Test of Control

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Test of control

Testing of control principles in auditing involves assessing the effectiveness of a


company's internal controls. Auditors do this to gain assurance that financial statements
are reliable and that the risk of material misstatement is reduced. The control principles
that auditors commonly test include the following:
Segregation of Duties: Auditors will test whether duties are appropriately
segregated to prevent fraud or errors. This means that one person should not have
control over all aspects of a transaction. For example, the person who authorizes a
payment should not also be the one who approves the invoice.
Authorization and Approval: Auditors will review documents and transactions
to ensure that they have been properly authorized and approved by the responsible
individuals or authorities.
Physical Controls: Auditors may physically inspect assets, such as cash or
inventory, to ensure that they exist and are properly safeguarded.
Documentation and Record-keeping: Auditors will assess whether the company
maintains adequate documentation and records to support its financial transactions and
positions. This includes checking for completeness and accuracy.
Reconciliation and Matching: Auditors will reconcile different sets of records
or documents to verify that they match and that there are no discrepancies. For
example, bank statements should reconcile with cash records.
Review of Operating Results: Auditors may review the company's operating
results to check for reasonableness and consistency with historical data or industry
standards.
Supervision and Review: Auditors will assess whether there is appropriate
supervision and review of work performed by employees. This helps ensure that errors
or irregularities are detected and corrected in a timely manner.
Access Controls: Auditors will test whether access to sensitive data and systems
is restricted to authorized individuals and that appropriate security measures are in
place.
Automated Controls: In today's digital age, auditors also evaluate automated controls,
such as IT security measures and data validation checks.
Management's Review and Monitoring: Auditors may review whether
management regularly monitors and reviews internal controls and takes corrective
actions when necessary.
General IT controls and application control
General IT controls and application controls are essential aspects of auditing that
focus on assessing the effectiveness of a company's information technology
environment and its specific software applications. These controls help ensure data
accuracy, integrity, security, and compliance with regulatory requirements. Here are
some key principles and considerations for auditing both general IT controls and
application controls:
General IT Controls:
Access Controls:

● Ensure that user access rights are appropriately assigned and revoked.

● Verify that user access is limited to only the necessary systems and data.

● Test authentication and authorization processes to prevent unauthorized access.

Change Management Controls:

● Review the change management process to assess whether changes to IT

systems are properly documented, authorized, and tested.

● Verify that changes do not negatively impact security or system performance.

Segregation of Duties:

● Evaluate whether there is a separation of duties between individuals responsible

for system development, system administration, and user access to prevent


conflicts of interest.

● Confirm that individuals with conflicting roles cannot make unauthorized

changes.
Incident Response and Disaster Recovery:

● Review incident response plans and assess their effectiveness in handling

security breaches or system failures.


● Ensure that disaster recovery plans are in place to minimize downtime in the

event of a disaster.
Physical Security:

● Evaluate physical security measures to safeguard data centers and IT equipment.

● Check for access controls, surveillance, and environmental controls to protect

against theft, damage, and unauthorized access.


Backup and Recovery:

● Examine backup and data retention policies to ensure data can be restored in

case of data loss or corruption.

● Verify that backups are regularly tested for accuracy and completeness.

IT Governance and Policies:

● Assess whether there are IT governance frameworks and policies in place.

● Review IT-related policies and procedures to ensure compliance with industry

standards and regulations.


Vendor Management:

● Evaluate the controls in place for managing third-party vendors, including cloud

service providers and software vendors.

● Verify that vendor contracts include necessary security and compliance

requirements.
Application Controls:
Input Controls:

● Test input validation mechanisms to ensure data entered into applications is

accurate and properly formatted.

● Verify that data is accurately recorded and processed by the application.

Processing Controls:
● Review application logic to ensure that it performs calculations and processes

data correctly.

● Confirm that transactions are processed in the correct sequence.

Output Controls:

● Examine the accuracy of data output from applications, such as reports and

invoices.

● Ensure that output is generated and distributed to authorized individuals only.

Audit Trails and Logging:

● Assess whether applications maintain audit trails and logs of user activities and

system events.

● Review logs for anomalies, unauthorized access attempts, or security breaches.

User Authentication and Authorization:

● Verify that user authentication methods are secure, such as strong passwords or

multi-factor authentication.

● Ensure that users have appropriate authorization levels within the application.

Data Encryption:

● Confirm that sensitive data is encrypted during transmission and storage.

● Assess encryption mechanisms and key management processes.

Error Handling and Exception Reporting:

● Test how the application handles errors and exceptions to prevent data

corruption or system crashes.

● Ensure that exception reports are generated and reviewed.

Communication on internal control


Communication regarding internal controls is a crucial aspect of the auditing
process. Auditors are responsible for assessing the effectiveness of a company's internal
controls and communicating their findings to relevant parties. Here are principles and
considerations for effective communication on internal controls in auditing:
Clarity and Transparency:
Communication should be clear, concise, and transparent. Avoid jargon or
technical language that may not be easily understood by non-auditors.
Tailored to the Audience:
Customize the communication to the needs and level of understanding of the
audience. Different stakeholders may require varying levels of detail and technicality.
Timely Reporting:
Communicate findings and recommendations in a timely manner. Delays in
reporting can hinder the timely resolution of control deficiencies.
Written Documentation:
Prepare written reports or memos that detail the assessment of internal
controls. This documentation should include findings, recommendations, and any
identified control deficiencies.
Clear Identification of Control Deficiencies:

Clearly identify and describe control deficiencies, specifying whether they are
significant or minor. Explain the potential impact on financial reporting and the
organization's operations.
Risk Assessment:
Communicate the auditor's assessment of the risks associated with identified
control deficiencies. Discuss the likelihood and potential magnitude of the risks.
Root Causes:
Whenever possible, provide insights into the root causes of control deficiencies.
Understanding the underlying issues can assist in developing effective remediation
strategies.
Recommendations for Improvement:
Offer practical and actionable recommendations for addressing control
deficiencies. These recommendations should focus on improving the design and
operation of controls.
Management's Response:
Include management's response to the findings and recommendations.
Management should provide feedback on whether they agree or disagree with the
findings and outline their plans for corrective action.
Monitoring and Follow-Up:
Discuss the process for monitoring and following up on control deficiencies.
Specify how and when management will implement corrective measures and when
auditors will re-evaluate the controls.
Board and Audit Committee Communication:
Communicate significant control deficiencies to the board of directors and the
audit committee. Ensure that these stakeholders are aware of any material weaknesses
in internal controls.
Constructive Dialogue:
Encourage a constructive dialogue between auditors and management. This
fosters a collaborative approach to addressing control issues.
Confidentiality:
Maintain the confidentiality of sensitive information, especially when reporting
control deficiencies that could be exploited by malicious actors.
Continuous Communication:

Maintain ongoing communication with management throughout the audit


process. Address questions, provide clarifications, and share progress updates.
Training and Education:
Offer training or educational sessions to assist management in understanding the
importance of internal controls and best practices for control design and
implementation.

You might also like