Skills and Competencies is maintained
by organisational unit, job function and individual.
 Evaluate the relevance and the contribution of the Skills and
Competencies to the achievement of the goals of the Organisational
Structure, and by consequence, IT-related goals and enterprise
goals.
 Evaluate the gap analysis between necessary portfolio of Skills and
Competencies and current inventory of skills and capabilities.
Skill levels are defined.  Assess the flexibility and performance of meeting Skills development
to address identified gaps between necessary and current Skill levels.
 Assess the process for 360-degree performance evaluations.

© ISACA 2014 All rights reserved. 28


DSS04 Manage Continuity
Audit/Assurance Program

Phase C—Communicate the Results of the Assessment


Ref. Assurance Step Guidance
C-1 Document exceptions and gaps.
C-1.1 Understand and document weaknesses and their impact on the • Illustrate the impact of enabler failures or weaknesses with numbers and scenarios of errors, inefficiencies and misuse.
achievement of process goals. • Clarify vulnerabilities, threats and missed opportunities that are likely to occur if enablers do not perform effectively.
C-1.2 Understand and document weaknesses and their impact on enterprise • Illustrate what the weaknesses would affect (e.g., business goals and objectives, enterprise architecture elements,
goals. capabilities, resources). Relate the impact of not achieving the enabler goals to actual cases in the same industry and
leverage industry benchmarks.
• Document the impact of actual enabler weaknesses in terms of bottom-line impact, integrity of financial reporting, hours lost
in staff time, loss of sales, ability to manage and react to the market, customer and shareholder requirements, etc.
• Point out the consequence of non-compliance with regulatory requirements and contractual agreements.
• Measure the actual impact of disruptions and outages on business processes and objectives, and on customers (e.g.,
number, effort, downtime, customer satisfaction, cost).
C-2 Communicate the work performed and findings.
C-2.1 Communicate the work performed.  Communicate regularly to the stakeholders identified in A-1 on progress of the work performed.
C-2.2 Communicate preliminary findings to the assurance engagement • Document the impact (i.e., customer and financial impact) of errors that could have been caught by effective enablers.
stakeholders defined in A-1. • Measure and document the impact of rework (e.g., ratio of rework to normal work) as an efficiency measure affected by
enabler weaknesses.
• Measure the actual business benefits and illustrate cost savings of effective enablers after the fact.
• Use benchmarking and survey results to compare the enterprise’s performance with others.
• Use extensive graphics to illustrate the issues.
• Inform the person responsible for the assurance activity about the preliminary findings and verify his/her correct
understanding of those findings.
C-2.3 Deliver a report (aligned with the terms of reference, scope and agreed-
on reporting standards) that supports the results of the initiative and
enables a clear focus on key issues and important actions.

© ISACA 2014 All rights reserved. 29

You might also like