ISA Material
ISA Material
ISA Material
ISA
ISBN - 978-81-8441-995-5
INFORMATION SYSTEMS
AUDIT 3.0 COURSE
Module - 1
Information Systems Audit Process
Module - 1
Digital Accounting and Assurance Board
The Institute of Chartered Accountants of India August | 2020 | P2724 (Revised)
ICAI Bhawan,Hostel Block, 7th Floor
A-29, Sector-62 Digital Accounting and Assurance Board
Noida - 201309, India The Institute of Chartered Accountants of India
Tel (Direct): +91 120 3045992/961
Web: www.icai.org (Set up by an Act of Parliament)
New Delhi
Background Material
on
Information Systems Audit 3.0 Course
Module-1:
Information Systems Audit Process
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form, or by any means, electronic mechanical, photocopying, recording, or
otherwise, without prior permission, in writing, from the publisher.
DISCLAIMER
The views expressed in this material are those of author(s). The Institute of Chartered Accountants
of India (ICAI) may not necessarily subscribe to the views expressed by the author(s).
The information in this material has been contributed by various authors based on their expertise
and research. While every effort have been made to keep the information cited in this material error
free, the Institute or its officers do not take the responsibility for any typographical or clerical error
which may have crept in while compiling the information provided in this material. There are no
warranties/claims for ready use of this material as this material is for educational purpose. The
information provided in this material are subject to changes in technology, business and regulatory
environment. Hence, members are advised to apply this using professional judgement. Please visit
34& portal for the latest updates. All copyrights are acknowledged. Use of specific
hardware/software in the material is not an endorsement by ICAI.
Email : [email protected]
ISBN : 978-81-8441-995-5
vi
Contents
Chapter 1: Concepts of IS Audit 1–22
1.1 Learning Objectives 1
1.2 Introduction 1
1.3 Definitions 2
1.4 Concepts of IS Audit 3
1.5 Concepts of IS Audit and Auditing in a computerised environment 4
1.5.1 Audit in a computerised environment 4
1.5.2 IS Audit and Audit of computerised environment 5
1.6 Concept of IT Risk 6
1.6.1 IT Risk in the risk hierarchy 6
1.6.2 Risk Management 7
1.7 Risk based auditing 7
1.8 Audit Universe 8
1.8.1 Benefits of having an Audit universe 8
1.9 Audit Risk and materiality 10
1.9.1 Audit Risk 10
1.9.2 Materiality 11
1.10 Concepts of Internal Controls 13
1.10.1 Types of internal controls 13
1.10.2 Types of IS Controls 14
1.11 Organisation of IS Audit Function 14
1.11.1 Infrastructure and organisation 15
1.11.2 Internal and external audit control framework 15
1.11.3 Quality assessment and peer review 16
1.11.4 Standards on audit performance 16
1.12 Summary 17
1.13 Case studies 17
1.14 Questions 19
1.15 Answers and explanation 21
viii
2.9.2 COBIT 2019 Framework: principles, components and core models 40
2.10 Risk Assessment 44
2.10.1 Guidance on Risk assessment by ISACA 45
2.10.2 Risk Management steps 46
2.10.3 Risk assessment procedures and related activities 48
2.10.4 Use of Risk assessment in audit planning 48
2.11 Governance and Management controls 49
2.11.1 IT General Controls 49
2.11.2 IT Application controls 57
2.11.3 Scope and steps of IS Audit of application software 60
2.12 Creation of Risk control Matrix 62
2.13 Audit sampling, Data Analysis and business intelligence 63
2.13.1 Audit sampling 63
2.13.2 Data Analysis 64
2.13.3 Business Intelligence 65
2.13.4 Analytical review procedures 66
2.14 Compliance Testing 66
2.15 Substantive Testing 67
2.16 Design and operational effectiveness 67
2.16.1 Design effectiveness 67
2.16.2 Operational effectiveness 68
2.17 Audit Evidence: Methods 69
2.17.1 Evaluating audit evidence 69
2.17.2 Types of evidence 70
2.17.3 Evidence preservation 71
2.17.4 Standards on evidence 71
2.18 Audit Documentation 74
2.18.1 Test working papers 75
ix
2.18.2 Organisation of audit working papers 75
2.18.3 Documentation controls 76
2.19 Using work of another auditor and expert 77
2.20 Evaluation of strength and weaknesses: judging by materiality 79
2.21 Risk ranking 80
2.22 Audit report structure and content 81
2.23 Management implementation of recommendation 84
2.24 Follow up review 84
2.25 Summary 85
2.26 Case studies 86
2.27 Questions 88
2.28 Answers with explanation 90
x
4.3 Business application software – parameters for selection 105
4.4 Types of business application 106
4.5 Key features and controls of business application 107
4.6 Application controls 107
4.6.1 Internal controls 107
4.7 Objectives of application controls 108
4.7.1 Objectives 108
4.7.2 Information criteria 108
4.7.3 Application controls objectives 109
4.7.4 Control practices 110
4.8 Summary 115
4.9 Questions 115
4.10 Answers with explanation 117
xi
5.6 Questions 125
5.7 Answers with explanation 128
xii
Chapter 1
Concepts of IS Audit
1.1 Learning Objectives
The objective of this chapter is to provide sufficient knowledge about the fundamental concepts
of information systems audit. This chapter provides insight into all the key concepts relating to
IS audit such as IS Audit methodology, enterprise risk management, risk-based auditing,
materiality, internal controls and the roles and responsibilities of the IS audit function. A good
understanding of these concepts will enable auditors to plan, perform and provide report on IS
Assurance and consulting assignments. The concepts covered are the building blocks for
execution and reporting of IS audit.
1.2 Introduction
In the present age of globalization, Information Systems have become the backbone for any
organization whether the field of its operations is manufacturing, education, trading, technology
or entertainment, etc. Nowadays, the success of any organization thrives on information that is
generated within the information systems. IT is used by enterprises for providing greater
satisfaction to customers, to access wider range of information, to handle business changes as
real time events, and create more efficiency within the enterprise. Further, with the development
of automated information systems there has been a simultaneous increase in the threats to the
security of information systems which has led to financial losses to the enterprise and most
importantly loss of critical information. Hence, in the current competitive world, the enterprises
strive not only to attain more efficiency and effectiveness of business through implementation
of information systems but also secure the information which has become the most valuable
asset to the enterprise.
As an IS auditor, the scope of work can vary from assisting the enterprise in selection and
implementation of information systems to providing assurance services. The engagements can
go beyond just implementing some basic IT level security. It is important for organisations to
take a holistic approach and implement security from a governance perspective with
involvement of board in directing and monitoring the use of IT for achieving business objectives.
Regulatory requirements also demand involvement of senior management in effective decision
making in all key aspects of IT security. Senior management look for assurance from IS Auditors
on the availability, adequacy and appropriateness of IT controls as implemented and also seek
advice on best deployment of IT for achieving business objectives. Hence, the role of IS auditor
has expanded to review not only whether IT is deployed in a safe and secure environment but
also to provide advisory services on optimum use of technology to enable organizations to
survive and thrive in the competitive environment while complying with regulatory requirements.
Background Material on Information Systems Audit 3.0 Course (Module 1)
1.3 Definitions
Audit: In simple terms, audit is an inspection of an organization’s accounts, typically by an
independent body. In case of financial audit, audit is an independent examination of financial
information of any entity, whether profit oriented or not, and irrespective of its size or legal form
with a view to expressing an opinion thereon. In case of IS Audit, the audit encompasses
independent review and evaluation of automated information systems, related manual systems
and the interfaces between them.
Computer System: A computer is an electronic device that processes data by following a set
of instructions. It has the ability to receive input, process data, and with the processed data,
create information for storage and/or output. A computer system is a complete and functional
computer that includes required hardware and software.
Information: As per IT Act 2000, information includes data, messages, images, sound, voice,
codes, computer programs, software and databases or microfilm or computer-generated micro
fiche. In general, data processed in a meaningful context is information. Information has value
to user. Information is data that is (1) accurate and timely, (2) specific and organized for a
purpose, (3) presented within a context that gives it meaning and relevance, and (4) can lead
to an increase in understanding and decrease in uncertainty.
Information Systems (IS): Information systems are formal, sociotechnical, organizational
systems designed to collect, process, store, and distribute information. In a sociotechnical
perspective, information systems are composed by four components: task, people, structure,
and technology. In general, Information Systems refer to hardware and software, that people
and organizations use to collect, filter and process, create, and distribute data. Specifically in
the context of IT, Information systems support data-intensive applications and include the
design and implementation of languages, data models, process models, algorithms, networks
etc.
Secure system: It means computer hardware, software and procedures that are reasonably:
(a) Secure from unauthorized access and misuse;
(b) Provide assurance for correct information processing;
(c) Suited to perform intended functions; and
(d) Adhere to generally accepted security procedures.
Risk: It is the potential of uncertain event resulting in losing something of value, weighed against
the potential to gain something of value. In IT parlance, it can be an uncertain event or
something going wrong, which affects enterprise from achieving its objectives. Risk is the
potential that a given threat will exploit the vulnerabilities of an asset or a group of assets to
cause loss or damage to the assets.
Internal Control: It is a process implemented in an organization to help in achieving specific
2
Concepts of IS Audit
goals. Internal controls include the policies, standards, practices & procedures, and
organisational structures designed to provide reasonable assurance that enterprise objectives
will be achieved and undesired events will be prevented, detected and corrected.
Business Process: A business process is a collection of related, structured activities
or tasks that produce a specific service or product (serve a particular goal) for a particular
customer or customers. It often can be visualized with a flowchart as a sequence of activities,
decision points or with a Process Matrix showing interrelated activities based on data flow in the
process.
3
Background Material on Information Systems Audit 3.0 Course (Module 1)
4
Concepts of IS Audit
information that may affect the organization and the procedures employed by it to implement
adequate and appropriate internal controls. Accordingly, the procedures followed by the auditors
in their review and evaluation of the information systems, related internal controls, nature, timing
and extent of audit procedures are directly impacted by the computerised information systems
environment. Hence, the audit approach and the audit evidence have moved from physical to
digital and it may become necessary for auditors to use computers to audit this digital
information.
5
Background Material on Information Systems Audit 3.0 Course (Module 1)
IT–Risk
1.6.1 IT Risk in the Risk Hierarchy
Managing the IT risk of the enterprise starts with defining the risk universe; a risk universe
describes risk in the overall environment and provides a structure for managing IT risk. The Risk
universe:
considers the overall business objectives, business processes and their dependencies
throughout the enterprise. It describes which IT applications and infrastructure support
the business objectives through the provision of IT services. It is worth highlighting that
IT risk needs to be seen from an end-to-end business activity perspective, crossing IT
function silos (IT operations, project management, application development, disaster
recovery, security, etc.).
considers the full value chain of the enterprise. This can include not only the enterprise
and its subsidiaries/business units, but also clients, suppliers and service providers.
6
Concepts of IS Audit
7
Background Material on Information Systems Audit 3.0 Course (Module 1)
relying on internal and operational controls as well as knowledge of the business of the
company. This type of risk assessment decision can help relate the cost-benefit analysis of the
controls to the known risks, allowing practical choices.
Business risks include concerns about the probable effects of an uncertain event in achieving
established business objectives. The nature of these risks maybe financial, regulatory or
operational, and may also include risks derived from specific technology deployment. For
example, an airline company is subject to extensive safety regulations and economic changes,
both of which impact the continuing operations of the company. In this context, the availability
of IT services and their reliability are critical.
By understanding the nature of business, IS Auditors can identify and categorize the types of
risks associated with the business and identify the risks applicable to specific situations. On the
other hand, risk assessment refers to the methodology where risks have been given elaborate
weights based on the nature of the business or the significance of the risk and risks are
categorized as high, medium or low based on which appropriate decisions are taken by the
management.
SA 315, the standard for risk identification and assessment requires IS Auditors to assess risk
that is part of the business environment and the internal control system. SA 330 requires IS
Auditors to review whether management has designed and implemented appropriate risk
remediation measures and provide recommendations on the residual risks that have been
identified as critical and are not appropriately mitigated. Usually the IS Auditor would provide
recommendations for risk remediation as part of the Audit Report.
8
Concepts of IS Audit
In these situations, individual engagements in the audit plan, drawn from the audit universe, can
be organised to address the top risks to the organisation focused on those aspects managed at
the location. The important issue here is making sure regular or cyclical audit reviews result in
auditing the management of significant risks rather than risks that have little or no significance.
Thus, entities or areas within the audit universe with a lower risk ranking would be audited at
a different frequency than those with a higher risk rating. Indeed it is possible that some areas
within the audit universe will never be audited, highlighting the importance of other assurance
providers for those areas.
An audit universe can be a useful aid to help communicate the amount of coverage of the
organisation by internal audit, which can be invaluable during resourcing discussions. The table
below shows an example of planned coverage by audit against the total audit universe (in this
case, ranked into tiers 1, 2 and 3, as per their risk impacts).
In practice, other considerations may override the simplified tier classification. Those
include, but are not limited to:
1. Board/senior management requested review(s)
2. Regulator requested review(s)
In these circumstances, those considerations would be incorporated into the risk assessment
and therefore form part of the risk rating to facilitate tier classification.
The audit universe can be valuable to assist the head of internal audit consider all of the relevant
areas in forming an "overall audit opinion".
10
Concepts of IS Audit
the degree of audit risk, the assessment of which is critical to the effectiveness of the audit
effort. Amongst the critical factors affecting the audit risk is the appropriate assessment of the
control environment. The preliminary review of audit environment enables the IS Auditor to gain
understanding of the business, technology and control environment and also gain clarity on the
objectives of the audit and scope of audit. Risk assessment allows the IS Auditor to determine
the scope of the audit and assess the level of audit risk.
1.9.2 Materiality
The concept of materiality in the case of financial audit is based on value and volume of the
transactions and the relevant error or discrepancy or control weakness detected. In case of
regulatory audit, materiality is based on impact of non-compliance and in case of IS Audit,
materiality is based on the effect or consequence of the risk in terms of potential loss. Hence,
materiality varies based on the scope and objectives of the audit and specific auditee
environment. Materiality is an important aspect of the professional judgment of the IS Auditor
as he/she has to decide whether the information is material or immaterial. With regards to the
materiality of the financial statements, information is regarded as material if it changes the
decision of the users of the financial statement i.e. if the misstatement is of a high value and
quantity. The IS Auditor should have a good understanding of these audit risks when planning
an audit. An audit sample may not detect every potential error in a population. When evaluating
internal controls, the IS Auditor should realize that a given system may not detect a minor error.
However, that specific error, combined with others, could become material to the overall system.
The concept of materiality requires sound judgment from the IS Auditor. The IS Auditor may
detect a small error that could be considered significant at an operational level, but may not be
viewed as significant to upper management. Materiality considerations combined with an
understanding of audit risk are essential concepts for planning the areas to be audited and the
specific tests to be performed in the audit. Higher the level of materiality, lower is the risk that
an IS auditor is, usually, willing to take.
For systems and operations not affecting financial transactions, following are the examples of
measures that should be considered to assess materiality:
Criticality of the business processes supported by the system or operation
Cost of the system or operation (i.e., hardware, software, staff, third-party services,
overheads, and a combination of these). As for example a virus has been detected and
cleaned and there was no impact on business or operations. Apparently, this may not be
a material risk. However, materiality can be correctly determined only when root cause
analysis is done to ascertain as to how and from where the virus entered the
organisation’s information systems. The analysis may reveal that there is a weakness in
control process. Hence, although the incident per se is not material but inherent cause of
weakness is definitely material as the virus problem can recur and cause harm to the
11
Background Material on Information Systems Audit 3.0 Course (Module 1)
organisation’s information systems. If auditor fails to detect this weakness, it might result
in detection risk.
Potential cost of errors (possibly in terms of lost sales, warranty claims, irrecoverable
development costs, cost of publicity required for warnings, rectification costs, health and
safety costs, unnecessarily high costs of production, high wastage, etc.)
Number of accesses/transactions/inquiries processed per period
Nature, timing and extent of reports prepared and files maintained
Nature and quantities of materials handled (e.g., where inventory movements are
recorded without values)
Service level agreement (SLA) requirements and cost of potential penalties
Penalties for failure to comply with legal and contractual requirements.
SA 320 is the Auditing standard for Audit Materiality. It requires the Auditor to report those
items that create an impact on the financial statements and which changes the decision that
would be made by the stakeholder. The same concept is applied even when conducting an IS
Audit Engagement. The ITAF (Information Technology Assurance Framework) 3rd edition issued
by ISACA has the following standards on “Materiality” which have to be complied by the IS
Auditor.
1204.1 IS audit and assurance professionals shall consider potential weaknesses or absences
of controls while planning an engagement, and whether such weaknesses or absences of
controls could result in a significant deficiency or a material weakness.
1204.2 IS audit and assurance professionals shall consider audit materiality and its relationship
to audit risk while determining the nature, timing and extent of audit procedures.
1204.3 IS audit and assurance professionals shall consider the cumulative effect of minor
control deficiencies or weaknesses and whether the absence of controls translates into a
significant deficiency or a material weakness.
1204.4 IS audit and assurance professionals shall disclose the following in the report:
a. Absence of controls or ineffective controls
b. Significance of the control deficiency
c. Likelihood of these weaknesses resulting in a significant deficiency or material weakness.
12
Concepts of IS Audit
The increasing use of IT in organizations has made it imperative that appropriate information
systems are implemented in an organization. IT should cover all key aspects of business
process of an enterprise which have an impact on its strategic and competitive advantage for
its success. Control is defined by ISACA as: “the policies, procedures, practices and the
organisation structure that are designed to provide reasonable assurance that the business
objectives will be achieved and undesired events are prevented or detected and corrected”. This
definition of control is applied for all IS Audits. Internal Controls are normally composed of
policies, procedures, practices and organizational structures which are implemented to reduce
risks in the organisation to an acceptable level. Internal controls are developed to provide
reasonable assurance to management that the organization’s business objectives will be
achieved and risk events will be prevented or detected and corrected.
Internal control activities and supporting processes are either manual or driven by automated
computer information resources. Thus, IS audit includes reviewing the implemented systems or
providing consultation and evaluating the reliability of operational effectiveness of controls. The
objective of controls is to reduce or if possible, eliminate the causes of the exposure to potential
loss.
General
Controls
Internal
Controls
IS
Controls
13
Background Material on Information Systems Audit 3.0 Course (Module 1)
IS Controls
Information Systems Controls
Application IT General
Controls Controls
Apply to IT environment in
Specific to application software
general
14
Concepts of IS Audit
15
Background Material on Information Systems Audit 3.0 Course (Module 1)
16
Concepts of IS Audit
1007 Assertions
1007.1 IS audit and assurance professionals shall review the assertions against which the
subject matter will be assessed to determine that such assertions are capable of being audited
and that the assertions are sufficient, valid and relevant.
1008 Criteria
1008.1 IS audit and assurance professionals shall select criteria, against which the subject
matter will be assessed, that are objective, complete, relevant, measurable, understandable,
widely recognised, authoritative and understood by, or available to, all readers and users of the
report.
1008.2 IS audit and assurance professionals shall consider the source of the criteria and focus
on those issued by relevant authoritative bodies before accepting lesser-known criteria.
1.12 Summary
This chapter has provided brief overview of the fundamental concepts of Audit, IS audit, risks,
controls and internal controls. We have also provided the distinction between audit in an IS
environment and audit of a computerized environment. Further, the conceptual understanding
of IT risk and risk-based auditing has been provided with an overview of types of audit risks and
their categorization as: Inherent Risk, Control Risk and Detection Risk. The concept of
materiality and internal controls with overview of types of internal controls has been provided.
Controls can be classified as, IS Controls and General Controls and IS controls are bifurcated
as IT Application Controls which are specific to application softwares and IT General Controls
which pertain to the IT environment in general. The classification of controls as preventive,
detective and corrective has been explained. The overall objective of this chapter is to provide
an understanding of the key concepts of information systems, audit function, materiality and the
attached risks.
17
Background Material on Information Systems Audit 3.0 Course (Module 1)
To adhere to SLA, M/s InfoTech Solutions detailed out following audit program:
(i) Detailed Risk Assessment will not be carried out. Audit will be assigned to a Senior IS
Auditor and he will decide audit area and sampling techniques as per his prior
experiences.
(ii) Initially, 2 associates will be allotted for the assignment. More resources will be provided
as and when required.
(iii) Senior Auditor will have to submit his draft report to Partner by 25th day and final report
to be issued to client by 30th day.
(iv) To preserve time, working papers and evidence gathering will be structured once the final
report is submitted.
Questions:
(1) While planning an audit M/s InfoTech Solutions should have FIRST identified:
(a) Areas of High risk.
(b) Skill sets of the audit staff.
(c) Test steps in the audit.
(d) Time allotted for the audit.
Correct Answer: A, areas of high risk
Explanation:
(a) When designing an audit plan, it is important to identify the areas of highest risk to
determine the areas to be audited.
(b) Skill sets of audit staff is an important consideration. However, unless risks are
identified it will not be known how and where to utilize the skills.
(c) Compliance test and substantial test can be effectively carried out only once
auditor is aware about areas of high risk.
(d) Allotment of time is important but not the first & primary step like identification of
high-risk areas.
(2) M/s InfoTech Solutions has decided to Skip Risk Assessment Process. What is the
Primary Risk involved here?
18
Concepts of IS Audit
1.14 Questions
1 The primary purpose and existence of an audit charter is to:
A. Document the audit process used by the enterprise
B. Formally document the audit department’s plan of action
C. Document a code of professional conduct for the auditor
D. Describe the authority and responsibilities of the audit department
2 Which of the following control classifications identify the cause of a problem and
minimize the impact of threat?
A. Administrative Controls
B. Detective Controls
19
Background Material on Information Systems Audit 3.0 Course (Module 1)
C. Preventive Controls
D. Corrective Controls
3. To conduct a system audit, the IS auditor should
A. Be technically at par with client’s technical staff
B. Be able to understand the system that is being audited
C. Possess knowledge in the area of current technology
D. Only possess a knowledge of auditing.
4 Which of the following are most commonly used to mitigate risks discovered by
organizations?
A. Controls
B. Personnel
C. Resources
D. Threats
5 The rate of change in technology increases the importance of:
A. Outsourcing the IS function
B. Implementing and enforcing good processes
C. Hiring personnel willing to make a career within the organisation
D. Meeting user requirements
6 What means the rate at which opinion of the IS Auditor would change if he selects
a larger sample size?
A. Audit Risk
B. Materiality
C. Risk Based Audit
D. Controls
7 Which of the following cannot be classified as Audit Risk?
A. Inherent Risk
B. Detection Risk
C. Controllable Risk
20
Concepts of IS Audit
D. Administrative Risk
8 After you enter a purchase order in an on-line system, you get the message, “The
request could not be processed due to lack of funds in your budget”. This is an
example of error?
A. Detection
B. Correction
C. Prevention
D. Recovery
9 When developing a risk-based audit strategy, an IS auditor should conduct a risk
assessment to ensure that:
A. Controls needed to mitigate risks are in place.
B. Vulnerabilities and threats are identified.
C. Audit risks are considered.
D. Gap analysis is appropriate
10 Reviewing management's long-term strategic plans helps the IS auditor:
A. Gains an understanding of an organization's goals and objectives.
B. Tests the enterprise's internal controls.
C. Assess the organization's reliance on information systems.
D. Determine the number of audit resources needed.
21
Background Material on Information Systems Audit 3.0 Course (Module 1)
auditee’s staff. He should have the knowledge of audit along with the technology in
the related subject of audit. Correct answer is B.
4 Controls are most commonly used to mitigate risks discovered by organizations. This
is what organizations implement as a result of the risks an organization discovers.
Resources and personnel are often expended to implement controls. Correct answer
is A.
5 Rate of change of technology increases the importance of implementing and enforcing
good practices. Correct answer is B.
6 Audit risk means the rate at which opinion of the IS Auditor would change if he selects
a larger sample size. Audit risk can be high, moderate or low depending on the sample
size selected by the IS Auditor. A risk-based audit approach is usually adapted to
develop and improve the continuous audit process. Materiality means importance of
information to the users. It is totally the matter of the professional judgment of the IS
Auditor to decide whether the information is material or immaterial. Correct answer is
A.
7 Inherent risk means overall risk of management which is on account of entity’s
business operations as a whole. Controllable risk is the risk present in the internal
control system and the enterprise can control this risk completely and eliminate it from
the system. Detection risk is the risk of the IS Auditor when he is not able to detect
the inherent risk or the controllable risk. Correct answer D
8 To stop or prevent a wrong entry is a function of error prevention. All other options
work after an error. Prevention works before occurrence of error. Correct answer is C.
9 In developing a risk-based audit strategy, risks and vulnerabilities are to be
understood. This determines areas to be audited and the extent of coverage.
Understanding whether appropriate controls required to mitigate risks are in place is
a resultant effect of an audit. Audit risks are inherent aspects of auditing, are directly
related to the audit process and are not relevant to the risk analysis of the environment
to be audited. Gap analysis would normally be done to compare the actual state to an
expected or desirable state. Correct answer B.
10 Strategic planning sets corporate or departmental objectives into motion. It is time and
project-oriented, but must also address and help determine priorities to meet business
needs. Reviewing long-term strategic plans will not achieve objectives by other
choice. Correct answer is A.
22
Chapter 2
IS Audit in Phases
2.1 Learning Objectives
This chapter provides detailed insights into various phases of IS audit. The fundamental
concepts which were discussed in earlier chapter are connected to their practical aspects in
terms of how to define the audit scope and objectives, gain knowledge of the organisation’s
business, assessment of risk, IT application controls and IT general controls of the enterprise.
Sampling and testing methodologies using CAAT as used by the IS auditor are also discussed.
How to develop audit programs and approach and design appropriate tests for compliance and
substantive testing for reviewing the design effectiveness and operational effectiveness of the
Information Systems are explained. The need for IS auditor to obtain sufficient evidence as a
part of the audit process which forms critical part of the assurance services as well as use of
global best practices as benchmarks for performing and reporting IS audit findings are discussed
in this chapter. Please note that ‘organisation’ and ‘enterprise’ words are used inter-changeably.
2.2 Introduction
Information systems have become an integral part of business processes. The growth of
technology has made IT an indispensable part of our day to day functioning. Organizations value
information as the most critical asset and hence it has become more vulnerable to theft causing
loss to the enterprise. There is a risk that the information may be stolen fraudulently and
fraudsters can use it for financial gains. Information systems are helping organizations in
improving efficiency in customer delivery and also opening up new delivery channels. In order
to adapt to these technological advancements organizations have reengineered their processes
which has potential of introducing new vulnerabilities. There is critical requirement of enhancing
value of information by making it available online but this should be coupled with right level of
security. In the networked world, the fraudsters can intrude the systems anytime and from
anywhere. It is important that the management not only has systems and processes in place to
ensure that adequate controls exist and are working effectively but also having an independent
evaluation by IS Audit professionals. The IS auditor has to plan the audit keeping in mind the
scope and objectives of the audit including the auditee environment, regulatory requirements
and technology deployment. The IS Audit phases are summarized in the following diagram.
Background Material on Information Systems Audit 3.0 Course (Module 1)
IS Audit Phases
24
IS Audit in Phases
25
Background Material on Information Systems Audit 3.0 Course (Module 1)
Responsibility
Operating principles
Independence
Relationship with external audit
Auditee requirements
Critical success factors
Key performance indicators
Risk assessment
Other measures of performance
Authority
Right of access to information, personnel, locations and systems relevant to the
performance of audits
Scope or any limitations of scope
Functions to be audited
Auditee expectations
Organizational structure, including reporting lines to board and senior management
Grading of IS audit staff
Accountability
Reporting lines to senior management
Assignment performance appraisals
Personnel performance appraisals
Staffing/career development
Auditee rights
Independent quality reviews
Assessment of compliance with standards
Benchmarking performance and functions
Assessment of completion of the audit plan
Comparison of budget to actual costs
Agreed actions, e.g., penalties when either party fails to carry out their responsibilities
26
IS Audit in Phases
27
Background Material on Information Systems Audit 3.0 Course (Module 1)
28
IS Audit in Phases
approach, documentation and methodology with appropriate templates for various types of
assignments. Best practices and frameworks along with the required standards, guidelines and
procedures should be used in developing quality assurance process and all the staff should be
trained in the process to be followed in all stages of planning to execution and reporting of
various types of assignments.
According to SA 220 of ICAI, Quality Control Systems, policies and procedures are the
responsibility of the audit firm. Under SQC 1, the firm has an obligation to establish and maintain
a system of quality control to provide it with reasonable assurance that: (a) The firm and its
personnel comply with professional standards and regulatory and legal requirements; and (b)
The reports issued by the firm or engagement partners are appropriate in the circumstances.
This SA 220 is premised on the basis that the firm is subject to SQC 1. Within the context of the
firm’s system of quality control, engagement teams have a responsibility to implement quality
control procedures that are applicable to the audit engagement and provide the firm with
relevant information to enable the functioning of that part of the firm’s system of quality control
relating to independence. Engagement teams are entitled to rely on the firm’s system of quality
control, unless information provided by the firm or other parties suggests otherwise.
29
Background Material on Information Systems Audit 3.0 Course (Module 1)
Are there areas that have undergone a significant degree of change? Examples of
changes within an entity are new technology deployed, increased staff turnover, and
reorganization. Examples of changes to an entity’s environment are new regulatory
requirements, change in senior management and budget cuts etc.
Is the timing appropriate for auditing the issue?
Are there any examples of past non-compliances?
What is the management style and the risk appetite and approach to risk management?
Are there any cases of past fraud or material errors?
Carefully scoping the audit early in the process helps increase efficiency and effectiveness of
the audit. The statement of scope should be clear about any areas excluded from audit.
30
IS Audit in Phases
effectiveness and efficiency of the audit and to coordinate audit procedures with work of
the entity’s personnel. The overall audit plan and the audit program; however, remain the
IS Auditor’s responsibility.
The IS Auditor should develop and document an overall audit plan describing the expected
scope and conduct of the audit. While the record of the overall audit plan will need to be
sufficiently detailed to guide the development of the audit program, its precise form and content
will vary depending on the size of the entity, the complexity of the audit and the specific
methodology and technology used by the IS Auditor.
Audit should be guided by an overall audit plan and underlying audit program and methodology.
Audit planning is often mistaken as a one-time activity to be taken and completed in the
beginning of the audit. While for all practical purposes, planning is a continuous activity which
goes on throughout the entire audit cycle. Many a times changes in conditions or circumstances
or unexpected findings during the course of audit require changes in the audit procedures and
methodology initially planned. Hence, IS Auditor is expected to modify the audit plan as
circumstances may require. The documentation of the audit plan is also a critical requirement.
All changes to the audit plan should follow a change management procedure with every change
being recorded with the reason for the change. Information Technology Assurance Framework
(ITAF) 3rd edition issued by ISACA provides the following standards to be followed by IS
Auditors:
1201.1 IS audit and assurance professionals shall plan each IS audit and assurance
engagement to address:
Objective(s), scope, timeline and deliverables
Compliance with applicable laws and professional auditing standards
Use of a risk-based approach, where appropriate
Engagement-specific issues
Documentation and reporting requirements
1201.2 IS audit and assurance professionals shall develop and document an IS audit or
assurance engagement project plan, describing the:
Engagement’s nature, objectives, timeline and resource requirements
Timing and extent of audit procedures to complete the engagement
Risk Assessment in Planning
1202.1 The IS audit and assurance function shall use an appropriate risk assessment approach
and supporting methodology to develop the overall IS audit plan and determine priorities for the
effective allocation of IS audit resources.
31
Background Material on Information Systems Audit 3.0 Course (Module 1)
1202.2 IS audit and assurance professionals shall identify and assess risk relevant to the area
under review, when planning individual engagements.
1202.3 IS audit and assurance professionals shall consider subject matter risk, audit risk and
related exposure to the enterprise.
Steps for Audit Planning
Gain an understanding of the business’s mission, objectives, purpose and processes,
which include information and processing requirements such as availability, integrity,
security and business technology and information confidentiality.
Understand changes in business environment of the auditee
Review prior work papers
Identify stated contents such as policies, standards and required guidelines, procedures
and organisation structure
Perform a risk analysis to help in designing the audit plan
Set the audit scope and audit objectives
Develop the audit approach or audit strategy
Assign personnel resources to the audit
Address engagement logistics.
32
IS Audit in Phases
Reliability
Fiduciary
Compliance
Efficiency
Objectives of IS Quality
Controls Effectiveness
Confidentiality
Security Integrity
Availability
33
Background Material on Information Systems Audit 3.0 Course (Module 1)
result in an enhancement to service quality or quantity. If this is not so, then the business case
must be quite clear about why the change is necessary.
34
IS Audit in Phases
with such regulatory areas as SOX 404(LODR of SEBI - the Indian version of Sarbanes Oxley
Act i.e. SOX 2002) focus on ensuring the integrity of information.
The CIA Triad is entirely concerned with information. While this is the core factor of most IT
security, it promotes a limited view of security that tends to ignore some additional, important
factors. For instance, while Availability might serve to ensure that one does not lose access to
resources that are needed to provide information when it is needed but thinking in terms of
information security, Availability in itself in no way guarantees that someone else isn't making
unauthorized use of your hardware resources.
35
Background Material on Information Systems Audit 3.0 Course (Module 1)
which are directed towards the achievement of organizational aims. It can also be considered
as the viewing glass or perspective through which individuals see their organization and its
environment. Organizational structure allows the allocation of responsibilities for different
functions and processes to different sub sets of organisation such as
the branch, department, workgroup and individual. The IS Auditor has to factor in the manner in
which the organization is setup to understand roles and responsibilities, policy frameworks, etc.
to ensure efficiency and effectiveness of audit.
2.8.3 IT Infrastructure
The IS Auditor has to obtain understanding of the IT infrastructure of the entity. As a part of
developing the audit plan, the IS Auditor has to keep in mind the present IT infrastructure
capacities, the age of hardware and software, licensing agreements, third party vendor
agreements etc. which all information is essential during the development of the IS audit plan.
This ensures that the plan is effective and efficient. IS Auditors can accordingly plan their
assessment testing on various areas like architecture testing, vulnerability testing, and other
control tastings etc.
36
IS Audit in Phases
Section 43A of the (Indian) Information Technology Act, 2000 provides that a body corporate
possessing, dealing or handling any sensitive personal data or information in a computer
resource which it owns, controls or operates and is negligent in implementing and maintaining
reasonable security practices and procedures resulting in wrongful loss or wrongful gain to any
person, then such body corporate may be held liable to pay damages by way of compensation
to the person so affected. It is important to note that there is no upper limit specified for the
compensation that can be claimed by the affected party in such circumstances.
The IT Amendment Act 2008 recognizes and punishes offences by companies and individual
(employee) actions. For example: Section 66 to 66F and 67 deal with the following crimes:
Sending offensive messages using electronic medium or using body corporate’s IT for
unacceptable purposes
Dishonestly stolen computer resources
Unauthorized Access to computer resources
Identity theft/Cheating by impersonating using computer
Violation of privacy
Cyber terrorism/Offences using computer
Publishing or transmitting obscene material
Under Section 72A of the (Indian) Information Technology Act, 2000, disclosure of information,
knowingly and intentionally, without the consent of the person concerned and in breach of the
lawful contract has been also made punishable with imprisonment for a term extending to three
years or fine extending to INR 5,00,000 or with both.
Sarbanes Oxley Act, 2002 (SOX)
As per section 404 of Sarbanes Oxley Act, 2002 (SOX), the independent Auditor of the
organization is required to opine on the effectiveness of internal controls over financial reporting
in addition to the Auditor's opinion on the fair presentation of the organization's financial
statements.
Section 404 draws attention to the significant processes that feed and comprise the financial
reporting process for an organization. In order for management to make its annual assessment
on the effectiveness of its internal controls, the management is required to document and
evaluate all controls that are deemed significant to the financial reporting processes.
Public Company Accounting Oversight Board (PCAOB)
PCAOB released Auditing Standard 5 “An audit of Internal Control over Financial Reporting that
is integrated with an Audit of Financial Statements”. This standard establishes requirements and
provides direction that applies when an Auditor is engaged to perform an audit of management's
assessment of the effectiveness of internal control over financial reporting ("the audit of internal
37
Background Material on Information Systems Audit 3.0 Course (Module 1)
control over financial reporting") that is integrated with an audit of the financial
statements. Effective internal control over financial reporting provides reasonable assurance
regarding the reliability of financial reporting and the preparation of financial statements for
external purposes. If one or more material weaknesses exist, the company's internal control
over financial reporting cannot be considered effective.
38
IS Audit in Phases
39
Background Material on Information Systems Audit 3.0 Course (Module 1)
General standards (1000 series)—Are the guiding principles under which the IS
assurance profession operates. They apply to the conduct of all assignments, and deal
with the IS audit and assurance professional’s ethics, independence, objectivity and due
care as well as knowledge, competency and skill.
Performance standards (1200 series)—Deal with the conduct of the assignment, such
as planning and supervision, scoping, risk and materiality, resource mobilization,
supervision and assignment management, audit and assurance evidence, and the
exercising of professional judgment and due care.
Reporting standards (1400 series)—Address the types of reports, means of
communication and the information communicated.
ITAF audit and assurance guidelines provide the auditor with information and direction about an
IS audit or assurance area. In line with the three categories of standards outlined above,
guidelines focus on the various audit approaches, methodologies and related material to assist
in planning, executing, assessing, testing and reporting on IS processes, controls and related
IS audit or assurance initiatives. Guidelines also help clarify the relationship between
organisation activities and initiatives, and those undertaken by IT.
40
IS Audit in Phases
stakeholders by maintaining a balance between the realization of benefits and the optimization
of risk and use of resources. COBIT 2019 provides all of the required processes and other
enablers to support business value creation through the use of IT. Because every enterprise
has different objectives, the enterprise can customize COBIT 2019 to suit its own context
through the goals cascade, translating high level enterprise goals into manageable specific IT
related goals and mapping these to specific processes and practices.
The COBIT 2019 goals cascade is the mechanism to translate stakeholder drivers and needs
to specific, actionable and customised enterprise goals and aligning the Goals; Governance and
Management objectives.
Principle 2: Holistic Approach: Efficient and effective governance and management of
enterprise I & T require a holistic approach, taking into account several integrating components.
COBIT 2019 defines a set of seven components of Governance system to support the
implementation of a comprehensive governance and management system for enterprise I & T.
Enablers are broadly defined as anything that can help to achieve objectives of the enterprise.
Principle 3: Dynamic Governance System: A Governance system should be dynamic. This
means that each time one or more of the design factors changes (e.g., a change in strategy or
technology), the impact of these changes on the Enterprise Governance of Information and
Technology (EGIT) system must be considered. A dynamic view of EGIT will lead towards a
viable and future proof EGIT system.
Principle 4: Governance distinct from Management: The COBIT 2019 framework makes a
clear distinction between governance and management. These two disciplines encompass
different types of activities that require different organizational structures and serve different
purposes.
Governance: It ensures that stakeholders needs, conditions and options are evaluated
to determine balanced, agreed on enterprise objectives to be achieved; setting direction
through prioritization and decision making, and monitoring performance and compliance
against agreed on direction and objectives. In most organizations the governance is the
responsibility of the board of directors under the leadership of the chairperson. Specific
governance responsibilities many be delegated to special organizational structures at an
appropriate level, especially in larger, complex organizations.
Management: It plans, builds, runs and monitors activities in alignment with the
directions set by the governing body to achieve the objectives. In most of the enterprises;
management is the responsibility of the executive management under the leadership of
the Chief Executive Officer (CEO).
From the definition of governance and management it is clear that they comprise different types
of activities, with different responsibilities. However, given the role of governance to evaluate,
direct and monitor, a set of interactions is required between governance and management to
41
Background Material on Information Systems Audit 3.0 Course (Module 1)
42
IS Audit in Phases
43
Background Material on Information Systems Audit 3.0 Course (Module 1)
and technology investments and related IT for not only supporting enterprise goals but also to
maintain compliance with internally directed and externally imposed regulations. This dynamic
changing environment provides a challenge for Chartered Accountants (as assurance providers)
to provide assurance with the required level of confidence. However, with the right type of skills
and toolsets, this provides an excellent opportunity for Chartered Accountants to act as
consultants, who provide relevant IT enabled services. A key component of this knowledge base
is usage of globally accepted good practices and frameworks and developing a holistic
approach, which meets the needs of stakeholders.
Evaluating the System of Internal Controls
COBIT 2019 has specific process: “MEA 02 Managed System of Internal Control”, which
provides guidance on evaluating and assessing internal controls implemented in an enterprise.
Such review would provide assurance on the transparency for key stakeholders on the adequacy
of the system of internal controls and this provides trust in operations, confidence in the
achievement of enterprise objectives and understanding of residual risks. The key management
practices for assessing and evaluating the system of internal controls in an enterprise are as
follows:
Monitor internal controls
Review business process controls effectiveness
Perform control self-assessment
Identify and report control deficiencies
44
IS Audit in Phases
enterprise.
6. With regard to services, infrastructure and applications, review service capabilities
required to provide risk and related functions to an enterprise.
7. For the people, skills and competencies enabler, review the skills and competencies
specific for risk.
The key business applications in use at a client are identified and addressed at a high level, in
order to incorporate them into the future planning process. The controls within the client
business application systems residing on the various platforms are evaluated during the course
of the review. The management of the enterprise is expected to continually examine and make
judgment on - the effect of risk on the current and future use of IT in the enterprise, consider
whether the enterprise risk appetite is appropriate and that risk to enterprise value related to
the use of IT is identified and managed.
45
Background Material on Information Systems Audit 3.0 Course (Module 1)
Conduct a preliminary assessment of the risks relevant to the area under review for each
engagement.
Objectives for each specific engagement should reflect the results of the preliminary risk
assessment.
In considering risk areas and planning a specific engagement, consider prior audits,
reviews and findings, including any remedial activities. Also consider the board’s
overarching risk assessment process.
Attempt to reduce audit risk to an acceptable level, and meet the audit objectives by an
appropriate assessment of the IS subject matter and related controls, while planning and
performing the IS audit.
When planning a specific IS audit procedure, recognise that the lower the materiality
threshold, the more precise the audit expectations and the greater the audit risk.
To reduce risk for higher materiality, compensate by either extending the test of controls
(reduce control risk) and/or extending the substantive testing procedures (reduce
detection risk) to gain additional assurance.
46
IS Audit in Phases
7. Determine the specific conditions that existed or were absent when risk events occurred
and the way the conditions affected event frequency and loss magnitude.
8. Perform periodic event and risk factor analysis to identify new or emerging risk issues
and to gain an understanding of the associated internal and external risk factors.
Analyze Risk
1. Develop useful information to support risk decisions that consider the business relevance
of risk factors.
2. Define the appropriate breadth and depth of risk analysis efforts, considering all risk
factors and the business criticality of assets. Set the risk analysis scope after performing
a cost-benefit analysis.
3. Build and regularly update IT risk scenarios, including compound scenarios of cascading
and/or coincidental threat types, and develop expectations for specific control activities,
capabilities to detect and other response measures.
4. Estimate the frequency and magnitude of loss or gain associated with IT risk scenarios.
Consider all applicable risk factors, evaluate known operational controls and estimate
residual risk levels.
5. Compare residual risk to acceptable risk tolerance and identify exposures that may
require a risk response.
6. Analyze cost-benefit of potential risk response options such as avoid, reduce/mitigate,
transfer/share or accept and exploit/seize. Propose the optimal risk response.
7. Specify high-level requirements for projects or programmers that will implement the
selected risk responses. Identify requirements and expectations for appropriate key
controls for risk mitigation responses.
8. Validate the risk analysis results before using them in decision making, confirming that
the analysis aligns with enterprise requirements and verifying that estimations were
properly calibrated and scrutinized for bias.
SA 315 – Standard on Risk Assessment procedures issued by ICAI is also applicable for risk
assessment pertaining to IS Audit assignment. This requires that the IS Auditor perform Risk
Assessment Activities.
47
Background Material on Information Systems Audit 3.0 Course (Module 1)
(a) Inquiries of management and of others within the entity who in the IS Auditor’s judgment
may have information that is likely to assist in identifying risks.
(b) Analytical procedures.
(c) Observation and inspection.
When the IS Auditor intends to use information obtained from the IS Auditor’s previous
experience within the entity and from audit procedures performed in previous audits, the IS
Auditor shall determine whether changes have occurred since the previous audit that may affect
its relevance to the current audit. The IS Auditor shall then assess the risks which are present
in the business environment and in the internal control system that influence the information
systems and determine the nature and extent of the audit engagements on the relevant subjects.
48
IS Audit in Phases
important for the IS auditor to obtain an understanding of these as they are the foundation on
which other controls are built.
A general controls’ review would also include the infrastructure and environmental controls. A
review of the data centre or information processing facility should cover the adequacy of air
conditioning (temperature, humidity), power supply (uninterruptible power supplies, generators)
and smoke detectors/fire suppression systems, a conducive clean and dust free environment,
protection from floods and water seepage as well as neat and identifiable electrical and network
cabling.
Physical access control is another important area for review. Today in a highly networked world,
logical access to computer systems is literally universal, yet there is a necessity to control
physical access too. There are certain commands and settings that can be executed only from
the console of the server and hence it is important to enclose all servers in a secure location
protected by suitable mechanisms like locked doors, access swipe cards, biometric access
devices or a combination of these. Further, the IS auditors should also review the overall access
control measures to the entire facility for controls like security guards at the entry gates,
displaying of identification badges and logging visitors’ access.
IT General controls are controls that are around the applications. These controls support the
healthy maintenance and general security of the applications and the IT processes present.
These processes include Change Management, Logical and Physical Access Management,
Backup and Recovery procedures, Incident Management, Job and Batch Scheduling,
procedures for review of security within Operating systems and databases etc.
IT General controls are controls that are not specific to any application, but exist in an IT
environment. The general controls are designed for the environment as a whole and are all
pervasive. If the IT General controls are not effective it may not be possible to rely on other
controls within the IT environment i.e. the application controls. Some of the IT General Controls
are as follows:
Operating System Controls
Operating System (OS) is the computer control program. It allows users and their applications
to share and access common resources, such as processor, main memory, database and
printers. It performs the main tasks of scheduling jobs, managing hardware and software
resources, maintaining system security, enabling multiuser resource sharing, handling interrupts
and maintaining usage records. To enhance usability, the Operating System must manage these
resources so that these are available to each authorized user. Moreover, each user must be
able to execute a job without regard to the other users.
Auditors often pay little attention to Operating System controls. Breaches of operating systems
controls could have catastrophic effect. The OS must be protected from user processes and
should be robust. Among various controls of OS, limiting administrator account access,
safeguarding domain controller, implementing adequate password policy and access control
49
Background Material on Information Systems Audit 3.0 Course (Module 1)
mechanism for OS, deactivating default accounts, regular patch management, implementing
updated anti-virus solution, hardening of OS etc. would help the system to remain secure.
Organisational Controls
These controls are concerned with the decision-making processes that lead to management and
authorization of transactions. Companies with large data processing facilities separate data
processing from business units to provide control over its costly hardware, software, and human
resources. Combining data processing into the business units would be too much responsibility
for one manager. Organizational control techniques include documentation of:
Definition of responsibilities and objectives of each function,
Policies and procedures,
Job descriptions, and
Segregation of duties.
(i) Responsibilities and objectives: Each IS function must be clearly defined and documented,
including systems software, application programming and systems development, database
administration, and operations. The senior manager of all these groups, and managers of the
individual groups make up the IS management team responsible for the effective and efficient
utilization of IS resources. Their responsibilities include:
Providing information to senior management on the IS resources, to enable senior
management to meet strategic objectives;
Planning for expansion of IS resources;
Controlling the use of IS resources; and
Implementing activities and functions that support accomplishment of company’s
strategic plan.
(ii) Policies, standards, procedures and practices: Policies establish the rules or boundaries
of authority delegated to individuals in the enterprise. Procedures establish the instructions that
must be followed for completing the assigned tasks. Mandating all requests for changes to
existing programs must be approved by user and IS management before programmers and
analysts can work on them is an example of a policy. Documented instructions for filling out a
standard change request form, how to justify the costs of the change, how to specify the changes
needed, how to obtain approvals, and from whom obtain the approvals are examples of
procedures. Documented policies should exist in IS for:
Use of IS resources,
Physical security,
Data security
50
IS Audit in Phases
On-line security,
Use of Information Systems (Acceptable use policy),
Reviewing, evaluating, and purchasing hardware and software,
System development methodology, and
Application program changes.
Documented procedures should exist for all data processing activities.
(iii) Job Descriptions
These communicate management’s specific expectations for job performance. Job procedures
establish instructions on how to do the job and policies define the authority and responsibility of
the employee. All jobs must have a current documented job description readily available to the
employee. Job descriptions establish responsibility and the accountability of the employee’s
actions.
(iv) Segregation of Duties
Segregation of duties refers to the concept of distribution of work responsibilities such that
individual employees are performing only the duties stipulated for their respective jobs and
positions. The main purpose is to prevent or detect errors or irregularities by applying suitable
controls. It reduces the likelihood of errors and wrongful acts. Organization structure and allied
controls should be structured in a manner that ensure the highest level of separation of duties.
Critical factors to be considered in segregation of duties in a computerized information system
are:
Nature of business operations;
Managerial policy;
Organization structure with job description; and
IT resources deployed such as: Operating system, Networking, Database, Application
software, technical staff available, IT services provided in-house or outsourced,
centralized or decentralized IT operations etc.
Segregation of duties is the most common control technique aimed at separating conflicting job
duties, primarily to discourage fraud, because separating duties makes collusion necessary to
commit a fraud. Such separation can also force an accuracy check of one-person’s work by
another, so that employees to some extent police each other. Examples of segregation of duties
are, separating:
Systems software programming group from the application programming group;
Database administration group from other data processing activities;
Computer hardware operations from other groups;
51
Background Material on Information Systems Audit 3.0 Course (Module 1)
52
IS Audit in Phases
53
Background Material on Information Systems Audit 3.0 Course (Module 1)
Budgets: These are estimates of the amount of time or money expected to be spent
during a particular period, project, or event. The budget alone is not an effective control.
Budgets must be compared with the actual performance, including isolating differences
and researching them for a cause and possible resolution.
Cancellation of documents: This marks a document in such a way to prevent its reuse.
This is a typical control over invoices marking them with a “paid” or “processed” stamp or
punching a hole in the document.
Documentation: This includes written or typed explanations of actions taken on specific
transactions. It also refers to written or typed instructions, which explain the performance
of tasks.
Dual control: This entails having two people simultaneously access an asset. For
example, the depositories of banks’ 24-hour teller machines should be accessed and
emptied with two people present, many people confuse dual control with dual access, but
these are distinct and different. Dual access divides the access function between two
people: once access is achieved, only one person handles the asset. With teller
machines, for example, two tellers would open the depository vault door together, but
only one would retrieve the deposit envelopes.
Input/ output verification: This entails comparing the information provided by a
computer system to the input documents. It can be monetary (dollar value) or non-
monetary fields like item counts/item sequence number.
Safekeeping: This entails physically securing assets, such as computer disks, under lock
and key, in a desk drawer, file cabinet storeroom, or vault.
Sequentially numbered documents: These are working documents with pre-printed
sequential numbers, which enables the detection of missing documents.
Supervisory review: This refers to review of specific work by a supervisor but this control
requires a sign-off on the documents by the supervisor, in order to provide evidence that
the supervisor at least handled them. This is an extremely difficult control to test after the
fact because the auditor cannot judge the quality of the review unless he or she witnesses
it, and, even then, the auditor cannot attest to what the supervisor did when the auditor
was not watching.
Data Management Controls
Data management controls fall in two categories – Access Controls and Back up Controls.
Access controls are designed to prevent unauthorized individuals from viewing, retrieving,
computing or destroying the entity’s data.
Back up controls are designed to ensure the availability of data in the event of its loss
due to unauthorized access, equipment failure or physical disaster. The organization can
54
IS Audit in Phases
55
Background Material on Information Systems Audit 3.0 Course (Module 1)
fall-back and resumption plans, risk management activities, assessment of single points of
failure and problem management. These are covered in detail in subsequent module.
System Maintenance Controls
System maintenance controls include controls on changes to program logic, additional controls
insertions and regular data base maintenance activities. These are needed for efficient
functioning of present systems/ correction/ upgradation of software solutions.
Computer Centre Security Controls
Computer centre security aims at restricting access to computer systems, infrastructure, data
and network components and also protection from natural and environmental threats housing
the above in a computer centre. The controls can be: Physical security controls, software & data
security controls, data communication security controls and environmental security controls.
Physical security attempts to restrict breach of access to computers and unauthorized access
to records. Software and data security ensures that there is use of passwords, authorizations,
screening and logs of all activity of the entity. Data communication security is implemented by
terminal locks, encryption of data, network administration, sign on user identifiers etc.
Internet and Intranet Controls
There are two major exposures in the communication sub-system - 1. Component failure and 2.
Subversive threats. Component failure can cause failure of transmission between sender and
receiver. Subversive threats are invasion attempts to violate the integrity of some
components/data in the system. These can provide intruders with important information about
messages being transmitted and the intruder can manipulate these messages. The controls
against component failures include building component level redundancy, avoiding single point
of failures, using tested and robust systems. Controls against subversive threats include
hardening of systems, patch management, use of updated anti -virus solutions, firewalls, IDS,
encryption etc.
56
IS Audit in Phases
software could be a payroll system, a retail banking system, an inventory system, and a billing
system or, possibly, an integrated ERP (enterprise resource planning) system. It is the
application software that understands data in reference to their business context. The rules
pertaining to the business processes are implemented in the application software.
Most users interact with the computer systems only through the application software.
Application Controls are controls within the application. These controls can be effective only if
the aggregate evaluation on the ITGC (Information Technology General Controls) processes
are concluded as effective and support the applications adequately. This is so, as IT General
controls are pervasive in nature and if they are not effective, effective operation of application
controls cannot be ensured.
There are two types of application controls - i.e. Automated Controls (Fully automated, no
human judgement or requirement), the other being Manual controls (these are semi-automated
controls requiring an input or action from a human in addition to the execution by IT systems).
It is very important to subject application software to a thorough audit because the business
processes and transactions involving money, material and services flow through the application
software.
The first question to ask in an application software review is, "What does the application
software do; what business function or activities does it perform?" In this context it is very
necessary for the IS auditor to know the business. For application reviews, the IS auditor's
knowledge of the intricacies of the business is as important, if not more so, as the technical
knowledge. Hence the first step in an application review is to understand the business
function/activity that the software serves. This can be done through the study of the
operating/work procedures of the organization or other reference material. The other alternative
is by interviewing the personnel.
Once this is done, it is necessary to identify the potential risks associated with the business
activity/function served by the application (i.e. what can go wrong?) and to see how these risks
are handled by the software (i.e. what controls are in place to mitigate those risks).
IT Applications controls are the controls over input, processing and output functions. The
objectives of application controls are:
Input data is accurate, complete, authorized and correct.
Data is processed in an acceptable time period.
Ensure that the internal processing produces the expected results.
Processing accomplishes the desired tasks
Data stored is accurate and complete
Output is accurate and compete and protected from unauthorized disclosure
A record is maintained to track the data from input to storage and to the eventual output.
57
Background Material on Information Systems Audit 3.0 Course (Module 1)
58
IS Audit in Phases
processing of data. They are required to ensure both the completeness and accuracy of the
data being processed. Some of the data processing controls are as follows:
Run to run totals
Reasonableness verification
Edit checks
Exception reports
4. Data File Controls
Controls to ensure that data resident in the files are maintained consistently with the assurance
of integrity and confidentiality of the stored data.
Some of the data file controls are as follows:
Version usage
Internal and external labelling
Data file security
Before and after image and logging
File updating and maintenance authorization
Parity checking
5. Output Controls
Controls to ensure that output is delivered to the users in a consistent and timely manner in the
format prescribed/required by the user. Output controls ensure that the data delivered to users
will be presented, formatted and delivered in a consistent and secured manner. Output can be
in any form: either printed data report or a database file in a removable media such as a floppy
disk, CDROM or removable hard disk. Whatever be the type of output, its confidentiality,
integrity, and consistency is to be maintained. The following form a part of output controls:
Storage and logging of sensitive, critical forms
Logging of output program executions
Spooling / queuing
Controls over printing
Report distribution and collection controls
Retention controls
6. Existence Controls
59
Background Material on Information Systems Audit 3.0 Course (Module 1)
Existence controls ensure the continued availability of the application system and data in a
consistent manner to the users. These form an integral part of the input, processing and output
controls. Recovery of the application system from failures and restoration of both standing data
as well as transaction data is very critical. Therefore, existence controls should include backup
and recovery procedures of data. This requires secure storage of data files. Existence controls
over processing of data should include adequate checkpoint/restart controls that recover the
process from a failure without having to repeat the entire process from the beginning. Existence
controls should also be exercised over output to prevent loss of output in any form.
As noted earlier, If IT General Controls are not effective, we cannot proceed to rely on the
Application controls and the auditor is required to execute substantive procedures i.e. detailed
procedures to obtain the necessary comfort required to provide assurance.
60
IS Audit in Phases
61
Background Material on Information Systems Audit 3.0 Course (Module 1)
Identify all weaknesses found at the end of an applications review in the software that
could lead to errors or compromises in security. These would need to be corrected by
either changes in design and/or some recoding. While this would be addressed by the IT
department, the user or owner of the application from the functional area would want to
know if any of these weaknesses have been exploited by anyone and whether there have
been any losses. To provide an answer to this question, the IS auditor should download
all the data for the period in question and run a series of comprehensive tests using an
audit software and determine if any error or fraud really occurred or not.
Evaluate the environment under which the application runs. The audit of the application
software alone is not enough. Generally, it is prudent to conduct a security review of the
operating system upon which the application runs and the databases it uses/updates
while doing an application review.
All critical applications used in an organization need to be subjected to detailed review by an IS
auditor. This is one of the most important aspect of IS audit for a business. The job of application
review becomes more complex as the application becomes larger and integrated. While auditing
complex applications, it is always good to start with a generic industry-based template of an
audit work program and slowly customize the work program to the specific situation as the audit
progresses. Such audit programs and templates can be obtained from various resources
including ISACA.
62
IS Audit in Phases
63
Background Material on Information Systems Audit 3.0 Course (Module 1)
In the digital decade, the need for IT governance and IS assurance services is gaining increasing
prominence. Rapid deployment of Information systems is making it imperative that Auditors have
practical knowledge of using IT as a tool for drawing inferences and gathering relevant and
reliable evidence as per requirements of the assignment. Computer Assisted Audit Techniques
(CAATs) provide the tools for Auditors to directly access digital information and facilitate in
conducting an effective and efficient audit. The need for understanding and auditing IT is not
only relevant for specialist IS Auditors but is imperative even for non-IS Auditors. Understanding
of data analysis tools and techniques will help auditors to not only perform their existing audits
more efficiently and effectively but also facilitate the auditors in knowing how to create and
execute new types of IT related audit assignments.
CAATs are a significant tool for auditors to gather information independently. CAATs can be
used in various types of Audits including IS Audits. CAATs provide a means to gain access and
to analyze data for a predetermined audit objective and to report the audit findings with
emphasis on the reliability of the records produced and maintained in the system. The reliability
of the source of the information used provides reassurance on findings generated. Auditors and
more particularly IS Auditors should have a thorough understanding of CAATs and know where
and when to apply them. Auditors to be effective in auditing IT environments need to gain
practical experience in using CAATs for various audit and assurance assignments.
The use of Data analytics tools and techniques helps the IS auditor to improve audit approaches,
unlike in the traditional approach which is based on a cyclical process involving manually
identifying controls, performing tests and sampling a small population to measure the
effectiveness. Data analytics can also help in fraud detection.
The IS auditor can use data analytics by which insights are extracted from financial, operational
and other forms of electronic data, internal or external to the organization. These insights can
be historical, real time or predictive and can also be risk-focused enabling the IS auditor to cover
the audit from all dimensions and ensure effectiveness of audit.
An IS auditor can use data analytics for the following purposes:
Determination of the operational effectiveness of current control environment
Determination of the effectiveness of anti-fraud procedures and controls
Identification of business process improvements and efficiencies in the control
environment and errors, if any
Identification of exceptions or unusual business results
Identification of frauds
Identification of areas where poor data quality exists
Performance of risk assessment at the planning phase of an audit
Data Analytics can be effective for an IS Auditor in both planning and fieldwork phases of the
64
IS Audit in Phases
65
Background Material on Information Systems Audit 3.0 Course (Module 1)
66
IS Audit in Phases
Substantive testing validates the details of financial transactions and balances. In contrast,
compliance testing concentrates on validating the internal control procedures in place over
those financial transactions. Substantive testing validates the amounts of the transactions
themselves. Substantive Testing are performed in every audit and are sometimes known as
default procedures. These procedures relate to checking the completeness, accuracy and
validity of the data produced by the enterprise. Further, if auditor concludes that a compliance
test is ineffective then the auditor has no option but to exercise substantive audit procedures on
the application/process.
Examples of substantive tests where sampling could be considered include performance of a
complex calculation on a sample of accounts or a sample of transactions to vouch for supporting
documentation, etc.
67
Background Material on Information Systems Audit 3.0 Course (Module 1)
68
IS Audit in Phases
69
Background Material on Information Systems Audit 3.0 Course (Module 1)
The quality and quantity of evidence must be assessed by the IS Auditor. These two
characteristics are referred to be competent and sufficient. Evidence is competent when it is
both valid and relevant. Audit judgment is used to determine when sufficiency is achieved in the
same manner that is used to determine the competency of evidence.
70
IS Audit in Phases
71
Background Material on Information Systems Audit 3.0 Course (Module 1)
72
IS Audit in Phases
Analytical procedures
Inspection
Observation
Other generally accepted methods
Consider the source and nature of any information obtained to evaluate its reliability and
further verification requirements. In general terms, evidence reliability is greater when it
is:
In written form, rather than oral expressions
Obtained from independent sources
Obtained by the professional rather than by the entity being audited
Certified by an independent party
Kept by an independent party
The results of inspection
The results of observation
Obtain objective evidence that is sufficient to enable a qualified independent party to re-
perform the tests and obtain the same results and conclusions.
Obtain evidence commensurate with the materiality of the item and the risk involved.
Place due emphasis on the accuracy and completeness of the information when
information obtained from the enterprise is used by the IS audit or assurance
professionals to perform audit procedures.
Disclose any situation where sufficient evidence cannot be obtained in a manner
consistent with the communication of the IS audit or assurance engagement results.
Secure evidence against unauthorised access and modifications.
Retain evidence after completion of the IS audit or assurance work as long as necessary
to comply with all applicable laws, regulations and policies.
73
Background Material on Information Systems Audit 3.0 Course (Module 1)
74
IS Audit in Phases
75
Background Material on Information Systems Audit 3.0 Course (Module 1)
76
IS Audit in Phases
77
Background Material on Information Systems Audit 3.0 Course (Module 1)
understand that often, even though a part of or whole of the audit work may be delegated to an
external service provider, the related professional liability is not necessarily delegated.
Therefore, it is the responsibility of the IS Auditor or entity employing the services providers to:
Clearly communicate the audit objectives, scope and methodology through a formal
engagement letter.
Put in place a monitoring process for regular review of the work of the expert/external
service provider with regard to planning, supervision, review and documentation.
Assess the usefulness and appropriateness of reports of such external providers, and
assess the impact of significant findings on the overall audit objectives.
ISACA standards require the following to be complied with by IS Auditor in using services of
external experts.
1206 Using the work of other Experts
1206.1 IS audit and assurance professionals shall consider using the work of other
experts for the engagement, where appropriate.
1206.2 IS audit and assurance professionals shall assess and approve the adequacy of
the other experts’ professional qualifications, competencies, relevant experience,
resources, independence and quality-control processes prior to the engagement.
1206.3 IS audit and assurance professionals shall assess, review and evaluate the work
of other experts as part of the engagement, and document the conclusion on the extent
of use and reliance on their work.
1206.4 IS audit and assurance professionals shall determine whether the work of other
experts, who are not part of the engagement team, is adequate and complete to conclude
on the current engagement objectives, and clearly document the conclusion.
1206.5 IS audit and assurance professionals shall determine whether the work of other
experts will be relied upon and incorporated directly or referred to separately in the report.
1206.6 IS audit and assurance professionals shall apply additional test procedures to
gain sufficient and appropriate evidence in circumstances where the work of other experts
does not provide sufficient and appropriate evidence.
1206.7 IS audit and assurance professionals shall provide an appropriate audit opinion
or conclusion, and include any scope limitation where required evidence is not obtained
through additional test procedures.
SA 600, 610, 620 may also be referred for covering the reports of other experts.
78
IS Audit in Phases
79
Background Material on Information Systems Audit 3.0 Course (Module 1)
attention to this process and that there have been no problems in this area, the IS Auditor may
decide that the failure to initial transmittal documents is not material enough to bring to the
attention of upper management. The IS Auditor might decide to discuss this only with local
operations management. However, there may be other control problems that will cause the IS
Auditor to conclude that this is a material error because it may lead to a larger control problem
in other areas. The IS Auditor should always judge which findings are material to various levels
of management and report them accordingly.
80
IS Audit in Phases
81
Background Material on Information Systems Audit 3.0 Course (Module 1)
82
IS Audit in Phases
conclusions.
Detailed audit findings and recommendations – the IS Auditor would decide whether to
include specific findings in an audit report. This should be based on the materiality of the
findings and the intended recipients of the audit report.
There would be a variety of findings some of which may be quite material while others
minor in nature. The IS Auditor may choose to present minor findings to management in
an alternative format such as by memorandum.
The IS Auditor, however, should make the final decision about what to include or exclude from
the audit report. Generally, the IS Auditor should be concerned with providing a balanced report,
describing not only negative issues in terms of findings but positive constructive comments
regarding improved processes and controls or effective controls already in place. Overall, the
IS Auditor should exercise independence in the reporting process.
Auditee management evaluates the findings, stating corrective actions to be taken and timing
for implementing these anticipated corrective actions. Management may not be able to
implement all audit recommendations immediately. For example, the IS Auditor may recommend
changes to an information system that is also undergoing other changes or enhancements. In
such a case, all recommendations may be implemented at the time of implementing changes.
The IS Auditor should discuss the recommendations and any planned implementation dates
while in the process of releasing the audit report. The IS Auditor must realize that various
constraints, such as staff limitations, budget or other projects may limit immediate
implementation. Management should develop a firm program for corrective actions. It is
important to obtain a commitment from the Auditee/management on the date by which the action
plan will be implemented and the manner in which it will be performed since the corrective action
may result in certain risks being avoided, if identified while discussing and finalizing the audit
report. If appropriate, the IS Auditor may want to report to senior management on the progress
of implementing recommendations. Sample format of IS Audit finding, audit report and executive
summary of audit report are given in Appendix-7.
83
Background Material on Information Systems Audit 3.0 Course (Module 1)
2.25 Summary
This chapter has provided detailed explanation of how an IS Audit is executed in all its phases
from planning to execution to issuing reports. IS auditors, to be able to perform IS Audit
assignments need to have a good understanding of concepts of auditing, IT and management.
This chapter has covered, in detail, the following concepts along with extracts from relevant
standards and guidelines as applicable.
How to conduct various types of IS audit as per scope and objectives of assignment after
understanding the auditee environment including the nature of business, organisation
structure, technology environment, applicable regulations using relevant standards and
best practices framework.
How to review and evaluate various types of risks and their assessment which forms the
basis on which the audit conclusions can be made.
84
IS Audit in Phases
How to use analytical procedures, compliance and substantive testing methods for
performing the audit.
How to review the design effectiveness and control effectiveness.
How to collect and evaluate evidence and maintain relevant documentation during the
course of IS audit.
How to perform risk ranking and prepare the final audit report with recommendations and
follow up procedures.
The primary objective of this chapter was to provide understanding of both the concepts and
practices of IS audit and the various phases involved covering the planning of audit process,
understanding of the risks involved, conducting the audit, obtaining and evaluating evidence
and issuing the final audit report containing recommendations.
85
Background Material on Information Systems Audit 3.0 Course (Module 1)
Explanation
A) IS Audit and Assurance Standards suggest that an IS Auditor should gather
sufficient and appropriate audit evidence on which his opinion is based. Here the
IS Auditor needs to determine whether this is an isolated incident or a systematic
failure. It would be a good practice to make management informed about the
incident.
B) Directly issuing an Audit Finding, without gathering sufficient and appropriate audit
evidence is not the proper practice as per the Standards.
C) Directly seeking explanations from management, without gathering sufficient and
appropriate audit evidence is not the proper practice as per the Standards.
D) Directly asking clarifications from Firewall Vendor without investigating the matter
further is not the proper practice on the part of IS Auditor. (Note: As per information
detailed in question, Vendor is not managing the firewall configuration files.
Rushing to Vendor means the auditor is overstepping the premise and is not in line
with auditor’s responsibilities).
2. An IS Auditor found one security loophole in the System. However, when the IT
Management got to know about it, immediately corrected it. The IS Auditor should:
A) Report the same in his Audit Report if the finding is material.
B) Don’t include in the Audit Report as the same is corrected.
C) Don’t include in the Audit Report but discuss the same in Exit Interview for
recommendation.
D) Don’t include in the Audit Report and send a letter of appreciation to IT
Management.
Correct Answer is A.
Explanation
A) As per the IS Audit and Assurance Standards, any finding, whether subsequently
corrected or not should be included in the IS Audit Report if it is material.
B) Not including the finding as it is corrected is not the proper treatment as per IS
Audit and Assurance Standards.
C) Not including the finding and discussing the same only at Exit Interview is not the
proper treatment as per IS Audit and Assurance Standards.
D) Not including the material audit finding is not the proper treatment as per IS Audit
and Assurance Standards. A Letter of appreciation has nothing to do with Auditor’s
Responsibilities of including material finding in IS Audit Report.
86
IS Audit in Phases
2.27 Questions
1. Which of the following forms of evidence would be considered to be the most
reliable when assisting an IS Auditor develop audit conclusion?
A. A confirmation letter received from a third party for the verification of an account
balance.
B. Assurance via a control self-assessment received from the management that an
application is working as designed.
C. Trend data obtained from World Wide Web (Internet) sources.
D. Ratio analysis developed by an IS Auditor from reports supplied by line
management
2. During a review of the controls over the process of defining IT service levels, an IS
auditor would most likely interview the:
A. Systems programmer
B. Legal staff
87
Background Material on Information Systems Audit 3.0 Course (Module 1)
88
IS Audit in Phases
89
Background Material on Information Systems Audit 3.0 Course (Module 1)
4. Correct answer is: C. IS audit services should be expended only if the risk warrants
it. Answers A, B and D occur after C has been completed. Answer "B" is NOT correct
because the IS Audit Manager does not know what areas are to appear on the IS audit
plan until a risk analysis is completed and discussions are held with the Audit Committee
members. Answer "A" is NOT correct because the IS Audit Manager would not meet with
the audit committee until a risk analysis of areas of exposure has been
completed. Answer "D" is NOT correct because a risk analysis would be the first step
before any IS audit services are expended.
5. Correct answer is: A. The compliance tests determine whether prescribed controls are
working as intended. Answer "B" is NOT the best choice. Current and accurate
documentation may be a good procedure but it is only one type of control procedure,
therefore, answer 'A' is a better choice as more control procedures are
evaluated. Answer "C" is NOT the best choice because segregation of duties is only one
type of control procedure; therefore, answer 'A' is a better choice as more control
procedures are evaluated. Answer "D" is NOT the correct choice. Exposures are defined
and quantified to determine audit scope. Compliance tests provide reasonable assurance
that controls are working as prescribed.
6. Correct answer is: B. IS auditor will most probably perform the test of internal control
when control environment is poor. When inherent risks are low and control risks are within
acceptable limit, likelihood of testing internal controls get reduced. Concluding the cost-
effectiveness of substantive approach is not the outcome of testing internal controls.
7. Correct answer is: D. The size of the system is the least important of the factors listed. All
other factors have specific financial implications and an IS Auditor can be used to help
mitigate the risk to the corporation with the development of a new system.
8. Correct answer is: C. Balancing of daily control totals relates to specific applications and
is not considered an overall general control concern. Answer "B" is NOT the correct
answer since documentation procedures within the IS Department are an important
general control concern. Answer "A" is NOT the correct answer since organization of the
IS Department is an important general control concern. Answer "D" is NOT the correct
answer since physical access controls and security measures are important general
control concerns.
9. Correct answer is: A. The IS Auditor needs specialized type of education in hardware and
operating system software. Options at B, C and D can be performed when an IS auditor
has a basic level of data processing technical knowledge and usually requires no special
training.
10. Correct answer is: A. Verification will ensure that production orders match customer
orders. Logging can be used to detect inaccuracies, but does not in itself guarantee
accurate processing. Hash totals will ensure accurate order transmission, but not
accurate processing centrally. Production supervisory approval is a time-consuming
90
IS Audit in Phases
91
Chapter 3
IS Audit Tools & Techniques
3.1 Learning Objectives
Computer Assisted Audit Tools and Techniques are important tools for collecting and evaluating
evidences during the Audit Process. Selection of right tools and characteristics, category and
uses of various available tools are discussed in this chapter.
management.
(d) Sampling programs to extract data for audit testing
(e) Tests of application controls, for example, testing the functionality of a programmed
control
(f) Re-performing calculations performed by the organisation’s accounting system.
Purpose of CAATs
CAATs give auditors ability to maximize their efficiency and effectiveness in performing audit.
These are considered to be essential part of Auditors’ Toolkit. CAATS can greatly enhance
effectiveness and efficiency in the audit process during the planning, fieldwork, and reporting
phases. IS auditors can use CAATs to perform tests that would normally be impossible or time-
consuming to perform manually, for example sorting, calculations, matching, and extracting of
information as required. CAATs can allow an auditor to interrogate and analyze data more
interactively, by removing the boundaries that can be imposed by a fixed audit program. For
example, an auditor can analyze data and react immediately to the results of the analysis by
simply modifying the parameters
Functional Capabilities of CAATs
1. File access: Enables the reading of different record formats and file structures. All
common formats of data such as database, text formats, excel files are accessible
through the import function.
2. File reorganization: Enables the indexing, sorting, merging and linking with another file.
These functions facilitate the auditor to get an instant view of the data from different
perspectives.
3. Data selection: Enables global filtration conditions and selection criteria. These functions
enable selection of data based on defined criteria.
4. Statistical functions: Enables sampling, stratification and frequency analysis. These
functions facilitate analysis of data.
5. Arithmetical functions: Enables arithmetic operators and functions. These functions
facilitate re-computations and re-performance of results.
How to use CAATs
IS Auditors need to have adequate computer knowledge, expertise and experience in using
CAATs. They need to formulate appropriate methodology for using CAATs. This includes having
a walk- through of the system to identify areas of weakness. Based on the results, Auditors will
perform compliance tests, evaluate the results and if required, design substantive tests. CAATs
can also be used to carry out detailed testing and collect evidences. Based on the results of
these tests, Auditors would recommend suitable control measures as relevant. The step-by-step
approach for using CAATs is given below:
93
Background Material on Information Systems Audit 3.0 Course (Module 1)
94
IS Audit Tools & Techniques
that CAATs will be used for a particular audit. The point is to keep in mind all relevant
techniques and technologies and to avoid traditional attitudes and thinking.
2. Identify what information will be required, to address the goals and objectives of the
investigation or audit.
3. Determine what the sources of the information are (Accounts payable system, payroll
master file system, contracts system).
4. Identify who is responsible for the information (supervisors, department leaders, IT
personnel).
5. Review documentation that describes the type of data in the system.
6. Review documentation that describes how the information flows. Take time to understand
the data. Know what each field in the data set represents and how it might be relevant to
performing the audit. Review the record layout for the file. Verify that the data is complete
(Compare it to a hard copy).
7. Understand the system generating the data, which is the best defense against
misunderstanding how the system processes data.
8. Review documentation on the system, for example, user manuals, flowcharts, output
reports.
9. Develop a plan for analyzing the data (What, When, Where, Why, and How)
What: Specific objectives that should be addressed by the analysis
When: Define the period that will be audited, and arrange with IT personnel to
secure the data for that period
Where: Define the sources of the data to be analyzed (Accounts payable, payroll)
Why: Reason for performing the tests and analysis (general review, fraud audit,
VFM: Value for Money)
How: The types of analysis planned to be carried out by the auditor (Note- Because
of the nature of CAATs, the analysis plan should be viewed as a framework and
not set in stone. For example, additional ad-hoc test might be performed, based on
preliminary findings)
95
Background Material on Information Systems Audit 3.0 Course (Module 1)
96
IS Audit Tools & Techniques
software etc. Such software may be either developed by the auditee or embedded as part of the
client’s mission critical application software. Such software may also be developed by the
auditor independently. Before using the organisation’s specialized audit software, the auditor
should take care to get an assurance on the integrity and security of the software developed by
the client.
3.2.2.3 Utility Software
Utility software or utilities though not developed or sold specifically for audit are often extremely
useful and handy for conducting audits. These utilities usually come as part of office automation
software, operating systems, and database management systems or may even come
separately. Utilities are useful in performing specific system command sequences and are also
useful in performing common data analysis functions such as searching, sorting, appending,
joining, analysis etc. Utilities are extensively used in design, development, testing and auditing
of application software, operating systems parameters, security software parameters, security
testing, debugging etc. Some examples are
a. File comparison: A current version of a file for example, is compared with the previous
year’s version, or an input file is compared with a processed file.
b. Production of circularisation letters.
97
Background Material on Information Systems Audit 3.0 Course (Module 1)
predetermined audit objective and to report audit findings with evidence. They help the auditor
to obtain evidence directly on the quality of the records produced and maintained in the system.
The quality of the evidence collected confirms the quality of the system processing. Following
are some examples of CAATs, which can be used to collect evidence:
• ACL, IDEA, Knime etc.
• Utility Software such as Find, Search, Flowcharting utilities
• Spreadsheets such as Excel
• SQL Commands, OS commands
• Third party access control software
• Embedded routines in Application software systems
• Options and reports built in as part of the application/systems software
• Performance monitoring tools
• Network management tools, OS utilities
• High end CAATs
• RSAREF, DES, PGP
• TCP Wrapper, SOCKS, TIS Toolkit
• COPS, Tripwire, Tiger
• ISS, SATAN, etc.
98
IS Audit Tools & Techniques
99
Background Material on Information Systems Audit 3.0 Course (Module 1)
resident code, and automatically write details of these items to an output file for subsequent
audit examination.
This technique generally uses one or more specially designed modules embedded in the
computer application system to select and record data for subsequent analysis and evaluation.
The data collection modules are inserted in the application system or program at points
predetermined by the auditor. The auditor also determines the criteria for selection and
recording. Automated or manual methods may be used to analyse the data later.
3.3.1.5 Continuous and Intermittent Simulation Audit
With significant advancements in technologies, business systems are increasingly driven by
client-server systems with distributed computing and databases. The components of such
systems are networked generally over geographically disparate locations. This has resulted in
the need for auditing systems that not only enable continuous auditing of transactions but also
have a low overhead on the IT resources of the auditee but without compromising on the
independence of such systems. When a transaction meets a pre-defined criterion, the audit
software runs an audit of the transaction (intermittent test). Then the computer waits for the next
transaction that meets the criteria. This provides continuous testing.
3.3.1.6 Systems Control Audit Review File (SCARF)
The use of this technique involves embedding specially written audit software in the
organisation’s host application systems so that the application systems are monitored on a
continuous basis. The technique involves collecting and storing data related to application
system errors, policy and procedural variances and application exceptions etc. for further
examination.
3.3.1.7 Audit Hook
This technique involves embedding audit modules in application systems to function as red flags
as real time notification of suspicious transactions to induce IS security and auditors to act
before an error or irregularity gets out of hand.
3.4 Summary
This chapter describes CAATS, types of CAATs, their uses, their functionalities and how and
when to select them and the benefits of using CAATs.
3.5 Questions
1. What is one of the key tests which can be ideally carried out using Computer Assisted
Audit Tools (CAATs)?
A. Identification of exceptional transactions based upon set criteria
100
IS Audit Tools & Techniques
101
Background Material on Information Systems Audit 3.0 Course (Module 1)
102
IS Audit Tools & Techniques
1 One of the many key tests that can be carried out by CAATs is identification of
exceptional transactions based upon set criteria. The IS auditor can set the criteria
based upon the sort of transactions which are not expected to occur on the basis of
the controls which presumably have been incorporated in the organization’s systems.
CAATs are more in the nature of audit tools & would not be ideal for the other purposes
listed in Options B to D above. Hence, answer at Option A alone is correct.
2 One of the many key tests that can be carried out by CAATs is identification of potential
areas of fraud. The IS auditor can set the criteria based upon the sort of transactions
which are not expected to occur on the basis of presumably have been incorporated
in the organization’s systems. CAATs are more in the nature of audit tools & would not
be ideal for the other purposes listed in Options B to D above. Correct answer is A.
3 One of the many key tests that can be carried out by CAATs is identification of data
which is inconsistent or erroneous. The IS auditor can set the criteria based upon the
sort of data which are not expected to occur on the basis of the controls which
presumably have been incorporated in the organization’s systems. CAATs are more
in the nature of audit tools & would not be ideal for the other purposes listed in Options
B to D above. Hence, answer at Option A alone is correct.
4 One of the many key tests that can be carried out by CAATs is the carrying out of
various types of statistical analysis which could throw up areas of inconsistencies,
defaults, etc. CAATs are more in the nature of audit tools & would not be ideal for the
other purposes listed in Options B to D above. Hence, answer at Option A alone is
correct.
5 One of the many key tests that can be carried out by CAATs is establishing whether
the set controls are working as intended. CAATs are more in the nature of audit tools
& would not be ideal for the other purposes listed in Options B to D above. Hence,
answer at Option A alone is correct.
6 One of the many key tests that can be carried out by CAATs is establishing relationship
between two or more areas & identify duplicate transactions. CAATs are more in the
nature of audit tools & would not be ideal for the other purposes listed in Options B to
D above. Hence, answer at Option A alone is correct.
7 CAAT is one of the tools useful for carrying out the detection of suspicious transactions
as a pre-emptive or post fraud activity. Hence, answer at Option A is correct.
8 Generalised Audit software is mainly used to find duplicate data. Options A and D are
on line application audit tools and statistical sampling may not be able to find
duplicates. Correct answer is C.
9 Statistical software packages use all data resources impacting the processing time
and response time. Network traffic analyzers also use the system resources but not
putting stress on production data. Test data generator is not resource intensive and
103
Background Material on Information Systems Audit 3.0 Course (Module 1)
test drivers are for specific use without impacting much resources. Correct answer is
B.
10 When testing the security of the entire application system including operating system,
database and application security, the auditor will most likely use a utility software that
assists in reviewing the configuration settings. In contrast, the Auditor may use GAS
to perform a substantive testing of data and configuration files of the application. Test
data are normally used to check the integrity of the data and expert systems are used
to inquire on specific topics. Hence correct answer is C.
104
Chapter 4
Application Controls Review of Business
Applications
4.1 Learning Objectives
To understand the business application controls implemented in an organisation
4.2 Introduction
Business applications are the tools to achieve management goals and objectives. Each
organisation selects the software as per its business goals and needs. The selection of
appropriate software is an important decision for top management to make as it contributes to
success of business.
An application or application system is a software that enables users to perform tasks employing
systems’ capabilities. These applications are the interface between the user and business
functions. For example, a counter clerk at a bank is required to perform various business
activities as part of his job and assigned responsibilities. From the point of view of users, it is
the application that drives the business logic. Application controls relate to individual business
processes including data edits, separation of business functions, balancing, transaction logging,
and error reporting. From an organizational perspective, it is important that application controls
help to:
Safeguard assets
Maintain data integrity
Achieve organisational goals effectively and efficiently
milk suppliers, newspaper agents etc. while still some others may generate lots of credit
sales.
The geographical spread: As globalisation has spread, many Indian companies have been
able to reap the benefits by becoming Indian MNCs. Few Indian companies are trying to foray
in export markets or increase their global footprint. The more the geographical spread of an
organisation, more robust business application software is needed. Robustness here is intended
to denote the capability of the business application system to work 24/7 as this may become a
critical business need, and it may also denote whether the business application system has
capability to handle multiple currency accounting.
The volume of transactions: As the transaction volumes increase, it is important for
organisation to go for business application softwares that can support business for the next few
years.
The regulatory structure at place of operation: As the number and nature of compliances
increase across the world, organisation shall prefer that software which is capable to cater to
the compliance requirements. A software company selling a product that is SOX compliant is
likely to find more buyers than others.
106
Application Controls Review of Business Applications
d. Payroll Applications:
Many companies across the world are using application softwares that process payrolls for their
employees. In India also many CA firms are doing good job on payroll outsourcing. TALLY has
a payroll application built into it.
Other Business Applications
i. Office Management Software
ii. Compliance Applications
iii. Customer Relationship Management Software
iv. Management Support Software
v. Logistics Management Software
vi. Legal matter management
vii. Industry Specific Applications
107
Background Material on Information Systems Audit 3.0 Course (Module 1)
108
Application Controls Review of Business Applications
and in the future. It also concerns the safeguarding of necessary resources and
associated capabilities.
6. Compliance: Deals with complying with the laws, regulations and contractual
arrangements to which the process is subject, i.e., externally imposed business criteria
as well as internal policies.
7. Reliability: Relates to the provision of appropriate information for management to
operate the organisation and exercise its fiduciary and governance responsibilities.
The specific key quality requirements may vary for different organisations based on specific
business needs.
109
Background Material on Information Systems Audit 3.0 Course (Module 1)
110
Application Controls Review of Business Applications
111
Background Material on Information Systems Audit 3.0 Course (Module 1)
transaction data as well as for validation rules. Implement automated controls and role
and responsibility requirements.
(v) Report transactions failing validation and post them to a suspense file. Report all errors
in a timely fashion and do not delay processing of valid transactions.
(vi) Ensure that transactions failing edit and validation routines are subject to appropriate
follow-up until errors are remediated. Ensure that information on processing failures is
maintained to allow for root cause analysis and help adjust procedures and automated
controls.
4.7.4.4 Processing integrity and validity
(i) Establish and implement mechanisms to authorise the initiation of transaction processing
and to enforce that only appropriate and authorised applications and tools are used.
(ii) Routinely verify that processing is completely and accurately performed with automated
controls, where appropriate. Controls may include checking for sequence and duplication
errors, transaction/record counts, referential integrity checks, control and hash totals,
range checks and buffer overflow.
(iii) Ensure that transactions failing validation routines are reported and posted to a suspense
file. Where a file contains valid and invalid transactions, ensure that the processing of
valid transactions is not delayed and all errors are reported in a timely fashion. Ensure
that information on processing failures is kept to allow for root cause analysis and help
adjust procedures and automated controls, to ensure early detection or prevent errors.
(iv) Ensure that transactions failing validation routines are subject to appropriate follow-up
until errors are remediated or the transaction is cancelled.
(v) Ensure that the correct sequence of jobs has been documented and communicated to IT
operations. Job output should include sufficient information regarding subsequent jobs to
ensure that data are not inappropriately added, changed or lost during processing.
(vi) Verify the unique and sequential identifier to every transaction (e.g., index, date and
time).
(vii) Maintain the audit trail of transactions processed. Include date and time of input and user
identification for each online or batch transaction. For sensitive data, the listing should
contain before and after images and should be checked by the business owner for
accuracy and authorisation of changes made.
(viii) Maintain the integrity of data during unexpected interruptions in data processing with
system and database utilities. Ensure that controls are in place to confirm data integrity
after processing failures or after use of system or database utilities to resolve operational
problems. Any changes made should be reported and approved by the business owner
112
Application Controls Review of Business Applications
113
Background Material on Information Systems Audit 3.0 Course (Module 1)
(iii) Analyse input received from other transaction processing applications to determine
authenticity of origin and the maintenance of the integrity of content during transmission.
(iv) Authentication means identification, i.e. to prove you are the right person to handle or
access resources whereas authorisation refers to the extent to which you can go, for
example ID and password is a means for proving your authentication whereas the
authorisation power will decide on what you can do after authentication. DBA can
add/delete a database user, whereas an auditor is authorised to do view and printing
access.
Information Criteria
Confidentiality
Effectiveness
Compliance
Availability
Reliability
Efficiency
Integrity
APPLICATION AND CONTROL OBJECTIVES
AND INFORMATION CRITERIA
4.8 Summary
This chapter describes the selection criteria for application systems, various application control
objectives and practices.
4.9 Questions
1 Application controls shall include all except
114
Application Controls Review of Business Applications
115
Background Material on Information Systems Audit 3.0 Course (Module 1)
116
Application Controls Review of Business Applications
A. Limit Check
B. Dependency Check
C. Range Check
D. Duplicate Check
10 While posting message on FACEBOOK, if user posts the same message again,
FACEBOOK gives a warning. The warning indicates which control.
A. Limit Check
B. Dependency Check
C. Range Check
D. Duplicate Check
117
Background Material on Information Systems Audit 3.0 Course (Module 1)
9 B. Dependency check is one where value of one field is related to that of another.
10 D. is the answer as this is a duplicate check.
118
Chapter 5
Application Controls Review of Specialised
Systems
5.1 Learning objectives
An IS auditor has to be aware of the controls that have been put in place in business
applications. He / She may have to review the same as a part of auditor’s risk assessment
procedure. As per SA200 on ““Overall Objectives of the Independent Auditor and the conduct
of an audit in accordance with standards on Auditing”, compliance procedures are tests
designed to obtain reasonable assurance that those internal controls on which audit reliance is
to be placed are in effect. As per ISACA ITAF 1007 “Assertions”, IS Audit and assurance
professional shall review the assertions against which the subject matter will be assessed to
determine that such assertions are capable of being audited and that the assertions are
sufficient, valid and relevant.
6. Inspection
7. Observation
8. Other Generally Accepted Methods
120
Application Controls Review of Specialised Systems
goal of research in this area. Interactive voice response and natural programming
languages, closer to human conversation, are some of the applications. Virtual reality is
another important application that can be classified under natural interfaces.
IS Auditor's Role
IS auditor has to be conversant with the controls relevant to these systems when used as the
integral part of the organizations business processes or critical functions and the level of
experience or intelligence used as a basis for developing software. The errors produced by such
systems would be more critical as compared to the errors produced by the traditional systems.
More details are given in Module 6.
121
Background Material on Information Systems Audit 3.0 Course (Module 1)
122
Application Controls Review of Specialised Systems
5.4.5 E-commerce
Other than buying and selling goods on the Internet, E Commerce (Electronic Commerce)
involves information sharing, payment, fulfilment of contractual obligations of the parties
participating in e-commerce transactions, service and support.
Risks of E-commerce
the identity and nature of relationships with e-commerce trading partners;
the integrity of transactions;
electronic processing of transactions;
systems' reliability;
privacy issues;
return of goods and product warranties;
taxation and regulatory issues.
IS Auditor’s role
IS Auditor’s responsibility shall be to assess whether the transactions have:
1. Authorisation
2. Authentication
3. Confirmation
4. Whether the payment gateway is secured or not.
123
Background Material on Information Systems Audit 3.0 Course (Module 1)
As the name indicates, a PoS is intended to capture data at the time and place of transaction
which is being initiated by a business user. It is often attached to scanners to read bar codes
and magnetic cards for credit card payment and electronic sales. They provide significant cost
and time saving as compared to the manual methods. They also eliminate errors that are
inherent in manual systems (when the data is subjected to transcription errors while a user
enters data from a document into the system). POS processing may involve batch processing
or online processing. These are generally used in big shopping malls or departmental stores.
IS Auditor’s role
1. In case there is batch processing, the IS auditor should evaluate the batch controls
implemented by the organization.
2. Check if they are in operation,
3. Review exceptional transaction logs.
4. Whether the internal control system is effective to ensure the accuracy and completeness
of the transaction batch before updating.
5. The IS auditor will have to evaluate the controls for accuracy and completeness of on-
line transactions.
6. RBI guidelines regarding “Cash withdrawal at Point of Sale (POS) - Prepaid Payment
Instruments issued by banks: need to be validated in case such transactions are taking
place.
124
Application Controls Review of Specialised Systems
(d) Controls on proper storage of unused ATM cards, Controls on their issue only against
valid application form from a customer, Control over custody of unissued ATM cards,
Return of old/ unclaimed ATM cards, Control over activation of PINs
(e) Controls on unused PINs, Procedure for issue of PINs, Return of PINs of returned
ATM cards.
(f) Controls to ensure that PINs do not appear in printed form with the customer’s account
number.
(g) Access control over retrieval or display of PINs via terminals
(h) Process of mailing cards to customers. Whether cards are sent in envelops with a return
address that do not identify the Bank. Whether cards and PINs are mailed separately with
sufficient period of time (usually three days) between mailings.
(i) Procedures of handling retracted/rejected transactions.
Presently, there are more than 2,50,000 ATM machine installations in India. Government of
India has already indicated that it wants to further enhance the usage of ATM in India, as this
allows banks to reach remote corners without being physically present. This creates a scope for
the IS Auditor for a separate ATM Audit. RBI has issued detailed set of instructions for banks to
follow.
Most of the banks manage their ATM Switch ecosystem through shared services of third-party
ATM Switch Application Service Providers (ASPs) for shared services for ATM Switch
applications. Since these service providers also have exposure to the payment system
landscape and are, therefore, exposed to the associated cyber threats, the RBI has directed
that certain baseline cyber security controls shall be mandated by the banks in their contractual
agreements with these service providers. These pertain to implementation of measures to
strengthen the process of deployment and changes in application softwares in the ecosystem;
continuous surveillance; implementation of controls on storage, processing and transmission of
sensitive data; building capacity for forensic examination; and making the incident response
mechanism more robust. The IS auditors undertaking audit of ATM Switch Services may refer
to these guidelines for providing assurance services.
5.5 Summary
This chapter covered various specialized systems and their related audit processes.
5.6 Questions
1 Which of the following business purposes can be met by implementing Data
warehouse in an organisation?
A. Business continuity can be ensured in case of disaster.
125
Background Material on Information Systems Audit 3.0 Course (Module 1)
126
Application Controls Review of Specialised Systems
127
Background Material on Information Systems Audit 3.0 Course (Module 1)
128
Application Controls Review of Specialised Systems
129
Chapter 6
IT Enabled Assurance Services
6.1 Learning Objectives
This chapter provides an overview of different types of audit engagements that can be
undertaken by the IS auditors. Further, there is an insight into the world of frauds and cyber-
crimes which have grown as a part of the technological advances. The IS auditor may also
undertake role of an investigator on behalf of the enterprise to investigate various modes of data
leakage and theft and use digital forensics to retrieve data from damaged hard disks, and other
mediums of data storage. This requires advance technical skills. A brief overview is provided so
that interested ISAs can venture into these new areas.
6.2 Introduction
As information systems presence has become an indispensable part of our day to day living and
as enterprise processes have become inseparable from IT, it is becoming increasingly critical
to ensure safe and secure access to information from a computing environment and make it
available to authorized persons & processes anyone at any point of time. This heavy reliance
on information from information systems has become the very edifice of enterprises today.
Information has to be available with necessary security safeguards as the information misused
can lead to loss of revenue, reputation and non-compliance with regulations thereby impacting
the very survival of enterprises. There are new types of tech-savvy computer fraudsters who by
using their technical expertise can exploit information for committing frauds. Hence, ensuring
security of any IS environment is of utmost importance within the organization as the loss of it
can not only lead to huge financial losses but the enterprise can become liable for damages for
loss of private data of customers as also loss of goodwill and market share. Due to the increase
in sophistication of technology, there has been an unprecedented growth in frauds and cyber-
crimes. On the positive side, using technology effectively can help enterprises to reach out to
customers anytime, anywhere leading to geometric progression growth. Enterprise
managements look for assurance on security and value addition due to the use of IT. This
provides a great opportunity for IS auditors who are equipped with the right competencies and
skill-sets to provide assurance and value-added services.
These reviews may be performed in conjunction with a financial statement audit, internal audit,
or other forms of attestation engagements. IT audits are also called IS audits and Computer
audits or IT/IS assurance Services.
The wide range or spectrum of IT audits cover the whole gamut of IT right from conception to
post-implementation review as also consulting on effective deployment. Some examples of
these services are as follows:
Systems and Applications: An audit to verify that systems and applications are
appropriate, are efficient, and are adequately controlled to ensure valid, reliable, timely,
and secure input, processing, and output at all levels of a system's activities.
Information Processing Facilities: An audit to verify that the processing facility is
controlled to ensure timely, accurate, and efficient processing of applications under
normal and potentially disruptive conditions.
Systems Development: An audit to verify that the systems under development meet the
objectives of the organization and to ensure that the systems are developed in
accordance with generally accepted standards for systems development.
Management of IT and Enterprise Architecture: An audit to verify that IT management
has developed an organizational structure and procedures to ensure a controlled and
efficient environment for information processing.
Client/Server, Telecommunications, Intranets, and Extranets: An audit to verify
that telecommunication controls are in place on the client (computer receiving services),
server, and on the networks connecting the clients and servers.
Compliance Audits: Compliance audits include specific tests of controls to demonstrate
adherence to specific regulatory or industry standards. These audits focus on particular
systems or data. Examples include Payment card industry Data security standard audits,
Health insurance portability and accountability act audit (HIPAA) etc. HIPPA is a US
legislation that provides data privacy and security provisions for safeguarding medical
information.
Operational Audit: An operational audit is designed to evaluate the internal control
structure in a given process or area. Audits of application in operation or logical security
systems are some examples of operational audits.
Financial Audit: The purpose of a financial audit is to assess the accuracy of financial
reporting. A financial audit will often involve detailed, substantive testing, although, IS
Auditors are now placing more emphasis on risk and control-based audit approach. This
kind of audit relates to financial information integrity and reliability.
Integrated Audits: An integrated audit combines financial and operational audit steps.
An integrated audit is also performed to assess the overall objectives within an
organization, related to financial information and assets’ safeguarding, efficiency and
131
Background Material on Information Systems Audit 3.0 Course (Module 1)
compliance.
Administrative Audits: These are oriented to assess issues related to the efficiency of
operational productivity within an organization.
IS Audits: This process collects and evaluates evidence to determine whether the
information systems and related resources adequately safeguard assets, maintain data
and system integrity and availability, provide relevant and reliable information, achieve
organizational goals effectively, consume resources efficiently, and have, in effect,
internal controls that provide reasonable assurance that business, operational and control
objectives will be met and that undesired events will be prevented or detected and
corrected, in a timely manner.
Specialized Audit: Within the category of IS audits, there are a number of specialized
reviews that examine areas such as services performed by third parties. Because
businesses are becoming increasingly reliant on third party service providers, it is
important that internal controls be evaluated in these environments.
Forensic Audit: Forensic Auditing has been defined as the audit specialized in
discovering, disclosing and following up on frauds and crimes. The primary purpose of
such a review is the development of evidence for review by law enforcement and judicial
authorities.
Control Self-Assessment: This is conducted by the business process owners but
facilitated by the auditors. The main difference between this and the other engagement
types is that the auditors as control experts identify with those responsible for
implementing the required controls and assist them in doing self-assessment. Therefore,
setting the evaluation criteria and executing the evaluation are carried out by the business
owners themselves. It is clear that proper guidance and follow-up are required to optimize
the added value of this type of engagement within the enterprise. Especially with regard
to approach, tools and reporting, the auditors should clearly lead the way and verify
whether assessors are using the existing guidelines.
Internal Audit/Compliance Reviews: Performed by a third party who is not involved in
the functioning of the enabler, but who is employed by the same enterprise as the
business owners of the enablers. Commonly, in a (medium- to large-sized) enterprise,
the evaluation criteria are set and the review is performed by the internal audit or
compliance department. This type of review is more independent than a self-assessment
because the auditor is not involved in the functioning of the enabler and therefore
contributes to the reliability/credibility of the evaluation outcome. Good practices and
consistent guidance are required to optimize the added value of this type of engagement.
132
IT Enabled Assurance Services
133
Background Material on Information Systems Audit 3.0 Course (Module 1)
6.5 Fraud
Fraud is the wrongful or criminal deception intended for personal financial or other gains. Fraud
is a deception deliberately practiced in order to secure unfair or unlawful gain. Defrauding
people or organizations of money or valuables is the usual purpose of fraud. It may sometimes
involves obtaining benefits without actually depriving anyone of money or valuables. For
example, obtaining a driver’s license by way of false statements. The establishment of a strong
internal control environment is necessary to deter against fraud perpetration. For internal
controls to be effective, they must be constantly evaluated for effectiveness and changed as
business processes change.
134
IT Enabled Assurance Services
135
Background Material on Information Systems Audit 3.0 Course (Module 1)
representations do not absolve the IS Auditor from performing his duties while conducting the
audit.
Standards on Internal Audit: SIA 2 requires internal auditors to use their knowledge and skills
to reasonably enable them to identify fraud indicators. SIA 11 defines fraud and lays the
responsibility for prevention and detection of frauds on the management and those charged with
governance.
Standards on Auditing: SA 240 requires an auditor to evaluate whether the information
obtained from risk assessment procedures and related activities indicate presence of fraud risk
factors. SA 315 requires an auditor to identify risks of material misstatement arising due to fraud.
136
IT Enabled Assurance Services
A holistic approach to fraud deterrence and prevention would be strengthening the governance
and management framework. IS Auditor could assist in evaluating control framework and
assessing the adequacy thereof and related policies. Sample questions for such assessments
and reviews for each of seven components adapted from COBIT 2019 are given below:
1. Policies and Procedures: Whether the organisation has a documented and approved
Cyber Fraud Governance and Management Program.
2. Processes: Does the organization have approved security policy and direction that senior
management conduct cyber fraud risk assessment regularly and evaluate whether
remedial measures are implemented to address cyber fraud risks.
3. Organisation Structures: Whether the organisation has clearly defined roles and
responsibilities in relation to cyber fraud management which meets both regulatory and
stakeholder requirements.
4. Culture, Ethics and Behaviour: Does management conduct periodic employee
awareness programs and training in relation to corporate governance, compliance and
cyber fraud.
5. Information Flows and Items: Whether the organisation has a proper reporting
mechanism for notifying fraud concerns to the top management and these are escalated
137
Background Material on Information Systems Audit 3.0 Course (Module 1)
138
IT Enabled Assurance Services
an incident
Preserve: Refers to practice of retrieving identified information and preserving it as evidence.
The practice generally includes the imaging of original media in presence of an independent
third party. The process also requires being able to document chain of custody so that it can be
established in a court of law.
Analyze: Involves extracting, processing and interpreting the evidence. Extracted data could
be unintelligible binary data after it has been processed and converted into human readable
format. Interpreting the data requires an in-depth knowledge of how different pieces of evidence
may fit together. The analysis should be performed using an image of media and not the original.
Present: Involves a presentation to the various audiences such as management, attorneys,
court, etc. Acceptance of the evidence depends upon the manner of presentation, qualifications
of the presenter, and credibility of the process used to preserve and analyze the evidence.
139
Background Material on Information Systems Audit 3.0 Course (Module 1)
that is normally sent as a link to the intended target. Once clicked, it can install executable codes
and scripts. It is normally avoided by using anti-malware and antivirus software, and firewalls.
In this case, the malware compromised a digital system responsible for settling cash
dispensation requests raised at ATMs. As soon as one swipes a card, a request is transferred
to the core banking system (CBS) of the bank. If the account has enough money, the CBS will
allow the transaction. It is suspected that the fraudsters used cloned debit cards of bank’s
customers. In this case, the malware created a proxy system that bypassed the CBS and
approved a series of 14,800 fraudulent transactions to withdraw Rs 80.5 crore - Rs 78 crore
through 12,000 transactions in 28 countries, the rest in India. Another Rs 13.5 crore was
transferred to a Hong Kong-based entity using SWIFT (Society for Worldwide Interbank
Telecommunications).
One of the control measures against malware is to have upgraded and tested operating system.
RBI, the banking regulator had pointed out that as in August 2018, many ATMs were still running
on Windows XP and other unsupported software. RBI had directed all the banks to upgrade their
software by June 2019.
As per industry experts, continuous monitoring and surveillance and deployment of Incidence
Response Teams is required to prevent such attacks.
Case Study 2: The WorldCom fraud
WorldCom fraud was one of the biggest crime cases in USA. WorldCom was one of the biggest
telecom companies in USA. It had cooked books to hide falling profitability, and inflated net
income and cash flow by recording expenses as investments. This is a popular example of
using technology for fraud detection. The Internal Auditors had found around $500 million debit
in the Property, Plant and Equipment (PP&E) account for which they could not find any invoices
or documentation to back up. As the Company would not provide full access to the financial
system, the Auditors had to apply data mining techniques to search the data by using a small
script and MS Access. Thereby, they were able to search the entire population of data for
anomalies in the trends & patterns. As they followed through the accounts, they discovered
misallocated expenses of several billion dollars and bogus accounting entries that inflated the
revenues. This was one of the crimes that led to the Sarbanes-Oxley Act in July 2002, which
strengthened disclosure requirements and the penalties for fraudulent accounting.
Lessons and Tips
While sampling techniques may be good for identifying weaknesses in internal controls, they
are not recommended in fraud detection. Frauds involve human intelligence and may affect only
a few transactions which may not be represented in a sample. Hence, fraud detection
methodologies require analysis of the entire population, which needs the aid of computer
technology and data analytics techniques.
Case Study 3: The $54 million fraud
This is a typical example of how lack of segregation of duties could lead to a phenomenal fraud.
140
IT Enabled Assurance Services
Rita Crundwell, the controller and treasurer of Dixon, an Illinois town, with an annual budget of
$6 million to $8 million, was able to embezzle nearly $54 million over two decades. The fraud
remained undetected in annual audits by two independent accounting firms and in annual audit
reviews by state regulators. She launched the fraud scheme on Dec. 18, 1990, when she opened
a secret bank account in the name of the City of Dixon. Crundwell was the only signatory on the
account, which was called the RSCDA (Reserve Sewer Capital Development Account). She
began transferring funds from city accounts into the RSCDA account in 1991. The city, which
does not have a city manager, gave Crundwell wide rein over its finances and set the stage for
her massive fraud. The failure to segregate duties allowed Crundwell to set up and operate a
fairly simple fraud scheme.
Lessons and Tips
Roles and responsibilities must be clearly defined and proper segregation of duties must be
done to ensure that no single person can be maker as well as the checker of a particular
transaction flow. Auditors must ensure the existence of internal controls with systems designed
to prevent or deter these types of frauds. Also, regular fraud risk assessments should be
conducted to Identify areas of risk where theft or manipulation are likely to occur.
Case Study 4: The Satyam Fraud
This is a case of manipulation of the books of account by inflating revenues through fake
invoices. The Company’s standard billing systems were subverted to generate false invoices to
show inflated sales. 7,561 invoices worth Rs.51 billion (US$1.01 billion) were found hidden in
the invoice management system using a Super User ID. The value of these fake invoices were
shown as receivables in the books of account thereby inflating the revenues of the company.
The charge framed against the Auditors was that they did not bring the internal control
deficiencies to the notice of audit committee and thereby, facilitated the continuance of the
fraudulent practices unabated.
Lessons and Tips
Auditors must remember that anyone of any stature could act with monumental recklessness,
selfishness and self-destructiveness as Ramalinga Raju, the then Chairman of the company,
did. They must also be conscious of the fact that anything can be faked in this modern
technology driven world and that they need to continuously update their skills and knowledge in
order to keep up with the new challenges.
Case Study 5: Bangladesh Central Bank Fraud
Bangladesh Central Bank was defrauded in February 2016, when thirty-five fraudulent
instructions were issued by security hackers via the SWIFT network to illegally transfer close to
US $1 billion from the Federal Reserve Bank of New York account belonging to Bangladesh
Bank. The heist was linked to a customized malware attack that compromised SWIFT software
used to transfer funds. SWIFT is a Belgium-based cooperative of 3,000 organizations that
141
Background Material on Information Systems Audit 3.0 Course (Module 1)
maintains a messaging platform used by banks to transfer money across borders, often in real
time. It was the bank's systems or controls that were compromised, not the SWIFT software.
Five of the thirty-five fraudulent instructions were successful in transferring $101 million, with
$20 million traced to Sri Lanka and $81 million to the Philippines. The Federal Reserve Bank of
New York blocked the remaining thirty transactions, amounting to $850 million, due to
suspicions raised by a misspelled instruction. All the money transferred to Sri Lanka has since
been recovered
The attack was waged against Bangladesh Bank, the nation's central bank. It was the account
of the bank with SWIFT, rather than that of the bank's customers, that was taken over. They
used these credentials to authorise about three dozen requests to the Federal Reserve Bank of
New York to transfer funds from the account of Bangladesh Bank. While hackers can
successfully access many systems without insider assistance, in this case, almost certainly
insider knowledge of how the system operates was used to overcome the fraud detection
controls. This knowledge could easily have come from a current employee at SWIFT or
Bangladesh Bank.
The malware used to compromise a computer used for SWIFT transactions was designed to
hide traces of fraudulent payments from the bank's local database collections. What's more,
once money is transferred via SWIFT, it's typically not reversible. Multiple banks and transfers
may be involved in completing a transaction, all taking place within seconds. And because
multiple banks and accounts are involved, by default, the transfers are not reversible when
disputed. The malware was able to be installed on the SWIFT software computer because the
attacker was in Bangladesh Bank's network with access - presumably with enough access to
override any locally installed security software. The perpetrators managed to compromise
Bangladesh Bank's computer network, observe how transfers are done, and gain access to the
bank's credentials for payment transfers. Later the Governor of Bangladesh Bank stated that he
had foreseen cyber security vulnerabilities one year ago and had hired an American cyber
security firm to bolster the firewall, network and overall cyber security of the bank. However, the
bureaucratic hurdles prevented the security firm from starting its operations in Bangladesh until
after the cyber heist
The key defense against such attack scenarios remains for users to implement appropriate
security measures in their local environments to safeguard their systems - in particular those
used to access SWIFT - against such potential security threats. Such protections should be
implemented by users to prevent the injection of malware into, or any misappropriation of, their
interfaces and other core systems. As per experts, the banks should be using the very same
controls over their own systems that they expect of their own customers. Further, SWIFT
transactions should be conducted only on computers that are isolated from other devices on
banks’ networks. It should be a dedicated computer for its single task.
142
IT Enabled Assurance Services
6.8 Summary
In this chapter, we have learnt various types of assurance and advisory services which can be
provided by IS Auditors. Further, an insight into fraud related activities which may result in loss
of critical information of the enterprise and how to conduct investigation into fraud related
activities by using data analysis and forensic tools was discussed.
6.9 Questions
1 Which of the following factors should not be considered in establishing the priority of
audits included in an annual audit plan?
A. Prior audit findings
B. The time period since the last audit
C. Auditee procedural changes
D. Use of audit software
2 Which of the following is LEAST likely to be included in a review to assess the risk of
fraud in application systems?
A. Volume of transactions
B. Likelihood of error
C. Value of transactions
D. Extent of existing controls
3 An IS auditor discovers evidence of fraud perpetrated with a manager's user id. The
manager had written the password, inside his/her desk drawer. The IS auditor should
conclude that the:
A. Manager’s assistant perpetrated the fraud.
B. Perpetrator cannot be established beyond doubt.
C. Fraud must have been perpetrated by the manager.
143
Background Material on Information Systems Audit 3.0 Course (Module 1)
144
IT Enabled Assurance Services
145
Background Material on Information Systems Audit 3.0 Course (Module 1)
References
www.icai.org
www.isaca.org
www.csoonline.com
www.businessdictionary.com
146
IT Enabled Assurance Services
www.sans.org
CISA Review Manual
Information Systems Control and Audit by Ron Weber
NIST Guidelines
ITAF 3rd edition
ISO/IEC 27001 standards
147
Appendix 1
RFP from Bank for IS Audit of Application
Software
Background: This is a private sector bank with branches all over India. It is using a number of
applications – both developed In-house and Outsourced for its business operations. It wishes
to have these application solutions audited as per the scope of audit given below.
Software Packages to be audited are:
Category A: Developed In-house (Standalone)
1. Bills
2. Remittance
3. Vostro Accounts
4. Preventive Monitoring System
Category B: (Outsourced)
1. Cash Management Services
2. Centralised Banking Solution
The Scope of Audit is as under:
Evaluation of Efficiency & Effectiveness of the package vis-à-vis business process and
requirements
Application Security & Controls review
Database Security and Integrity review
Review of Interface Controls with other applications
Review of Network & Communications controls in relation to the application package
Inter-alia, the scope shall include the following:
1. Whether the design of the software conforms to the Requirements Specifications.
2. Objectives of the application - whether these have been fulfilled/ likely to be fulfilled by
implementation.
3. Whether bank’s systems & procedures are being followed in the application.
4. What are the controls built in the application? Whether these take care of bank’s systems
and procedures.
RFP from Bank for IS Audit of Application Software
5. What are the security features available / built into the application package and whether
these are sufficient to take care of the risks in financial transactions?
6. What is the relative efficiency of the application in conduct of transactions vis-à-vis the
performance in similar packages?
7. Testing robustness of the application package by running a specified number of
transactions.
8. Assessment of the Risk component in the package.
9. To test and verify for any bugs in the application package.
10. To specify clearly methodology to be adopted in carrying out each of the above steps.
149
Appendix 2:
Response to RFP for Logical Access
Controls Review of SAP
Introduction
The Client Company (Max Infotech)
Max Infotech began its business operations in 1959. Today the Max Infotech Group is a
significant player in the Indian software industry with a gross sales turnover of Rs 10.20 Billion
in 2018-19. The Max Infotech Group offers a range of IT enabled services. The services of the
Group are divided into the specific business units covering specific business interests. Max
Infotech has over 5000 employees located in 10 ITPs and 20 marketing offices in India and
abroad. Max Infotech has implemented SAP Ver. X and has been using it successfully for more
than 3 years. It has more than 500 SAP users in the group. Max Infotech is also considered as
one of the SAP Competency Centres in India. The primary SAP modules used are SD, FD, PD,
HR, QM and PM. It intends to provide information access to its dealers. Max Infotech intends to
have an IS Audit of SAP implementation covering Logical Access Security encompassing
security at Network, OS, Database and functionality layers.
Background
Objective of SAP Review
Max Infotech Group has been using Information Technology as a key enabler for facilitating
business processes and enhancing services to its customers. The senior management of Max
Infotech has been very proactive in directing the management and deployment of Information
Technology. Most of the mission critical applications in the company have been computerised.
The IT department of Max Infotech has developed Information Systems Controls (Policies,
Procedures, Practices and Organisation Structure) as envisaged by the management for
Response to RFP for Logical Access Controls Review of SAP
151
Background Material on Information Systems Audit 3.0 Course (Module 1)
Our Approach/Methodology
Audit Approach
A. Our approach to the assignment would be as follows:
(i) We propose to deploy a core team of 4 to 6 IS audit personnel for this assignment in
batches of 2 to 3 as per the skill sets required, under the personal direction and liaison
of the Principal, Mr. Abraham.
(ii) Max Infotech should designate a person at a senior level to coordinate between us. Max
Infotech should also depute one personnel each from systems and audit group to form
part of the audit team.
(iii) Detailed systematic audit procedures would be finalized after completing review of the
documentation and discussion with the systems staff and the users.
In tune with terms and scope of reference of the assignment, we will adapt the methodology
from COBIT®. Specific Control Objectives\Management Guidelines of the relevant IT process
of Logical Access controls shall be selected for this assignment after obtaining understanding
of the organisation structure, deployment of information systems and available documented
policies and procedures.
Structured Methodology
The above-mentioned objectives shall be achieved through the following structured
methodology;
Obtain understanding of IT Resources deployment at Max Infotech
Obtain understanding of the IT Strategy and internal control system at Max Infotech
Identification and documentation of IT related Circulars issued by Max Infotech.
Identification and documentation of Organisation Structure and Information Architecture
Identification and documentation of existing policies, procedures and practices
152
Response to RFP for Logical Access Controls Review of SAP
Application of COBIT® for formulating IT best practices for the Policy and Procedures of
Max Infotech
Formulation of draft report on our findings covering our review and benchmarking.
Presentation of final report with agreed action plan based on feedback of IT management
of Internal Audit team of Max Infotech
Max Infotech shall make available all the required resources on time and provide one
coordinator for interaction and clarifications, as required.
Audit Plan
The audit plan would cover the following activities:
1. Discussions with the
Internal Audit Team
Systems\Implementation Team
Users and user management
2. Review of Operating Systems (OS) documentation
3. Examination of OS access rights
4. Review of Oracle\SAP Manuals
5. Examination of selected Modules access profiles
6. Observation of the Users and the systems in operation
7. Review of access controls over Computers as relevant
8. Examination of computerised processing controls incorporated within the selected
modules.
Audit Program/Procedures
Our audit team would perform the following tasks based on the audit methodologies:
1. Undertake an in-depth study and analysis of all aspects of SAP as implemented at Max
Infotech. We will take steps to identify the way in which the system currently operates. In
doing so, the following objectives would be kept in mind while setting the overall goals:
Accurate and complete processing of data
Error messages in case of incomplete/aborting of processing of data
Optimise data handling and storage
Better management of information
2. Review the software in operation; understand how the various modules interact within the
153
Background Material on Information Systems Audit 3.0 Course (Module 1)
overall system.
3. Review how each module in the system has been tested including the documentation
prepared in respect of each.
4. Review the methods employed for implementation of the system, including post-
implementation review procedures undertaken to ensure that the objectives set out were
actually achieved.
5. Understand the business processes and review how these have been mapped in the
information systems by tracing the modules with a top down approach.
6. Review the modules by performing detailed documented tests of all the menu options and
their related effects.
7. Review the controls established over the continuity of stored data, necessary to ensure
that once data is updated to a file, the data remains correct and current on the file.
8. Review the in-built controls for stored data so as to ensure that only authorised persons
have access to data on computer files.
9. Review the controls established which ensure that all transactions are input and accepted
for further processing and that transactions are not processed twice.
10. Review the controls established so as to ensure that only valid transactions are
processed.
11. Review the procedures established for back-up and recovery of files in the package.
12. Review controls established for the development, documentation and amendment of
programs so as to ensure that they go live as intended.
Assignment Team
Our approach to selecting the right people for a project is to bring together the necessary skills
and experience for a particular assignment from the rich mix of skills and experience available.
The assignment would be executed under the personal supervision and led by Mr. Abraham.
The team would be a blend of professionals with extensive experience in Management,
Information Systems and Auditing. The team includes Chartered Accountants, IT Professionals,
Management Consultants and Certified Information System Auditors. The senior members of
the team are:
Abraham
Ramprakash
Ravindra Jain
Hariram
154
Response to RFP for Logical Access Controls Review of SAP
Logistic Arrangements
Infrastructure Required
It will be necessary for Max Infotech to appoint one coordinator who will be part of the
discussions on the work plan initially and continue to work with our team till the assignment is
complete. Max Infotech will make available necessary systems, software resources and support
facilities required for completing the assignment within the agreed time-frame. During the course
of the assignment, we will require following:
Three Nodes with Read only access to SAP.
One Laptop with Windows 10/Microsoft office 2013 or higher version.
Access to a laser printer for printing reports as required.
Adequate seating and storage space for audit team
Facilities for discussions amongst our team and your designated staff.
Documentation Required
User Manuals and Technical Manuals relating to System Software and SAP.
Organisation chart outlining the organisation hierarchy and job responsibilities.
Access to circulars\guidelines issued to employees.
Access to user manuals and documentation relating to SAP Implementation by Max
Infotech.
Any other documentation as identified by us as required for the assignment.
155
Background Material on Information Systems Audit 3.0 Course (Module 1)
would also impact the audit duration and time schedule, which we would be communicating to
you in advance.
Fees
The Fees for this assignment are Rs. x.xx Lakhs (Rupees xxx only) to be paid as follows:
50% Advance on Proposal acceptance
Balance 50% on presentation of Final Report
Out of pocket Expenses
Travelling, Boarding, Lodging and conveyance expenses to be reimbursed on actuals in case
of outstation travel. As our HO is in Bangalore, the assignment may involve one\two trips of Mr.
Abraham from Bangalore to Delhi for the assignment.
Authorised Signatory
Encl: Profile of ISACC
156
Appendix 3
Sample IS Audit Finding
Logical Access Controls Review of Operating System (OS)
We have reviewed procedure of granting access to the Operating system and Toll Operations
Package. Our specific findings and recommendations with agreed action plan are given below:
The overall control objective in implementing OS Access controls:
“The creation of users and their access need to be controlled through appropriate Authorization
levels. Controls have to be laid down and adhered to while granting authorization. Access logs
are to be generated whenever the OS is accessed and Access Logs should show details as to
the users accessing the OS, the period of access and the resources accessed. System must
enforce a systematic procedure for logins and logouts. All access points to the system are to be
monitored by way of access logs and these access points are available only on the
administrators’ console and terminals”.
Findings
1. System Users have blank user-ids:
Issue: Presently, system manager has the system administration rights and toll manager is also
created as a user who can modify the ini settings in PQR. These users have a blank user-id and
passwords have not been changed since installation.
Implication: High
User accountability may not be established on account of lack of documentation. The operations
of PQR may be affected in case of breakdown and non-availability of the relevant personnel.
Recommendations:
The users of Operating System and Toll Operations Package in PQR Computer need to
be authorized in writing by senior management. Creation of their user ids and passwords
should be documented and accepted by the user and kept by senior management in
sealed cover in safe custody to be available in case of need.
Password policy has to be formulated and passwords should be changed at least once in
90 days without reusing the previous five passwords.
Management comment: Agreed. System manager will create user ids for all authorized users.
Issue: The PQR Computer is linked to other computers in the Network. These computers are
only being used by the Toll Manager and his staff for performing administration jobs such as
preparing Toll Reports. Networking of these office computers with PQR computer makes it
vulnerable to unauthorized access.
Implication: High
PQR System could be accessed by any of the users of the office computers.
Recommendations:
A review of security and operations settings needs to be done and all access to PQR Computer
from any of the office computers has to be removed or restricted.
Management comment: Agreed. Will be reviewed and modified as required.
158
Appendix 4
CAAT Report using SQL
Sample Results of using CAAT
As a part of our audit procedure, we have used SQL to directly access and analyze the data
stored in the tables. Our observations and the related analysis are given below. As these
observations relate to the data stored which could impact financial accounts, we have submitted
this information to Statutory Auditors and user department of ABC with a request to verify these
SQL results and confirm the impact on the financial statements. The detailed tables of SQL
Statements can be obtained from ABC, IT Department. Our observations with implications,
comments and our Risk assessment are given below.
160
Appendix 5
Sample IS Audit Report
Objectives of the Assignment
The primary objective of this Information Systems Audit assignment was to provide assurance
to the management of ABC Limited (ABC) on the availability, appropriateness and adequacy of
controls in the Financial Accounting and Loan Processing System (FALPS) through review of
controls of their in-house package - Financial Accounting and Loan Processing System
(FALPS),
Logical access controls of FALPS, and
Conduct Implementation audit of General Controls at 2 select branches with specific emphasis
on implementation of FALPS.
162
Sample IS Audit Report
3. Issues identified which have been rectified by IT deptt and the issues rectified as on date
4. Logical access control Review of Unix: Access Controls issues of Unix
5. Logical access control Review of Oracle: Access Control issues of Oracle
6. Review of Financial data using SQL: Highlighting data integrity issues in existing data
Overall Conclusions
Based on our review, our overall conclusions on specific areas are as follows:
Security and Access Controls
Our review of security and access controls at the IT Environment as reviewed by us and as
implemented in ABC using Unix, Oracle and FALPS confirms that appropriate security and
access controls have been implemented by using related functions and features of the
packages. Our test checks have revealed that systems of security and controls are reliable.
However, there are some areas where controls need to be strengthened and these are given in
annexure.
Business Process Controls
Our review of business process validations and data integrity controls covering all the core
functions of ABC as facilitated by FALPS such as interest computation, allocation and aging,
confirms that all related data have been duly captured, processed and stored correctly and
completely subject to some transaction data not available pertaining to previous years.
However, there are also missing data in master tables which impact the MIS and statements of
accounts. This may also lead to inconsistencies in data and is a major concern area. The issues,
which have come to our notice during the process of our review, are highlighted in annexure.
Further Action
We consider that the recommendations given in annexure to this report would be very useful for
facilitating business process controls of ABC and will aid in improving the effectiveness of
FALPS package and computer operations. We would like to affirm that the matters included in
this report are those which came to our notice during our review by following normal Information
System audit procedures by complying with globally applicable Information Systems Auditing
Standards, Guidelines and Procedures that apply specifically to Information Systems Auditing
issued by ISACA, USA and Security and Control Practices as outlined in COBIT 5 also issued
by ISACA as applied to ABC operations for review of Application software and implementation.
Further, on account of limitations of scope and time, we have used sample test and test check
approach. Hence, certain areas, which are outside the scope of this review such as source code
review, implementation controls and general controls specific to branches are not covered.
163
Appendix 6
Questionnaire for the IS Auditor to Prepare
Himself for Providing Assurance services in
E-Commerce
1. How many (approximately) of the businesses you audit will be electronic in that there is
no paper, or other non-electronic forms of audit trail available?
2. In general, as an auditor, what special steps or approach would you take when auditing
a business that is engaged in eCommerce compared with a comparable business not
engaged in electronic commerce?
3. Which national or international standards or pronouncements would you use or are using
in undertaking an audit of a business engaged in electronic commerce?
4. To what extent would you want that records and audit trails of eCommerce transactions
be maintained and in what form?
5. How would you assure the management that records, and audit trails are being properly
created?
6. To what extent would you recommend that records and audit trails of eCommerce
transactions be maintained over time?
7. To what extent do you foresee that records and audit trails of eCommerce transactions
will be combined with other transactions or otherwise consolidated, so that the
transactional trail is not lost?
8. How do you satisfy yourself that records and audit trails of eCommerce transactions have
not been altered?
9. How would you test the above – through review of system controls or substantive testing?
10. If you find that that records and audit trails of eCommerce transactions are inaccessible
either through being stored remotely, or through the effects of data security mechanisms,
or otherwise, how would you, as auditors, audit the same?
11. What are the minimum types of records that must be archived, by the business entity,
which will allow both external financial or statutory auditors to perform their functions? On
what basis do you expect these records to be maintained? In what form do you want
these records - Digital or manual?
12. How would you address the following issues and problems you could be facing in practice
when carrying out audits of businesses engaged in eCommerce?
Sample IS Audit Report
165
Appendix 7
Specimen Report Format
Sr # Reported Area Recommendations Management
Comments
4.0 AUDIT AREA– Asset Management
4.1 Improper Asset Management .
Fixed asset register does not reflect the clear ownership of
the asset. Asset register
Many assets were not having tags as required by Asset should reflect the
Name
Tagging Policy. ownership and
tagging should be Desig
Root Technol Proce Peo Othe as per policy. nation
Cause ogy ss ple rs Timeli
nes
Non-Compliance to security policy PO Yes No
support
Risk Very High Mediu Low Negligi
require
High m ble
d for
Reason for Risk of Theft/Misuse resoluti
rating Risk of system crash due to temperature on
and
humidity
5.0 AUDIT AREA- Physical and Environmental Controls
5.1 Weak Controls on Laptop checking
On 6/08/2019, it was observed that at M office, Laptops are
not being checked while leaving the office. Visitors’ laptops
The access control system at the entire 1st Floor at K office should be checked
Name
is not operational. while entering and
leaving the office. Designa
Tech Proc Peo Othe tion
Access control
Root nolo ess ple rs system should be Time
Cause gy made operational. lines
Non-Compliance to security policy
Very High Mediu Low Negligi PO Yes No
Risk suppo
High m ble
rt
Reason Risk of Theft/Misuse requir
for rating ed for
resolu
tion
Sample IS Audit Report
5.2
Monitoring not done for preventive maintenance of AC
Preventive
The preventive maintenance of air conditioning at K office for
maintenance
data centre is not being monitored at all. The Admin deptt. is not
schedule should be
having even copy of preventive maintenance schedule, a pre-
maintained and
requisite for monitoring and compliance, as agreed between Nam
monitored.
Bharti and Nu Tech Engineers e
Root Technol Proce Peop Others Desi
PO Ye No
Cause ogy ss le gnati
sup s
on
Non-Compliance to security policy port
req Timel
Risk Very High Mediu Low Neglig
uire ines
High m ible
d
Reason Risk of system crash due to temperature for
for and humidity res
rating oluti
on
6.0 AUDIT AREA- Communications and Operations
Management.
6.1 Weak Backup Controls
The B Backup and Recovery Management version 2.2 is Backup schedule
dated 13/8/2015, with no date of revision should be suitably
Backup schedules are not drafted so as to give clear amended to provide
Name
direction for storage of backups. clear directions for
backup storage as Designa
In case of all the servers, except M-KL (10.0.0.0), monthly
per policy. tion
back-up was not kept on-site.
Offsite backup is not kept in fire proof cabinet. Timelin
The prescribed format, FM Backup & Recovery Request Offsite backups es
Form, is not being used. should be stored in
fireproof cabinet.
In case of server (10.0.0.0.), monthly backup is required to
be kept for 7 years. As explained to us, immediate six
months’ data should be kept onsite and rest offsite. PO Yes No
However, it was noticed that some tapes of 2016 and 2017 suppo
were also kept on-site. rt
requir
Tech Proc Peo Others ed for
nolog ess ple resolu
Root y tion
Cause
Lack of clear directions in back up
schedule and non adherence of policy.
Risk Very High Mediu Low Negligible
High m
167
Background Material on Information Systems Audit 3.0 Course (Module 1)
168
Sample IS Audit Report
IWSS). Using only the squid proxy for the filtering is not a strong for the Internet Name
measure to do the web filtering. content filtering to
Designa
Database for the web content filtering is not strong enough to reduce the
tion
catch all the websites on the Internet. vulnerabilities and
malicious attacks Timelin
from Internet. es
Tec Pro Peo Oth
hnol ces ple ers
Root Cause ogy s PO Yes No
suppo
Lack of security focus
rt
High Medi Low requir
Risk
um ed for
resolu
Reason for It is a Gateway for vulnerabilities
tion
Rating
169
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
ISA Background Material
INFORMATION SYSTEMS AUDIT 3.0 COURSE
ISA (Modules 1 to 6)
Background Material
ISBN - 978-81-8441-995-5
INFORMATION SYSTEMS
AUDIT 3.0 COURSE
Module - 2
Governance and Management of Enterprise
Information Technology, Risk Management,
Module - 2
Compliance & BCM Section
Digital Accounting and Assurance Board
The Institute of Chartered Accountants of India August | 2020 | P2724 (Revised)
ICAI Bhawan,Hostel Block, 7th Floor
A-29, Sector-62 Digital Accounting and Assurance Board
Noida - 201309, India The Institute of Chartered Accountants of India
Tel (Direct): +91 120 3045992/961
Web: www.icai.org (Set up by an Act of Parliament)
New Delhi
Background Material
on
Information Systems Audit 3.0 Course
Module-2 :
Governance and Management of Enterprise Information
Technology, Risk Management, Compliance & BCM Section
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form, or by any means, electronic mechanical, photocopying, recording, or
otherwise, without prior permission, in writing, from the publisher.
DISCLAIMER
The views expressed in this material are those of author(s). The Institute of Chartered Accountants
of India (ICAI) may not necessarily subscribe to the views expressed by the author(s).
The information in this material has been contributed by various authors based on their expertise
and research. While every effort have been made to keep the information cited in this material error
free, the Institute or its officers do not take the responsibility for any typographical or clerical error
which may have crept in while compiling the information provided in this material. There are no
warranties/claims for ready use of this material as this material is for educational purpose. The
information provided in this material are subject to changes in technology, business and regulatory
environment. Hence, members are advised to apply this using professional judgement. Please visit
34& portal for the latest updates. All copyrights are acknowledged. Use of specific
hardware/software in the material is not an endorsement by ICAI.
Email : [email protected]
ISBN : 978-81-8441-995-5
Evolution of digital economy and ever changing dynamic ecosystem presents significant
challenges, including new competition, new business and service delivery models, unprecedented
transparency, privacy concerns and cyber threats. With a goal to keep members abreast of impact
of emerging technologies, Digital Accounting and Assurance Board has come out with the updated
Post Qualification Course on Information Systems Audit Modules to equip members with
specialised body of knowledge and skill sets so that they become Information Systems Auditors
(ISAs) who are technologically adept and are able to utilize and leverage technology to provide
reasonable assurance that an organization safeguards it data processing assets, maintains data
integrity and achieves system effectiveness and efficiency. This updated syllabus facilitates high
level understanding about the role and competence of an IS Auditor to analyse, review, evaluate
and provide recommendations on identified control weaknesses in diverse areas of information
systems deployment.
Revised Modules of Post Qualification Course on Information Systems Audit has specific objective,
i.e., “To provide relevant practical knowledge and develop skills for planning and performing
various types of assurance or consulting assignments in the areas of Governance, Risk
management, Security, Controls and Compliance of Information Systems.” The core of DISA 3.0
lies in inculcating competence to add to service delivery of the members. The updated course
would help the members to apply appropriate strategy, approach, methodology and techniques for
auditing information system and perform IS Assurance and consulting assignments by using
relevant best practices, IS Audit standards, frameworks, guidelines and procedures.
The updated ISA Course 3.0 has a blend of training and includes e-learning, live case studies and
lab manuals, project work in addition to class room lectures. This updated background material
also includes a DVD which has e-Learning lectures, PPTs, case studies, DEMO CAAT software,
useful checklists and sample audit reports. New Module on “Emerging Technology and Audit” has
been added which covers Information System Assurance and Data Analytics, Assurance in Block
chain Ecosystem, and Embracing Robotic Process Automation in Assurance Services. In addition
to this Artificial Intelligence and Internet of Things (IoT) has also been inducted in the new
modules.
We would like to take this opportunity to place on record our deep appreciation for the efforts put in
by Convener, Dr. Onkar Nath as well as authors and reviewers of the various modules, viz., CA
Anand Prakash Jangid, Mr. N.D. Kundu, Mr. Inder Pal Singh, Mr. Avinash Gokhale, CA Pranay
Kochar, CA Naresh Gandhi, Dr Manish Kumar Srivastava, Dr. Saurabh Maheshwari, CA
Narasimhan Elangovan and CA Atul Kumar Gupta. It would be also appropriate to express our
thanks to all the ISA faculties for giving their inputs/ suggestions for the implementation of DISA
3.0.
We would like to express gratitude to CA. Atul Kumar Gupta, President, ICAI, and CA. Nihar
Niranjan Jambusaria, Vice President, ICAI, for their thought leadership and encouragement to the
initiatives of the Board. We would also like to place on record our gratitude for all the Board
members, co-opted members and special invitees for providing their valuable guidance and
support in this initiative of the Board. We also wish to express my sincere appreciation for CA. Amit
Gupta, Secretary, DAAB, Ms. Nishi Saraf, Section Officer for their untiring efforts in finalization of
the updated Modules.
We are sure that these updated Modules on Post Qualification Course on Information Systems
Audit would be of immense help to the members and enable them to enhance service delivery not
only in compliance, consulting and assurance of IT services, but also provide new professional
avenues in the areas of IT Governance, Cyber Security, Information System Control and
assurance services.
vi
Contents
Chapter 1: Concepts of Governance and Management of
Information Systems 1
Learning Objective: 1
1.1. Introduction 1
1.2. Key Concepts of Governance 1
1.2.1. Enterprise Governance 2
1.2.2. Conformance or Corporate Governance Dimension 2
1.2.3. Performance or Business Governance Dimension 3
1.2.4. Enterprise Governance Framework 3
1.2.5. Corporate Governance 4
1.2.6. Need for Corporate Governance 5
1.3. Corporate Governance and Regulatory Requirements 6
1.4. Enterprise Governance of Information and Technology (EGIT) 7
1.4.1. Implementing EGIT 8
1.5. Enterprise Risk Management 12
1.5.1. Governance Objectives 12
1.5.2. Internal Controls 13
1.6. Summary 15
1.7. Questions 15
1.8. Answers and Explanations 17
viii
3.5. Stakeholders in Implementing EGIT 60
3.6. Using systematic Approach for Implementing EGIT 60
3.6.1. Phase 1: Establish the Desire to Change 61
3.6.2. Phase 2: Form an Effective Implementation Team 61
3.6.3. Phase 3: Communicate Desired Vision 62
3.6.4. Phase 4: Empower Role Players and Identify Quick Wins 62
3.6.5. Phase 5: Enable Aperation and Use 62
3.6.6. Phase 6: Embed New Approaches 63
3.6.7. Phase 7: Sustain 63
3.7. Implementing EGIT in Specific Areas 63
3.7.1. Strategic Alignment of IT with Business 63
3.7.2. Aligning IT Strategy with Enterprise Strategy 65
3.7.3. Value Optimization 66
3.7.4. Resource Optimization 66
3.7.5. Sourcing Processes 67
3.7.6. Outsourcing 67
3.7.7. Capacity Management & Growth Planning Processes 67
3.7.8. Capex and Opex 68
3.7.9. Role of IS Auditors 69
3.8. Summary 69
3.9. Questions 70
3.10. Answers and Explanations 71
ix
4.5.3. Measures Defined 78
4.6. Balanced Scorecard (BSC) 78
4.6.1. BSC Perspectives 79
4.7. Strategic Scorecard 81
4.8. Summary 83
4.9. Questions 83
4.10. Answers and Explanations 85
x
5.14.1. Back up Strategies 111
5.14.2. Types of Backup 111
5.14.3. Recovery Strategies 112
5.14.4. Strategies for Networked Systems 112
5.14.5. Strategies for Distributed Systems 114
5.14.6. Strategies for Data Communications 114
5.14.7. Strategies for Voice Communications 115
5.15. Types of Recovery and Alternative Sites 115
5.15.1. Mirror Site/ Active Recovery Site 116
5.15.2. Offsite Data Protection 117
5.16. System Resiliency Tools and Techniques 118
5.16.1. Fault Tolerance 118
5.16.2. Redundant Array of Inexpensive Disks (RAID) 119
5.17. Testing of BCP 119
5.18. BCP Audit and Regulatory Requirements 121
5.18.1. Role of IS Auditor in BCP Audit 121
5.18.2. Regulatory Requirements 121
5.18.3. Regulatory Compliances of BCP 121
5.19. ISO 22301:2019 122
5.20. ISO 27031:2011 123
5.21. Services that can be Provided by an IS Auditor in BCM 123
5.22. Summary 124
5.23. Questions 125
5.24. Answers and Explanations Error! Bookmark not defined.
Appendix 1: Checklist and Control Matrix 129
Appendix 2: Sample of BCP Audit Finding 134
xi
xii
Chapter 1
Concepts of Governance and Management of
Information Systems
Learning Objective
Evaluate structures, policies, procedures, practices, accountability mechanisms and
performance measures for ensuring Governance and management of Information Technology,
risk management and compliance as per internal and external stakeholder requirements.
1.1 Introduction
The need for governance and management of information systems can be assessed from the
simple fact that today technology is all pervasive. Organizations are so dependent on
Technology that its failure will bring all key operations to a complete halt. On the positive side,
technology facilitates organizations to offer products or services to anyone across the globe.
The fundamental principle in the current business environment is to use technology to enable
users to access information anytime, anywhere, anyhow by anyone. The objective is to
provide information access to all stakeholders online with real-time access and update. This is
done using enabling technology such as the network, Internet, hardware, operating system
software, database, applications and browser. Modern Technology is empowered by the cloud
and internet access through wireless broadband. Technology is only an enabler but the
backbone for this has to be robust systems and processes for the information systems. Hence,
it is critical to ensure that organizations embed Governance and management processes and
other enablers in the technology deployed. This will ensure that various stakeholder
requirements are met and the management at all levels are able to use technology to perform
their responsibilities. It is important to comply with the requirements of corporate governance
or enterprise governance by implementing Governance of Enterprise IT, enterprise risk
management using appropriate risk management strategy and internal control systems. This
chapter outlines these concepts and provides overview of how to implement EGIT
combination of processes and structures implemented by the board to inform, direct, manage,
and monitor the activities of the organization toward the achievement of its objectives.”
Governance should be in place to ensure IT supports the strategies and objectives of the
organization. The relationship of enterprise Governance and Corporate Governance with IT
governance (EGIT is depicted below)
2
Concepts of Governance and Management of Information Systems
CEO, role and composition of the board of directors, Board committees, Controls assurance
and Risk management for compliance. Regulatory requirements and standards generally
address this dimension with compliance being subject to assurance and/or audit. There are
established oversight mechanisms for the board to ensure that good corporate governance
processes are effective. These might include committees composed mainly or wholly of
independent non-executive directors, particularly the audit committee or its equivalent in
countries where the two-tier board system is the norm. Other committees are usually the
nominations committee and the remuneration committee. The Sarbanes Oxley Act of US is an
example of providing for such compliances from conformance perspective.
3
Background Material on Information Systems Audit 3.0 Course (Module 2)
4
Concepts of Governance and Management of Information Systems
5
Background Material on Information Systems Audit 3.0 Course (Module 2)
6
Concepts of Governance and Management of Information Systems
Governance of Information and Technology (EGIT) using global best practices and
frameworks.
The Information Technology Act amended in 2008 introduced new provisions which are
specifically applicable to corporates, provisions relating to maintaining privacy of information
and imposed compliance requirements on management with penalties for non-compliance.
These requirements have to be considered as part of compliance by corporates and
individuals as applicable.
In the US, The Sarbanes Oxley Act (SOX) focuses on the implementation and review of
internal controls as relating to financial audit. It highlights the importance of evaluating the
risks, security and controls as related to financial statements. In an IT environment, it is
important to understand whether the relevant IT controls are implemented in the relevant
computerised information systems. The overall reliability of these controls would be dependent
on the overall risk management strategy, risk appetite of the management, use of best
practices and various other enablers.
Corporates across the world for SOX compliance have used COBIT 2019
(www.isaca.org/COBIT 2019) as the primary framework and best practices for implementing
governance, risk management and internal controls. COBIT 2019 is a comprehensive
framework for the governance and management of enterprise I&T, comprising five domains,
40Governance and Management objectives and over 200 management practices and activities
divided into governance and management managed processes. Cobit 2019 has been
discussed in detail in subsequent chapters of this module.
Good corporate governance is vital for all types of enterprises big or small in view of the
benefits which accrues due to its implementation. Governance helps in ensuring that control
failures are mitigated appropriately. However, good corporate governance on its own cannot
make an organisation successful. There is a danger that insufficient attention is paid to the
need for organisations to create wealth or stakeholder value. Strategy and performance are
also important.
7
Background Material on Information Systems Audit 3.0 Course (Module 2)
and objectives and the IT-related processes are overseen effectively and transparently.
Implementing a EGIT framework helps in better compliance with legal and regulatory
requirements and ensures that the governance requirements for board members are met. A
few decades back, IT was one of the wagons but now IT is the engine propelling enterprise
growth. IT interfaces all aspects of the enterprise and not just transaction processing. It can be
said that IT has become inseparable from the business. Hence, in a modern enterprise, IT has
moved from being a mere service provider to a strategic partner which helps enterprises in
achieving both competitive and strategic advantage. Considering this huge dependence on IT
and the fact that internal controls are embedded in IT and effective risk management can be
achieved by using IT, implementing Governance of Enterprise IT has become imperative for a
modern enterprise. Regulatory agencies, professional bodies and associates issue guidelines
on use of generic and specific best practices. For example, the Reserve Bank of India issues
guidelines covering various aspects of secure technology deployment. These guidelines are
prepared based on various global best practices such as COBIT 2019 and ISO 27001. The
Information technology Rules, 2011 outlines the need for maintaining secrecy of personal and
sensitive information and identifies ISO 27001 as “Reasonable Security Practices and
Procedures” for implementing best practices.
8
Concepts of Governance and Management of Information Systems
The COBIT 2019 framework can be used for implementing EGIT from any/both the above
perspectives. The seven key components of EGIT which are required for effective
implementation are described in further chapter. Overall, EGIT requires structures, processes
and relational mechanisms.
The components and relationship of IT Governance framework are outlined in figure given
below.
9
Background Material on Information Systems Audit 3.0 Course (Module 2)
communication. COBIT 2019 which is the business framework for implementing EGIT can be
used by enterprises of all sizes and types and regardless of technology deployment.
1.4.1.1 Guidelines for Implementing EGIT
The primary objective of implementing EGIT is to ensure IT delivers value to the business and
helps in mitigation of IT-related risk. This is enabled by the availability and management of
adequate resources and the measurement of performance to monitor progress towards the
desired goals. The COBIT 2019 implementation guide provides a systematic approach with
defines phases and specific roles and responsibilities for implementing EGIT. This approach
can be customized and used by any organization regardless of size, nature of business, sector
or technology used.
1.4.1.2 Systemic Approach to Implementing EGIT
Research studies have established that effective implementation of EGIT maximizes the
contribution made by IT to organizational success. There can be multiple approaches to
implementing EGIT as this varies with the needs of the enterprise and the specific framework
used. It is advisable to adapt a systematic and well-proven approach as outlined in some of
the best practices and frameworks. IT solution providers and regulators also provide their own
approaches for implementing EGIT. It is important to remember that the focus should be first
on implementing the systems and processes first and then automating rather than expecting
that automation will implement systems and processes as required. As explained earlier,
frameworks such as COBIT 2019 also provide a systematic approach for implementing the
relevant frameworks. The technology and business frameworks can be easily integrated under
these frameworks. We are giving below some general guidelines on implementing EGIT which
can be adapted as required.
1. Aligning IT Goals with Business Goals
Achieving better governance starts with the business, and more specifically with
understanding its strategy and goals. IT management should be involved early in the business
strategy definition process, especially in those companies that are highly dependent on IT.
The IT goals should be aligned to the business goals. The IT strategy should be an IT
blueprint of the business strategy plan. The IT goals set out in the IT strategy plan should
clearly support the achievement of one or more business goals. It is the responsibility of the
board and senior management to ensure that the IT strategy is aligned with the business
strategy. This could be achieved through:
Clear business goals, communicated to the entire organisation
Early involvement of IT in business strategy process
Align IT goals to business goals
Derive IT strategy from business strategy
2. Formalise and Implement Right IT Governance Processes
10
Concepts of Governance and Management of Information Systems
After aligning the IT goals with the business goals, it is important to implement required set of
efficient and effective IT governance and management processes. Using best practices such
as COBIT 2019 will facilitate such implementation. It is important to select the most critical
process based on business priorities, assign process owners, develop metrics and monitor the
achievement of process as per set objectives.
3. Establish Required IT Organisation and Decision Structure
Effective Governance of enterprise IT is determined by the way the IT department is organised
and where the IT decision-making authority is located within the organisation. The
responsibility for governance rests with the board of directors as they are responsible for
evaluating, directing and monitoring the governance processes as per stakeholder
requirements. They have to establish the right management structure with the C suite to
ensure there is proper collaboration between business and IT department.
4. Involve Board of Directors/Executive Management in IT Related Matters
Governance initiatives may be initiated by IT or internal auditors but the overall responsibility
vests with the board who assign specific responsibility to senior management from both
business and IT. The executive management has to be aware and actively participating in the
existing governance activities. IT topics and decisions should regularly appear and be
discussed in executive committees or on-board level, especially in organisations where IT
plays a crucial role in keeping the business running. Even when the CIO is not a part of the
executive committees, he should be represented by another executive member or he/she
could be invited whenever an IT related topic is handled.
5. Govern and Manage Roles and Responsibilities
The board should ensure that governance and management structures are established
involving the organisation, the location of the IT function, the existence of clearly defined roles
and responsibilities and a diversity of IT/business committees. The organisation structure
should specify clear responsibilities defined towards the business they work for, and this
throughout all levels, including the CIO and IT management. To make sure individuals adopt
and execute upon their roles and responsibilities, a process of 'formal' evaluation and regular
process of review has to be implemented as part of performance management system.
6. Establish IT Strategy and IT Steering Committee
Effective committees created at the right level with clearly defined roles and responsibilities
play an important role in establishing ensuring alignment of IT with business which is key to
successful implementation of EGIT. IT strategy committee has to operate at the board level
and the IT steering committee has to operate at executive level with each committee having
specific responsibility, authority and membership. The roles and responsibilities of these two
key committees are explained in later chapter of this module.
7. Plan, Align and Manage IT Enabled Investment as a Portfolio
11
Background Material on Information Systems Audit 3.0 Course (Module 2)
12
Concepts of Governance and Management of Information Systems
and increasing value derived from existing I&T investments, and eliminating IT
initiatives and assets that are not creating sufficient value for the enterprise. The
basic principles of I&T value are delivery of fit-for-purpose services and solutions on
time and within budget and generating the financial and nonfinancial benefits that
were intended. The value that I&T delivers should be aligned directly with the values
on which the business is focussed and measured in a way that transparently shows
the impacts and contribution of the I&T-enabled investments in the value creation
process of the enterprise.
Risk Optimisation: Addressing the business risk associated with the use,
ownership, operation, involvement, influence and adoption of I&T within an
enterprise. I&T-related business risk consists of I&T-related events that could
potentially impact the business. While value delivery focuses on the creation of
value, risk management focuses on the preservation of value. The management of
I&T-related risks should be integrated within the enterprise risk management
approach to ensure a focus on IT by the enterprise and be measured in a way that
transparently shows the impacts and contribution of I&T-related business risk
optimisation in preserving value.
Resource Optimisation: Ensuring that the right capabilities are in place to execute
the strategic plan and sufficient, appropriate and effective resources are provided.
Resource optimisation ensures that an integrated, economical IT infrastructure is
provided, new technology is introduced as required by the business, and obsolete
systems are updated or replaced. It recognises the importance of people, in addition
to hardware and software, and, therefore, focuses on providing training, promoting
retention and ensuring competence of key IT personnel.
13
Background Material on Information Systems Audit 3.0 Course (Module 2)
14
Concepts of Governance and Management of Information Systems
embedded in IT and information systems and provide assurance on the effectiveness to meet
established objectives.
1.6 Summary
This chapter has provided an overview of concepts and practice of various aspects of
Governance such as enterprise governance, corporate governance and EGIT. The interfaces
between the different levels at which governance is implemented have also been highlighted.
As IT is a key enabler of organization processes, it is critical to implement EGIT as an integral
part of governance. The regulatory and management requirements for implementing
governance start with clearly established objectives and require using a systematic approach
and use of relevant best practices frameworks as required. Corporate Governance and EGIT
are closely inter-linked with enterprise risk management and internal controls. Regulatory
requirement mandates the implementation of governance, enterprise risk management and
internal controls. Organizations are established with the objective of value creation. Hence,
they will implement governance not only from conformance perspective but also to provide
value to the organization. Hence, the two dimensions of conformance and performance have
to be balanced in implementing governance in enterprises. Guidelines for implementing EGIT
have been explained through a generic guideline starting from aligning IT strategy with
enterprise strategy and ending with ensuring sustainability of EGIT implementation and thus
making it an integral part of day to day process.
1.7 Questions
1. Who is responsible for establishing right structure of decision-making accountabilities?
A. Senior management
B. Operational management
C. Chief information officer
D. IT steering committee
2. The MOST important benefit of implementing Governance of Enterprise IT is:
A. Monitor and measure enterprise performance
B. Provide guidance to IT to achieve business objectives
C. Run the companies to meet shareholders’ interest
D. Ensure strategic alignment of IT with business
3. The primary objective of Corporate Governance is:
A. Reduce IT cost in line with enterprise objectives and performance.
B. Optimise implementation of IT Controls in line with business needs
15
Background Material on Information Systems Audit 3.0 Course (Module 2)
16
Concepts of Governance and Management of Information Systems
17
Background Material on Information Systems Audit 3.0 Course (Module 2)
18
Chapter 2
GRC Frameworks and Risk Management
Practices
Learning Objective
As IT increasingly becomes a key enabler in enterprises of all types and sizes and there is
transformation of enterprises from “Technology Oriented” to “Business and Technology
oriented, governance and risk management become imperative to ensure value creation and
compliance. In the first chapter, we have understood how EGIT implementation can help in
balancing performance with conformance. Use of best practices framework helps in balancing
risk vs return by implementing the right level of security. Implementing EGIT principles is
critical to strive and thrive in the highly intensive IT era. Governance frameworks provide the
structure within which the management can effectively operate to deliver results as per set
objectives. A governance framework typically set in in motion by the board of directors defines
the rules under which the management system operates to translate the board strategy into
specific actions. Governance is about ensuring that the required authority and responsibility is
allocated appropriately within the organisation. It defines the boundaries of decision making
together with mechanism that ensures that performance is monitored, and risks are identified
and escalated so they are managed at the appropriate level. Risk management at enterprise
level encompassing all levels and all areas is critical for successful implementation of
governance. Governance, Risk and Compliance is a regulatory requirement, and this can be
effectively implemented using well established frameworks. There are a plethora of
frameworks for implementing GRC and EGIT. This chapter provides overview of some of the
key GRC frameworks and also elaborates key concepts of risk management from strategy to
operations.
2.1 Introduction
IT is key enabler of enterprises and forms the edifice on which the information and information
systems are built. Implementing Governance, risk management and internal controls is not
only a management requirement but is also mandated by law. In an IT environment
embedding the right level of controls within the information systems to ensure that users can
access required information securely and safely and as per business requirements is critical
for survival. This not only ensures business success but is also a key requirement for the
continued growth of the enterprise. In implementing internal controls in an IT environment, the
legacy approach of considering IT and its contents as boxes to be secured by the IT
department is fraught with extreme risk as the traditional methods of securing IT from
perimeter perspective is no longer relevant. Users of I&T need to access and use information
Background Material on Information Systems Audit 3.0 Course (Module 2)
from anywhere, anytime. There is need to adapt a macro level and architecture perspective for
securing information and information systems. Hence, both from regulatory as well as
enterprise perspective, senior management have to be involved in providing direction on how
governance, risk and control are implemented using a holistic approach encompassing all
levels from strategy to execution. The Board of directors have to evaluate, direct and monitor
effective use of I&T to achieve enterprise objectives. This governance approach will ensure
harnessing the power of information and information technology for achieving business
objectives in addition to meeting regulatory requirements. Best practices framework provide
management with distilled knowledge of experts and this can be customized to meet
stakeholder requirements which include inter alia management and regulators. Management
has to choose the right mix of frameworks for implementing governance, risk, security and
controls. IS Auditors can assist management in implementing these frameworks in an advisory
capacity or provide assurance on how well the GRC frameworks have been implemented to
meet stakeholder requirements and provide recommendations for improvement. From
regulatory perspective, management have to certify whether Risk management and internal
controls have been implemented as per organisation needs and auditors have to certify
whether this implementation is appropriate and adequate.
20
GRC Frameworks and Risk Management Practices
potential public embarrassment, protect intellectual property and maximize opportunities. The
best practices of COBIT 2019 helps enterprises to create optimal value from I&T by
maintaining a balance between realizing benefits and optimizing risk levels and resource use.
COBIT 2019 enables I&T to be governed and managed in a holistic manner for the entire
enterprise, taking in the full end-to-end business and I&T functional areas of responsibility,
considering the I&T related interests of internal and external stakeholders. COBIT 2019 helps
enterprises to manage I&T related risk and ensures compliance, continuity, security and
privacy. COBIT 2019 enables clear policy development and good practice for I&T
management including increased business user satisfaction. The key advantage in using a
generic framework such as COBIT 2019 is that it is useful for enterprises of all sizes, whether
commercial, not-for-profit or in the public sector.
2.1.1.1 Integrating COBIT 2019 with Other Frameworks
There is no single framework which provides all the requirements for all types of enterprises.
Hence, enterprises have to select the right blend of frameworks and best practices. The main
advantage of using COBIT 2019 is that it is provides an enterprise view and is aligned with
enterprise governance best practices enabling EGIT to be implemented as an integral part of
wider enterprise governance. COBIT 2019 also provides a basis to integrate effectively other
frameworks, standards and practices used such as ITIL, TOGAF and ISO 27001. It is also
aligned with The EGIT standard ISO/IEC 38500:2008, which sets out high-level principles for
the governance of I&T, covering responsibility, strategy, acquisition, performance, compliance
and human behaviour that the governing body (e.g., board) should evaluate, direct and
monitor. Thus, COBIT 2019 acts as the single overarching framework, which serves as a
consistent and integrated source of guidance in a non-technical, technology-agnostic common
language.
The Governance and Management objectives in Cobit 2019 are grouped in to five Domains.
Governance objectives are grouped in the Evaluate, Direct and Monitor (EDM) Domain. In this
Domain the Governing body Evaluates strategic options, directs senior management on the
chosen strategic options and monitors the achievement of the strategy. Management
Objectives are grouped into four Domains:
Align Plan and Organise (APO) addresses the overall organization strategy and supporting
activities for I&T.
Build, Acquire and Implement (BAI) treats the definition, acquisition and implementation of
I&T solutions and their integration in business processes.
Deliver, Service and Support (DSS) addresses the operational delivery and support of I&T
Services
Monitor, Evaluate and Assess (MEA) addresses performance monitoring and conformance
of I &T with internal performance targets, internal control objectives and external
requirements.
21
Background Material on Information Systems Audit 3.0 Course (Module 2)
22
GRC Frameworks and Risk Management Practices
23
Background Material on Information Systems Audit 3.0 Course (Module 2)
24
GRC Frameworks and Risk Management Practices
AS/NZS 4360 for risk management. The modification it has made is that ISO has added
processes for IT risk governance by defining IT risk committee. ISO 31000:2018, Risk
management – Guidelines, provides principles, framework and a process for managing risk. It
can be used by any organization regardless of its size, activity or sector.
Using ISO 31000 can help organizations increase the likelihood of achieving objectives,
improve the identification of opportunities and threats and effectively allocate and use
resources for risk treatment.
However, ISO 31000 cannot be used for certification purposes, but does provide guidance for
internal or external audit programmes. Organizations using it can compare their risk
management practices with an internationally recognised benchmark, providing sound
principles for effective management and corporate governance.
25
Background Material on Information Systems Audit 3.0 Course (Module 2)
ISO/IEC 38500:2015 is applicable to all organizations, including public and private companies,
government entities, and not-for-profit organizations. ISO/IEC 38500:2015 is applicable to
organizations of all sizes from the smallest to the largest, regardless of the extent of their use
of IT.
The purpose of ISO/IEC 38500:20015 is to promote effective, efficient, and acceptable use of
IT in all organizations by
assuring stakeholders that, if the principles and practices proposed by the standard are
followed, they can have confidence in the organization's governance of IT,
informing and guiding governing bodies in governing the use of IT in their organization,
and
establishing a vocabulary for the governance of IT.
26
GRC Frameworks and Risk Management Practices
Enterprise Risk
Market Risk Competition IT Risk
Management
Operational
IT Risk
Risk
27
Background Material on Information Systems Audit 3.0 Course (Module 2)
enterprise's risk appetite is appropriate and ensure that risk to enterprise value related
to the use of I&T are identified and managed;
Direct Risk Management: Direct the establishment of risk management practices to
provide reasonable assurance that I&T risk management practices are appropriate to
ensure that the actual I&T risk does not exceed the board’s risk appetite; and
Monitor Risk Management: Monitor the key goals and metrics of the risk management
processes and establish how deviations or problems will be identified, tracked and
reported on for remediation.
Key Management Practices of Risk Management (APO 12: Managed Risk)
Implementing Risk Management requires that the risk management practices are embedded in
all the key organisational processes as required and are performed as part of the day to day
tasks and activities. A process-oriented approach has to be followed for implementing risk
management. The key management practices of effective risk management are:
Collect Data: Identify and collect relevant data to enable effective I&T related risk
identification, analysis and reporting.
Analyze Risk: Develop a substantiated view on actual I&T risk in support of risk
decisions.
Maintain a Risk Profile: Maintain an inventory of known risks and risk attributes,
including expected frequency, potential impact, and responses, and of related
resources, capabilities, and current control activities.
Articulate Risk: Provide information on the current state of I&T- related exposures and
opportunities in a timely manner to all required stakeholders for appropriate response.
Define a Risk Management Action Portfolio: Manage opportunities and reduce risk to
an acceptable level as a portfolio.
Respond to Risk: Respond in a timely manner with effective measures to limit the
magnitude of loss.
Metrics of Risk Management
Enterprises have to monitor the processes and practices of I&T risk management by using
specific metrics. Some of the key metrics are:
Percentage of critical business processes, I&T services and I&T-enabled business
programs covered by risk assessment;
Number of significant I&T related incidents that were not identified in risk Assessment;
Percentage of enterprise risk assessments including I&T related risks; and
Frequency of updating the risk profile based on status of assessment of risks.
28
GRC Frameworks and Risk Management Practices
29
Background Material on Information Systems Audit 3.0 Course (Module 2)
30
GRC Frameworks and Risk Management Practices
In a centralized model it is the Information Risk Management team that develops policies for
the board to consider. Other organizations have decentralized model requiring the involvement
of front-line staff in managing the inherent risks of the company, of the business unit or of the
process.
31
Background Material on Information Systems Audit 3.0 Course (Module 2)
covers risk identification, risk evaluation, control definition steps. In case process
owners does not agree a method called Delphi technique be used to assess the risks.
2. Use of generic risk scenarios based on industry experience and historical data: Generic
scenarios are the list of possible incidents affecting desired outcome of business
process objectives.
3. Review and audit of processes and technology. This includes vulnerability assessment:
Audit findings, lessons learned from Incident response, vulnerability assessments help
organization in identifying possible threats that can impact the normal functioning of
business processes.
2.4.1.1 Risk Components
Risk to be managed effectively have to be understood in totality. Hence, it is important to
understand all the specific components of all identified risks and these are:
Risk Scenario: A possible event due to materializing of one or more risks for example
Failure of connectivity might be caused due to one or more reasons like physical
damage to cables / devices, malfunction of devices, virus / malware attack, Denial of
service attack, failure of service provider.
Threat: Reason for risk materialization for example theft of equipment, fire, natural
disaster, non-availability of human resources, Virus
Vulnerability: Weakness that gets exploited due to threat. For example, absence of
antivirus is a vulnerability that will enable a virus to infect the system or improper
physical security leading to theft
Likelihood / Probability: Judgment of possibility that threat shall exploit vulnerability.
For example, there is always a possibility of earthquake, however it may not take place
every day. The possibility can be worked out based on historical data and seismic zone
in which facility is located. Or possibility of virus attacking systems can happen multiple
times in a day.
Impact / Consequences: When threat materializes, it will affect normal functioning
which might result in loss of business, interruption of services. A calculation of possible
loss expressed in monetary terms.
Response: Acton Plan designed by organization to minimize impact or likelihood of risk
materializing. There are four types of responses and organization may choose one or
more for each risk. The four types are: Accept, Transfer, Avoid and Mitigate. For
example, Management may have process to monitor virus by maintaining antivirus tool
updated and also run a schedule scan. In case cost of process and tool is higher than
impact organization may decide to do nothing and accept the risk.
Controls / Mitigation: In order to mitigate risk management implements controls. For
32
GRC Frameworks and Risk Management Practices
33
Background Material on Information Systems Audit 3.0 Course (Module 2)
your information security. The assessment helps you meet your minimum compliance
mandates and security assessment needs. Assessments are typically performed according to
the following steps:
a. Cataloguing assets and resources in a system.
b. Assigning quantifiable value or rank and importance to those resources
c. Identifying the vulnerabilities or potential threats to each resource
Vulnerabilities that may exist across your systems and applications can create an easy path
for hackers to gain access to and exploit your environment. With dozens and even hundreds
of applications and systems across your environment with access to the Internet, maintaining
and updating system operating systems and applications to eliminate vulnerabilities is
paramount - especially when those applications and systems are tied to sensitive customer,
patient or cardholder information.
2.4.1.4 Asset Inventory
Risks when materialize affect the functioning of organization. The impact of a risk can be
different for different business function depending upon the various factors like time of
incident, functions affected etc. For example, in case on a Bank failure of connectivity might
affect ATM network as well as branch network, however if the failure happens after business
hours impact of non-availability of ATM could be higher. In other words, providing protection
for connectivity to ATM shall be different as compared to branch networks. In order to provide
appropriate security organizations may focus on implementing controls over assets that
supports business processes. ISO27001:2005 also recommends implementing controls
around assets by prioritizing them based on results of risk evaluation. (ISO27001:2013
recommend ISO31000 for Risk management and also states that risk management need not
be asset based.)
2.4.1.5 Risk Register and Control Catalogue
It is a collective record of all identified and evaluated risk along with risk owner and risk
response. The structure of risk register may vary organization to organization, however it
must:
1. Contain risk scenario, likelihood, assets impacted, overall impact on business
(assessment), owner, risk response decision, reference to control catalogue, review
date.
2. It must be maintained based on updating process.
3. Generally, it is used to develop risk profile for reporting to management and approval.
IS auditor should use this risk register to review and audit the risk management process and
also ensure that appropriate controls are identified, designed and implemented. Control
catalogue is collective register of all controls designed and implemented within organization
with reference to risk register.
34
GRC Frameworks and Risk Management Practices
35
Background Material on Information Systems Audit 3.0 Course (Module 2)
36
GRC Frameworks and Risk Management Practices
37
Background Material on Information Systems Audit 3.0 Course (Module 2)
38
GRC Frameworks and Risk Management Practices
39
Background Material on Information Systems Audit 3.0 Course (Module 2)
40
GRC Frameworks and Risk Management Practices
Section 72A
Does the enterprise have an adequate privacy policy?
Whether the enterprise has provided for opt-in/opt-out clause in the privacy policy?
General
Has the enterprise appointed designated officer/nodal officer/computer-in-charge to
comply with the directions of competent authority/agency under various provisions of
the Act? Whether details of such designated officer/nodal officer readily available online
(at its website)?
Section 7A Audit of documents i.e. in Electronic Form: Where in any law for the time being in
force, there is a provision for audit of documents, records or information, that provision shall
also be applicable for audit of documents, records or information, processed and maintained
in electronic form.
Under Section 43A of the (Indian) Information Technology Act, 2000, a body corporate who is
possessing, dealing or handling any sensitive personal data or information, and is negligent in
implementing and maintaining reasonable security practices resulting in wrongful loss or
wrongful gain to any person, then such body corporate may be held liable to pay damages to
the person so affected. It is important to note that there is no upper limit specified for the
compensation that can be claimed by the affected party in such circumstances.
The IT Act 2008 recognizes and punishes offences by companies and individual (employee)
actions. For example: Section 66 to 66F and 67 deal with the following crimes:
Sending offensive messages using electronic medium or using body corporate’s IT for
unacceptable purposes
Dishonestly stolen computer resource
Unauthorized Access to computer resources
Identity theft/Cheating by personating using computer
Violation of privacy
Cyber terrorism/Offences using computer
Publishing or transmitting obscene material
Under Section 72A of the (Indian) Information Technology Act, 2000, disclosure of information,
knowingly and intentionally, without the consent of the person concerned and in breach of the
lawful contract has been also made punishable with imprisonment for a term extending to
three years or fine extending to INR 5,00,000 or with both.
41
Background Material on Information Systems Audit 3.0 Course (Module 2)
42
GRC Frameworks and Risk Management Practices
43
Background Material on Information Systems Audit 3.0 Course (Module 2)
2.10 Summary
This chapter has provided an overview of various types of Governance and risk management
frameworks which can be used by organisations for implementing. There is no single
framework which meets all requirements. Hence, it is important to understand the scope and
coverage of each of these frameworks so that they can adapted as required for
implementation. Risk management is an integral aspect of governance and management.
Risks have both positive and negative attributes. Risks provide challenges but they also
provide opportunities. Risk management requires effective mitigation of risks by adapting the
risk management process strategy thereby balancing risk versus benefits.
2.11 Questions
1. The most important requirement for IT governance function to be effective is:
A. Monitoring
B. Evaluation
C. Directing
D. Managing
2. The MOST important benefit of implementing IT risk management process is that it
helps in:
A. optimizing internal control framework.
B. ensuring residual risk is at acceptable level.
C. prioritizing business functions for audit planning.
D. complying with regulatory requirements.
3. Which of the following is a major risk factor?
A. Existence of inflationary trends.
B. Vendor launches new software.
C. Board of directors elects new chairman.
D. Change in government post elections.
4. The level to which an enterprise can accept financial loss from a new initiative is:
A. Risk tolerance
B. Risk management
C. Risk appetite
D. Risk acceptance
44
GRC Frameworks and Risk Management Practices
5. Designing and implementing a control to reduce the likelihood and/or impact of risk
materializing is a:
A. Risk acceptance
B. Risk transfer
C. Risk treatment
D. Risk transfer
6. Which of the following is a valid risk statement?
A. Network service provider is unable to meet bandwidth.
B. Hacker attempts to launch attack on web site.
C. Application server crash due to power failure.
D. Delay in servicing customers due to network congestion.
7. Which of the following is primary reason for periodic review of risk? The changes in:
A. risk factors
B. risk appetite
C. budget
D. risk strategy
8. Which of the following is a strategic IT risk?
A. IS audit may not identify critical non-compliance.
B. Non-availability of networks impacting services to customers.
C. New application may not achieve expected benefits.
D. Defer replacement of obsolete hardware.
9. Which of the following is the most essential action after evaluation of inherent risks?
A. Evaluate implemented controls.
B. Update risk register.
C. Prepare heat map.
D. Prioritized evaluated risk.
45
Background Material on Information Systems Audit 3.0 Course (Module 2)
risk management.
3. D. Risk factors are conditions that affect the risk profile of organization. Change in
government is one of major risk factor as compared with other options.
4. C. Risk appetite denotes the level of risk acceptable by management. Risk tolerance is the
time up to which an organization can afford to accept the risk. Risk management is a
process of risk mitigation and risk acceptance is decision of the management and is
considered as risk response.
5. C. Implementing control is a risk treatment.
6. D. Options A, B and C are threats and not risks.
7. A. Changes in risk factors is the primary reason for reviewing changes in risk levels for an
organization. The other options are secondary reasons.
8. D. Deferring replacement of obsolete hardware is strategic decision and hence it is a
strategic IT risk. Others are operational IT risks.
9. A. Once risks are evaluated it is necessary to find out the current state of risk mitigation
(gaps in controls) by evaluating the existing controls. This help in identifying gaps and
implementing controls so as to reduce the total exposure within acceptable limits. Other
activities are required but not as essential as identifying gaps in controls.
Downloads
COBIT 2019 Design Guide
http://www.isaca.org/COBIT/Pages/COBIT-2019-Design-Guide.aspx
46
Chapter 3
Key Components of A Governance System
Learning Objectives
To satisfy governance and management objectives, each enterprise needs to establish, tailor
and sustain a governance system built from a number of components. Components are factors
that, individually and collectively, contribute to the good operations of the enterprise’s
governance system over I&T. Components interact with each other, resulting in a holistic
governance system for I&T. Components of a governance system include organizational
structures; policies and procedures; information items; culture and behavior; skills and
competencies; and services, infrastructure and applications
COBIT 2019 which is based on components can be used for implementing Enterprise
Governance of Information Technology (EGIT). This chapter discusses the key components of
EGIT which facilitate the successful achievement of enterprise goals and IT enabled goals.
3.1 Introduction
Organizations which wish to implement EGIT for achieving enterprise objectives have to
consider various key aspects such as goals, objectives, benefit and value for the organisation.
However, to ensure these are achieved, an appropriate EGIT framework must be
implemented. Implementing EGIT does not occur in a vacuum but has to consider the specific
environment applicable to the enterprise. We have discussed in earlier chapters how
implementation of EGIT can be focussed both on conformance and performance. EGIT
implementation has to be taken as a project with an empowered project champion vested with
responsibility for results. Selecting and implementing the right type of components as required
is the key to successful implementation of a EGIT framework. This implementation takes place
in different conditions and circumstances determined by numerous factors impacting both
internal and external environment and these could be pertaining to:
Ethics and culture of the organisation
Laws, regulations and policies
Applicable standards
Industry practices
Competitive environment
Implementing EGIT requires consideration of specific aspects applicable to the enterprise and
these could pertain to:
Mission, vision, goals and values
Background Material on Information Systems Audit 3.0 Course (Module 2)
48
Key Components of A Governance System
enterprise has different objectives, and enterprise can customize COBIT 2019 to suit its own
context through the goals cascade, translating high level enterprise goals into manageable
specific, IT related goals and mapping these to specific processes and practices.
Principle 2: End-to-End Governance System: COBIT 2019 integrates governance of
enterprise IT into enterprise governance. It covers all functions and processes within the
enterprise; COBIT 2019 does not focus only on the IT function but treats information and
related technologies as assets that needs to be dealt with just like any other asset by
everyone in the enterprise. It considers all IT related governance and management
components to be enterprise wide and end to end i.e. inclusive of everything and everyone
internal and external that is relevant to governance and management of enterprise information
and related IT.
Principle 3: Tailored to Enterprise Needs: A governance system should be tailored to the
enterprise’s needs, using a set of design factors as parameters to customize and prioritize the
governance system components.
Principle 4: Holistic Approach: Efficient and effective Enterprise governance of I&T require
a holistic approach, taking into account several integrating components. COBIT 2019 defines
a set of components to support the implementation of a comprehensive Enterprise governance
system for I&T. Components are broadly defined as anything that can help to achieve
objectives of the enterprise.
Principle 5: Governance Distinct from Management: The COBIT 2019 framework makes a
clear distinction between governance and management. These two disciplines encompass
different types of activities require different organizational structures and serve different
purposes.
Governance: It ensures that stakeholders needs, conditions and options are evaluated
to determine balanced, agreed on enterprise objectives to be achieved; setting direction
through prioritization and decision making, and monitoring performance and compliance
against agreed on direction and objectives. In most organizations the governance is the
responsibility of the board of directors under the leadership of the chairperson. Specific
governance responsibilities many be delegated to special organizational structures at
an appropriate level, especially in larger, complex organizations.
Management: It plans, builds, runs and monitors activities in alignment with the
direction set by the governing body to achieve the objectives. In most of the enterprises;
management is the responsibility of the executive management under the leadership of
the Chief Executive Officer (CEO).
Table 3.1: Distinction between Governance and Management
Governance Management
Evaluate: Stakeholder needs, Plan, build, run and monitor activities
conditions and options
49
Background Material on Information Systems Audit 3.0 Course (Module 2)
50
Key Components of A Governance System
51
Background Material on Information Systems Audit 3.0 Course (Module 2)
3.3.2 Processes
The second component of COBIT 2019 is “Processes”. A process is defined as ‘a collection
of practices influenced by the enterprises policies, and procedures that takes inputs from a
number of sources (including other processes) manipulates the inputs and produces outputs
(e.g. products and services).
Process practices are defined as the ‘guidance’ necessary to achieve process goals.
Process activities are defined as the ‘guidance’ to achieve management practices for
successful governance and management of enterprise IT.
Inputs and Outputs are the process work products/artefacts considered necessary to
support operation of the process.
Process model of COBIT 2019 focuses on generic processes required by organization to
implement within organization. It clearly distinguishes between Governance processes and
management processes.
Each process should provide:
Process description
Process purpose statement
IT-related Goals
Each IT-related goal is associated with a set of generic related metrics
Process Goals (also from the Goals cascade mechanism and is referred to as
Component Goals).
Each process goal is associated or related with a set of generic metrics.
Each Process contains a set of Management Practices.
These are associated with a generic RACI chart (Responsible, Accountable, Consulted,
Informed)
Each management practices contains a set of inputs and outputs (called work products)
Each management Practice is associated with a set of activities.
In addition, COBIT 2019 identifies the goals for each process and also defines the metrics to
measure the performance of each process.
52
Key Components of A Governance System
Hence, the organisation structure has to include establishing specific responsibility for both
governance and management. The key role and responsibilities for most of the typical
functions in an organisation from governance and management perspective is identified for
each of the 200+ management practices covering all the 40 Governance and Management
objectives. This is provided in the RACI chart which will help in defining roles, responsibilities
covering risks and controls for all critical areas as per COBIT 2019 processes and practices.
Using these practices will help organisations to establish a number of good practices of
organizational structure such as:
Operating Principles: The practical arrangements regarding how the structure will
operate, such as meeting frequency documentation and other rules
Span of Control: The boundaries of the organization structure’s decision rights.
Level of Authority: The decisions that the structure is authorized to take.
Delegation of Responsibility: The structure can delegate a subset of its decision
rights to other structures reporting to it.
Escalation Procedures: The escalation path for a structure describes the required
actions in case of problems in making decisions.
An organization structure shall vary from organization to organization depending on the level
of authority, responsibility and span of control. A generic structure may look like the following
diagram:
53
Background Material on Information Systems Audit 3.0 Course (Module 2)
54
Key Components of A Governance System
committee should ensure that IT is a regular item on the board's agenda, where it must be
addressed in a structured way. The IT strategy committee should work in close relationship
with the other board committees and with management in order to provide input to, and to
review and amend the aligned enterprise and IT strategies. The implementation of the IT
strategy must be the responsibility of executive management assisted by one or more IT
steering committees. Typically, such a steering committee has the responsibility for
overseeing major projects and managing IT priorities, IT costs, and IT resource allocation.
While the IT strategy committee operates at the board level, the IT steering committee is
situated at executive level, which implies that they have different responsibility, authority and
membership
3.3.3.2 IT Steering Committee
Planning is essential for determining and monitoring the direction and achievement of the
enterprise goals and objectives. As enterprises are dependent on the information generated
by information systems, it is important that planning relating to information systems is
undertaken by senior management or by the steering committee. Depending on the size and
needs of the enterprise, the senior management may appoint a high-level committee to
provide appropriate direction to IT deployment and information systems and to ensure that the
information technology deployment is in tune with the enterprise business goals and
objectives. This committee called as the IT Steering Committee is ideally led by a member of
the Board of Directors and comprises of functional heads from all key departments of the
enterprise including the audit and IT department.
The role and responsibility of the IT Steering Committee and its members must be
documented and approved by senior management. As the members comprise of function
heads of departments, they would be responsible for taking decisions relating to their
departments as required. The IT Steering Committee provides overall direction to deployment
of IT and information systems in the enterprises. The key functions of the committee would
include:
To ensure that long and short-range plans of the IT department are in tune with
enterprise goals and objectives;
To establish size and scope of IT function and sets priorities within the scope;
To review and approve major IT deployment projects in all their stages;
To approve and monitor key projects by measuring result of IT projects in terms of
return on investment, etc.;
To review the status of IS plans and budgets and overall IT performance;
To review and approve standards, policies and procedures;
To make decisions on all key aspects of IT deployment and implementation;
55
Background Material on Information Systems Audit 3.0 Course (Module 2)
56
Key Components of A Governance System
Good practices for creating, encouraging and maintaining desired behaviour throughout the
enterprise include:
Communication throughout the enterprise of desired behaviours and corporate values.
(This can be done via a code of ethics).
Awareness of desired behaviour strengthened by senior management example. This is
one of the keys to a good governance environment when senior management and the
executives ‘walk the talk’ so to speak. It is sometimes a difficult area and one that
causes many enterprises to fail because it leads to poor governance. (Typically, this will
be part of a training and awareness sessions based around a code of ethics).
Incentives to encourage and deterrents to enforce desired behaviour. There is a clear
link to HR payment and reward schemes.
Rules and norms which provide more guidance will typically be found in a Code of
Ethics.
3.3.5 Information
Information is the fifth component of COBIT 2019. Information is processed using information
technology. The success of an enterprise in the digital world depends on how well information
is harnessed for achieving enterprise objectives. Information is the most valuable asset and
success of an enterprise is determined by how well information is processed and made
available to all the stakeholders with the requisite level of security. Ensuring the right type of
information using information systems in safe and secure environment is the most critical
aspects of technology deployment. As per COBIT 2019, Information is currency of the 21st
century. Process requires information and management at all levels require information for
decision making and monitoring performance. IT maintains information and hence the
attributes of information are most important for business and management. IT supports
business process by generating and processing data. The information is then transformed into
knowledge that creates value for management and helps in decision which affects the
business process. The attributes required to assess the context and quality of information to
the user which need to be considered, specifically are:
Relevancy: The extent to which information is applicable and helpful for the task at
hand
Completeness: The extent to which information is not missing and is of sufficient depth
and breath for the task at hand
Appropriateness: The extent to which the volume of information is appropriate for the
task at hand.
Conciseness: The extent to which the information is compactly represented.
Consistency: The extent to which the information is presented in the same format.
57
Background Material on Information Systems Audit 3.0 Course (Module 2)
58
Key Components of A Governance System
59
Background Material on Information Systems Audit 3.0 Course (Module 2)
2. Determine the initial scope of the governance system. This includes establishing
governance and management priorities.
3. Refine the scope of the governance system. This includes considering the threat
landscape, compliance requirements, the role of IT, the technology adoption strategy,
enterprise size and more.
4. Conclude the governance system design. This includes resolving priority conflicts,
adopting resolution strategies and conclude the governance system design.
60
Key Components of A Governance System
ensure that dependencies and impacts are considered. It should be ensured from the start that
the required change enablement skills, competencies and experience are available and
utilised: for example, by involving resources from the HR function or by obtaining external
assistance. As an outcome of this phase, the appropriate balance of directive and inclusive
change enablement activities required to deliver sustainable benefits can be designed. Brief
overview of each of the phases of a EGIT implementation is provided. This approach has to be
adapted as per requirements of the project.
61
Background Material on Information Systems Audit 3.0 Course (Module 2)
It is important to identify potential change agents within different parts of the business that
the core team can work with to support the vision and cascade changes down.
62
Key Components of A Governance System
Solutions will be rolled out and during this process, mentoring and coaching will be critical to
ensure uptake in the user environment. The change requirements and objectives that had
been set during the start of the initiative should be revisited to ensure that they were
adequately addressed. Success measures should be defined and should include both hard
business measures and perception measures that track how people feel about a change.
63
Background Material on Information Systems Audit 3.0 Course (Module 2)
Management Strategy determines at the macro level the path and methodology of rendering
services by the enterprise. Strategy outlines the approach of the enterprise and is formulated
by the senior management. Based on the strategy adapted, relevant policies and procedures
are formulated. From business strategy perspective, I&T is affecting the way in which
enterprises are structured, managed and operated. One of the most dramatic developments
affecting enterprises is the fusion of IT with business strategy. Enterprises can no longer
develop business strategy separate from IT strategy and vice versa. Accordingly, there is a
need for the integration of sound IT planning with business planning and the incorporation of
effective financial and management controls within new systems. Management primarily is
focused on harnessing the enterprise resources towards achievement of business objectives.
This would involve the managerial processes of planning, organizing, staffing, directing,
coordinating, reporting and budgeting.
3.7.1.1 Objective of IT Strategy
The primary objective of IT strategy is to provide a holistic view of the current I&T
environment, the future direction, and the initiatives required to migrate to the desired future
environment by leveraging enterprise architecture building blocks and components to enable
nimble, reliable and efficient response to strategic objectives. Alignment of the strategic IT
plans with the business objectives is done by clearly communicating the objectives and
associated accountabilities so they are understood by all and all the IT strategic options are
identified, structured and integrated with the business plans as required.
IT organizations should define their strategies and tactics to support the organization by
ensuring that day-to-day IT operations are delivered efficiently and without compromise.
Metrics and goals are established to help IT perform on a tactical basis and also to guide the
efforts of personnel to improve maturity of practices. The results will enable the IT function to
execute its strategy and achieve its objectives established with the approval of enterprise
leaders. Internal audit can determine whether the linkage of IT metrics and objectives aligns
with the organization’s goals, adequately measure progress being made on approved
initiatives, and express an opinion on whether the metrics are relevant and useful.
Additionally, auditors can validate that metrics are being measured correctly and represent
realistic views of IT operations and governance on a tactical and strategic basis.
3.7.1.2 IT Strategic Planning
The strategic planning process has to be dynamic in nature and IT management and business
process owners should ensure a process is in place to modify the IT long-range plan in a
timely and accurate manner to accommodate changes to the enterprise's long-range plan and
changes in IT conditions. Management should establish a policy requiring that IT long and
short-range plan are developed and maintained. IT management and business process
owners should ensure that the IT long-range plan is regularly translated into IT short-range
plans. Such short-range plans should ensure that appropriate IT function resources are
allocated on a basis consistent with the IT long-range plan. The short-range plans should be
reassessed periodically and amended as necessary in response to changing business and IT
64
Key Components of A Governance System
conditions. The timely performance of feasibility studies should ensure that the execution of
the short-range plans is adequately initiated.
65
Background Material on Information Systems Audit 3.0 Course (Module 2)
extent of stakeholder satisfaction with scope of the planned portfolio of programs and services
and the percentage of IT value drivers, which are mapped to business value drivers.
66
Key Components of A Governance System
3.7.6 Outsourcing
Outsourcing is a strategic decision for management in order to achieve long-term
improvement in business performance, by utilising the vendor’s core competencies. IT is one
of the key areas which is outsourced in part or in totality depending on the criticality of the
processes. Although IT outsourcing has many benefits, it has inherent risks which need to be
mitigated. The risks are much more when IT outsourcing covers strategic use of IT. Hence,
mitigating these risks require all the service provider are managed through an appropriate
structure. This vendor management process should not only monitor performance but also
include specific functional heads who have the appropriate level of authority to hold the
service providers accountable. Some of the important tools which are used to manage, and
monitor IT service providers are performance targets, service level agreements (SLAs), and
scorecards. It is critical to note that senior management cannot abdicate its ultimate
responsibility for IT service delivery just because it has been outsourced as the responsibility
for compliance and ensuring performance vests with the enterprise. The key principles and
guidelines as explained earlier relating to sourcing are applicable to outsourcing as this is also
a form of sourcing.
67
Background Material on Information Systems Audit 3.0 Course (Module 2)
process goals and metrics. Monitor that processes are performing against agreed performance
and conformance goals and metrics and provide reporting that is systematic and timely. This
helps in providing transparency of performance and conformance and drive achievement of
goals. Capacity management or configuration management process is used in order to assess
the effectiveness and efficiency of the IS operations. Capacity includes:
Storage space
Network throughput
Human resources
Electronic messaging
Customer Relationship Management
Quantum of data processed, etc.
The benefits of good capacity management are:
Enhanced customer satisfaction
Better justification of spending on IS resources
Avoiding incorrect capacity sizing which may lead to inappropriate utilisation of IS
resources and insufficient capacity to process the production workloads
A reduction in capacity failures
Better alignment of business needs and IS resources
Better service level management
68
Key Components of A Governance System
Opex has become important as most of the organisations now look at outsourcing as the
preferred option for all non-core activities. Further, in cloud computing environment, critical
activities are outsourced by organisations considering the benefits of converting Capex into
Opex. IS Auditors who are required to evaluate such alternatives have to consider not only the
cost benefit analysis but also the associated risks and how these risks have been mitigated
through implementation of appropriate controls.
3.8 Summary
The seven key components for implementing EGIT are the building blocks for any technology
deployment. This chapter has provided details of key characteristics of each of the seven
components. These seven components are: Principles, policies, Procedures Processes,
Information, Organizational structures, Services, infrastructure and applications, People, skills
and competencies and Culture, ethics and behavior. Each of these components is critical.
However, information is most valuable for most of the enterprises. Each of these enables have
their own characteristics that have to be considered while implementing EGIT. Organization
need to ensure that these components are implemented as appropriate depending on the
requirements of the organization.
In implementing EGIT, it is most important to note that Governance and management are
different concepts. Governance is providing direction and monitoring performance, whereas
management is about implementing, executing and monitoring activities as per the strategy to
ensure that enterprise objectives are achieved. How well these components are effective
would also depend on the involvement of senior management with the governance perspective
of providing direction and channelizing use of technology from strategic perspective. COBIT
2019 provides generic guidance for each of these components and in case of processes and
information, there are specific publications which provide detailed guidance. However,
implementation of these seven components requires integration and use of detailed guidance
from other relevant frameworks as required. However, considering that COBIT 2019 is an
umbrella framework, it provides the overall framework for integration of best practice guidance
from all frameworks.
69
Background Material on Information Systems Audit 3.0 Course (Module 2)
3.9 Questions
1. Which of the following is most important resource of the organization?
A. Policies and procedures
B. IT infrastructure and applications
C. Information and data
D. Culture, ethics and behaviour
2. Which of the following is most important characteristic of policies?
A. Must be limited in number.
B. Requires framework to implement.
C. Reviewed periodically.
D. Non-intrusive and logical.
3. Primary function of a process is to:
A. Act on input and generate output.
B. Define activities to be performed.
C. Focus on achieving business goals.
D. Comply with adopted standards.
4. Effective organizational structure focuses on:
A. Defining designations.
B. Delegating responsibility.
C. Defining escalation path.
D. Deciding span of control.
5. Prioritization of IT initiatives within organization is primarily based on:
A. Results of risk assessments
B. Expected benefit realization
C. Recommendations of CIO
D. Rate of obsolescence of IT
6. Primary objective of IT steering committee is to:
A. Align IT initiatives with business
B. Approve and manage IT projects
C. Supervise IT and business operations
70
Key Components of A Governance System
71
Chapter 4
Performance Management Systems
Learning Objective
The Governance processes of ISO 38500 and COBIT 2019 primarily focus on “Evaluate,
Direct and Monitor”. Governance is an oversight function and evaluates the business
environment in terms of the business strategy and objectives, the technology environment,
market conditions, competitive environment, regulatory requirements and emerging
innovations that could significantly impact and influence the business strategic and operating
models of the organization.
The governance function thus provides the direction that the IT operation should integrate to
maximize the support and involvement to the business. The governance function also
monitors the performance of the IT operation in terms of its direction and the goals achieved.
The ‘direct’ function provides what is expected from management, whereas ‘monitor’ function
focuses on whether what was expected has been achieved or not. The challenge is to
‘evaluate’ what is actually achieved and validate whether it is as per set objectives. This
evaluation should help enterprise to make a realistic assessment of what was achieved, what
are the gaps and how to monitor the performance not only on reactive but proactive basis.
This chapter provides an overview of key concepts and models of performance management
system.
4.1 Introduction
An effective performance management system is the corner-stone for meeting this challenge
and implementing effective governance. This requires setting goals and metrics which are
integrated across all the key areas and are measured and monitored. The system of
performance measurement can be implemented by use of relevant governance and
performance frameworks such as balanced scorecards, maturity models, and quality systems.
This chapter provides an overview of performance management systems with specific details
of goals cascade from COBIT 2019 and also explains the principles of Balanced Scorecard
and Strategic Scorecard.
good governance is that management should provide direction using clearly defined and
communicated objectives, and then manage adherence to objectives by applying
appropriate practices. Monitoring of performance using metrics enables management to
ensure that goals are achieved. In developing a performance management system, it is
important to identify the enterprise goals and then obtain understanding of the connection
between the entity’s mission, vision and strategies and its operating environment.
The broad phases of performance measurement system are:
Plan, establish and update performance measures
Plan and establish the accountability of persons for the performance measures
Collect and analyse data on performance
Report on performance information and
Take corrective action
Performance indicators or metrics will determine how well the process is performing in
enabling the goals to be achieved. They are also indicators of capabilities and skills of IS
personnel.
73
Background Material on Information Systems Audit 3.0 Course (Module 2)
74
Key Components of A Governance System
Enterprise goals are set by the board of directors based on the strategy and objectives. The
list of enterprise goals are given here. These need to be customised by selecting by what is
relevant for the enterprise and adding specific dates, values and number to the identified
goals. Enterprise goals include:
EG01: Portfolio of competitive products and services
EG02: Managed business risk
EG03: Compliance with external laws and regulations
EG04: Quality of financial information
EG05: Customer-oriented service culture
EG06: Business service continuity and availability
EG07: Quality of management information
EG08: Optimization of business process functionality
EG09: Optimization of business process costs
EG10: Staff skills, motivation and productivity
EG11: Compliance with internal policies
EG12: Managed digital transformation programs
EG13: Product and business innovation
75
Background Material on Information Systems Audit 3.0 Course (Module 2)
76
Key Components of A Governance System
77
Background Material on Information Systems Audit 3.0 Course (Module 2)
78
Key Components of A Governance System
79
Background Material on Information Systems Audit 3.0 Course (Module 2)
80
Key Components of A Governance System
81
Background Material on Information Systems Audit 3.0 Course (Module 2)
82
Key Components of A Governance System
4.8 Summary
The purpose of performance measurement is to uncover, communicate and evolve
organizational performance drivers. The choice of measures communicates to stakeholders
what is important, and this affects what gets done. Choosing measures that answer critical
management questions improves management’s visibility into key processes. This chapter has
provided an overview of performance management system with specific details from COBIT
2019 using enterprise goals, alignment goals with examples of specific process with alignment
goals with related metrics and process goals with related metrics. Further, the key concepts of
Balanced score card with the four perspectives with example have been illustrated.
The key to success is setting goals and monitoring them to ensure success with corrective
steps to be taken as required. Use of frameworks helps in setting the right goals with the
metrics to measure and monitor successful achievement of the goals. Performance
measurement is critical for successful implementation of Governance or EGIT. Performance
management helps management in keeping on track towards meeting stakeholder
requirements and also in complying with regulatory requirements on time. IS Auditors with
knowledge of performance management system can provide assurance or advisory services
on the performance management system in place and provide recommendations for improving
the effectiveness.
4.9 Questions
1. Which of the following is best approach for monitoring the performance of IT resources?
A. Compare lag indicators against expected thresholds
B. Monitor lead indicators with industry best practices
C. Define thresholds for lag indicators based on long term plan
D. Lead indicators have corresponding lag indicator.
2. Performance monitoring using balance score card is most useful since it primarily
focuses on:
A. Management perspective
B. Product and services
C. Customer perspectives
D. Service delivery processes
3. Which of the following is considered as an example of a lead indicator?
A. Number of gaps with respect to industry standard.
B. Comparative market position of organization.
83
Background Material on Information Systems Audit 3.0 Course (Module 2)
84
Key Components of A Governance System
85
Background Material on Information Systems Audit 3.0 Course (Module 2)
86
Chapter 5
Business Continuity Management
Learning Objective
The objective of this chapter is to provide knowledge about the key concepts of Business
Continuity Management (BCM), Business Continuity Planning (BCP), Disaster Recovery
Planning (DRP), Incident Responses, Contingency plan and disaster. It is important to
understand these concepts as they form the base and DISA candidate is expected to have
understanding of the key terms related concepts as this is critical for designing, implementing
or reviewing business continuity. A good understanding and working knowledge in this area
will help DISAs to provide assurance and consulting services in this area. This chapter deals
with the regulatory requirements that make it mandatory for an organisation to have Business
Continuity Management.
5.1 Introduction
A Business Continuity Plan outlines a range of disaster scenarios and the steps the business
will take in any particular scenario to return to regular trade. BCP's are written ahead of time
and can also include precautions to be put in place. Usually created with the input of key staff
as well as stakeholders, a BCP is a set of contingencies to minimize potential harm to
businesses during adverse scenarios.
Organisations around the world have been the victims of all sorts of disruptions. Over the
years, man-made and natural disasters have unveiled the vulnerability of businesses on a
global scale.
Business continuity management (BCM) capabilities enable organisations to restore their
businesses to normal operations following an unanticipated disaster or business interruption.
The disruption of business operation can be due to unforeseen man-made or natural disaster
and this may lead to loss of productivity, revenue and market share among many other
impacts. Hence, organisations have to take necessary steps to ensure that the impact from
such disasters is minimized and build resilience which ensures continuity of critical operation
in the event of disruptions. Modern organisations cannot think of running their business
operations without I&T. I&T is prone to increased risks which can lead to failure of I&T thus
impacting operations. Hence, it is becoming increasingly important for organisations to have a
business contingency plan for their Information Systems.
knowing the key terms. Knowledge of definition of these terms will help not only in
understanding the topics but also to provide assurance, consulting or implementation services
in this area.
Business Continuity Planning: Business continuity planning is the process of developing
prior arrangements and procedures that enable an organisation to respond to an event in such
a manner that critical business functions can continue within planned level of disruption. The
end result of the planning is called a Business Continuity Plan.
Crisis: An abnormal situation which threatens the operations, staff, customers or reputation of
the organisation.
Disaster: A physical event which interrupts business processes sufficiently to threaten the
viability of the organisation.
Emergency Management Team (EMT): This team comprising of executives at all levels
including IT is vested with the responsibility of commanding the resources which are required
to recover the enterprises operations.
Incident: An event that has the capacity to lead to loss of or a disruption to an organisation’s
operations, services, or functions – which, if not managed, can escalate into an emergency,
crisis or disaster.
Incident Management Plan: A clearly defined and documented plan of action for use at the
time of an incident, typically covering the key personnel, resources, services and actions
needed to implement the incident management process.
Minimum Business Continuity Objective (MBCO): This refers to the minimum level of
services and/or products that is acceptable to the organization to achieve its business
objectives during an incident, emergency or disaster. As per ISO 22301:2012, clause 3.28,
MBCO is the minimum level of services and/or products that is acceptable to
the organizations to achieve its business objectives during a disruption. MBCO is used to
develop test plan for testing BCP.
Maximum Acceptable Outage (MAO): This is the time frame during which a recovery must
become effective before an outage compromises the ability of an Organization to achieve its
business objectives and/or survival. This refers to the maximum period of time that an
organization can tolerate the disruption of a critical business function, before the achievement
of objectives is adversely affected. MAO is also known as maximum tolerable outage (MTO),
maximum downtime (MD), Maximum Tolerable Period of Disruption (MTPD).
Recovery Time Objective (RTO): The pre-determined time at which a product, service, or
activity must be resumed, or resources must be recovered
Recovery Point Objective (RPO): Maximum data loss, i.e., minimum amount of data used by
an activity that needs to be restored
Resilience: The ability of an organisation to resist being affected by the incident.
88
Business Continuity Management
89
Background Material on Information Systems Audit 3.0 Course (Module 2)
90
Business Continuity Management
recover as quickly as possible. BCM looks at an entirety of the businesses of the entity as a
whole. It is a continuous process whereby risks which are inherent to the business are closely
monitored and mitigated.
91
Background Material on Information Systems Audit 3.0 Course (Module 2)
92
Business Continuity Management
contingency plans for resuming operations from disruption. The disruption of business
operation can be due to unforeseen manmade or natural disaster that may result into revenue
loss, productivity loss and loss of market share among many other impacts. Thus,
organisations have to take necessary steps to ensure continuity of operation in the event of
disruptions. Business continuity is the activity performed by an organisation to ensure that
critical business functions will be available to customers, suppliers, regulators, and other
entities that must have access to those functions. These activities include many daily chores
such as project management, system backups, change control, and help desk. Business
continuity is not something implemented at the time of a disaster; Business Continuity refers to
those activities performed daily to maintain service, consistency, and recoverability.
93
Background Material on Information Systems Audit 3.0 Course (Module 2)
94
Business Continuity Management
95
Background Material on Information Systems Audit 3.0 Course (Module 2)
96
Business Continuity Management
(vi) Litigation: Laws, regulations, contractual obligation in form of service level agreement
govern the business operations. Failure in such compliance may lead the company to
legal litigations and lawsuits.
When considering the impact of a disaster, it should be remembered that it will never happen
at a convenient time; and is always unpredictable. There is no way of knowing:
When it will happen;
What form it will take;
How much damage it will cause; or
How big the impact will be?
However, it is important to envisage various types of scenarios to ensure that the coverage is
as comprehensive as feasible covering various types of events with varying impact.
Understanding disaster and their impact is the key to successful business impact analysis
which will result to preparation of an effective business continuity plan.
97
Background Material on Information Systems Audit 3.0 Course (Module 2)
section containing specific recovery procedures. There are also sections that document the
personnel that will be needed to perform the recovery tasks and an organisational structure for
the recovery process. This plan will be updated on a regular basis as changes to the
computing and networking systems are made. Due to the very sensitive nature of the
information contained in the plan, the plan should be treated as a confidential document and
should be shared with specific employees as per the specific responsibilities they have been
assigned.
98
Business Continuity Management
99
Background Material on Information Systems Audit 3.0 Course (Module 2)
5.12.1 DRP
The DRP should contain information about the vital records details including location where it
is stored, who is in charge of that record etc. It contains information about what is stored
offsite such as:
1. A current copy of this disaster recovery plan.
2. Copies of install disks for all relevant software and critical software/operating system
licenses. These should be stored electronically rather than relying on Internet-
downloadable versions. When the software is needed the same version of the software
used may not be available on the Internet, or there may be Internet issues that could
negatively affect large downloads or may significantly slow down the recovery process.
100
Business Continuity Management
After the Disaster Make recommendations on how the disaster recovery plan can be
improved
5.12.2.3 Administrative Responsibilities
The administrative function provides administrative support services to any team requiring this
support. This includes the hiring of temporary help or the reassignment of other clerical
personnel.
Activities by Phase
Procedures during Disaster Recovery Activation Phase
Notify all vendors and delivery services of change of address
Procedures during All Phases
Process expense reports
Account for the recovery costs
Handle personnel problems
After the Disaster
Make recommendations on how the disaster recovery plan can be improved
5.12.2.4 Supply Responsibilities
The supply function is responsible for coordinating the purchase of all needed supplies during
the disaster recovery period. Supplies include all computing equipment and supplies, office
supplies such as paper and pencils, and office furnishings.
Activities by Phase
Procedures during Disaster Recovery Activation Phase
Purchase supplies required by the teams at the alternate site.
Procedures during Remote Operation/Data Centre Rebuild Phase
Work with procurement to order replacement supplies and expedite shipments
Ongoing distribution of supplies
Procedures during return to primary site Phase
Restock supplies at the restored site
After the disaster
Make recommendations on how the disaster recovery plan can be improved
5.12.2.5 Public Relations Responsibilities
The public relations function will pass appropriate information about the disaster and
associated recovery process to the public and to employees. Every effort should be made to
101
Background Material on Information Systems Audit 3.0 Course (Module 2)
give these groups reason to believe that the organization is doing everything possible to
minimize losses and to ensure a quick return to normalcy.
Activities by Phase
All Phases
Ensure that employees do not talk to the media
Control information released to the public and to employees
Interface with organisation’s Public Relations or defer to Senior Management
Publish internal newsletters
Keep everyone aware of recovery progress
After the Disaster
Make recommendations on how the disaster recovery plan can be improved
Management Team Call Checklist
The disaster recovery plan should contain disaster recovery management team call checklist.
It should specify the contact information about Team leader as well as team members with the
details on which functionality he/she can be contacted. The disaster recovery plan should
contain details about Technical support Team and its sub-teams like Hardware, Software,
Network, Operations etc. and their respective responsibilities.
5.12.2.6 Hardware Responsibilities
The responsibility of the Hardware Team is to acquire (along with the Facilities Team),
configure and install servers and workstations for organisational information Technology
users.
Activities by Phase
Procedures during Disaster Recovery Activation Phase
Determine scope of damage for servers and workstations
Order appropriate equipment and supplies (coordinate and work with the Facilities
Team for this activity)
Procedures during Remote Operation/Data Centre Rebuild Phase
Set up servers and workstations
Install software as necessary
Restore data
Install additional workstations as they arrive
102
Business Continuity Management
103
Background Material on Information Systems Audit 3.0 Course (Module 2)
104
Business Continuity Management
105
Background Material on Information Systems Audit 3.0 Course (Module 2)
106
Business Continuity Management
107
Background Material on Information Systems Audit 3.0 Course (Module 2)
108
Business Continuity Management
minimal impact. Further, the BCP should be comprehensive and anticipate various types of
incident or disaster scenarios and outline the action plan for recovering from the incident or
disaster with minimum impact and ensuring ‘Continuous availability of all key services. The
BCP Manual is expected to specify the responsibilities of the BCM team, whose mission is to
establish appropriate BCP procedures to ensure the continuity of organisation's critical
business functions. In the event of an incident or disaster affecting any of the functional areas,
the BCM Team serves as visioning teams between the functional area(s) affected and other
departments providing support services.
5.13.2.1 Elements of BCP Manual
The plan will contain the following elements:
1. Purpose of the plan: Included in this section should be a summary description of the
purpose of the manual. It should be made clear that the manual does not address recovery
from day to day operational problems. Similarly, it must be stressed that the manual does not
attempt to foresee all possible disasters, but rather provides a framework within which
management can base recovery from any given disaster.
2. Organisation of the manual: A brief description of the organisation of the manual, and
the contents of each of the major sections, will provide the reader with the direction to the
relevant section of the manual in an emergency situation. Any information which is external to
the manual but will be required in an emergency should be identified in this section.
3. Disaster definitions: It may assist the user of the manual if a definition of disaster
classification is provided, together with an identification of the relevance of the plan to that
situation. Four types of classification can generally be used:
Problem/Incident: Event or disruptions that cause no significant damage.
Minor disaster: Event or disruption that causes limited financial impact,
Major disaster: Event or disruptions that cause significant impact and may have an
effect on outside clients.
Catastrophic disaster: Event or disruption that has significant impact and adversely
affect the organisation’s “going concern” status
The BCP manual of each organisation is expected to classify disasters, after taking into
account the size and nature of its business and the time and cost associated to each kind of
disaster should be defined as per the requirement of the individual organisation. It should be
noted, however, that development of a plan based on each classification is not recommended.
The need to invoke the plan should be determined by the length and associated cost of the
expected outage and not the classification of the disaster, although there is a direct
correlation. These definitions will be most useful for communication with senior management.
4. Objectives of the plan: The objectives of the manual should be clearly stated in the
introductory section. Typically, such objectives include:
109
Background Material on Information Systems Audit 3.0 Course (Module 2)
Safety/security all personnel. The paramount objective of a BCP is to ensure the safety
and security of people (both employees and others who may be affected in the event of
a disaster). The safeguarding of assets/data is always a secondary objective.
the reduction of confusion in an emergency
the identification of critical application systems and / or business functions
the identification of all resources, including personnel, required to recover the critical
business functions
the identification of alternative means of ensuring that the critical business functions are
performed and
The establishment of a workable plan to recover the critical business functions, and
subsequently resume normal operations, as quickly as possible after a disaster.
The list should be expanded as necessary to meet the requirements of any given plan.
5. Scope of the plan: In order that there is no confusion as the situations in which the
plan will apply, the scope of the plan must be clearly identified. Any limitations must be
explained.
6. Plan approach / recovery strategy: A step by step summary of the approach adopted
by the plan should be presented. For ease of reference, it may be good to provide this
overview by means of a schematic diagram. In particular, it may be useful to set up the
recovery process as a project plan in this section.
7. Plan administration: The introductory section should also identify the person or
persons, responsible for the business continuity plan manual, and the expected plan review
cycles. These persons will be responsible for issuing revisions which will ensure that the plan
remains current. Because the manual will include staff assignments, it is also advisable that
the personnel or human resource function accept responsibility for notifying the plan
administrators of all personnel changes which must be reflected in the plan.
8. Plan management: Following a disaster, the normal reporting channels and lines of
management are unlikely to be strictly adhered to. During a disaster, reporting by exception
may be the only feasible way to operate. This does not however negate the requirement for
formalized management. The management responsibilities and reporting channels to be
observed, during disaster recovery should be clearly established in advance.
9. Disaster notification and plan activation procedures: The procedures represent the
first steps to be followed when any disaster occurs. It is recommended that the procedures be
written in a task-oriented manner and provide a logical flow to enable ease of management.
110
Business Continuity Management
111
Background Material on Information Systems Audit 3.0 Course (Module 2)
backup set. However, the amount of time and space such a backup takes prevents it
from being a realistic proposition for backing up a large amount of data.
Incremental Backup: An incremental backup captures files that were created or
changed since the last backup, regardless of backup type. This is the most economical
method, as only the files that changed since the last backup are backed up. This saves
a lot of backup time and space. Normally, incremental backup is very difficult to restore.
One will have to start with recovering the last full backup, and then recovering from
every incremental backup taken since.
Differential Backup: A differential backup stores files that have changed since the last
full backup. Therefore, if a file is changed after the previous full backup, a differential
backup takes less time to complete than a full back up. Comparing with full backup,
differential backup is obviously faster and more economical in using the backup space,
as only the files that have changed since the last full backup are saved. Restoring from
a differential backup is a two-step operation: Restoring from the last full backup; and
then restoring the appropriate differential backup. The downside to using differential
backup is that each differential backup probably includes files that were already
included in earlier differential backups.
Mirror Backup: A mirror backup is identical to a full backup, with the exception that the
files are not compressed in zip files and they cannot be protected with a password.
Mirror backup is most frequently used to create an exact copy of the backup data.
112
Business Continuity Management
113
Background Material on Information Systems Audit 3.0 Course (Module 2)
114
Business Continuity Management
some additional equipment. For this approach to communications recovery to work, there must
also be some redundancy accommodated following any carrier outage.
(v) Microwave communications: The regular communications can be backed up by the
use of microwave communications. This could be used to: backup communications from the
central office to the primary site, in case of breakage in the land lines; backup communications
from the central office to the recovery centre; or a backup link from a company-controlled
communications centre direct to the recovery centre.
(vi) VSAT (Very Small Aperture Terminal) based satellite communications: Companies
are increasingly looking to VSAT communications as a cost-effective means of communicating
large volumes of information. This technique could similarly be used to back up the primary
carrier service. The use of this technology requires VSAT terminals to be installed at each
remote location and at the recovery centre if it does not currently provide such a service.
115
Background Material on Information Systems Audit 3.0 Course (Module 2)
116
Business Continuity Management
even a hot site. Warm sites will have backups on hand, but they may not be complete and may
be between several days and a week old. An example would be backup tapes sent to the
warm site by courier.
5.15.1.5 Near Site
A near site is a backup storage location in close proximity to the primary processing location
that provides easy access to the data
117
Background Material on Information Systems Audit 3.0 Course (Module 2)
118
Business Continuity Management
119
Background Material on Information Systems Audit 3.0 Course (Module 2)
objective is to test the ability and preparedness of the personnel to respond to a simulated
disaster. The simulation may go to the point of relocating to the alternate backup site or
enacting recovery procedures but does not perform any actual recovery process or alternate
processing.
4. Parallel test: A Parallel test is a full test of the recovery plan, utilizing all personnel. The
difference between this and the full interruption test is that the primary production processing
of the business does not stop, the test processing runs in parallel to the real processing. The
goal of this type of test is to ensure that critical systems will actually run at the alternate
processing backup site. Systems are relocated to the alternate site, parallel processing
backup site, and the results of the transactions and other elements are compared. This is the
most common type of disaster recovery plan testing.
5. Full interruption test: During a full interruption test, a disaster is replicated event the point
of ceasing normal production operations. The plan is implemented Asif it was a real disaster,
to the point of involving emergency services. This is a very severe test, as it can cause a
disaster on its own. It is the absolute best way to test a disaster recovery plan, however,
because the plan either works or doesn’t.
Documentation of results: During every phase of the test, a detailed documentation of
observations, problems and resolutions should be maintained. This documentation can be of
great assistance during an actual disaster. They are also helpful in improving and maintaining
the plan as they reveal the strengths and weaknesses of the plan. No test is ever a failure
because, however badly it may seem to have gone lessons can still be learnt from it. However,
it should be remembered that if a test is not planned properly, it could actually create a
disaster. Live tests especially could create disaster if not planned properly because they use
real people and real resources in real conditions, probably during normal working hours. Live
tests should only be considered after the BCP has been tested in full and all Recovery Team
members fully trained. The worst way to test a Plan is to turn off the power suddenly, for
example, and tell people to exercise their Recovery Plans, the interruption and delay to normal
work could well become a disaster in itself.
Results Analysis: The results of each test should be recorded to identify:
I. What happened;
II. What was tested successfully; and
III. What needs to be changed?
If a test indicates that the BCP needs to be changed, the change should be made, and the test
repeated until all aspects are completed satisfactorily. When all the components have been
tested satisfactorily, the whole BCP is ready for testing. It should not be assumed that
because the components work individually there is no need to test the whole BCP. Putting it
all together may reveal problems which did not show up in lower level testing. When preparing
for testing, the participants should be given all the information and instruction they need.
120
Business Continuity Management
121
Background Material on Information Systems Audit 3.0 Course (Module 2)
implementing BCP. Some of the sample laws and regulations that are applicable are given
here:
5.18.3.1 Basel Committee on E Banking
The Basel Committee on E-Banking outlines the principles for electronic banking as; “Banks
should have effective capacity, business continuity and contingency planning processes to
help ensure the availability of e-banking systems and services”. The Committee underlines
that banks should also ensure that periodic independent internal and/or external audits are
conducted about business continuity and contingency planning. These requirements are spelt
out in Appendix VI relating to “Sound Capacity, Business Continuity and Contingency Planning
Practices for E-Banking”:
5.18.3.2 Indian legislations
There are various Indian legislations such as the Information Technology Act, Indian Income
Tax act, Goods and Services Tax Act etc. which require data retention for specific number of
years. Organisations which have to comply with these requirements have to ensure that they
have a proper business continuity plan which meets these requirements. The Reserve bank of
India provides regular guidelines to financial institutions covering various aspects of IT
deployment. These guidelines cover business continuity and disaster recovery procedures for
various types of business operations which are dependent on I&T environment.
Bank Audit
The Long Form Audit report in the case of statutory audit of banks contains two key points
relating to business continuity and disaster recovery which need to be evaluated and
commented by the statutory auditor.
Whether regular back-ups of accounts and off-site storage are maintained as per the
guidelines of the controlling authorities of the bank?
Whether adequate contingency and disaster recovery plans are in place for
loss/encryption of data?
The first point may be irrelevant in case of audit of branches where core banking solution is
implemented. However, a general review of the contingency and disaster recovery plans has
to be made by auditor and required comments provided. In case of internal audit or concurrent
audit of banks, there are specific areas of BCP which need to be reviewed by the auditors.
122
Business Continuity Management
is done by finding out business continuity priorities (through business impact analysis), what
potential disruptive events can affect business operations (through risk assessment), defining
what needs to be done to prevent such events from happening, and then defining how to
recover minimal and normal operations in the shortest time possible (i.e., risk mitigation or risk
treatment). Therefore, the main philosophy of ISO 22301 is based on analyzing impacts and
managing risks: find out which activities are more important and which risks can affect them,
and then systematically treat those risks.
The strategies and solutions that are to be implemented are usually in the form of policies,
procedures, and technical/physical implementation (e.g., facilities, software, and equipment).
In most cases, organizations do not have all the facilities, hardware, and software in place –
therefore, ISO 22301 implementation will involve not only setting organizational rules (i.e.,
writing documents) that are needed in order to prevent disruptive incidents, but also
developing plans and allocating technical and other resources to make the continuity and
recovery of business activities possible.
123
Background Material on Information Systems Audit 3.0 Course (Module 2)
BCP in the organisation. They can design the phases for implementation of the BCP
and thus ensure correct and effective implementation of the BCP in the organisation.
3. Designing Test Plans and Conducting Tests of the BCP/DRP. CAs can design plans
that can be used by the management for regular testing of the BCP. He can also
evaluate the tests that have been conducted by the management.
4. Consultancy Services in revising and updating the BCP/DRP. Maintenance of the BCP
is a periodic process. Technologies evolve, and the Business Environment often
changes and hence it is necessary to revise and update the BCP.
5. Conducting Pre-Implementation Audit, Post Implementation Audit, General Audit of the
BCP/DRP.
A Chartered Accountant can provide assurance whether the BCP would suffice to the
organisation.
6. Consultancy Services in Risk Assessment and Business Impact Analysis. Conducting a
proper Business Impact Analysis and assessing the risks that are present in the
organisation’s environment is really crucial for the correct development of the
BCP/DRP. CAs can help in the development stages by conducting BIA and Risk
Assessment for the organisation.
7. CAs can be involved in any/all areas of BCP implementation or review. These areas
could be pertaining to:
(a) Risk Assessment
(b) Business Impact Assessment
(c) Disaster Recovery Strategy Selection
(d) Business Continuity Plan Development
(e) Fast-track Business Continuity Development
(f) BCP / DRP Audit, Review and Health-check Services
(g) Development and Management of BCP / DRP Exercises and Rehearsals
(h) Media Management for Crisis Scenarios
(i) Business Continuity Training
5.22 Summary
This chapter has provided an overview of the key concepts relating to management of BCP,
DRP and Incident Responses. Together, these are to be implemented as part of Business
Continuity management. The ultimate objective of a BCM is to recover from a crisis as fast as
possible and at the lowest possible cost. The development of a Business Continuity Plan can
be done with the support of BCP Policy existing in an organisation. BCP Policy sets the scope
124
Business Continuity Management
of the plan. Development of BCP involves planning BCP as a project includes conducting a
Business Impact Analyses, Risk Assessment, testing of the BCP, providing training and
awareness and continuous maintenance of the BCP Plan. IS Auditor having to understand
BCP processes and key activities for each of the key processes. This chapter has provided an
overview of the BCP processes. Audit Process that are to be followed by an IS Auditor. A
control is placed always against an identified risk by the management. It is essential for an IS
Auditor to verify the controls that have been put in place by the management for adequacy and
existence.
5.23 Questions
1. Which of the following is MOST important to have in a disaster recovery plan?
A. Backup of compiled object programs
B. Reciprocal processing agreement
C. Phone contact list
D. Supply of special forms
2. Which of the following BEST describes difference between a DRP and a BCP? The
DRP:
A. works for natural disasters whereas BCP works for unplanned operating incidents
such as technical failures.
B. works for business process recovery and information systems whereas BCP
works only for information systems.
C. defines all needed actions to restore to normal operation after an un-planned
incident whereas BCP only deals with critical operations needed to continue
working after an un-planned incident.
D. is the awareness process for employees whereas BCP contains procedures to
recover the operation?
3. The MOST significant level of BCP program development effort is generally required
during the:
A. Early stages of planning.
B. Evaluation stage.
C. Maintenance stage.
D. Testing Stage.
4. An advantage of the use of hot sites as a backup alternative is:
A. The costs related with hot sites are low.
125
Background Material on Information Systems Audit 3.0 Course (Module 2)
126
Business Continuity Management
127
Background Material on Information Systems Audit 3.0 Course (Module 2)
128
Appendix 1
Checklist and Control Matrix
Appendix 1: Checklist for a Business Continuity Plan and Audit
Process Objectives:
To seamlessly recover from the disaster situation.
To reduce the impact of the damage of the assets, in turn reducing the data loss.
To assure compliances
To sustain operations so that customer service and corporate image can be maintained.
Using this Checklist:
This checklist is to be used by the IS Auditor who is conducting the BCP Audit. This checklist
covers the entire BCP Process, but it has to be customized as per the specific needs of the
assignment. An IS Auditor can use this checklist as a basis for recording observations and for
collecting evidences for the Audit engagement. This checklist is an illustrative example as to
how an IS Auditor could conduct a BCM Audit at an organisation. It can be taken as a base for
conducting such audit engagements.
Policy and Procedure
1. Is business continuity plan documented and implemented?
2. Whether the scope and objectives of a BCP are clearly defined in the policy
document?
(Scope to cover all critical activities of business. Objectives should clearly spell out
outcomes of the BCP)
3. Whether there exist any exceptions to the scope of BCP i.e. in terms of location or
any specific area, and whether the management has justifications for exclusion of
the same.
4. What is the time limit for such exclusion and what is the current strategy of covering
such exclusions
5. Are the policy and procedure documents approved by the Top Management?
(Verify sign off on policy and procedure documents and budget allocations made by
the management for a BCP)
6. Does the business continuity plan ensure the resumption of IS operations during
major information system failures?
(Verify that the IS disaster recovery plan is in line with strategies, goals and
objectives of corporate business continuity plan).
Background Material on Information Systems Audit 3.0 Course (Module 2)
130
Checklist and Control Matrix
131
Background Material on Information Systems Audit 3.0 Course (Module 2)
132
Checklist and Control Matrix
133
Appendix 2
Sample of BCP Audit Finding
Max Infotech should have an alternate disaster recovery site and documented procedures and
policies for disaster recovery.
Observation
Max Infotech does not have an alternate disaster recovery site. Also documented Disaster
Recovery Plan (DRP) and business continuity plan are not there.
Exposure
The DRP is a key plan ensuring availability of resources critical to the business operations. In
the absence of documented procedures and policies for the same, it may be difficult to recover
from a disaster resulting in non-availability of data and applications to the users for
unacceptable period of time thereby interrupting business processes and impacting the
business.
Cause
This is due to lack of documented Disaster Recovery Plan (DRP).
Recommendation
Ensure that the Max Infotech has an alternate disaster recovery site and a documented
procedures and policies for disaster recovery. This document should include:
• Provision for back up and restoration of resources identified as critical to recovery;
• Provision for back up and off-site location of non-critical application software, data files
and system software to facilitate their restoration following the recovery of critical
application;
• Frequency of back up and off-site rotation and number of generations maintained, of
production data files including databases;
• Back up and off-site copies of system software, updated or replaced with each upgrade
or revision;
• Off-site copies of systems, program, user and operations documentation updated to
reflect system revision;
Instructions on how to restore from back-up copies of program and data files.
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
ISA Background Material
ISA
ISBN - 978-81-8441-995-5
INFORMATION SYSTEMS
AUDIT 3.0 COURSE
Module - 3
System Development, Acquisition,
Implementation and Maintenance
Module - 3
Application System Audit
Digital Accounting and Assurance Board
The Institute of Chartered Accountants of India August | 2020 | P2724 (Revised)
ICAI Bhawan,Hostel Block, 7th Floor
A-29, Sector-62 Digital Accounting and Assurance Board
Noida - 201309, India The Institute of Chartered Accountants of India
Tel (Direct): +91 120 3045992/961
Web: www.icai.org (Set up by an Act of Parliament)
New Delhi
Background Material
on
Information Systems Audit 3.0 Course
Module-3 :
System Development, Acquisition,
Implementation and Maintenance
Application System Audit
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form, or by any means, electronic mechanical, photocopying, recording, or
otherwise, without prior permission, in writing, from the publisher.
DISCLAIMER
The views expressed in this material are those of author(s). The Institute of Chartered Accountants
of India (ICAI) may not necessarily subscribe to the views expressed by the author(s).
The information in this material has been contributed by various authors based on their expertise
and research. While every effort have been made to keep the information cited in this material error
free, the Institute or its officers do not take the responsibility for any typographical or clerical error
which may have crept in while compiling the information provided in this material. There are no
warranties/claims for ready use of this material as this material is for educational purpose. The
information provided in this material are subject to changes in technology, business and regulatory
environment. Hence, members are advised to apply this using professional judgement. Please visit
34& portal for the latest updates. All copyrights are acknowledged. Use of specific
hardware/software in the material is not an endorsement by ICAI.
Email : [email protected]
ISBN : 978-81-8441-995-5
vi
Contents
Learning Objectives xi
Chapter 1: Project Management for SDLC 1
Objectives 1
1.1 Introduction 1
1.2 Project Management Frameworks 1
1.2.1 Capability Maturity Model Integration (CMMI) 2
1.3 Key concepts of Project Management 3
1.4 Program and Project Management and Organization 4
1.4.1 Portfolio/Program Management 4
1.4.2 Program/Project Management Organization Forms 5
1.5 Project Initiation 6
1.5.1 Project Management Methodology 7
1.5.2 Project Context and Environment 8
1.5.3 Project Communication and Culture 8
1.5.4 Project Objectives 9
1.5.5 Project Management Practices 9
1.6 Project Planning 10
1.7 Project Controlling 11
1.7.1 Management of Scope 11
1.7.2 Resource Management 12
1.7.3 Project Risk Management Standards and Methods 13
1.8 Project Closing 14
1.9 Roles and Responsibilities 15
1.9.1 Steering Committee 15
1.9.2 Project Sponsor 16
1.9.3 Project Manager 16
1.9.4 Senior Management 17
1.9.5 Business Management 17
1.9.6 Systems Development Project Team 17
1.9.7 Business Function Representatives/Domain Specialists 17
1.9.8 Security Officer 18
1.9.9 Quality Assurance (QA) 18
1.9.10 Technology Specialist 18
1.9.11 Systems Analyst 19
1.9.12 Programmers/Developers 19
1.9.13 Testers 19
1.9.14 Documentation Specialist 19
1.9.15 Database Administrator (DBA) 19
1.9.16 Data Administrator (DA) 19
1.9.17 User Manager 19
1.9.18 IS Auditor 19
1.10 SDLC Project Management Techniques and Tools 20
1.11 Summary 27
1.12 Questions 28
1.13 Answers and Explanations 30
viii
2.5.4 System Design 36
2.5.5 Development 37
2.5.6 Testing 39
2.5.7 Implementation 41
2.5.8 Maintenance 42
2.6 Types of SDLC Model 43
2.6.1 Waterfall Model 43
2.6.2 Incremental Model 45
2.6.3 Software Reengineering and Reverse Engineering 47
2.6.4 Object Oriented Software Development 49
2.6.5 Component Based Development 51
2.6.6 Web Based Application Development 52
2.7 Selection of SDLC Model 53
2.8 New Development Iterative Models- Prototype, Spiral, Rapid & Agile etc. 54
2.8.1 Prototype Methodology 54
2.8.2 Spiral Model 57
2.8.3 Rapid Application Development 59
2.8.4 Agile Software Development Methodology 61
2.8.5 DevOps 64
2.8.6 DevSecOps 64
2.9 Secure SDLC 65
2.10 Summary 66
2.11 Questions 67
2.12 Answers and Explanations 69
ix
3.3 Methods of Software Testing 72
3.3.1 Black Box Testing 72
3.3.2 White Box Testing 73
3.3.3 Grey Box Testing 73
3.3.4 A Comparison of Testing Methods 74
3.4 Levels of Testing 75
3.4.1 Functional Testing 75
3.4.2 Non-Functional Testing 76
3.5 Strategies of Software Testing 76
3.5.1 What is the Test Strategy 76
3.5.2 Different Test Approaches 76
3.5.3 Factors to be Considered 77
3.6 Types of Software Testing 77
3.6.1 Unit Testing 77
3.6.2 Static Testing 78
3.6.3 Load Testing 79
3.6.4 Usability Testing 79
3.6.5 Portability Testing 79
3.6.6 Integration Testing 80
3.6.7 Regression Testing 81
3.6.8 System Testing 81
3.6.9 Other Types of Testing 82
3.7 Final Testing 83
3.7.1 Quality Assurance Testing 84
3.7.2 User Acceptance Testing 84
3.8 Implementation 85
3.8.1 Implementation Strategies 85
3.8.2 Preparing for Implementation 87
3.8.3 Conversion 88
x
3.9 Change Management Process 90
3.9.1 Emergency Change 92
3.9.2 Implementing Changes to Production 93
3.9.3 Segregation of Duties 93
3.9.4 Configuration Management 94
3.10 Summary 95
3.11 Questions 95
3.12 Answers and Explanations 97
xi
Learning Objectives
Evaluate whether proposed changes to information system are meeting business
objectives.
Evaluate policies and practices about the organization’s project management.
Evaluate the effectiveness of controls at all stages of SDLC
Evaluate the process for migration of new system to the production
Post implementation review of system to ensure that new system met business
requirement, controls and project deliverables.
Evaluate change management, configuration management, release management and
patch management.
Chapter 1
Project Management for SDLC
Learning Objectives
This chapter provides insights on Project management aspect of System Development. This
includes initiation of program/project, establishing project management methodology, defining
objective, project risk management, planning, resource management, monitoring and
controlling project, managing changes, closing project and tools and techniques required for
software project management.
1.1 Introduction
In this chapter basic understanding about project management has been given. Unless the
proposed system becomes operational and organization begins deriving benefit out of it,
SDLC project cannot be treated as complete.
Control aspect of the proposed information system is planned at the design stage. IS Auditor
should ensure that appropriate controls are designed at analysis and design stage.
Since there are significant differences in scope, content and wording in each of these
standards, an auditor has to be familiar with the standard adopted by auditee organization,
prior to involvement in project. Although each project management approach has its own pros
and cons, several elements are common across all project management methodologies. Some
are focused on software development, others have a more general approach; some
concentrate on a holistic and systemic view, others provide a very detailed workflow including
templates for document creation
2
Project Management for SDLC
3
Background Material on Information Systems Audit 3.0 Course (Module 3)
Each group mainly consists of processes; however, all processes may not be applicable to all
projects.
Project initiation group consists of mainly processes related to developing project charter
based on scope of project. In SDLC project, it is business case that help in Identifying
beneficiaries and stakeholders of project.
Project planning consists of processes related to developing project execution plan, finalizing
requirements, defining work breakdown structure and modules to be developed, estimating
efforts and cost, resource planning, risk management, procurement planning and plan for
communications with stakeholders.
Project execution consists of processes related to direct project teams, ensuring quality
assurance and testing, managing requirements and changes in requirements, ensuring timely
procurements and manage resources.
Project monitoring and controlling consists of processes related to monitoring risks, Scope
Creeps, quality of deliverables, costs and budgets, performance reporting.
Project closing has processes for handing over deliverables or terminating project. SDLC
project management is further discussed in ensuing sections.
4
Project Management for SDLC
Program schedules
Program objectives and deliverables
Program context and environment
Program communication and culture
Program organization
5
Background Material on Information Systems Audit 3.0 Course (Module 3)
organization. However, depending upon the nature of business, from a project management
perspective, organizations can be categorized as follows:
Functional organization that is influenced by the projects: These are business
organizations that are involved in production of goods and services. Projects are
undertaken to support the functional activities. For example, a manufacturing
organization may want to automate administrative processes (like finance, HR, pay roll
etc.) using IT. In such organizations, Project Manager has only a staff function without
formal management authority. The Project Manager is only allowed to advise peers and
team members as to which activities should be completed. In such organization project
team consist of staff that report to functional manager, except for the purpose of project
activities assigned, reports to Project Manager.
Projectile organization: These are pure project organizations that execute projects.
For example, an infrastructure development organization or consulting organizations
that executes projects. In such organizations Project Manager has formal authority over
those taking part in the project. Often, this is bolstered by providing a special working
area for the project team that is separated from their normal office space.
Matrix project organization: The organization that provides product and services and
also executes projects. Most IT companies falls under such categories where these
organizations undertake project to manage business functions for other organizations
and also executes projects for customer organization. In such organizations,
Management Authority is shared between the Project Manager and the Department
Heads.
IS Auditor has to understand these organizational forms and their implications on
controls in SDLC project management activities.
6
Project Management for SDLC
GUI based system as in case of old COBOL / XBASE based distributed banking to
RDBMS based Core Banking system.
A project may be initiated from any part of the organization, including the IS department. A
project is time bound, with specific start and end dates, a specific objective and a set of
predetermined deliverables. Once a project is initiated, a project sponsor and project manager
is appointed to execute the further activities. This also includes gathering information related
to gaining approvals for the project. This will often be compiled into terms of reference or a
project charter that states the objective of the project, the stakeholders in the system to be
produced, and the Project Manager and sponsor. Approval of a project initiation or project
request is authorization for a project to begin.
During the project initiation phase, several activities are performed by Project Manager
starting from assessing the size, scope, as well as project complexity, and further establishes
procedures to supporting subsequent activities. IS Auditor has to understand the implications
on controls in SDLC project management activities. The major activities to be performed in the
project initiation are:
Establishment of project initiation team: In this activity an initial core of project team
members are organized to complete the project initiation activities.
Establishment of relationship with customer: A good understanding of the customer is
needed to build stronger customer partnerships and also higher trust level.
Establishment of plan for project initiation: This step provides the definition of activities
required to organize the initiation team, who define the scope of the project.
Establishment of management procedures: Without developing effective management
procedure, it not possible to achieve successful completion of project.
Establishment of project workbook and project management environment: The objective
of this activity is to organize and collect the tools that will be used for managing the
project and will help to develop the project workbook. For example, major portion of the
project workbook is derived from charts, diagrams and description of the system. Thus,
the project workbook serves as a repository for all project deliverables, inputs, outputs,
correspondence, procedures, and standards established by the project team.
Many organizations that follow standard process for project management prepare a formal
Project Initiation Report that is presented to Senior Management or Board of Directors. Once
accepted this becomes formal charter for the project and triggers next phases of SDLC.
7
Background Material on Information Systems Audit 3.0 Course (Module 3)
8
Project Management for SDLC
develop and execute communication plan so as to inform issues, concerns, if any and to
report project progress.
9
Background Material on Information Systems Audit 3.0 Course (Module 3)
10
Project Management for SDLC
scheduling involves establishing when these resources are required in the project. This
is achieved by arranging tasks according to:
1. The logical sequential and parallel tasks relationship and determining earliest
start date.
2. Based on estimated efforts (section 1.7) for each resource arriving at latest
expected finish date.
3. Schedules are presented using PERT, CPM diagrams and Gantt Charts.
(Discussed in section 1.7.)
11
Background Material on Information Systems Audit 3.0 Course (Module 3)
The Project Manager then assesses the impact of change request on project activities,
schedule and budget.
A change advisory board is appointed to evaluate change requests and decide on
approving changes.
If the change is accepted, the Project Manager should update the project plan.
The updated project plan must be formally confirmed by the project sponsor—accepting
or rejecting the recommendation of the change advisory board.
12
Project Management for SDLC
13
Background Material on Information Systems Audit 3.0 Course (Module 3)
category. The risk management process consists of five steps that are repeatedly executed
during a project. Phase-end milestones are a good anchor points in time at which the review
and update of the initial risk assessments and related mitigations can be done.
Risk Management Process
Identify Risk: Perform a brainstorming session with your team and create an inventory
of possible risks.
Assess and Evaluate Risk: Quantify the likelihood (expressed as a percentage) and
the impact of the risk (expressed as an amount of money). The “insurance policy” (total
impact) that needs to be in the project budget is calculated as the likelihood multiplied
by the impact.
Manage Risk: Create a Risk Management Plan, describing the strategy adopted and
measures to deal with the risk. Generally, the more important the risk, the more budget
should be made available for counter-measures. Counter-measures could include
prevention, detection and damage control/reconstruction activities. Any risk can be
mitigated, avoided, transferred or accepted depending on its severity, likelihood and
cost of counter-measures and the organization’s policy.
Monitor risk: Discover risk that materializes, and act accordingly.
Evaluate the Risk Management Process: Review and evaluate the effectiveness and
costs of the Risk Management Process.
IS Auditor has to focus on the Risk Management Process as it provides detailed insight
on the effectiveness of Project Management.
14
Project Management for SDLC
15
Background Material on Information Systems Audit 3.0 Course (Module 3)
16
Project Management for SDLC
17
Background Material on Information Systems Audit 3.0 Course (Module 3)
18
Project Management for SDLC
1.9.12 Programmers/Developers
Programmers convert design into programs by coding using programming language. They are
also referred to as Coders or Developers.
1.9.13 Testers
Testers are junior level quality assurance personnel attached to a project. They test programs
and subprograms as per the plan given by the module / project leaders and prepare test
reports.
1.9.18 IS Auditor
The IS Auditor can be a part of SDLC project team as consultant for internal controls or for
19
Background Material on Information Systems Audit 3.0 Course (Module 3)
the review of the project activities. They may also provide an independent, objective review to
ensure appropriate level of commitment of the responsible parties.IS Auditor has to
understand the systems development; acquisition and maintenance methodologies used by
the organization and identify potential vulnerabilities. If auditor observes control weakness
either as a result of review due to organizational structure or the software methods used, or
weakness in process execution, it is the IS auditor’s role to advise the project team and Senior
Management of the deficiencies in project management and provide recommendations for
improvement.
Role of IS Auditor in SDLC
Throughout the project management process, IS Auditor should analyze the associated risks
and exposures inherent in each phase of SDLC. He should assure that appropriate control
mechanisms are in place to minimize the risks in a cost-effective manner, while reviewing
SDLC various phases as well as the project team meetings Minutes. He will also assess the
project development team’s ability to produce key deliverables by the promised dates.
Adequate and complete documentation of all phases should be collected and reviewed by
processes, IS Auditor is expected to obtain necessary and available documentation from the
Project Manager The specific areas of review are:
1. Understand standards adopted and followed by the organization through the process of
inquiry, observation and documentation review.
2. To determine significant phases for the various size and type.
3. To assess efficiency and effectiveness of each function to satisfy the users goals and
organization objectives.
4. To test methodology adopted and determine compliance with the organization
standards by reviewing the documentation produced.
5. To evaluate controls designed for compliance with internal control principles and
standards.
6. To determine compliance with common security, auditability and change control
standards.
If IS Auditor is part of project team not for performing an audit, but is participating on
the project in an advisory role then depending on the level of involvement, IS Auditor
may become ineligible to perform audits of the application when it becomes
operational.
20
Project Management for SDLC
developed. Tools that help in improving productivity include code generators, development
environments (also referred to as developer’s workbench) like Visual Studio and Computer-
Aided Software Engineering (CASE) applications that help in documenting the SDLC process.
In addition, Project Managers may use project management tools like MS Project. This section
provides information about these tools. This section covers following three areas:
1. CASE tools
2. Software size estimation covering various techniques used like LOC, FPA analysis etc.
3. Project controlling tools like PERT, CPM and Gantt Charts.
1. Computer-Aided Software Engineering (CASE) tools
SDLC requires collecting, organizing and presenting information required at application
systems and program level. This involves building data flows, documenting design of
application system, identifying modules/functions/program required to be developed and
sometimes developing prototypes to capture requirements. These are essential but time-
consuming processes that are required for developing, using and maintaining computer
applications.
Computer-Aided Software Engineering (CASE) are automated tools that aid in the software
development process. Their use may include tools for capturing and analyzing requirements,
software design, code generation, testing, document building and other software development
activities.
Although IS Auditor is not expected to have detailed knowledge of how to use CASE
tools, they may have to learn how to use CASE tools for effective audit of SDLC project,
as required.
Code Generators
Code generators are tools that are a part of CASE tools or development environment like
Visual Studio. These tools generate program source code based on parameters provided.
These products significantly reduce the development (particularly coding) time; however,
maintaining or changing these programs might be painful and time consuming.
Development Environments and Non-Procedural Languages
Developer’s Workbench: Provides environment to developer for editing, simulating code,
temporary storage, file management and sometimes code generation. It may also provide
Software facilities that include the ability to design or paint retrieval screen formats, develop
computer-aided training routines or help screens, and produce graphical outputs. It is often
referred to as an Integrated Development Environment (IDE).
Non-procedural languages: These are event driven and make extensive use of Object-
Oriented Programming concepts such as objects, properties and methods. These languages
21
Background Material on Information Systems Audit 3.0 Course (Module 3)
cannot perform data intensive or online operations. However, they are best suited to provide
an environment to the end user for generating their own views and reports that are required
for data analysis and decision making. These languages provide environmental independence
(portability) across computer architectures, operating systems and tele-communications
monitors. These languages generally have simple language subsets that can be used by less-
skilled users.
These languages are classified in the following ways:
1. Query and Report Generators: These languages can extract and produce reports and
sometimes can access database records, produce complex online outputs.
2. Embedded Database Languages are more user-friendly but also may lead to
applications that are not integrated well with other production applications.
3. Relational Database Languages are usually an optional feature on a vendor’s DBMS.
These allow the applications developer to make better use of the DBMS product, but
they often are not end-user-oriented.
2. Software Size Estimation
Once the work breakdown structure is completed and SDLC methodology (discussed in
chapter 4) is finalized Project Manager must perform Software size estimation, i.e. determining
the physical size of application (number of programs, modules, reusable function/modules
etc.). This helps the Project Manager in deciding resource and skills requirements, to judge
the time and cost required for development, and to compare the total effort required by the
resources.
Source Lines Of Code (SLOC)
Traditionally, particularly when COBOL like languages was used, software sizing used to be
performed using number of Source Lines of Code (SLOC). However, it does not work well for
complex systems using different types of programs and automated tools like Source Code
Generators. This puts limitation on planning for cost, schedule and quality metrics.
With new technologies, Multi-Point Estimations Techniques were developed that now uses
diagrams, objects, spreadsheet cells, database queries and Graphical User Interface (GUI)
widgets. These technologies are more closely related to functionality that needs to be created
rather than lines of code.
Function Point Analysis (FPA)
The Function Point Analysis (FPA) technique has evolved over the years and is widely used
for estimating complexity in developing large business applications. The results of FPA are a
measure of the size of an information system based on the number and complexity of the
inputs, outputs, files, interfaces and queries with which a user views and interacts with the
22
Project Management for SDLC
data. This is an indirect measure of software size and the process of development. It is based
on the number and complexity of inputs, outputs, files, interfaces and queries.
Function points (FPs) are computed by considering various parameters like number of users,
number of inputs, number of outputs, expected user actions, data elements to be processed
and external interfaces to determine whether a particular module/program is simple, average
or complex. This information is used to compute function point using an algorithm that takes
into account complexity adjustment values (i.e., rating factors) based on responses to
questions related to reliability, criticality, complexity, reusability, changeability and portability.
Function points (FP) derived from this equation are then used as a measure for cost,
schedule, productivity and quality metrics (e.g. Productivity = FP/Person-Month, Quality =
Defects/FP, and Cost = Monetary Value/FP).
IS Auditor should be familiar with the use of Function Point Analysis. However, IS
Auditors are not expected to be experts in this technique.
FPA Feature Points
In web-enabled applications, the development effort depends on the number of forms, number
of images; type of images (static or animated), features to be enabled, interfaces and cross-
referencing that is required. Thus, from the point of view of web applications, the effort would
include all that is mentioned under Function Point Estimation, plus the features that need to be
enabled for different types of user groups. The measurement would involve identification or
listing of features, access rules, links, storage, etc.
A slightly different approach for System Software such as Operating Systems, Telephone
Switching Systems, etc. was developed. To differentiate from FPA it is called “Feature Points”.
It is used for software that has well-defined algorithms like Systems Software, Embedded
Software, Real Time Software, CAD, Artificial Intelligence and some traditional MIS software.
Cost Budgets
Cost estimates of a SDLC project are based on the amount of effort likely to be required to
carry out each task. The estimates for each task contain one or more of the following
elements:
1. Person-hours for all type of resources e.g. System Analyst, Programmers, Support
Staff, Testing Teams etc. (Pl. refer section 3.9 roles and responsibilities)
2. Infrastructure (Hardware, Software, Networks etc.), other specialized software, if any
and communication equipment
3. Other costs such as third-party services, automation tools required for the project,
consultant or contractor fees, training costs, etc.
Based on estimates following steps are used in arriving at cost budget:
23
Background Material on Information Systems Audit 3.0 Course (Module 3)
24
Project Management for SDLC
Figure 1.4 illustrates use of the PERT Network Management Technique. (Each circle
represents milestones and the arrow represents activities. Number after activity shows the
number of days required to complete the activity.)
25
Background Material on Information Systems Audit 3.0 Course (Module 3)
3. B – D – F – H – J – K
4. B – D – F – G – I – L
Using the time estimates the total time required for each path is 28, 30, 34 and 32 days
respectively. Third path hence is Critical Path. (Shown by thick arrows in figure 1.5
26
Project Management for SDLC
1.11 Summary
Every project has unique success criteria based on the expectations of stakeholders.
Generally, success criteria are measurable and manageable such as cost, time and scope.
However, some criteria, such as meeting business needs, are subjective but essential. The
project sponsor is a key stakeholder who defines such success criteria. The project team
should capture project requirements and document them at the initial stage to complete the
project successfully. Activity of capturing requirements is usually difficult because it involves
subjective decisions and extensive interaction between users and developers. Requirements
should be formally approved and then frozen (baselined) to prevent Scope Creep. Success
criteria allow the Project Manager to focus on managing risks that can affect desirable
outcome and successful completion of the project.
IS Auditor should review adequacy of the following project management activities:
Levels of oversight by Project Committee/Board
Risk Management methods within the project
Issue Management
Cost Management
Processes for Planning and Dependency Management
27
Background Material on Information Systems Audit 3.0 Course (Module 3)
1.12 Questions
1. Who among the following is responsible for ongoing facilitation of a SDLC
project?
A. Project Sponsor
B. Project Manager
C. Steering Committee
D. Board of Directors
2. A Multi-National organization has decided to implement an ERP solution across
all geographical locations. The organization shall initiate a:
A. Project
B. Program
C. Portfolio
D. Feasibility study
3. Which of the following primarily helps Project Manager in mitigating therisk
associated with change in scope of software development project?
A. Change Management Process
B. Use of Prototyping
28
Project Management for SDLC
29
Background Material on Information Systems Audit 3.0 Course (Module 3)
C. A Line Manager
D. A Sponsor
9. The most successful Project Manager usually:
A. Works his/her way up from Assistants in the project office to full-fledged Project
Managers, supplementing that experience with formal education.
B. Comes right from Harvard's MBA program into managing very large projects.
C. Are the Technical Experts.
D. Have considerable experience as a Functional Manager before moving into the
Project Management arena.
30
Project Management for SDLC
productivity. Option A: Use of standards help in following uniform methods and reducing
rework. Option B: Software Sizing is the main input parameter to cost estimation
models. Option D: HR policies may help in motivating team but it is secondary.
6. A is the correct answer. Auditor should primarily focus on risk management that will
provide inputs on events that has impact on all aspects of project. Options B, C and D
help in confirming the findings from review of Risk Management process.
7. C is the correct answer. A Project Manager is responsible to ensure high quality in a
way that the final product meets the specifications and quality benchmarks. Options A,
B and C are not the main responsibility of a Project Manager.
8. A is the correct answer. The Project Manager is responsible for collective project
success. The Project Manager integrates a project as a whole. He/she unifies various
aspects and processes of initiating, planning, executing, monitoring, control and
closure. Options B, C and D is not the role of the Project Manager.
9. A is the correct answer. A Project Manager must have experience in working on
projects in various roles including the role of a Project Manager. Options B, C and D are
secondary aspect.
31
Chapter 2
SDLC – Need, Benefits and Phases
Learning Objectives:
After completion of this chapter you should have conceptual clarity on the basic concepts of
System Development Life Cycle (SDLC), changes in SDLC due to change of technology and
business environment. This chapter will also help to understand the inclusion of newer phases
in SDLC. This chapter covers:
Traditional SDLC phases and overview of the main activities;
Additional phases due to availability of outsourcing and generic customizable software;
and
Steps added in different phases due to security requirements (Secure SDLC or
SSDLC).
information. For example, a software developed for the managing inventory at a bookstore
may keep track of the inventory of books in stock for the latest bestseller. Application System
for the Human Resource Department may keep track of the changing payroll information of the
employees.
System Development involves developing or acquiring and maintaining Application Systems
which are used for various day-to-day business activities. These business activities are called
as Business Processes and they process data. The effective management and control of this
System Development is critical as the business systems process and control information
assets of the organization. The use of standard set of steps to develop and support business
applications is called Systems Development Methodology.
33
Background Material on Information Systems Audit 3.0 Course (Module 3)
Have a clear view of the entire project, the personnel involved, staffing requirements, a
defined timeline, and precise objectives to close each phase.
Base costs and staffing decisions on concrete information and need.
Provide verification, goals, and deliverables that meet design and development
standards for each step of the project, developing extensive documentation throughout.
It usually begins with the analysis of cost and timelines and provides developers a
measure of control through the phased and iterative approach.
Improvement may be brought in the quality of the final system through verification at
each stage.
34
Project Management for SDLC
and focus only on the benefits to the organization, such as providing Internet Banking services
or Mobile Banking services.
Role of IS Auditor in project initiation and feasibility study phase:
Review of documentation for the reasonableness.
Review cost justification/benefits with schedule of when the anticipated benefits may be
realized.
Identify if the business needs used to justify the system actually exist.
Justification for going for a development or acquisition.
Review the alternate solutions for reasonableness.
Review the reasonableness of the chosen solution.
35
Background Material on Information Systems Audit 3.0 Course (Module 3)
new design, one must thoroughly understand existing process/system and map them against
new requirements to understand changes and rationale for changes. Analysis is also important
to decide upon system design approach. Traditional system development generally adopts a
data oriented approach, since it had been focused on processing and presenting of business
data., However, due to extensive use of technology in modern organizations, the focus now is
more on service oriented approach where the objective of the system is to provide services
using data models.
Role of IS Auditor in System Analysis phase:
Verify that Management has approved the initiation of the project and the cost.
In case of acquisition, determine that an appropriate number of vendors have been
given proposals to cover the true scope of the project and requirements of the users.
Determine whether the application is appropriate for the user of an embedded audit
routine or modules and if so, request may be made to incorporate the routine in
conceptual design of the system.
36
Project Management for SDLC
Assess adequacy of the audit trails which provide traceability and accountability.
Verify key calculations and processes for correctness and completeness.
Interview users to ascertain their level understanding of the system design, input to the
system, screen formats and output reports.
Verify that system can identify erroneous data correctly and can handle invalid
transactions.
Review conceptual design to ensure the existence of appropriate controls.
Review quality assurance and quality control results of programs.
Verify the design for its completeness and correctness and ensure that it meets the
defined requirements.
Verify that the functional data created during requirement phase is complete and test
plans are developed.
37
Background Material on Information Systems Audit 3.0 Course (Module 3)
Efficiency: It refers to the performance per unit cost with respect to relevant
parameters and it should not be unduly affected with the increase in input values.
Usability: It refers to a user-friendly interface and easy-to-understand internal/external
documentation.
Readability: It refers to the ease of maintenance of program even in the absence of the
program developer.
Some key aspects of development:
1. Program Coding Standards: The logic of the program outlined in the flowcharts is
converted into program statements or instructions. For each language, there are specific rules
concerning format and syntax. Syntax means vocabulary, punctuation and grammatical rules
available in the language manuals that the programmer has to follow strictly and pedantically.
Different programmers may write a program using different sets of instructions but each giving
the same results. This might create a problem for changes to be done to the program which
has been written by another programmer. Therefore, the coding standards are to be defined
so as to serve as a method of communication between teams, amongst the team members
and users resulting in better controls. Coding standards minimize the system development
issues due to programmer turnover. These standards provide simplicity, interoperability,
compatibility, efficient utilization of resources and reduce processing time.
2. Programming Language: Depending upon the development approach, the analyst
decides the programming language to be used. Application programs are coded in the form of
statements or instructions and the same is converted by the compiler to object code for the
computer to understand and execute. The programming languages commonly used are:
High-level general-purpose programming languages such as COBOL and C;
Object oriented languages such as C++, JAVA etc.;
Scripting language such as JavaScript, VBScript; and
Decision Support or Logic Programming languages such as LISP and PROLOG.
The choice of a programming language may depend on various pertinent parameters. In
general, language selection may be made on the basis of application area; algorithmic
complexity; environment in which software has to be executed; performance consideration;
data structure complexity; knowledge of System Development staff; and capability of in-house
staff for maintenance.
Role of IS Auditor in development phase:
Ensure that documentation is complete.
Review QA report on adopting coding standards by developers.
Review the testing and bugs found are reported and sent for rework to developers.
38
Project Management for SDLC
39
Background Material on Information Systems Audit 3.0 Course (Module 3)
UAT supports the process of ensuring that the system is production-ready and satisfies all
documented requirements. The methods include:
Definition of test strategies and procedures.
Design of test cases and scenarios.
Execution of the tests.
Utilization of the results to verify system readiness.
Acceptance criteria are defined so that a deliverable satisfies the pre-defined needs of the
user. A UAT plan must be documented for the final test of the completed system. The tests
are written from a user perspective and should test the system in a manner as close to
production as possible. For example, tests may be based around typical pre-defined, business
process scenarios. If new business processes have been developed to accommodate the new
or modified system they should also be tested at this point. A key aspect of testing should also
include testers seeking to verify that supporting processes integrate into the application in an
acceptable manner. Successful completion would generally enable a project team to hand
over a complete integrated package of application and supporting procedures.
Ideally, UAT should be performed in a secure testing or staging environment. A secure testing
environment where both source and executable code are protected helps to ensure that
unauthorized or last-minute changes are not made to the system without going through the
standard system maintenance process. The nature and extent of the tests will depend on the
magnitude and complexity of the system change.
Testing primarily focuses on ensuring that the software does not fail i.e. it will run according to
its specifications and in the way users expect. Special test data are input for processing and
the results are examined against pre-determined output. If it is found satisfactory, it is
eventually tested with actual data from the current system.
Role of IS Auditor in testing phase:
Review the test plan for completeness and correctness.
Review whether relevant users have participated during testing phase.
Review error reports for their precision in recognizing erroneous data and for resolution
of errors.
Verify cyclical processes for correctness (example: year-end process, quarter-end
process)
Interview end-users of the system for their understanding of new methods, procedures
and operating instructions.
40
Project Management for SDLC
Review the system and end-user documentation to determine its completeness and
correctness.
Review whether reconciliation of control totals and converted data has been performed
to verify the integrity of the data after conversion.
Review all parallel testing results.
Test the system randomly for correctness.
Review unit test plans and system test plans to determine that tests for internal control
are addressed.
Verify that the system security is functioning as designed by developing and executing
access tests.
Ensure test plans and rest results are maintained for reference and audit
41
Background Material on Information Systems Audit 3.0 Course (Module 3)
Review programmed procedure used for scheduling and running the system along with
the system parameters that are used in executing the production schedule.
Review all system documentation to ensure its completeness and verify whether all
recent updates from the testing phase have been incorporated.
Verify that data conversion is correct and complete and is confirmed by the respective
User Departments before the system is implemented and Final User Sign-off is
obtained.
42
Project Management for SDLC
Identify system changes and verify that appropriate authorization was given to make the
change in accordance with organizational standards.
Review permanent program documentation to ensure that evidence (Audit Trail) is
retained regarding program changes.
Evaluate adequacy of the security access restrictions over production source and
executable modules.
Evaluate adequacy of the organization’s procedures for dealing “emergency” program
changes.
Evaluate the adequacy of the security access restrictions over the use of the
“emergency” logon-ids.
Verify existence and adequacy of the records for system changes.
Evaluate adequacy of the access protection of maintenance records.
43
Background Material on Information Systems Audit 3.0 Course (Module 3)
The characterizing features of this model have influenced the development community in big
way. Some of the key characteristics are:
Project is divided into sequential phases, with some overlap and splash back
acceptable between phases.
Emphasis is on planning, time schedules, target dates, budgets and implementation of
an entire system at one time.
Tight control is maintained over the life of the project through the use of extensive
written documentation, as well as through formal reviews and approval/signoff by the
user and information technology management occurring at the end of most phases
before beginning the next phase.
Strengths:
It is ideal for supporting less experienced project teams and Project Managers, or
project teams whose composition fluctuates.
The orderly sequence of development steps and design reviews help to ensure the
Quality, Reliability, Adequacy and Maintainability of the developed software.
Progress of system development can be tracked and monitored easily.
It enables to conserve resources.
Weaknesses:
It is criticized to be Inflexible, slow, costly, and cumbersome due to significant structure
and tight controls.
Project progresses forward, with only slight movement backward.
There is a little to iterate, which may be essential in situations.
It depends upon early identification and specification of requirements, even if the users
may not be able to clearly define ‘what they need early in the project’.
Requirement inconsistencies, missing system components and unexpected
development needs discovered during design and coding are most difficult to handle.
Problems are often not discovered until system testing.
System performance cannot be tested until the system is almost fully coded, and under
capacity may be difficult to correct.
It is difficult to respond to changes, which may occur later in the life cycle, and if
undertaken it proves costly and are thus discouraged.
Written specifications are often difficult for users to read and thoroughly appreciate.
It promotes the gap between users and developers with clear vision of responsibility.
44
Project Management for SDLC
45
Background Material on Information Systems Audit 3.0 Course (Module 3)
46
Project Management for SDLC
Weaknesses:
When utilizing a series of mini-Waterfalls for a small part of the system before moving
onto the next increment, there is usually a lack of overall consideration of the business
problem and technical requirements for the overall system.
Each phase of an iteration is rigid and do not overlap each other.
Problems may arise pertaining to system architecture because not all requirements are
gathered up front for the entire software life cycle.
Since some modules will be completed much earlier than others, well-defined interfaces
are required.
It is difficult to demonstrate early success to management.
47
Background Material on Information Systems Audit 3.0 Course (Module 3)
48
Project Management for SDLC
Reverse Engineering
Reverse Engineering is the process of studying and analysing an application, a software
application or a product to see how it functions and to use that information to develop a similar
system. This process can be carried out in several ways:
Decompiling object or executable code into source code and using it to analyze the
program
Black Box testing: The application to be reverse-engineered to unveil its functionality
The major advantages of Reverse Engineering are:
Faster development and reduced SDLC duration
The possibility of introducing improvements by overcoming the reverse-engineered
application drawbacks
49
Background Material on Information Systems Audit 3.0 Course (Module 3)
Aggregate Classes interact through messages, which are requests for services from one
Class (called a client), to another Class (called a server). A Polymorphism is termed as the
ability of two or more Objects to interpret same message differently during execution,
depending upon the superclass of the calling Object.
For example, consider a car owned by you as an object. The object is complete in itself and all
necessary data (components and specifications) are embedded into the object. The object can
be specifically used for the purpose it has been designed. However, there are different
objects either having similar data (same model, same company) or different data (Different
model, different companies etc.) All these objects belong to class cars. All object cars have
common attributes (i.e. steering, gear, break, wheels etc.) that are inherited from class cars
(or may be from superclass vehicles). One can modify the object car by keeping basic
common attributes and add few more functions to it. (Polymorphism)
There are many programming languages that are used for developing object-oriented
systems. To realize the full benefits of using object-oriented programming, it is necessary to
employ object-oriented analysis and design approaches. Dealing with objects should permit
analysts, developers and programmers to consider larger logical chunks of a system and
clarify the programming process. Although it is possible to do object-oriented development
using a waterfall model in practice most object-oriented systems are developed with an
iterative approach. As a result, in object-oriented processes "Analysis and Design" are often
considered at the same time. OOSD being a programming method, use of a particular
programming language or a particular programming technique does not imply or require use of
a particular software development methodology.
Advantages of OOSD:
The ability to manage an unrestricted variety of data types
Provision of a means to model complex relationships
It has capability to meet the demands of a changing technology and environment
A significant development in OOSD has been the decision by some of the major players in
object-oriented development to join forces and merge their individual approaches into a
unified approach using the Unified Modelling Language (UML). UML is a general-purpose
notational language which helps developers to specify and visualize complex software for
large object-oriented projects. This signals a maturation of the object-oriented development
approach. While object-orientation is not yet pervasive, it can be accurately said to have
entered the computing mainstream.
Applications that use object-oriented technology are:
Web Applications
E-Business applications
50
Project Management for SDLC
51
Background Material on Information Systems Audit 3.0 Course (Module 3)
52
Project Management for SDLC
real-time integration of code across platforms. However, using these RPC approaches for
different APIs still remains complex. Web-based application development is designed to
further facilitate and standardize code module and program integration.
Web-based application development enables users to avoid the need to perform redundant
computing tasks with redundant code. For example, installing client on all users after making
changes or change of address notification from a customer need not be updated separately in
multiple databases. For example, entering and maintaining same data in contact
management, accounts receivable etc. Web application development though is different than
traditional developments (e.g. users test and approve the development work), but the risks of
application development remain the same.
With web-based application development, an XML language known as Simple Object Access
Protocol (SOAP) is used to define APIs. SOAP will work with any operating system and
programming language that understands XML. SOAP is simpler than using the more complex
RPC-based approach, with the advantage that modules are coupled loosely so that a change
to one component does not normally require changes to other components. The second key
component of web development is the Web Services Description Language (WSDL), which is
also based on XML. WSDL is used to identify the SOAP specification that is to be used for the
code module API and the formats of the SOAP messages used for input and output to the
code module. The WSDL is also used to identify the particular web service accessible via a
corporate intranet or across the Internet by being published to a relevant intranet or Internet
web server.
53
Background Material on Information Systems Audit 3.0 Course (Module 3)
54
Project Management for SDLC
Test and Revise: After finishing the initial prototype, the designers first demonstrate
the model to users and then give it to them to experiment and ask users to record their
likes and dislikes about the system and recommend changes. Using this feedback, the
design team modifies the prototype as necessary and then re-submits the revised
model to system users for re-evaluation. Thus, iterative process of modification and re-
evaluation continues until the users are satisfied.
Obtain User Signoff of the Approved Prototype: Users formally approve the final
version of the prototype, which commits them to the current design and establishes a
contractual obligation about what the system will, and will not do or provide. Prototyping
is not commonly used for developing traditional MIS and batch processing type of
applications such as accounts receivable, accounts payable, payroll, or inventory
management, where the inputs, processing, and outputs are well known and clearly
defined.
55
Background Material on Information Systems Audit 3.0 Course (Module 3)
56
Project Management for SDLC
user to take an active part in the systems design, with the analyst acting in an advisory
role. Prototyping makes use of the expertise of both the user and the analyst, thus
ensuring better analysis and design, and prototyping is a crucial tool in that process.
Prototype has one major drawback. Many-a-time users do not realize that prototype
is not actual system or code but is just a model. Users may think that the system is
ready. Whereas actual development starts only after the prototype is approved.
Hence, the actual system may require time before it is ready for implementation
and use. In the meantime, users may get restless and wonder why there is so much
delay.
57
Background Material on Information Systems Audit 3.0 Course (Module 3)
Strengths:
Enhances the risk avoidance.
Useful in helping for optimal development of a given software iteration based on project
risk.
Incorporates Waterfall, Prototyping, and Incremental methodologies as special cases in
the framework, and provide guidance as to which combination of these model’s best fits
a given software iteration, based upon the type of project risk. For example, a project
with low risk of not meeting user requirements but high risk of missing budget or
schedule targets would essentially follow a linear Waterfall approach for a given
software iteration. Conversely, if the risk factors were reversed, the Spiral methodology
could yield an iterative prototyping approach.
Weaknesses:
It is challenging to determine the exact composition of development methodologies to
use for each of the iterations around the Spiral.
A skilled and experienced Project Manager is required to determine how to apply it to
any given project.
Sometimes there are no firm deadlines, cycles continue till requirements are clearly
identified. Hence has an inherent risk of not meeting budget or schedule.
58
Project Management for SDLC
59
Background Material on Information Systems Audit 3.0 Course (Module 3)
60
Project Management for SDLC
61
Background Material on Information Systems Audit 3.0 Course (Module 3)
62
Project Management for SDLC
boxed iterative approach and encourages rapid and flexible response to change. It is a
conceptual framework that promotes foreseen interactions throughout the development life
cycle.
Key features of agile methodologies
Customer satisfaction by rapid delivery of useful software;
Welcome changing requirements, even late in development;
Working software is delivered frequently (weeks rather than months);
Working software is the principal measure of progress;
Sustainable development, able to maintain a constant pace;
Close and regular interaction between business representatives and developers;
Face-to-face conversation is the best form of communication (co-location);
Projects are built around motivated individuals, who should be trusted;
Continuous attention to technical excellence and good design;
Simplicity; Self-organizing teams; and
Regular adaptation to changing circumstances.
Strengths:
Agile methodology has the concept of an adaptive team, which enables to respond to
the changing requirements.
The team does not have to invest time and efforts and finally find that by the time they
delivered the product, the requirement of the customer has changed.
Face to face communication and continuous inputs from customer representative leaves
a little space for guesswork.
The documentation is crisp and to the point to save time.
In general, the end result is of high-quality software in least possible duration leading
finally to a satisfied customer.
Weaknesses:
In case of some software deliverables, especially the large ones, it is difficult to assess
the efforts required at the beginning of the System Development life cycle.
There is lack of emphasis on necessary designing and documentation due to time
management. As a result, documentation is generally left out or remains incomplete.
63
Background Material on Information Systems Audit 3.0 Course (Module 3)
2.8.5 DevOps
Historically, the concept of DevOps came into existence for developing a culture of
collaboration between the teams. DevOps refers to the integration of development and
operations processes to eliminate conflicts and barriers. This integration can create a great
deal of benefits, but it can also create new risk. Decisions to adopt DevOps should be made
based on factors such as an organization’s climate, risk tolerance and culture and on the
scope of the development project. Because DevOps changes the environment and often
impacts an organization’s control environment and accepted level of risk, an IS Auditor
should ensure that there is a proper separation of duties.
DevOps combines the concepts of agile development, agile infrastructure and flexible
operations. It requires a bridge of communication between software development and
operations and the application of agile principles to all functions that support the Software
Development Life Cycle. Implementing DevOps processes can be done in a logical and
systematic manner and used to enhance the maturity of software development.
2.8.6 DevSecOps
DevSecOps means building security into app development from end to end. The adoption
DevSecOps is often closely associated with the adoption of Agile. DevSecOps uses two
distinctive concepts: (1) the confluence of software development, Information Security and IT
operations groups and (2) the use of automation in those activities.
An organization should consider the following controls when embracing a DevOps
development approach:
• Automated Software Scanning
• Automated Vulnerability Scanning
• Web Application Firewall
• Developer Application Security Training
64
Project Management for SDLC
65
Background Material on Information Systems Audit 3.0 Course (Module 3)
2.10 Summary
SDLC is an essential aspect of automating business processes using Information Technology.
It has been evolving with changing technology and global proliferation of computers. Today’s
business largely depends on IT and any problem faced has multi-fold repercussions.
Controlling SDLC process helps organizations in mitigating risks associated with
implementation and use of IT. An IS Auditor must be aware of phases and key steps of each
66
Project Management for SDLC
of the SDLC phases. There are various models and methods. An IS auditor, while auditing
SDLC process is not required to be an expert in all technologies but should always focus on
associated risks, assessment of these risks and assess whether the implemented solutions
are as per the expected business objectives.
2.11 Questions
1. SDLC primarily refers to the process of:
A. Developing IT based solution to improve business service delivery.
B. Acquiring upgraded version of hardware for existing applications.
C. Redesigning network infrastructure as per service provider’s needs.
D. Understanding expectations of business managers from technology.
2. Organizations should adopt programming/coding standards mainly because, it:
A. Is a requirement for programming using High Level Languages?
B. Helps in maintaining and updating System Documentation.
C. Is required for Security and Quality Assurance function of SDLC.
D. Has been globally accepted practice by large organizations.
3. An organization decided to purchase a configurable application product instead
of developing in-house. Outcome of which of the following SDLC phase helped
organization in this decision?
A. Requirement Definition
B. Feasibility Study
C. System Analysis
D. Development Phase
4. In which of the following phases of SDLC, controls for security must be
considered FIRST?
A. Requirement Definition
B. Feasibility Study
C. System Design
D. Implementation
67
Background Material on Information Systems Audit 3.0 Course (Module 3)
5. IS Auditor has been part of SDLC project team. Which of the following situation
does not prevent IS Auditor from performing post implementation review? The IS
Auditor has:
A. Designed the Security Controls.
B. Implemented Security Controls.
C. Selected Security Controls.
D. Developed Integrated Test facility.
6. An organization has implemented an IT based solution to support business
function. Which of the following situation shall indicate the need to initiate SDLC
project?
A. Vendor has launched a new hardware which is faster.
B. Organizations has unused surplus budget for IT.
C. Regulators have requested additional reports from business.
D. Competitor has launched an efficient IT based service.
7. A “Go or No Go” decision for SDLC project is primarily based on:
A. Feasibility Study
B. Business Case
C. Budget Provision
D. Market Situation
8. Which of the following is the primary reason for organization to outsource the
SDLC project? Non-availability of:
A. Skilled Resources
B. Budgetary Approvals
C. Security Processes
D. Infrastructure
9. Which of the following is an example of addressing social feasibility issue in
SDLC project?
A. Organization decides to use existing infrastructure.
B. Beta version of the application is made available to users.
C. Configuration of purchased software requires more cost.
D. Allowing employees to access social media sites.
68
Project Management for SDLC
10. Which of the following is not an indicator to assess benefit realization for internal
application software developed in-house?
A. Increase in number of customers because of new application.
B. Decrease in audit findings related to regulatory non-compliance.
C. Reduced number of virus attacks after implementing new software.
D. Increase in productivity of employees after implementation.
69
Background Material on Information Systems Audit 3.0 Course (Module 3)
7. B is the correct answer. Business case is a document that narrates all aspect including
benefit realization, cost and effort estimates, outcome of feasibility study, available
budget. That helps management in decision on the need of the SDLC project. Rest are
secondary aspects.
8. A is correct answer. Non availability of skilled resources required for application
development is primary reason for outsourcing the SDLC project. Other reasons can be
addressed. i.e. (B) budget can be made available; (C) security processes can be
established. (D) Infrastructure can be acquired, depending upon design of new
application and hence it is not a reason.
9. B is the correct answer. In order to ensure the acceptability by users, beta version of
solution is made available to users. Based on feedback changes are made so that the
solution can be socialized. Option A addresses technical feasibility, Option C addresses
economic feasibility. Option D addresses IT policy that has nothing to do with SDLC.
10. C is the correct answer. Since the application is for internal use and developed in
house it has nothing to do with reduction in virus attacks. This can be benefit realization
for anti-virus solution.
70
Chapter 3
Software Testing and Implementation
Learning Objectives
This chapter will give you a basic understanding on software testing, its importance,
strategies, types, methods, levels, and other related terminologies.
3.1 Introduction
The success of information systems depends upon the quality of software that supports the
system. Testing of software before deploying in production to ensure it delivers as per
requirements is most essential aspect of quality. This is apart from documentation, compliance
with coding standards, version control discipline and user training.
Testing is the process of evaluating a system or its component(s) with the intent to find
whether it satisfies the specified requirements or not. In simple words, testing is executing a
system in order to identify any gaps, errors, or missing requirements in contrary to the actual
requirements.
According to ANSI/IEEE 1059 standard, Testing can be defined as - A process of analyzing a
software item to detect the differences between existing and required conditions (that is
defects/errors/bugs) and to evaluate the features of the software item.
72
Software Testing and Implementation
Advantages Disadvantages
As the tester has knowledge of the source Due to the fact that a skilled tester is needed
code, it becomes very easy to find out which to perform white-box testing, the costs are
type of data can help in testing the increased.
application effectively.
It helps in optimizing the code. Sometimes it is impossible to look into every
nook and corner to find out hidden errors that
may create problems, as many paths will go
untested.
Extra lines of code can be removed which It is difficult to maintain white-box testing, as
can bring in hidden defects. it requires specialized tools like code
analyzers and debugging tools.
Due to the tester's knowledge about the code,
maximum coverage is attained during test
scenario writing.
73
Background Material on Information Systems Audit 3.0 Course (Module 3)
Advantages Disadvantages
Offers combined benefits of Black-Box and Since the access to source code is not
White-Box testing wherever possible. available, the ability to go over the code and
test coverage is limited.
Grey-Box testers don't rely on the source The tests can be redundant if the software
code; instead they rely on interface definition designer has already run a test case.
and functional specifications.
Based on the limited information available, a Testing every possible input stream is
Grey-Box tester can design excellent test unrealistic because it would take an
scenarios especially around communication unreasonable amount of time. As a result,
protocols and data type handling. many program paths will go untested.
The test is done from the point of view of the
user and not the designer.
74
Software Testing and Implementation
Not suited for algorithm Not suited for algorithm testing. Suited for algorithm
testing. testing.
This can only be done by Data domains and internal Data domains and internal
trial-and-error method. boundaries can be tested, if boundaries can be better
known. tested.
An effective testing practice will see the above steps applied to the testing policies of every
organization and hence it will make sure that the organization maintains the strictest of
standards when it comes to software quality. Commonly used functional testing types are; Unit
75
Background Material on Information Systems Audit 3.0 Course (Module 3)
testing, Integration testing, Smoke testing, Sanity testing, System testing, Regression testing,
Acceptance testing (Alpha testing, and Beta testing), and End to End testing.
76
Software Testing and Implementation
77
Background Material on Information Systems Audit 3.0 Course (Module 3)
78
Software Testing and Implementation
79
Background Material on Information Systems Audit 3.0 Course (Module 3)
Portability Testing can be considered as one of the sub-parts of system testing, as this testing
type includes overall testing of a software with respect to its usage over different
environments. Computer hardware, operating systems, and browsers are the major focus of
portability testing. Some of the pre-conditions for portability testing are as follows −
Software should be designed and coded, keeping in mind the portability requirements.
Unit testing has been performed on the associated components.
Integration testing has been performed.
Test environment has been established.
80
Software Testing and Implementation
substituted with real modules one by one, and these modules are tested. This process
continues till the atomic (smallest) modules are reached. Since decision-making processes
are likely to occur in the higher levels of program hierarchy, the top-down strategy emphasizes
on major control decision points encountered in the earlier stages of a process and detects
any error in these processes. The difficulty arises in the top-down method, because the high-
level modules are tested with stubs and not with actual modules.
81
Background Material on Information Systems Audit 3.0 Course (Module 3)
in order to observe the results. Stress Testing may be performed by testing the
application with large quantity of data during peak hours to test its performance.
Performance Testing: Software Performance Testing is performed on various
parameters like response time, speed of processing, effectiveness use of a resources
(RAM, CPU etc.), network, etc. This testing technique compares the new system's
performance with that of similar systems using available industry benchmarks.
82
Software Testing and Implementation
Testers generally perform Black Box testing (Penetration Test) by trying to simulate attacks on
hosted application. This is then followed by performing Grey Box and/or White Box testing
that includes code review to identify the issues in coding practices that might introduce the
vulnerabilities in the application. These can be avoided by including secure coding practices in
coding standard developed by the organizations.
83
Background Material on Information Systems Audit 3.0 Course (Module 3)
84
Software Testing and Implementation
3.8 Implementation
Application software developed shall be implemented once it is tested and UAT has been
signed off. However, the planning for implementation must start much earlier in SDLC, many
times after feasibility study. Planning involves:
Selecting Implementation Strategies
Preparing for implementation
o Deciding on hardware and ordering (if required) in advance so as to be available
in time
o Deciding on site where infrastructure to be made available
Conversion of data to suit to the requirements of new application.
85
Background Material on Information Systems Audit 3.0 Course (Module 3)
86
Software Testing and Implementation
87
Background Material on Information Systems Audit 3.0 Course (Module 3)
implementation to begin. Moreover, many other issues like defect removal, maintenances,
reengineering may require to be addressed to assure the desirable quality control of the
system in operational environment.
The process of ensuring that the information system is operational and then allowing users to
take over its operation for use and evaluation is called System Implementation.
Implementation includes all those activities that take place to convert from the old system to
the new. The new system may be totally new, replacing an existing manual or automatic
system. Some of the generic key activities involved in System Implementation are:
Site preparation and hardware installation
Conversion of data to the new system files;
Training of end users;
Completion of user documentation;
System changeover
Post implementation review and evaluation
Site Preparation and Installation: The hardware required to support the new system is
selected prior to the implementation phase. The necessary hardware should be ordered in
time to allow for installation and testing of equipment during the implementation phase. An
installation checklist should be developed at this time with operating advice from the vendor
and system development team. In situations, where people are not experienced in the
installation of similar hardware/platform/equipment, adequate time should be planned to allow
completion of required activities.
Site Preparation: An appropriate location as required to provide an operating environment for
system (temperature, humidity and dust control specifications) has to be prepared in time.
Installation of New Hardware / Software: Site preparation also includes receiving, installing
and connecting the hardware and supporting software (like operating systems, middleware
etc.). In case the hardware is available, the same needs to be commissioned for the new
application as per design requirements.
Equipment Checkout: The equipment must be turned on for testing under normal operating
conditions. Though the routine 'diagnostic tests' should be run by the vendor, the in-
house implementation team should test the equipment functionalities in actual working
conditions.
3.8.3 Conversion
Conversion of data is most important activity while implementing new application system or
when there is significant change in technology requiring conversion. The Conversion activity
88
Software Testing and Implementation
involves converting data, procedures, documentation from old system to new system. Most
important being data conversion.
Data Conversion: The requirement of data conversion depends upon the change. If the new
application is replacing manual operation to automated operation it involves:
1. Capturing of data into electronic form
2. Verification of data
3. Uploading into database
In case change is from old system to new system, it involves:
1. Converting electronic data from old format to new format
2. Verification
3. Uploading into new database.
Since data conversion is a type of input, controls on conversions are essential to ensure
integrity of data. These controls generally include:
1. Completeness Check: Using number of records, control totals, batch totals, hash
totals. For example, verifying number of employee’s record, checking trial balance before and
after conversion etc.
2. Accuracy Check: Manual verification or key verification (manual to electronic
conversion)
Unauthorized changes during conversion are one of the sources of frauds.
Procedure Conversion: Changes in application systems may require changes in operating
procedures and associated controls. Operating procedures should be carefully completed with
sufficient documentation pertaining to operations on how to use the new system. It applies to
both computer-operations and functional area operations. Before conversion activities can
start, conversion procedures must be defined and personnel involved must be trained to cover
input, data files, methods, procedures, output, and internal control.
For example, during manual operation in banking every transaction is verified before being
posted to account and then the effect of transaction is reflected in general ledger. However in
electronic banking system transactions are flagged with type of transaction and posted to
general ledger. Hence verification of transaction is most essential in new system.
System Conversion: After on-line and off-line files have been converted and the reliability of
the new system has been confirmed for a functional area, daily processing can be shifted from
the existing information system to the new one. All transactions initiated after this time are
processed on the new system. System development team members should be present to
89
Background Material on Information Systems Audit 3.0 Course (Module 3)
assist and to answer any questions that might develop. Consideration should be given to
operating the old system for some more time to permit checking, matching and balancing the
total results of both systems.
Scheduling Personnel and Equipment: Scheduling data processing operations of a new
information system for the first time is a difficult task for the system manager. As users
become familiar with the new system, the job becomes easier to perform and becomes part of
the routine work. Schedules should be set up by the system manager in conjunction with
departmental managers of operational units serviced by the equipment. The master schedule
for next period/month should provide sufficient computer time to handle all required
processing.
90
Software Testing and Implementation
6. Prioritizing the Change Requests: This is required to resolve the conflict due to
multiple Change Requests from different users.
7. Carrying out Changes: System Analyst shall review the changes and decide
appropriate resources to carry out changes. Records of all program changes should be
maintained. Library management software may help in automating this process and also
maintaining audit trail. The maintenance information usually consists of the programmer ID,
time and date of change, project or request number associated with the change, and before
and after images of the lines of code that were changed. This also helps in preventing and/or
detecting unauthorized changes.
8. System Document Maintenance: All relevant System Documentation updating
sometimes is neglected area during change management. It is essential to ensure the
effective utilization and future maintenance of a system, Documentation requiring revision may
consist of program and/or system flowcharts, program narratives, data dictionaries, entity
relationship models, data flow diagrams (DFDs), operator run books and end-user procedural
manuals. In case of infrastructure changes network diagrams. data centre block diagrams,
electrical and facility diagrams etc. are likely to undergo changes.
9. Testing the Changes: Changes will be tested as per testing process (Please refer
subsection on testing). However, for testing changes, following points must be considered:
o Existing functionalities are not affected by the change
o System performance is as expected
o Security vulnerabilities are not introduced
This also includes conducting user acceptance testing and formal sign-off from users/owners.
(E-mail, electronic approval in automated system, document etc.)
10. Releasing Changes: Changes shall be released to production once approved by
stakeholders (UAT). Ensure fall-back procedures in place in case operations are affected due
to change. Automation of this process shall help management in restricting one person
requiring access to production, test and development environment.
11. Review: Post implementation/release review may be conducted.
12. Record Maintenance: Change Requests should be maintained in a format that will
ensure that all changes associated with primary change requests are considered. This allows
the management to easily track the changes to change requests. The process must be formal
and maintain record of all approvals and rejections.
For acquired systems vendor may distribute periodic updates, patches or new version of the
software. User and systems management should review such changes for impact and
appropriateness before implementing.
91
Background Material on Information Systems Audit 3.0 Course (Module 3)
92
Software Testing and Implementation
The IS Auditor has to ensure that emergency changes are handled in a controlled
manner.
93
Background Material on Information Systems Audit 3.0 Course (Module 3)
94
Software Testing and Implementation
3.10 Summary
Testing is a process that focuses on correctness, completeness and quality of developed
computer software. Although the testing phase comes much later in the life cycle, planning for
testing starts with the commencement of System Development Life Cycle i.e. during
requirement gathering phase. Testing should systematically uncover different classes of errors
in a minimum amount of time with a minimum amount of efforts. The data collected through
testing can also provide an indication of the software's reliability and quality. However, testing
cannot show the absence of defect, it can only show that software defects are present.
3.11 Questions
1. Which of the following is main reason to perform User Acceptance Test (UAT)?
A. To train and educate users on features of new solution.
B. To confirm from users that solution meets requirements.
C. To complete formality of sign-off to mark end of project.
D. To finalize the implementation plan for new IT solution.
95
Background Material on Information Systems Audit 3.0 Course (Module 3)
96
Software Testing and Implementation
97
Background Material on Information Systems Audit 3.0 Course (Module 3)
identify bugs before releasing the product to real or intended users. Option D User
Training helps successful system implementation.
3. D is the correct answer. Sanitized data generally may not cover all paths the data can
take and hence system cannot be tested for all possible cases. Option B leakage of
production data is not a major concern since data is sanitized. Options A and C are not
concerns.
4. B is the correct answer. Black Box testing focuses on the inputs and outputs without
knowing their internal code implementation. Option A White Box testing evaluates the
code and the internal structure of a program. Option C Load Testing is performed to
determine a system's behaviour under both normal and at peak conditions. Option D
Regression Testing is defined as a type of software testing to confirm that a recent
program or code change has not adversely affected existing features.
5. D is the correct answer. Test levels can be combined or reorganized depending upon
nature of a project or system architecture. Unit testing refers to test a function,
individual program or even a procedure. Integration Testing allows individuals to find
interface defects between the modules/functions. System Testing is the first level in
which the complete application is tested as a whole. Acceptance Testing (or User
Acceptance Testing) determines whether the system is ready for release.
6. C is the correct answer. System Testing is based on Functional Requirement
Specification (FRS), which tells about general behavior of a system. Acceptance testing
(or User Acceptance Testing) determines whether the system is ready for release.
Component Testing, also known as Unit, Module or Program Testing, is defined as a
software testing type, in which the testing is performed on each individual component
separately without integrating with other components. Integration testing allows
individuals to find interface defects between the modules/functions.
7. C is the correct answer. Separately testable components are tested in Unit Testing or
Component Testing. A Unit Testing tends to test a function, individual program or even
a procedure. Option B Acceptance Testing (or User Acceptance Testing) determines
whether the system is ready for release. Option A Integration Testing allows individuals
to find interface defects between the modules/functions. Option D System Testing is the
first level in which the complete application is tested as a whole.
8. B is the correct answer. Usability Testing is mostly done by users. They are not familiar
with internal structure of the system and hence Black Box technique is correct answer.
Option A White Box testing evaluates the code and the internal structure of a program.
Option C Grey Box testing is a process for debugging software applications by making
an input through the front-end, and verifying the data on the back-end. Option D does
not exist.
98
Software Testing and Implementation
9. B is the correct answer. Portability Testing shows the ease with which a computer
software component or application can be moved from one environment to another, e.g.
moving of any application from Windows XP to Windows 7. Option A Interoperability
testing checks whether software can inter-operate with other software component,
software or systems. Option C Usability Testing, is a non-functional testing technique
that is a measure of how easily the system can be used by end users. Option D
Performance Testing is the process of determining the speed, responsiveness and
stability of a computer, network, software program or device under a workload.
10. B is the correct answer. Boundary Value Analysis is based on testing at the boundaries
between partitions and checks the output with expected output. Option A White Box
testing evaluates the code and the internal structure of a program. Option C also known
as Grey Box testing is a process for debugging software applications by making an
input through the front-end, and verifying the data on the back-end. Option D is not
applicable.
99
Chapter 4
Application Controls
Learning Objectives
After studying this chapter, you will be able to have basic understanding of Application
Controls and types of Application Controls. You will also learn the mapping of Application
Controls to business processes, and the role of auditors.
4.1 Introduction
Most Application Control solutions also allow for visibility into applications, users, and content.
This is helpful for understanding the data of the enterprise and controls, its storage locations,
which users have access to it, the access points, and the data transmission process. These
steps are required for data discovery and classification for risk management and regulatory
compliance. Application Control supports these processes and allows organizations to keep
their finger on the pulse of what is happening within their network.
Application Control gives companies and organizations knowledge about key areas regarding
applications, web traffic, threats, and data patterns. Users can also benefit from Application
Control by gaining a better understanding of applications or threats, applications’ key features
and behavioral characteristics, details on who uses an application, and details on those
affected by a threat. Organizations also gain knowledge about traffic source and destination,
security rules, and zones to get a complete picture of application usage patterns, which in turn
allows them to make more informed decisions on how to secure applications and identify risky
behavior. While they are making those decisions, the Application Control solution is
automatically protecting the network with whitelisting and blocking capabilities.
101
Background Material on Information Systems Audit 3.0 Course (Module 3)
102
Application Controls
103
Background Material on Information Systems Audit 3.0 Course (Module 3)
Pre-recorded input
Transaction logs
File updating and maintenance authorization
Parity checking
The control over data files or database tables are of four categories:
System control parameters
Standing data
Master data/ balance data
Transaction files
104
Application Controls
105
Background Material on Information Systems Audit 3.0 Course (Module 3)
106
Application Controls
107
Background Material on Information Systems Audit 3.0 Course (Module 3)
Application
Controls
Accomplish
Application
Controls
Enable
Application
Controls
Achieve
Application
Controls
108
Application Controls
109
Background Material on Information Systems Audit 3.0 Course (Module 3)
110
Application Controls
The objectives relevant for Application Controls generally involve ensuring that:
Data prepared for entry are authorized, complete, valid and reliable.
Data are converted to an automated form and entered into the application accurately,
completely and on time.
Data are processed by the application accurately, completely and on time, and in
accordance with established requirements.
Data are protected throughout processing to maintain integrity and validity.
Output is protected from unauthorized modification or damage and distributed in
accordance with prescribed policies.
Providing assurance over Application Controls typically involves an assurance provider (the
process/application owner, internal auditor, external auditor, etc.) following a process for
gathering sufficient evidence that the Application Controls (subject matter) are appropriately
designed and are operating effectively (conclusion) relative to established criteria (such as
COBIT Application Control objectives).
Materiality
Materiality needs to be considered in determining whether a given set of Application Controls
is sufficient to satisfy the control objectives and criteria. The assessment of what is material is
a matter of professional judgment and includes consideration of the potential effect on the
enterprise’s ability to meet its business objectives in the event of errors, omissions,
irregularities and illegal acts that may arise as a result of control weaknesses. Materiality can
be used as a:
Factor in determining the amount of evidence necessary to support the assurance
provider’s conclusion
Measure of the significance of a finding relative to the subject matter
When conducting or supporting financial statement audits, assurance providers ordinarily
measure materiality in monetary terms since what they are auditing is also measured and
reported in monetary terms. Application Control assurance providers may be required to
provide assurance on non-financial systems (e.g., Air Traffic Control system) or records (e.g.,
Healthcare Diagnostic Codes) and, therefore, alternative measures are required. With respect
to a specific control objective, a material control is a control or group of controls without which
control procedures do not provide reasonable assurance that the control objective will be met.
ISACA IS Auditing Guideline G6 Materiality Concepts for Auditing Information Systems
specifies that where the assurance objective relates to systems or operations processing
financial transactions, the value of the assets controlled by the system(s) and the value of
transactions processed per day/week/month/year should be considered in assessing
materiality.
111
Background Material on Information Systems Audit 3.0 Course (Module 3)
For systems and controls not affecting financial transactions, the following are examples of
measures that could be considered to assess materiality:
Criticality of the business processes supported by the system or operation
Cost of the system or operation (e.g., hardware, software, staff, third-party services,
overhead costs and/or a combination of these)
Potential cost of errors (possibly in terms of reputational risk, loss of client/consumer
trust, lost sales, warranty claims, irrecoverable development costs, cost of publicity
required for warnings, rectification costs, health and safety costs, unnecessarily high
costs of production, high wastage)
Number of accesses/transactions/inquiries processed per period
Nature, timing and extent of reports prepared and files maintained
Nature and quantities of materials handled (e.g., where inventory movements are
recorded without values)
SLA requirements and cost of potential penalties
Penalties for failure to comply with legal and contractual requirements
Loss of end-user productivity
Degradation of end-user efficiencies
Detection Risk is the risk that an incorrect conclusion is reached by the Assurance provider
regarding the presence (or absence) of material misstatement of the subject matter. In the
context of Application Controls, the risk of an incorrect conclusion could, for example, be the
risk of concluding that the Application Controls operated effectively when, in reality, they did
not. Detection risk is a function of the risk of material error or control failure and the risk that
the Assurance provider will not detect associated errors or control failures. The risk of material
error has two components:
Inherent Risk—The susceptibility of the subject matter (such as an assertion by the
responsible party) to a misstatement that could be material
Control Risk—The risk that a material misstatement could occur in an assertion and
not be prevented, detected or corrected on a timely basis by the entity’s internal
controls When planning an assurance activity, it is important to consider the inherent
risk associated with the subject matter to determine the nature and extent of procedures
and to design those procedures to reduce detection risk to an acceptable level.
4.9 Summary
Application Control may consist of edit tests, totals, reconciliations and identification and
reporting of incorrect, missing or exception data. Automated controls should be coupled with
manual procedures to ensure proper investigation of exceptions. These controls help ensure
112
Application Controls
data accuracy, completeness, validity, verifiability, and consistency, thus achieving data
integrity and data reliability. Implementation of Application Controls helps ensure system
integrity, that applicable system functions operate as intended, and that information contained
by the system is relevant, reliable, secure and available when needed.
4.10 Questions
1. A company’s labour distribution report requires extensive corrections each
month because of labour hours charged to inactive jobs. Which of the following
data processing input controls appears to be missing?
A. Completeness Test
B. Valid Code Check
C. Limit Test
D. Control Total
2. A customer inadvertently orders part number 1234-8 instead of 1243-8. Which of
the following controls would detect this error during processing?
A. Hash Total
B. Check Digit
C. Limit Check
D. Financial Batch Total
3. Which of the following are not Application Controls?
A. Numerical Sequence Check
B. Access Security
C. Manual follow-up of Exception Reports
D. Chart of Accounts
4. Which of the following ensures completeness and accuracy of accumulated data?
A. Processing Control Procedures
B. Data File Control Procedures
C. Output Controls
D. Application Controls
113
Background Material on Information Systems Audit 3.0 Course (Module 3)
114
References
1. ISA2.0 Module 5
2. Selection of SDLC Models (References Software Development Life Cycle Models and
Methodologies. (2012, 3). Retrieved from melsatar.blog: Software Development Life
Cycle Models and Methodologies)
3. CISA Review Manual 26th Edition.
4. CISA Review Manual 27th Edition.
5. https://www.iso.org/standard/35733.html
6. https://www.iso.org/standard/35747.html
7. https://csrc.nist.gov/csrc/media/publications/conferencepaper/1996/10/22/proceeding-
of-the-19th-nissc-1996/documents/paper001/article.pdf
Annexure
A-1 ISO/IEC 25010:2011 defines:
https://www.iso.org/standard/35733.html
1. A quality in use model is composed of five characteristics (some of which are further
sub-divided into sub-characteristics) that relate to the outcome of interaction when a product is
used in a particular context. This system model is applicable to the complete human-computer
system, including both computer systems in use and software products in use.
2. A product quality model is composed of eight characteristics (which are further
subdivided into sub-characteristics) that relate to static properties of software and dynamic
properties of the computer system. The model is applicable to both computer systems and
software products.
The characteristics defined by both models are relevant to all software products and computer
systems. The characteristics and sub-characteristics provide consistent terminology for
specifying, measuring and evaluating system and software product quality. They also provide
a set of quality characteristics against which stated quality requirements can be compared for
completeness.
Although the scope of the product quality model is intended to be software and computer
systems, many of the characteristics are also relevant to wider systems and services.
ISO 25010 has eight product quality characteristics (in contrast to ISO 9126's six), and 31
sub-characteristics.
"Functionality" is renamed "Functional Suitability". "Functional Completeness" is added
as a sub-characteristic, and "Interoperability" and "Security" are moved elsewhere.
"Accuracy" is renamed "Functional Correctness", and "Suitability" is renamed
"Functional Appropriateness".
"Efficiency" is renamed "Performance Efficiency". "Capacity" is added as a sub-
characteristic.
"Compatibility" is a new characteristic, with "Co-existence" moved from "Portability" and
"Interoperability" moved from "Functionality".
"Usability" has new sub-characteristics of "user error protection" and "accessibility"
(used in people with a wide range of characteristics). "Understandability" is renamed
"Appropriateness Recognizability", and "Attractiveness" is renamed "User Interface
Aesthetics".
"Reliability" has a new sub-characteristic of "Availability" (when required for use).
Annexure
117
Background Material on Information Systems Audit 3.0 Course (Module 3)
The proposed quality measures are primarily intended to be used for quality assurance and
improvement of system and software products during or post the development life cycle
process.
The main users of ISO/IEC 25023:2016 are people carrying out quality requirement
specification and evaluation activities as part of the following:
Development: Including requirements analysis, design specification, coding and testing
through acceptance during the life cycle process;
Quality Management: Systematic examination of the software product or computer
system, for example, when evaluating system or software product quality as part of
quality assurance, quality control and quality certification;
Supply: A contract with the acquirer for the supply of a system, software product or
software service under the terms of a contract, for example, when validating quality at
qualification test;
Acquisition: Including product selection and acceptance testing, when acquiring or
procuring a system, software product or software service from a supplier;
Maintenance: Improvement of the software product or system based on quality
measurement.
118
ISA Background Material
ISA
ISBN - 978-81-8441-995-5
INFORMATION SYSTEMS
AUDIT 3.0 COURSE
Module - 4
Information Systems Operations
and Management
Module - 4
Digital Accounting and Assurance Board
The Institute of Chartered Accountants of India August | 2020 | P2724 (Revised)
ICAI Bhawan,Hostel Block, 7th Floor
A-29, Sector-62 Digital Accounting and Assurance Board
Noida - 201309, India The Institute of Chartered Accountants of India
Tel (Direct): +91 120 3045992/961
Web: www.icai.org (Set up by an Act of Parliament)
New Delhi
Background Material
on
Information Systems Audit 3.0 Course
Module-4 :
Information Systems Operations and Management
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form, or by any means, electronic mechanical, photocopying, recording, or
otherwise, without prior permission, in writing, from the publisher.
DISCLAIMER
The views expressed in this material are those of author(s). The Institute of Chartered Accountants
of India (ICAI) may not necessarily subscribe to the views expressed by the author(s).
The information in this material has been contributed by various authors based on their expertise
and research. While every effort have been made to keep the information cited in this material error
free, the Institute or its officers do not take the responsibility for any typographical or clerical error
which may have crept in while compiling the information provided in this material. There are no
warranties/claims for ready use of this material as this material is for educational purpose. The
information provided in this material are subject to changes in technology, business and regulatory
environment. Hence, members are advised to apply this using professional judgement. Please visit
34& portal for the latest updates. All copyrights are acknowledged. Use of specific
hardware/software in the material is not an endorsement by ICAI.
Email : [email protected]
ISBN : 978-81-8441-995-5
vi
Contents
Chapter 1: Information Systems Management 1-16
Learning Objective 1
1.1 Information Systems Management 1
1.2 Information Systems Organization 2
1.3 Information Systems Service Management 3
1.4 Roles and Responsibilities 6
1.5 Human Resource Management 7
1.6 Training and Education 8
1.7 Supply Chain Management (SCM) 9
1.8 Customer Relationship Management (CRM) 10
1.9 Issues and challenges of IS Management 10
1.10 Summary 11
1.11 Questions 12
1.12 Answers and Explanation 14
Chapter 2: Information Systems Operations 17-35
2.1 Information Systems Operations 17
2.2 Management of IS Operations 18
2.3 Asset Management 19
2.4 Change Management 20
2.5 Configuration Management 22
2.6 Version Control 24
2.7 Log Management 25
2.8 User Management 26
2.9 Operations Helpdesk & User Assistance 29
2.10 IS Operations Performance Measurement 31
2.11 Summary 31
2.12 Questions 32
2.13 Answers and Explanations 34
Chapter 3: Software Operations & Management 36-62
3.1 Introduction to Software Infrastructure 36
3.1.1 System Software 36
3.2 Operating System 37
3.3 Application Software 38
3.4 Software Testing 40
3.5 Software Maintenance 42
3.6 DBMS – Database Management System 44
3.7 Network Services 50
3.8 Backup Strategies 54
3.9 Patch Management 57
3.10 Summary 58
3.11 Questions 58
3.12 Answers and Explanation 60
Chapter 4: Incident Response and Management 63-86
4.1 Incident handling and response 63
4.2 Cyber-Security Framework 68
4.2.1 Security Operation Centre 72
4.2.2 Computer Emergency response Team (CERT) 76
4.2.3 Indian Banks - Centre for Analysis of Risks and Threats (IBCART) 78
4.3 SIEM Tools and their utility 79
4.3.1 Deployment of SEIM Tool 79
4.3.2 SEIM Tools Utility 82
4.4 Summary 82
4.5 Questions 83
4.6 Answers and Explanation 85
Chapter 1
Information Systems Management
Learning Objective
All organisations either big or small are using Information systems for their day to day work
and generate lot of data or information. In this chapter, students will see how this information
is used, who is responsible to provide services to various departments of the organisation.
Students will also learn, how this information is used by the different users in the organisation.
Students will study IS Management, IS Service Management, IS policies, Procedures,
Standards and guidelines, Roles & Responsibilities, Human Resource Management practices
for IT, Training and Education and Issues and challenges of IS Management.
business decisions. E.g. an e-commerce web site can know from customers’ buying pattern,
which products the customers regularly buy and take decisions about selling strategies
3. Support the Business Process: Information Systems provide support to business
systems by automating business processes within the business function. E.g. account opening
process in a bank is supported with the account opening application module of the Banking
Application
4. Support Operations of an Organization: Operating a Business Application is a cycle
of entering(capturing) data into Business Application System, processing it and producing
output to be taken for further processing or using by humans. This involves many operations
to be performed with the help of Information Systems. E.g. in a manufacturing company data
is entered and processed through various stages of manufacturing on an ERP application.
This involves operations of data entry, processing, producing output, taking backup of data an
so on.
2
Information Systems Management
3
Background Material on Information Systems Audit 3.0 Course (Module 4)
4
Information Systems Management
3. Service-level management
4. Availability management
5. Capacity management
6. IT service continuity management
7. Security management
8. Supplier management
3. Service Transition - ITIL describes Service Transition as, the role of Service Transition
is to deliver services that are required by the business into operational use. This area also
covers various aspects such as managing changes to the Business environment. List of
processes in service transition are as follows -
1. Transition planning and support
2. Change management
3. Service asset and configuration management
4. Release and deployment management
5. Service validation and testing
6. Change evaluation
7. Knowledge management
4. Service Operation - Service Operation aims to provide best practice for achieving the
delivery of agreed levels of services both to end-users and the customers. Service operation is
the part of the lifecycle where the services and value is directly delivered. Also, the monitoring
of problems and balance between service reliability and cost etc are considered. Processes in
the service operation are as follows -
1. Event Management
2. Incident Management
3. Request Fulfilment
4. Access Management
5. Problem Management
Functions in the service operation are as follows -
1. Service Desk
2. Technical Management
5
Background Material on Information Systems Audit 3.0 Course (Module 4)
3. Application Management
4. IT Operations Management
5. Continual Service Improvement - Continual service improvement (CSI), aims to align
and realign IT services to changing business needs. The perspective of CSI on improvement
is, the business perspective of service quality. CSI aims to improve process effectiveness,
efficiency and cost effectiveness of the IT processes through the whole lifecycle. To manage
improvement, CSI should clearly define what should be controlled and measured.
CSI needs upfront planning, training and awareness, ongoing scheduling, roles created,
ownership assigned, and activities identified, to be successful. CSI must be planned and
scheduled as a process with defined activities, inputs, outputs, roles and reporting. CSI
focuses on improvement, tying together service design, service transition, and service
operation, which in turn, help raise the bar of operational excellence for IT.
6
Information Systems Management
7
Background Material on Information Systems Audit 3.0 Course (Module 4)
8
Information Systems Management
observe the role played and then discuss, deliberate and learn the subjects.
8. Management Specific Activities – This training is for finding managerial and
leadership qualities, behavioural skills, project management skills in students.
9. Case studies – In this kind of training, a trainer discusses Case studies for problem-
solving. This can be conducted in groups, as mentioned above or the trainer explains the case
and solution to the students.
9
Background Material on Information Systems Audit 3.0 Course (Module 4)
In order to satisfy customer needs, Information Systems have done a substantial progress in
CRM. Today, CRM can be provided with web sites, emails, mobile applications and so on.
Information Systems help businesses to track customer orders, create customer profiles, allow
customers to compare products and pricing, maintain customer history and provide other
support services.
There are various IS components of CRM, which dramatically changed today’s businesses
and are listed below –
i. E-Commerce
ii. Data Warehouse
iii. Enterprise Resource Planning (ERP)
v. Internet Technologies
vi. Payment Gateways
vii. Software & Applications
viii. Data Mining
ix. Artificial Intelligence
x. Business Analytics
5. Cyber Security Threats – Cyber security threats in an organisation are due to following
reasons -
i. Weak security policies & procedures
ii. Lack of standardisation
iii. Lack of proper controls
iv. Lack of user training and user awareness about security
6. Data Control – Now-a-days, growth in data in an organisation is tremendous. Managing
this data growth poses the following hazards -
i. Data Corruption
ii Data unavailability
iii. Data leakage
iv. Data Theft
v. Data privacy
To overcome these challenges proper cyber security measures such as Data Leakage
Protection (DLP) solutions need to be implemented. Proper data backup and physical controls
are necessary to protect the data.
7. Trained manpower – Continuous changes in technology poses hurdles in getting
trained manpower. Providing training on latest technology for work-force involves heavy costs
and difficulties are also faced in retaining trained work-force.
8. Management Support - Providing senior management support for monitoring and
supervisory responsibilities also poses challenges for organisations.
9. Service Level Agreements – Service level agreement is a measurable agreement
between a service providing vendor and a service availing customer. There are various
challenges that need to be looked into by both the parties such as clear scope of service,
metrics measurement, responsibilities etc.
10. Fourth Party Risk – Outsourced vendors further outsourcing to their vendors is known
as fourth party outsourcing. Such fourth party outsourcing poses risks of data leakage, data
privacy, non-compliance to the regulatory guidelines etc.
1.10 Summary
In this chapter, we discussed about Information Systems Management which involves
application of people, technologies, and procedures collectively to solve business problems.
We also learned that, organisations can be classified based on decision making, hierarchy and
processes.
11
Background Material on Information Systems Audit 3.0 Course (Module 4)
References
Control Objectives for Information Technology - COBIT 2019
Open Compliance Ethics Group - OCEG
Information Technology Infrastructure Library – ITIL version 4
DISA Manual 2.0
International Standards Organisation - ISO 27001 for Information Security Management
Systems
1.11 Questions
1. Which of the following is a common feature for all the policies?
A. Encryption
B. Standards
C. Acceptable use policy
D. Process
2. Which of the following is not an HRM function?
A. Recruitment
B. Cyber security training
C. Security Policy approval
D. Appraisal
3. Which of the following training an employee can acquire while working on his/her
desk in the office?
A. E-learning
B. Simulator based training
12
Information Systems Management
13
Background Material on Information Systems Audit 3.0 Course (Module 4)
14
Information Systems Management
The data owner has the ability to create, edit, modify, share and restrict access to the
data. Data ownership also defines the data owner’s ability to assign, share or surrender
all of these privileges to a third party. The IT Department acts as the Data Custodian,
responsible for the safe custody, transport, storage of the data and implementation of
business rules. System Owner is a person or department having responsibility for the
development, procurement, integration, modification, operation and maintenance,
and/or final disposition of an information system. Process Owner is a person, who is
accountable for the performance of the process and manages the process on a daily
basis.
6. The correct answer is A
The main challenge while choosing outsourcing data processing is data confidentiality.
Companies feel comfortable in sharing data, only with employees whom they trust or
who are bounded by the contractual commitments to keep the data undisclosed.
Majority of the outsourcing firms sign a strict non disclosure agreement with the
companies which assures that the data would be kept confidential and any breach on
the agreement would be punishable under the law. Choices B and D are advantages of
outsourcing. Data integrity is the overall completeness, accuracy and consistency of
data. Data integrity although very important but does not pose a greater challenge than
data confidentiality.
7. The correct answer is B
When individuals serve multiple roles, this represents a separation of duties problem
and is associated with risk. Security administrators should not be system programmers,
due to the associated rights of both functions. A person with both security and
programming rights could do almost anything on a system. The other combinations of
roles are valid from a separation of duties perspective. Ideally, network administrators
should not be responsible for quality assurance because they could approve their own
work. However, that is not as serious as the combination of security and programming,
which would allow nearly unlimited abuse of privilege. In some distributed
environments, especially with small staffing levels, users may also manage security.
While a database administrator is a very privileged position and it would not be in
conflict with the role of a systems analyst.
8. The correct answer is C
Management should ensure that all information assets (data and systems) have an
appointed owner who makes decisions about classification and access rights. System
owners typically delegate day-to-day custodianship to the systems delivery / operations
group and security responsibilities to a security administrator. Owners, however, remain
accountable for the maintenance of appropriate security measures.
15
Background Material on Information Systems Audit 3.0 Course (Module 4)
16
Chapter 2
Information Systems Operations
Learning Objectives
Operations management represents support for issues faced in day-to-day business.
Information Systems Operations support is the support given to users. In this Chapter,
students shall study topics such as Information Systems Operations, Management of IS
operations, Asset Management, Change Management, Configuration Management, Version
Control, Log Management, User Management, Operations Helpdesk & User Assistance and IS
Operations Performance Measurement
18
Information Systems Operations
IT
Infrastructure
Server User
Operation
19
Background Material on Information Systems Audit 3.0 Course (Module 4)
20
Information Systems Operations
follows –
1. Request for Change (RFC) – Any change should be initiated through a Request for
Change (RFC). Such request for change shall be done stepwise, with review and monitoring.
Proper request with proper documentation with proper explanation related to what, why, how
and by whom will have an effective Change Management Process.
Change
Prioritization Change Schedule Review
21
Background Material on Information Systems Audit 3.0 Course (Module 4)
software.
To make configuration management successful, it is important for the organisation to
implement following practices -
i. Policy, Standards, Procedures and guidelines.
ii. Formation of Change control board
iii. Documentation
iv. Pre-Launch Testing
v. Proper training and skills upgradation of personnel
vi. Timeliness
vii. Clear Scope of Work
viii. Optimisation
Configuration management constraint – The constraints to the Configuration management
are many, some of them are listed below –
i. Non - availability of the skilled Resources or lack of training to IT manpower
ii. Absence of Change control board
iii. Either absence of Policy, procedure and guidelines or non-adherence to them
iv. Poor Quality of the configuration
v. Incomplete, poor or absence of scope of work
vi. Delayed Responses
vii. No pre-launch testing
viii. No fund availability from the organisation
Configuration management process – Configuration management process in an
organisation is generally based on the industry best practice. Adherence to policies,
standards, guidelines and procedures aligns the configuration management process with the
objectives of IT department, which in turn is aligned to the objectives of the organisation.
The configuration management process is explained as follows -
1. Configuration Items (CI) – IT department, along with data owners, identifies the
Configuration Items required to be configured as per the Configuration Management Policy of
the organisation. The following activities are performed by the IT department for the
identification of Configuration Items –
23
Background Material on Information Systems Audit 3.0 Course (Module 4)
24
Information Systems Operations
configuration of software and/or hardware. In some organisations, such changes required may
be very high, e.g. 10 to 15 changes in a week. As discussed earlier, this is effected through a
Change Management process. Due to changes in hardware or software, a different release or
version of the system is coming in existence. If the changes are quite frequent, such as 10 to
15 changes a week, then it is necessary to keep track of the new releases or versions. This is
done through Version Control.
Characteristics and features of a version are –
a. Version number
b. Date
c. Included and excluded features
To track and control the version of a system, IT department uses Version Control System
(VCS). VCS allows IT department, to keep track of version numbers and their release dates.
VCS provides assistance to IT team with following -
i. Repository of the contents
ii. Record of Previous versions
iii. Provide access to older versions
iv. Maintaining logs for accounting and details of changes
Benefits of having a good version control system (VCS) are given below –
1. Remote team coordination in development, is possible
2. Improvement in Scalability (growth of system)
3. Fast, Efficient and reliable
4. Integrity in Version is maintained
5. Improved Accountability
6. Immutability (locking of version)
7. Atomic Transactions (Atomic – lowest possible unit)
25
Background Material on Information Systems Audit 3.0 Course (Module 4)
User Profile
Account Account
Termination Modification
employee’s user profile. After completing the necessary induction training in the department,
the employee is assigned a role (for job responsibilities) by the head of the department.
To perform the assigned role, the employee is given a computer (desktop or laptop) to work in
the IT department. The employee logs into the system using his/her user ID as per the profile
assigned. E.g. an employee joining as an Officer will be assigned “Officer” role whereas an
employee joining as a “Manager” will be assigned a “Manager” role.
User profile contains following information such as –
a. Name of the user
b. Department
c. Email address
d. Intercom Number or Mobile number
f. Active Directory (Active Directory is a Microsoft product on Windows Server to manage
user and other services permissions and access to network resources)
g. Computer name as per active directory
ii. User Account types –User account types are given below –
a. User account
b. Guest account
c. Super user account
d. Database account
e. Network user account
f. Network Directory account
g. Internet Access account
h. Email account
i. Biometric Access account
j. ERP or other application account
User account information have the following information which is either in clear text or hashed
(Hash – converting clear text into unreadable or scrambled text which cannot be read as a
clear text. This is done by a software based on algorithms such as Secured Hashing Algorithm
1 or 256 – Sha1 or Sha256), due to privacy and security requirements–
a. User name
27
Background Material on Information Systems Audit 3.0 Course (Module 4)
b. password
c. Mobile number
d. Department code
e. Network/Cloud Drive associated with the account
Benefits of User Management - Benefits of creation of user accounts are many, few are
listed below –
1) Improved User Management
2) Improved Access Controls for a user
3) Improved integration of various systems for a user
4) Optimised performance
5) Improved Accountability
6) Improved Authenticity
7) Improved Authorization
8) Helpdesk setup is easier - either online or offline
9) Improved Security
iii. Account Modification – Account modification may be requested by a user to IT
department, through his/her user management. Depending upon the change of role of a user,
transfer of an employee or promotion of an employee changes are required in the account
profile. There are two types of account modification described as follows –
1. By the Administrative – Based on the request received from the user department
administrator, modifies the account for the following information –
a. Department code
b. Authorisation
c. Drive mapping
d. Transfer of account from one office location to another
2. By the User – Based on the organisation’s policy or in some cases, at the discretion of
the user, a user may change certain information related to his/her account as detailed
below –
a. Password
b. Other demographic details such as contact address, mobile phone etc. However,
this may further require to be approved by competent authority
iv. Account termination – A user Account is terminated by the IT department, only when
the request is approved and sent by the Human Resource department and not by the
28
Information Systems Operations
employee’s parent department. Account termination request sent by the Human Resource
department for the employee is based on the following –
a. Termination of the employee
b. Resignation of the employee
c. Employee on Deputation
d. Employee seriously ill and on long medical leave
e. Death of the employee
v. Deleting user profile – A User profile is deleted by the IT department on the request
sent by the Human Resource department. Account termination request may be based on the
following –
a. Termination of the employee
b. Resignation of the employee
c. Death of the employee
29
Background Material on Information Systems Audit 3.0 Course (Module 4)
c. Email
d. Chatting
e. Video Conferencing
f. Messenger Chatting
g. Physically attending the user
Helpdesk personnel, help the user for various hurdles related to the Information systems and
try to resolve them as given below –
a. Password reset
b. Software related issues
c. Drive related issues
d. Network related issues
e. Database related issues
f. Email related issues
g. Internet related issues
h. Hardware issues such as PC Desktop and Peripherals issue
Effectiveness and efficiency of Helpdesk is important and is based on incident / problem
resolving capacity of helpdesk personnel.
Levels of Help desk support - There are following types of help desk support categories
available, either through a call centre or in-house help desk facility -
Level 0 Helpdesk – Mostly, Level 0 support is automated and self-service type of support,
wherein a user can solve the problem him/herself. Self-services such password/s resetting fall
in this category of help desk.
Level 1 Helpdesk – Level 1 support is given for other basic services such as configuration
changes, troubleshooting. Users can talk to helpdesk personnel related to issues such as
password reset support, email support, internet support, DBMS support, ERP support and
other application or software level support. If helpdesk personnel is unable to resolve the
issue, then the issue is escalated to the next level i.e. Level 2. Level 1 support is considered
as “first aid” support
Level 2 Helpdesk – Level 2 support is provided by supervisory staff of Level 1 personnel, for
escalated issues such as advance troubleshooting and installation of computing devices or
software. Sometimes, users may be given support by taking remote access of user’s systems.
Most of the user’s problems are solved at this level, however, if a user issue cannot be solved
even at this level, then it is escalated to the next level i.e. Level 3.
30
Information Systems Operations
Level 3 Helpdesk – Level 3 support is next level of advanced trouble shooting. If an incident
is not solved and gets elevated to this level, it is considered as a “Problem” and resolution
may require substantial changes to the system. Change management process may be invoked
for this level of support. If the problem of a user is not resolved even at this level, then in such
cases, help is required from the devices manufacturer or system developer. The issue is, then,
escalated to Level 4.
Level 4 Helpdesk – Level 4 support is generally given by the device manufacturer or system
developer. If an issue has come to this level, it may be required to be resolved by launching a
new release or version of the device or product.
2.11 Summary
In this chapter, we discussed Information system operations and challenges faced by the
31
Background Material on Information Systems Audit 3.0 Course (Module 4)
References
NIST – National Institute of Standards and Technology - USA
ISACA – Information System Audit and Control Association - USA
ISC2 – The International Information System Security Certification Consortium
DISA manual 2.0
2.12 Questions
1. Why should organizations want to manage logs?
A. To be informed when something unusual happens involving a system or
application
B. To be able to do take action in response to a security event
C. To keep a record of all the responses to security events
D. All of the above
2. When implementing a log management program, it's BEST to start with:
A. Technology from a trusted vendor
B. The same program and process that organizations with similar business are
using
C. List of top-three vendors from a published report
D. A careful review of the organization's log management and reporting needs
3. The security principle of least privilege is:
A. The practice of limiting permissions to the minimal level that will allow users to
perform their jobs.
B. The practice of increasing permissions to a level that will allow users to perform
their jobs and those of their supervisor.
C. The practice of limiting permissions to a level that will allow users to perform their
jobs and those of their immediate colleagues.
32
Information Systems Operations
D. The practice of increasing permissions to a level that will allow users to use the
cloud services of their choice in order to get their jobs done more quickly.
4. Why does privilege creep pose a security risk?
A. Users privileges don't match their job or role and responsibilities.
B. Because with more privileges there are more responsibilities.
C. Users have more privileges than they need and may use them to perform actions
outside of their job description.
D. Auditors may question about a mismatch between an individual's responsibilities
and their privileges and access rights.
5. Software Configuration management is the discipline for systematically
controlling
A. Changes due to the evolution of work products as the project progresses
B. The changes required due to defects being found which are to be fixed
C. Changes necessary due to change in requirements
D. All of the above
6. Which of the following is the top priority that, companies planning to implement
an asset management system should examine?
A. The visual appeal of websites, internal search pages and marketing collateral
B. Number of videos, audio files and other multimedia assets available
C. Specific data needs and the business problems to be solved
D. All of the above
7. Self-service assistance to users provided by help-desk such as resetting
passwords etc. is considered which level of assistance?
A. Level 4
B. Level 0
C. Level 2
D. Level 1
8. During development of a software system, which of the following will be used to
maintain software integrity?
A. Configuration Management
33
Background Material on Information Systems Audit 3.0 Course (Module 4)
B. Version Control
C. Change Management
D. None of the above
9. Who of the following would approve or reject major changes in configuration?
A. Management
B. Change control board
C. User
D. System Administrator
10. A transaction in a database management system should be atomic in nature. An
Atomic Transaction is:
A. Transaction should be submitted by a user
B. Transaction should be either completed or not completed at all
C. Transaction should fail
D. Transaction can be in-between fail and complete
35
Chapter 3
Software Operations & Management
Learning Objectives
In this chapter, students will learn about importance and functions of System Software,
operating system, application software, data and database management system. Students will
also learn about testing of software, what is meant by network services, what is meant by
(software) patch management and about backup system.
Basic understanding of all these systems and services is introduced, so that, as an IS Auditor,
a student will not find difficulties in their application in conducting audits.
System
Software
User
Hardware
Application
Software
37
Background Material on Information Systems Audit 3.0 Course (Module 4)
programs and act as an intermediary between a user of a computer and the computer
hardware. OS is a type of system software, that manages computer hardware as well as
providing an environment for application programs to run. Examples of operating system (OS)
are as follows Windows, Unix, Linux, iOS etc
The objectives of OS are as follows -
Process Management (Processor Management)
Memory Management
File Management
I/O-System Management
Secondary storage Management
Networking
Protection System
Command-Interpreter System or GUI
38
Information Systems Operations
Email Internet
OS
MS OFFICE
ERP
Tally
39
Background Material on Information Systems Audit 3.0 Course (Module 4)
40
Information Systems Operations
start with, but since s/he is knowledgeable about internal working of the software, proceeds to
White Box testing.
2. Black Box Testing: Black box testing is a functional testing. It means that, tester does
not know the internal structure of the software. Tester submits input to the software and
expects specified output. S/he does not look “through” the software.
3. Grey Box Testing: In Grey box testing, tester is partially knowledgeable about the
internal structure of the software. S/he, therefore, performs both Black Box and to some extent
White Box (not fully) testing.
41
Background Material on Information Systems Audit 3.0 Course (Module 4)
Categories of maintenance
Software has various category of maintenance. Following are the categories of software
maintenance –
1. Preventive Maintenance: Preventive maintenance is a proactive approach. Software
developer may do preventive maintenance since they know design and/or programming level
shortcomings.
2. Corrective Maintenance: Corrective maintenance is reactive approach. When a defect
or error arises in working of a software, corrective measure is taken by making changes to
program/s. User department may face a down time in some situations.
3. Adaptive Maintenance: Adaptability I making software suitable for new environment,
especially, upgraded hardware and operating system. Software adapts to new environment
due to this type of maintenance activity.
4. Perfective Maintenance: Here again, it may be a proactive approach. Software
developers on their own may keep on changing the software and releasing new versions for
betterment of functionality and security. The following changes may be done as a perfective
maintenance –
a. Making alteration for betterment
b. Fast processing
c. Addition of features,
42
Information Systems Operations
d. Portability
e. Scalability
f. Agile
g. Well documentation
i. Security enhancement
Challenges of Maintenance
Organisations usually face the following challenges of software maintenance –
1. Job Change: Due to high manpower turnover in software industry, software
maintenance may become difficult, since the set of programmers who originally developed the
software may not be available and new developers may take time to understand work done by
original developers.
2. Structure of the software: Software development is not a yet stable and structured
similar to other industry (e.g. engineering, chemicals etc). This poses hurdles in maintenance
because developed programs may be person(programmer)-dependent.
3. Understanding of Scope of Work: If requirements gathering (of software) is not done
43
Background Material on Information Systems Audit 3.0 Course (Module 4)
correctly and in an atomic (lowest possible level) manner with users, then software may not
work as desired. Users start adding even some basic missing functionality features during
maintenance phase. This poses problems in software maintenance. Software baselining
should be done along with user department to avoid such situations.
4. Scalability issue: Scalability of a software is it’s adaptability to growing requirements
of business. It may be expected that, the software should be capable to expanding business
and technical situations. E.g. faster or enhanced hardware
44
Information Systems Operations
DBMS
Database
Figure – 4.3.4
2. Schema – Schema is the organisation of data in a database. Schema is also the design
of a database. Schema is of 3 types as follows –
i. Physical Schema – The design of data stored in the database on a secondary storage
is called as Physical Schema.
ii. Conceptual Schema – Conceptual schema is the logical design of the database into
rows and columns. This conceptual schema is is mapped to the physical schema. This
schema is used by database designers, DBAs and programmers in software
development.
iii. External Schema – External schema is how a user views the database at user level.
This schema is used to interact with the users.
3. Tables − Database Management System uses table (Refer figure – 4.3.5) to arrange
data of the database. Tables are also called relations. Table has rows and column. Each row
represents a record, while each column represents field or attribute. Each record in the table
has a definitive attribute and that is called tuple.
45
Background Material on Information Systems Audit 3.0 Course (Module 4)
1 Ajinkya 49 50 Rows
2 Aadu 47 50
Tuple
3 Cherry 42 45
Figure -4.3.5
6. Keys – In an RDBMS, a Primary Key is column/s which can uniquely identify a
record(tuple) in a database table. In figure - 4.3.5, attribute student cannot have uniqueness –
there may be more than one Ajinkya. Therefore, we need an additional column as Roleno,
which can be unique and becomes a Primary Key. help a DBMS user to uniquely identify
Ajinkya with his marks. Similarly, refer Fig 4.3.6. Can you identify the Primary Key?
7322 Aadu GM
5899 Shini GM
7254 Ajinkya ED
8944 Ajinkya ED
Figure -4.3.6
46
Information Systems Operations
Dept_Code Dept_Name
01 Human Resources
02 Accounts
03 Marketing
04 Purchase
Figure -4.3.6-a
7. Isolation of data and application – Data isolation is possible in an RDBMS because
the conceptual(logical) schema cannot be seen by database designer or DBA or programmer.
It is internally mapped to physical schema by RDBMS software.
8. Normalization – Normalisation Normalisation is a record-design technique developed
by Dr Codd to avoid certain design anomalies. It is a process of breaking down a table into
more tables until the other columns in the table are dependent only on the key/s columns of
the table.
47
Background Material on Information Systems Audit 3.0 Course (Module 4)
48
Information Systems Operations
14. Security − RDBMS provides various ways, through which security can be ensured.
These are –
i. Multiple views – for access controls or restricting access of user only to specific
columns
ii. Key Reference – uniqueness and referential integrity
iii. ACID Test – for ensuring using transactions in correct manner
iv. Data Integrity
Other related security controls which are important are given below –
i. Strong and Multifactor authentication
ii. Segregation of web server and RDBMS server
iii. Encrypted data in database
iv. Use of Web application Firewall to restrict some attacks which are targeted at RDBMS
v. Patching of RDBMS application regularly
vi Audit logging of RDBMS
Structured Query Language (SQL) – Structured Query Language or SQL is a programming
language of RDBM.S.
Programmers use SQL and embed them in application programs. SQL commands work on
RDBMS and can insert, update or delete record/s in RDBMS tables. Data can be fetched with
the help of “Select” command. There are 3 components of SQL or RDBMS programming
language. They are – Data Definition Language - DDL, Data Control Language DCL, Data
Manipulation (i.e. changing data in official manner) Language – DML. E.g.
DDL – Create table, Drop table, Alter table
DCL – Grant access or Revoke access
DML – 4 commands Insert, Update, Delete, Select records in a table
Figure 4.3.7
49
Background Material on Information Systems Audit 3.0 Course (Module 4)
SQL is widely accepted and the most popular due to the following advantages −
System Architecture – So far, we have discussed various components of a system. Let us
see how they are linked to each other in today’s Information Technology.
User is connected to web site which runs on a web server. This is known as front-end of the
system. It is also known as Presentation Tier or Public facing tier.
Web server is connected to an Application Server. This is known as Business Tier or Logic
Tier. Application server processes users’ requests by taking input/s and data from database.
Application Server is connected to a Database Server (generally, RDBMS), which stores all
the data of users and even temporary data.
Thus, today’s systems are 3-tier architecture system, unlike past trend of single tier or 2 tier
architecture, as shown in the following Fig. Some bigger organisations may use additional
tiers such as Transaction servers, message queuing servers etc, which are in between tiers.
Therefore, sometimes, it is referred to as n-tier architecture.
Presentation Tier
Application Tier
Database Tier
Figure – 4.3.8
50
Information Systems Operations
iii. Metropolitan Area Network (MAN) – Network of computers in a metropolitan area such
as a city
iv. Personal Area Network (PAN) – network of computers of a personal workspace
v. Storage area Network (SAN) – For storing large amount of data
vi. Virtual Private Network (VPN)
Network Services - The Defence Advanced Research Projects Agency (DARPA) of USA
designed and proposed Transmission Control Protocol/Internet Protocol. Open Standard
Interconnect OSI of International Standards Organisation (ISO) is also another conceptual
protocol which was proposed. TCP/IP protocol is given in the following. (Figure – 4.3.9)
Application Layer
Transport Layer
Internet Layer
Link Layer
Figure – 4.3.9
A user who is using an Application Software, submits his/her data to be sent to another
connected computer. This data is taken and broken down into packets by the Application
Layer of TCP/IP and moved downward through other layers, packet by packet.
Application layer packets are taken by Transport Layer (TCP) and are sent to the next layer
which is IP. TCP layer assures data delivery to the final receiver by taking acknowledgement
of each data packet.
Internet Layer (IP and other routing protocol) provides a correct path to the packets by routing
them through network of devices such as switches, routers, servers etc. This is done by
51
Background Material on Information Systems Audit 3.0 Course (Module 4)
sending data packets to next device’s IP address. However, before it packets can be sent to
next device, IP gives the data packets to the Link Layer.
Finally, the Link layer comes into picture when packets are sent on the wire. Link layer
converts the packets into bits and puts them on wire (copper wire or fibre optic etc) or through
air, by using Ethernet protocol.
When packets finally reach the destination, they are assembled back into data and are given
to the application software of the final receiver. The packets go through reverse journey from
Link Layer to IP to TCP and then to Application Layer.
Some known network services in an organisation are –
1. Internet Services – Most of the organisations provide Internet services to their users
through their web sites. The Internet setup in an organisation can be depicted as in the figure
4.3.10.
Network Address
User Translation (NAT)
on Private Public
LAN Address Address Router
Figure 4.3.10
Internet service in homes is usually through a broadband network. Service provider provides a
broadband router and we can connect our devices (such as PCs, laptops, mobile phones) to
Internet. In organisations, however, service provider provides leased telephone lines or MPLS
(Multi Protocol Label Switching) lines through organisation users connect to Internet or
application servers.
2. DNS service – When Internet was new, users were connecting t a web site by typing
web site’s IP address in the browser. E.g. http://9.9.9.9. However, as Internet grew, it was
difficult for users to remember IP addresses. Therefore, a DNS (Domain System Service)
server was introduced, which stores in a database, name of all web sites and their respective
IP addresses. When a user types a URL (Uniform Resource Locator) – e.g.
http://anywebsite.com, then DNS server provides the IP address of the website and then
browser connects to that IP address.
52
Information Systems Operations
3. An E-mail service – Organisations reserve a domain name/s to launch a web site. This
reservation of domain name and actually hosting a web site is generally done through a
service provider. The Internet service provider also provides a domain for e-mail service.
Organisations can take multiple e-mail domains and reserve specific domains for specific
purpose. Employee are given a common domain, as per e-mail policy of the organisation.
Email server is needs to be setup with smtp (Simple Mail Transfer Protocol) service for
outgoing mails. IMAP (Internet Message Access Protocol) or POP3(Post Office Protocol
version 3) can be used for incoming emails. Refer Figure - 4.3.11.
POP3
Internet
IMAP
SMTP
Server
Webmail
Figure - 4.3.11
Users connect to email server and access their email through a client software such as
Outlook.
i. POP3 Client – POP3 client is Post Office Protocol used to receive incoming emails. In
the POP3, when a user connects through a client software (such as Outlook) to mail
server, the incoming mails are downloaded from the server. In this protocol, all the
emails, once downloaded are deleted from the server.
ii. IMAP – IMAP client is based on Internet Message Access protocol. It is also used for
incoming mails. Similar to POP3, a user connects through a client software to email
server and downloads incoming mails. However, in this protocol, mails are retained on
the server, even after they are downloaded.
iii. Webmail – Webmail is for the email access over the internet browser.
4. Web service – Organisations can establish integration of web application with another
organisation. This is done through launching a web service with the help of API (Application
Programming Interface). E.g. an aggregator for booking airline or railway reservation,
establishes connectivity to all airlines and railway’s web sites through web services and API.
Customers can connect to aggregator’s web site and book tickets rather than going to
individual web site of airlines.
5. Directory Services – When organisations need to control all the desktops, laptops or
other computing devices, resources and provide proper authentication and security, they
53
Background Material on Information Systems Audit 3.0 Course (Module 4)
implement directory services. Microsoft Active Directory, Sun Microsystem’s iPlanet Directory
services and Novell’s eDirectory, are some popular solutions available for such controlled
access.
6. Print services – Print server runs print service to make a pool of network printers
installed in the organisation. Print server allows authenticated users to connect, either by the
print server itself or get authenticated by directory services.
Print server installation enables an organisation to enforce printing policy for controlling
printing to be done on various printers. Print server also provides monitoring of print jobs and
provides statistics related to it.
7. DBMS Service – DBMS or database management services is already discussed in
section 3.6 of this chapter in detail. DBMS provides efficient and smooth process of data
storage and retrieval.
8. Video Conferencing – Many organisations have established video conferencing
facilities to connect and have video meetings for branches, regional offices with head office or
corporate office, with senior management people. Travelling time and cost can be reduced
substantially with the help of well organised video conferencing facility. With increasing
bandwidth facilities, at reducing costs, provided by service providers and improved
telecommunication technologies, video conferencing can be wide spread and can also be
used by small and medium enterprises.
54
Information Systems Operations
system logs and system configuration files etc. are critical in nature and need to be backed up
on priority basis.
3. Backup Frequency – How frequently a backup should be taken, also needs to be
defined. E.g. critical data may be backed up every day, every hour or immediately (known as
mirroring of data).
4. Backup Storage Location – Backup should be stored safely and securely preferably at
a separate geographic location. Another copy of the backup can be kept near the primary site,
so that if needed, it can be easily procured.
5. Backup Retention Period – Backup policy decides how long backup/s should be
retained. After the retention period, the backup is either destroyed securely or it is archived
and then destroyed securely.
6. Testing – Backup needs to be tested regularly so that when needed it can be correctly
restored. Organisations setup separate systems for restoring backup data and test it for
correctness of restoration.
7. Training – Not all data will be backed by IT Department. Users may have their
important data stored in their laptops or desktops. It is the user’s responsibility to backup this
data. Therefore, adequate training must be provided to the users about backup policy and
backup system. IT personnel also needs training on backup policy and backup procedures.
8. Tape Control – Many organisations use magnetic tapes for backing up of data. Some
large organisations have very high number of tapes and may require a tape library
management system. This system allows automated tape backup, management and
restoration of data on tapes.
Backup methods
Organisations use special backup software for taking and restoring backup of data. This
software generally provides 4 types of backup methods, which are explained below –
1. A full backup – Any backup strategy should start with a full or normal backup for the
first backup. Full backup backs up all the data selected for backup. Many system
administrators always take full backup of data as it is safer. However, taking full backup all the
time has following drawbacks –
i. Full back up consumes lot of storage on media.
ii. Reduced disk life (due repeated overwriting)
iii. Increased back up cost since many tapes are required
iv. Longer time is required for full back up
v. Inefficient method if there is a very small change in data
55
Background Material on Information Systems Audit 3.0 Course (Module 4)
2. Incremental Backup – Incremental backup is backup of changes only done to the data.
Every incremental backup is stored on the media as a separate data. Following figure
illustrates incremental backup –
To start with, full backup is taken on Monday. On subsequent days, only incremental backup is
taken. Thus, we have, on backup media, 5 copies for each day plus full backup of Monday. If
on next Monday, it is required to restore the backup, we will have to restore all these backups
i.e. full backup plus incremental backup of Tuesday through Saturday. If any of the
incremental backup or full backup is unavailable, we will not be able to restore the backup
56
Information Systems Operations
4. Virtual Full Backups – This type of backup is a synchronised backup, wherein first
time a full backup is taken and subsequently whenever change takes place, the backup is
synchronised for the changes.
Benefit of Patching
Patching helps achieving following benefits -
1. Risk Mitigation – Patching mitigates security risks related to viruses, Trojans, and
other security flaws which were inadvertently present in the software. Software developers are
continuously improving their software for functionality, security, bugs removal etc.
57
Background Material on Information Systems Audit 3.0 Course (Module 4)
3.10 Summary
In this chapter, we discussed various types of software such as system software, application
software and operating systems and their interfaces.
We also discussed importance of software testing and different types of testing which are
used in organisations.
We discussed about Database Management System (DBMS), especially most commonly used
RDBMS RDBMS is an important backbone of every computer system and we looked into a few
details about RDBMS such as schemas, SQL commands etc.
We then discussed today’s networking and linkage between users and software systems.
In the end, we discussed about backup and patch management systems and their importance
to organisations.
References
ISC2 - The International Information System Security Certification Consortium
ISO 22301:2012 - Business Continuity Standard
NIST – National Institute of Standards and Technology - USA
ISACA – Information System Audit and Control Association - USA
DISA Manual 2.0
3.11 Questions
1. The main focus of acceptance testing is
A. Ensuring that the system is acceptable to management
B. Accepting errors & bugs in the system
58
Information Systems Operations
59
Background Material on Information Systems Audit 3.0 Course (Module 4)
C. SQL
D. Foreign key
7. Database normalization is
A. Data redundancy optimization
B. Data logging and accountability
C. Streamlining data process
D. Deleting temporary files
8. Which of the following is NOT a property of database transactions?
A. Consistency
B. Atomicity
C. Insulation
D. Durability
9. After discovering a security vulnerability in a third-party application that
interfaces with several external systems, a patch is applied to a significant
number of modules. Which of the following tests should an IS auditor
recommend?
A. Stress
B. Black box
C. Interface
D. System
10. An organization has recently installed a security patch, which crashed the
production server. To minimize the probability of this occurring again, an IS
auditor should:
A. Apply the patch according to the patch's release notes.
B. Ensure that a good change management process is in place.
C. Thoroughly test the patch before sending it to production.
D. Approve the patch after doing a risk assessment.
60
Information Systems Operations
61
Background Material on Information Systems Audit 3.0 Course (Module 4)
62
Chapter 4
Incident Response and Management
Learning Objectives
Students will learn about what is a normal working and what is an incident. Incidents may
occur due to natural causes such as earthquake or man-made such as virus, cyber attack etc.
Incident response and management is important so that they can be reduced in future. This
chapter deals only with man-made incidences.
We will learn what is Incident handling & response, how to build an effective Incident response
capability, different phases of building Incident response capability, steps to build each phase
of Incident response capability. Benefits of Incident response capability, Security Operations
Centre, what are SIEM (Security Incident & Event Management) tools, deployment of SIEM
tools and utility of SIEM tools.
Organisations need to prepare themselves for handling and responding to these types of
incidents in an efficient and consistence manner. Organisations need resources, planning and
systematic preparation in this regard. Organisations usually face lot of challenges such as -
1. Identification of IT assets are susceptible to cyber incident.
2. Identification of an incident.
3. Objective Analysis of incidents
4. Need to scan through bulk of Information and logs
5. Criteria for zeroing on an incident
6. Identification of IT assets actually damaged due to incident/s
7. Identification of loss of data
8. Tracing out the Source of incident
9. Brainstorming for Modus Operandi
10. Impact Analysis
11. Forensic Investigation of incident and collecting evidence
12. Fixing the responsibility
Preparatio
Documentation Identification
Follow up
Containment
Recovery
Eradication
Figure -4.4.1
1B. Technical Preparation
i. Risk assessment and Risk Management
ii. Data Classification
iii. Assessment of Confidentiality, Integrity and availability of Data
iv. Technology Infrastructure
v. Dependency on certain technology providers, developers etc
vi. Controls
vii. Possible vulnerabilities
viii. Cyber Threats
ix. Cyber security posture
x. Possible source/s of threat/s
65
Background Material on Information Systems Audit 3.0 Course (Module 4)
2. Identification - The organisation should identify an incident and then take action
accordingly. Most organisations usually fail to properly identify incident/s and unnecessarily
engage manpower and other resources.
Challenges in incident identification are –
i. Knowing that incident is happened or happening
ii. Analysis of data (which may be large) associated with the incident
iii. Declaring an incident
iv. Correctly describing details about the incident
With skills, experience, tools and technology, this difficult task of identifying an incident can be
handled by Incident Response Team.
With Technology and other tools (which sometimes are in-built into the cyber security
equipment and software), an Incident Response Team can do the following -
a. Notice any suspicious events. Sometimes, with the help of outsourced support.
b. Alerts are generated by SIEM (Security Incidents & Event Management System), DLP
(Data Leakage Prevention), IPS/IDS (Intrusion Prevention System/ Intrusion Detection
System) and firewall.
c. Generate cyber-security Audit reports
d. Resolve anomalies reported by SOC (Security Operations Centre)
Incidents can be analysed as given below –
i. Time of occurrence of an incident
ii. How was it detected i.e. either by alert or by IT team or observing anomalies etc.
iii. What impact it is going to have on IT asset
iv. Source of this incident
3. Containment – After the identification of an incident and analysing the same, , the next
job of incident response team shall be containment of the impact of the incident. This involves
isolation of the victimised system and not allowing the incident to spread across many
systems. This should be done promptly. Performance of incident response team can be
judged by how quickly an incident is identified and contained by the team.
Containment can be done in one or more of the following ways –
i. Terminating all sessions of users logged in as well as other sessions
ii. Blocking the source of incident
66
Incident Response and Management
iii. Block the Socket (Socket is entry point i.e. Ip address + porttcp) component of incident
iv. Changing of Administrator or root password
4. Eradication – After the containment of incident, another process which is important is
eradication. Even after the containment, the infected system may still be active with malware
and may spread to other systems.
After containment and isolation of the infected system, eradication activities will start,
consisting of –
i. Marking of infected system
ii. Disconnection from the network
iii. Copying logs manually to a USB drive
iv. Malware/Trojan/Bot etc need to be analysed
v. Disable the infected accounts of Users
vi. Disable carrier ports
vii. Collect the evidence
viii. Clean the system
ix. Re-Scan the system
5. Recovery – After eradication process, the next step in incident response is recovery of
systems, data, software and connectivity. In the recovery process incident response team has
to assure that, the system performance shall be normal i.e. no deviation, all the risks are
mitigated with necessary controls such as patching, antivirus updating, optimisation of ports
and services. The following activities are done for the recovery process –
i. Reconnection of the network of the isolated system
ii. All controls restored
iii. Re-Loading Operating system, applications, antivirus
iv. Re-configuring the part of the infected system
v. Infected files/folders need to be replaced
vi. All disabled accounts of users need to be restored
vii. All logs are directed to SOC again
viii. Check the integrity of the system
ix. Scan the system
67
Background Material on Information Systems Audit 3.0 Course (Module 4)
68
Incident Response and Management
concerned. Therefore, many regulators in India, especially banking sector regulator like
Reserve Bank of India (RBI) and Govt of India have initiated providing guidelines for
developing Cyber Security Framework for various organisations.
India’s National Security Policy 2013 - The National Cyber-Security Policy 2013 was
released on July 2, 2013 by the Government of India. Some of the important parts of the policy
are mentioned here from the policy itself.
Policy Objectives
1. To create a secure cyber ecosystem in the country, generate adequate trust &
confidence in IT systems and transactions in cyberspace and thereby enhance adoption
of IT in all sectors of the economy.
2. To create an assurance framework for design of security policies and for promotion and
enabling actions for compliance to global security standards and best practices by way
of conformity assessment (product, process, technology & people).
3. To strengthen the Regulatory framework for ensuring a Secure Cyberspace ecosystem.
4. To enhance and create at National and Sectoral level, a 24 x 7 mechanism for obtaining
strategic information regarding threats to ICT (Information and Communication
Technology) infrastructure, creating scenarios for response, resolution and crisis
management through effective predictive, preventive, protective, response and recovery
actions.
5. To enhance the protection and resilience of Nation's critical information infrastructure by
operating a 24x7 National Critical information Infrastructure Protection Centre (NCIIPC)
and mandating security practices related to the design, acquisition, development, use
and operation of information resources.
6. To develop suitable indigenous security technologies through frontier technology
research, solution-oriented research, proof of concept, pilot development, transition,
diffusion and commercialisation leading to widespread deployment of secure ICT
products / processes in general and specifically for addressing National Security
requirements.
7. To improve visibility of the integrity of ICT products and services by establishing
infrastructure for testing & validation of security of such products.
8. To create a workforce of 500,000 professionals skilled in cyber security in the next 5
years through capacity building, skill development and training.
9. To provide fiscal benefits to businesses for adoption of standard security practices and
processes.
69
Background Material on Information Systems Audit 3.0 Course (Module 4)
10. To enable protection of information while in process, handling, storage & transit so as to
safeguard privacy of citizen's data and for reducing economic losses due to cyber-crime
or data theft.
11. To enable effective prevention, investigation and prosecution of cyber-crime and
enhancement of law enforcement capabilities through appropriate legislative
intervention.
12. To create a culture of cyber security and privacy enabling responsible user behaviour &
actions through an effective communication and promotion strategy.
13. To develop effective public private partnerships and collaborative engagements through
technical and operational cooperation and contribution for enhancing the security of
cyberspace.
14. To enhance global cooperation by promoting shared understanding and leveraging
relationships for furthering the cause of security of cyberspace.
Strategies
1. To designate a National nodal agency to coordinate all matters related to cyber security
in the country, with clearly defined roles & responsibilities.
2. To encourage all organizations, private and public to designate a member of senior
management, as Chief Information Security Officer (CISO), responsible for cyber
security efforts and initiatives.
3. To encourage all organizations to develop information security policies duly integrated
with their business plans and implement such policies as per international best
practices. Such policies should include establishing standards and mechanisms for
secure information flow (while in process, handling, storage & transit), crisis
management plan, proactive security posture assessment and forensically enabled
information infrastructure.
4. To ensure that all organizations earmark a specific budget for implementing cyber
security initiatives and for meeting emergency response arising out of cyber incidents.
5. To provide fiscal schemes and incentives to encourage entities to install, strengthen
and upgrade information infrastructure with respect to cyber security.
6. To prevent occurrence and recurrence of cyber incidents by way of incentives for
technology development, cyber security compliance and proactive actions.
7. To establish a mechanism for sharing information and for identifying and responding to
cyber security incidents and for cooperation in restoration efforts.
8. To encourage entities to adopt guidelines for procurement of trustworthy ICT products
70
Incident Response and Management
and provide for procurement of indigenously manufactured ICT products that have
security implications.
9. To promote adoption of global best practices in information security and compliance
and thereby enhance cyber security posture.
10. To create infrastructure for conformity assessment and certification of compliance to
cyber security best practices, standards and guidelines (Eg. ISO 27001 ISMS
certification, IS system audits, Penetration testing / Vulnerability assessment,
application security testing, web security testing).
11. To enable implementation of global security best practices in formal risk assessment
and risk management processes, business continuity management and cyber crisis
management plan by all entities within Government and in critical sectors, to reduce the
risk of disruption and improve the security posture.
12. To create National level systems, processes, structures and mechanisms to generate
necessary situational scenario of existing and potential cyber security threats and
enable timely information sharing for proactive, preventive and protective actions by
individual entities.
13. To operate a 24x7 National Level Computer Emergency Response Team (CERT-In) to
function as a Nodal Agency for coordination of all efforts for cyber security emergency
response and crisis management. CERT-In will function as an umbrella organization in
enabling creation and operationalization of sectorial CERTs as well as facilitating
communication and coordination actions in dealing with cyber crisis situations.
14. To operationalize 24x7 sectorial CERTs for all coordination and communication actions
within the respective sectors for effective incidence response & resolution and cyber
crisis management.
15. To implement Cyber Crisis Management Plan for dealing with cyber related incidents
impacting critical national processes or endangering public safety and security of the
Nation, by way of well-coordinated, multi-disciplinary approach at the National, Sectoral
as well as entity levels.
16. To conduct and facilitate regular cyber security drills & exercises at National, sectoral
and entity levels to enable assessment of the security posture and level of emergency
preparedness in resisting and dealing with cyber security incidents.
17. To mandate implementation of global security best practices, business continuity
management and cyber crisis management plan for all e-Governance initiatives in the
country, to reduce the risk of disruption and improve the security posture.
18. To encourage wider usage of Public Key Infrastructure (PKI) within Government for
trusted communication and transactions.
71
Background Material on Information Systems Audit 3.0 Course (Module 4)
72
Incident Response and Management
Figure – 4.4.2
A 24x7 monitoring team gets alerts generated by SIEM tool. The monitoring team checks
these alerts, with pre-set criteria for any deviation. If the monitoring team finds alerts qualify as
an incident, then, it declares the alert as an incident. The declared incident is sent to the
incident response team for further action, as mentioned in earlier.
A copy of incidents is also sent to team of investigators, who are “deep diving” in these
incidents. After completion of the investigation, investigators provide inputs to the cyber-
security team of the organisation for further action.
73
Background Material on Information Systems Audit 3.0 Course (Module 4)
SOC Characteristics
A professionally managed SOC must provide real time alerts and data for investigation, to
make organisation’s security posture current and relevant. A good SOC may have the
following the following characteristics -
i. Policy, Standards and Guidelines – Organisation must have a sound policy related to
the SOC and its activities. A good policy provides various suggestive steps for monitoring
teams and investigators.
ii. Top management support – SOC requires top management support and leadership
accountability by the top management. Top management should provide continuous support in
terms of investment, resources and people to the SOC. Top management should have SOC in
board meeting’s agenda. Top management should have a meeting at least once in a Quarter
with CISO (Chief Information Security Officer).
iii. Investment – SOC requires adequate investment, for 24x7 operations and performs
sophisticated security related operations. Investment may be for purchasing equipment,
devices, software etc (Capex) and day-to-day operational expenditure (Opex). Monthly or
yearly subscriptions to external intelligence knowledge-base and AMC cost of the equipment
needs to be considered for budgetary provisions.
iv. People – SOC requires two levels of employees. Level1 may be required in large
numbers working in shifts. They will be monitoring 24x7 with pre-set criteria of deviation to
identify and declare an alert as an incident.
Level 2 is of investigators, who will be doing deep analysis of alerts and incidents to find the
root cause of incidents and provide inputs to the cyber security team. This team should have
specialised skills in analysis and must be kept abreast about current security hazards and
resolution.
v. Process & Procedures – It is very important to have documented proper procedures
and guidelines for speedy identification and resolution of cyber security incidents. Processes
and procedures will be for start to end for Cyber Security Incident Management.
vi. Technology – With reference to figure-4.4.2, technology plays important role in
operations of SOC for Log Analysis, Network Analysis, Malware Analysis, Forensic Analysis,
Cryptosystems, signature database updates, packet filtering, packet inspection, data analytics
and reverse engineering systems.
Augmentation of technology is not a straight forward process and it takes the following steps
to acquire correct technology –
1. Preparing specifications for technology by SOC team
2. Discussions with various Vendors
74
Incident Response and Management
Log
IS SOC
Result
Figure 4.4.3
IS infrastructure, processes, people etc provide inputs to SOC operations, while reporting and
deep analysis by SOC provides valuable inputs to IS infrastructure.
viii. Analytics & Reporting - Today’s SOCs have to handle enormous data and establish
correlations in data so that a security incident can be identified and treated.
SOC can also use data analytics to create insightful metrics and performance measures. It
can use some metrics to facilitate operational improvements internally, while management can
75
Background Material on Information Systems Audit 3.0 Course (Module 4)
use others, to make more informed decisions for balancing the trade-offs between cost and
risks. Thus, a thoughtful metrics and reporting framework can add value beyond mere security
matters, helping business to achieve business objectives with the help of IT and cyber space.
ix. Physical Controls – SOC should also have general physical controls as well as some
specific physical controls. SOC, usually does not share the space with IT department or Data
Centre. SOCs are augmented with a different physical space with no sign boards of the
organisation. All necessary devices, equipment, hardware, software and team members are
not shared with IT department and Data Centre teams for low latency in response and working
in a closed environment.
x. Continuous Improvement – SOC is always under continuous monitoring of the
organisation for the necessary improvements in the following areas
a. Performance – in terms of identification of incidents and their speedy resolution
b. Efficiency – maximum benefits with optimum cost
c. People
d. Tools
e. Technology
f. Budget
Following actions should be taken for continuous improvement of SOC –
1. Periodic assessment of upgrading skills
2. 360-degree feedback of SOC from various stakeholders
3. Lessons learned by SOC team after every incident
4. Augmentation of new technology as per need
5. Budget provisions as needed
6. Top management support
Coordination Centre (CERT-CC). All countries in world should take copyright permission from
CERT-CC to open CERT in their country. For India it is CERT-In
Government of India, also emphasises the importance of cyber-security in the country and has
started CERT-In, which was operational in January 2004. CERT-in handles incidents within
India and reports for further action to main Cert. Every government, non-government, private
establishment should report incidents to CERT-in, so that, country develops a security posture
database and these incidents can be shared with all organisations, not only within India, but to
the entire world through CERT-CC. CERT-In, has been empowered through IT act 2008, for
the incident management in India. The section 70B of the IT Act 2008, is detailed as follows -
70 B Indian Computer Emergency Response Team to serve as national agency for
incident response
(1) The Central Government shall, by notification in the Official Gazette, appoint an agency
of the government to be called the Indian Computer Emergency Response Team.
(2) The Central Government shall provide the agency referred to in sub-section (1) with a
Director General and such other officers and employees as may be prescribed.
(3) The salary and allowances and terms and conditions of the Director General and other
officers and employees shall be such as may be prescribed.
(4) The Indian Computer Emergency Response Team shall serve as the national agency
for performing the following functions in the area of Cyber Security, -
(a) collection, analysis and dissemination of information on cyber incidents (b) forecast
and alerts of cyber security incidents (c) emergency measures for handling cyber
security incidents (d) Coordination of cyber incidents response activities (e) issue
guidelines, advisories, vulnerability notes and white papers relating to information
security practices, procedures, prevention, response and reporting of cyber incidents (f)
such other functions relating to cyber security as may be prescribed
(5) The manner of performing functions and duties of the agency referred to in sub-section
(1) shall be such as may be prescribed.
(6) For carrying out the provisions of sub-section (4), the agency referred to in sub-section
(1) may call for information and give direction to the service providers, intermediaries,
data centres, body corporate and any other person
(7) Any service provider, intermediaries, data centres, body corporate or person who fails
to provide the information called for or comply with the direction under sub-section (6),
shall be punishable with imprisonment for a term which may extend to one year or with
fine which may extend to one lakh rupees or with both.
(8) No Court shall take cognizance of any offence under this section, except on a complaint
made by an officer authorized in this behalf by the agency referred to in sub-section (1)
77
Background Material on Information Systems Audit 3.0 Course (Module 4)
4.2.3 Indian Banks – Centre for Analysis of Risks and Threat (IB-CART)
As discussed above, after CERT-In most of the organisations and financial sector also started
their CERT and started to report incidents to CERT-in. Banking sector CERT is started with
same functioning of USA ISAC (Information Sharing and Analysis Center). Some important
points from IB-CART are given below -
The Reserve Bank of India's Working Group on Information Security, Electronic Banking,
Technology Risk Management and Cyber Frauds states that "there is a need for a system of
information sharing akin to the functions performed by the Financial Services Information
Sharing Agency (FS-ISAC) in the US" and recommended that IDRBT set up a body like the
FS-ISAC that can enable the sharing of security events amongst banks.
Simultaneously, the National Security Council Secretariat also wanted such centres to be set
up in various critical sectors. As banks were well ahead in implementing information security
and IDRBT had already set up a CISO Forum for banks, the task of setting up this body for
information sharing was entrusted to IDRBT.
Accordingly, IDRBT has established the Indian Banks – Centre for Analysis of Risks and
Threats (IB-CART) in March 2014. This is the first such centre for the country and has become
a model for other critical sectors. The key objectives of the IB-CART are:
— To disseminate and foster the sharing of relevant and actionable threat information
among members to ensure the continued public confidence in the banking sector. IB-
CART will share and disseminate information associated with physical and cyber events
(incidents / threats / vulnerabilities) and resolution or solutions associated with the
bank's critical infrastructures and technologies.
— Utilise the sectors' resources (people, process, and technology) to aid the entire sector
with situational awareness and advance warning of new physical and cyber security
events and challenges.
— Enable infrastructure that enables anonymity and security while capturing and
disseminating information.
— Conduct research and intelligence gathering to alert the members of evolving or existing
events
— Support the development of content that is posted to the IB-CART database, advice on
mitigation steps or best practices to members
— Facilitate cross sector information exchange.
Since its establishment, the IB-CART has played a pivotal role in creating a platform to
develop safety nets to contain(limit) cyber-attacks. It has been constantly engaging with the IT
executives of banks to resolve security concerns of the banking sector. The IB-CART team
78
Incident Response and Management
also performs cyber drills regularly to help banks strengthen their incident management
process.
The IB-CART now has more than 90 users from over 60 public, private and foreign banks in
India. The IB-CART advisory council has 9 members with representation from public and
private sector banks and CERT-IN.
79
Background Material on Information Systems Audit 3.0 Course (Module 4)
sizing of devices which it can cater and the other side of providing output such as alerts,
reports and correlated files.
b. Security: Logs provide the information related to all events of the activities performed
by the devices and equipment. The events usually indicate the vulnerability in the
system and possible development of threats. It is very difficult for SOC team to read
logs of thousands, of devices installed in an organisation.
SIEM tool collects logs from all these thousands of devices, arranges them in a
common format, assesses them, correlates them and then develops the security
posture of the IS infrastructure of the organisation. The security posture is provided to
cyber security team of the organisation as a feedback. The cyber security team takes
necessary action by taking corrective and preventive actions.
c. Compliance –SIEM provided auto generated reports related to security posture of an
organisation can be taken up for audits. Auditors should be able use the reports of
SIEM tool. For the compliance purpose auditee must ensure the following, as per SIEM
deployment in the SOC –
a. Asset list maintained in a company vis-a-vis asset that SIEM is monitoring
b. Scope of work
c. Logs and events
d. SOC detail processes
e. Security posture database
f. Reporting
g. Latency in conversion of alert into incident
ii. Use case details – A use case provides details about laid down procedure/s to
interface a device. As discussed, SIEM tool has two interfaces as shown in figure - 4.4.4
SIEM
IS Infrastructure Report
Figure - 4.4.4
The use case for IS infrastructure related to logs and correlation at one side while reports and
investigation etc on the other.
iii. Installation of SIEM – The IS Infrastructure of the organisation is consisting of various
devices, equipment such as Servers, Computers, Databases, applications and network
equipment like routers, switches, controllers etc. These equipment and devices generate logs
80
Incident Response and Management
of their activity. Logs are very important for security. Logs provides the information related to
all events of the activities performed by the devices and equipment.
SIEM has various components which are used to perform various activities like collection of
logs, arrangement of logs in a common format and correlation. Please refer to figure - 4.4.5.
The components of SIEM are as follows -
a. Agents – All the devices in the IS Infrastructure need to be installed with an agent of
SIEM tool. An agent is a software to collect logs from the device and send them to
collector of the SIEM tool. These agents can be configured remotely from centrl SIEM
tool.
Agents only collect those logs for which they are configured. They can also be used to
filter out some events based on pre-set criteria. An agent is supposed to normalise the
logs, so that no redundant information reaches to central SIEM tool. Agents, after
filtering and normalisation send the logs to the collector of SIEM over a secure
encrypted connection.
b. Collectors – Collector application collects logs from the agents and does further
normalisation and any pre-set filtering criteria. SIEM may be a standalone application
separated from the SIEM or an inbuilt feature of the same.
Collector
External Intelligence
SIEM Application
Figure-4.4.5
c. SIEM Core – The SIEM core is the logic of the SIEM, which is composed of multiple
software. It collects all the events and logs from the collector and also collects input
81
Background Material on Information Systems Audit 3.0 Course (Module 4)
from the external intelligence from the outside world continuously. SIEM Core does
processing which are under the scope of the SOC for operations, security and
compliance. SIEM core handles the following areas -
1. Risk Assessment for IS infrastructure
2. Correlation of events collected by the collector and external intelligence
3. Any Deviation in normal operations of IS Infrastructure
4. Data Mining & Data Analysis
5. Real-Time Monitoring and alerts
6. Cyber Security posture
7. Correlated data for Forensic & Investigation
8. Reports
4.4 Summary
In this chapter, we discussed about cyber security incidents and how to deal with them.
Incident Management needs to be established by organisations to correctly handle cyber
security incidents and reap benefits of cyber space. Senior management should support
security and incidents handling by setting up policies, procedures and giving adequate
resources and training to employees.
We also discussed about how SOC and SIEM can help in handling incidents and taking
82
Incident Response and Management
preventive and corrective actions on them. Whole Cyber world is under threat from various
security hazards, and CERT is taking efforts in successfully tackling these threats and India is
also contributing.
We learned, in brief, operations of SOC and about SIEM tool and how they help in fighiting
security hazards.
References
ISO 27035:2013
CSIRT- CMU
CERT-In
www.rbi.org.in
IT Act 2008
4.5 Questions
1. Basic operation of the SIEM tools, on the logs collected from the devices is
A. Correlating the log
B. Collecting the log
C. Analysing the log
D. Live Correlating the log
2. Which of the following is not a part of SIEM tools?
A. Sensor
B. Collector
C. Agent
D. Log
3. Which one is not the part of SIEM application?
A. Risk assessment
B. Vulnerability Scanning
C. Real time monitoring
D. Normalization
4. How does a SIEM tool handle the issue of Completeness of log?
83
Background Material on Information Systems Audit 3.0 Course (Module 4)
A. Encryption
B. Hashing
C. Digital Signing
D. Time stamping
5. The computer security incident response team (CSIRT) of an organization
publishes detailed descriptions of recent threats. An IS auditor's GREATEST
concern should be that the users may:
A. Use this information to launch attacks
B. Forward the security alert
C. Implement individual solutions
D. Fail to understand the threat
6. The main goal of Security Operation Centre (SOC) is
A. Detect, analyse and report
B. Detect, analyse and respond
C. Collect, analyse and report
D. Collect, analyse and respond
7. What is the primary purpose of an incident management program?
A. Identify and assess incidents
B. Conduct lessons learned sessions
C. Alert key individuals
D. Assign responsibility
8. SOC shall be ineffective without the support of –
A. Risk
B. Budget
C. Top management
D. Quality
9. Phases of an incident management program
A. Prepare, Respond, and follow up
B. Plan, prepare, and respond
84
Incident Response and Management
85
Background Material on Information Systems Audit 3.0 Course (Module 4)
disseminate recent threats, security guidelines and security updates to the users to
assist them in understanding the security risk of errors and omissions. However, this
introduces the risk that the users may use this information to launch attacks, directly or
indirectly. An IS auditor should ensure that the CSIRT is actively involved with users to
assist them in mitigation of risk arising from security failures and to prevent additional
security incidents resulting from the same threat. Option B Forwarding the security alert
is not harmful to the organization. Option C Implementing individual solutions is unlikely
and inefficient, but not a serious risk. Option D Users failing to understand the threat
would not be a serious concern.
6. The correct answer is B
A Security Operation Centre (SOC) is a centralized function within an organization
employing people, processes, and technology to continuously monitor and improve an
organization's security posture while preventing, detecting, analyzing, and responding
to security incidents. Reporting is not the part of SOC.
7. The correct answer is A
Incident Response Management Program aims to manage the lifecycle of all Incidents
(unplanned interruptions or reductions in quality of IT services). The primary objective of
this program is to identify, assess, analyze, and correct the incidents to prevent a future
re-occurrence and to make available the IT service to users as quickly as possible.
8. The correct answer is C
Without clear executive support, a SOC may be ineffective, and its value will not be
realized. Creating an effective SOC requires support to establish a clear mandate for
the SOC and a long-term strategy, and also a strong SOC leader to drive organizational
change and develop a culture of security. The SOC leader shall take care of Risks and
Quality.
9. The correct answer is A
Incident response program can be broken down into four broad phases: (1) Preparation;
(2) Detection and Analysis; (3) Containment, Eradication, and Recovery; and (4) Post-
Event Activity. Hence Option A Prepare, Respond, and follow up, are in correct order.
Options B, C and D are incomplete.
10. The correct answer is B
When a breach is first discovered, in the containment phase, the Incident Response
team after having gathered the information and gained an understanding of the incident,
will begin to combat the threat by taking actions to prevent further damage, such as
closing ports or blocking IPs. Hence Option B is the correct answer.
86
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
ISA Background Material
ISA
ISBN - 978-81-8441-995-5
INFORMATION SYSTEMS
AUDIT 3.0 COURSE
Module - 5
Protection of Information Assets
Module - 5
Digital Accounting and Assurance Board
The Institute of Chartered Accountants of India August | 2020 | P2724 (Revised)
ICAI Bhawan,Hostel Block, 7th Floor
A-29, Sector-62 Digital Accounting and Assurance Board
Noida - 201309, India The Institute of Chartered Accountants of India
Tel (Direct): +91 120 3045992/961
Web: www.icai.org (Set up by an Act of Parliament)
New Delhi
Background Material
on
Information Systems Audit 3.0 Course
Module-5 :
Protection of Information Assets
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form, or by any means, electronic mechanical, photocopying, recording, or
otherwise, without prior permission, in writing, from the publisher.
DISCLAIMER
The views expressed in this material are those of author(s). The Institute of Chartered Accountants
of India (ICAI) may not necessarily subscribe to the views expressed by the author(s).
The information in this material has been contributed by various authors based on their expertise
and research. While every effort have been made to keep the information cited in this material error
free, the Institute or its officers do not take the responsibility for any typographical or clerical error
which may have crept in while compiling the information provided in this material. There are no
warranties/claims for ready use of this material as this material is for educational purpose. The
information provided in this material are subject to changes in technology, business and regulatory
environment. Hence, members are advised to apply this using professional judgement. Please visit
34& portal for the latest updates. All copyrights are acknowledged. Use of specific
hardware/software in the material is not an endorsement by ICAI.
Email : [email protected]
ISBN : 978-81-8441-995-5
Evolution of digital economy and ever changing dynamic ecosystem presents significant
challenges, including new competition, new business and service delivery models, unprecedented
transparency, privacy concerns and cyber threats. With a goal to keep members abreast of impact
of emerging technologies, Digital Accounting and Assurance Board has come out with the updated
Post Qualification Course on Information Systems Audit Modules to equip members with
specialised body of knowledge and skill sets so that they become Information Systems Auditors
(ISAs) who are technologically adept and are able to utilize and leverage technology to provide
reasonable assurance that an organization safeguards it data processing assets, maintains data
integrity and achieves system effectiveness and efficiency. This updated syllabus facilitates high
level understanding about the role and competence of an IS Auditor to analyse, review, evaluate
and provide recommendations on identified control weaknesses in diverse areas of information
systems deployment.
Revised Modules of Post Qualification Course on Information Systems Audit has specific objective,
i.e., “To provide relevant practical knowledge and develop skills for planning and performing
various types of assurance or consulting assignments in the areas of Governance, Risk
management, Security, Controls and Compliance of Information Systems.” The core of DISA 3.0
lies in inculcating competence to add to service delivery of the members. The updated course
would help the members to apply appropriate strategy, approach, methodology and techniques for
auditing information system and perform IS Assurance and consulting assignments by using
relevant best practices, IS Audit standards, frameworks, guidelines and procedures.
The updated ISA Course 3.0 has a blend of training and includes e-learning, live case studies and
lab manuals, project work in addition to class room lectures. This updated background material
also includes a DVD which has e-Learning lectures, PPTs, case studies, DEMO CAAT software,
useful checklists and sample audit reports. New Module on “Emerging Technology and Audit” has
been added which covers Information System Assurance and Data Analytics, Assurance in Block
chain Ecosystem, and Embracing Robotic Process Automation in Assurance Services. In addition
to this Artificial Intelligence and Internet of Things (IoT) has also been inducted in the new
modules.
We would like to take this opportunity to place on record our deep appreciation for the efforts put in
by Convener, Dr. Onkar Nath as well as authors and reviewers of the various modules, viz., CA
Anand Prakash Jangid, Mr. N.D. Kundu, Mr. Inder Pal Singh, Mr. Avinash Gokhale, CA Pranay
Kochar, CA Naresh Gandhi, Dr Manish Kumar Srivastava, Dr. Saurabh Maheshwari, CA
Narasimhan Elangovan and CA Atul Kumar Gupta. It would be also appropriate to express our
thanks to all the ISA faculties for giving their inputs/ suggestions for the implementation of DISA
3.0.
We would like to express gratitude to CA. Atul Kumar Gupta, President, ICAI, and CA. Nihar
Niranjan Jambusaria, Vice President, ICAI, for their thought leadership and encouragement to the
initiatives of the Board. We would also like to place on record our gratitude for all the Board
members, co-opted members and special invitees for providing their valuable guidance and
support in this initiative of the Board. We also wish to express my sincere appreciation for CA. Amit
Gupta, Secretary, DAAB, Ms. Nishi Saraf, Section Officer for their untiring efforts in finalization of
the updated Modules.
We are sure that these updated Modules on Post Qualification Course on Information Systems
Audit would be of immense help to the members and enable them to enhance service delivery not
only in compliance, consulting and assurance of IT services, but also provide new professional
avenues in the areas of IT Governance, Cyber Security, Information System Control and
assurance services.
vi
Contents
Chapter 1: Introduction to Protection of Information Assets ........................................ 1-15
1.1. Introduction ................................................................................................................... 1
1.2. Risk Response .............................................................................................................. 1
1.2.1. Information Security Objectives ........................................................................... 1
1.3. Threat Modelling Tools .................................................................................................. 2
1.3.1. OWASP Model .................................................................................................... 2
1.3.2. DREAD Model ..................................................................................................... 3
1.3.3. STRIDE Model .................................................................................................... 3
1.4. Cyber/ Computer Attacks .............................................................................................. 3
1.5. Information Systems Controls ........................................................................................ 7
1.5.1. Need for IS Controls ............................................................................................ 7
1.5.2. Objectives of Controls ......................................................................................... 8
1.5.3. Internal Controls .................................................................................................. 8
1.5.4. Types of Controls ............................................................................................... 9
1.6. Risk and Control Ownership ........................................................................................ 10
1.7. Periodic Review and Monitoring of Risk and Controls .................................................. 10
1.7.1. Control Assessment .......................................................................................... 10
1.7.2. Control Self-Assessment ................................................................................... 10
1.7.3. Role of IS Auditor in Information Risk Management ........................................... 11
1.8. Summary ..................................................................................................................... 12
1.9. Questions .................................................................................................................... 12
1.10. Answers and Explanations .......................................................................................... 14
Chapter 2: Administrative Controls of Information Assets .......................................... 16-33
2.1 Information Security Management ............................................................................... 16
2.2 Senior Management Commitment & Support ............................................................... 16
2.3 Critical Success Factors to Information Security Management .................................... 17
2.4 Information Security Organization ............................................................................... 17
2.4.1 Segregation of Duties ........................................................................................ 18
2.4.2 Four Eyes (Two Person) Principle ..................................................................... 18
2.4.3 Rotation of Duties ............................................................................................. 19
2.4.4 Key Man Policy ................................................................................................ 19
2.5 Information Security Policies, Procedures, Standards and Guidelines ........................ 19
2.5.1 Components of Information Security Policies ..................................................... 20
2.5.2 Other Common Security Policies ....................................................................... 20
2.5.3 Control Over Policies ......................................................................................... 22
2.5.4 Exceptions to the Policies.................................................................................. 22
2.6 Information Classification ............................................................................................ 22
2.6.1 Benefits from Classifications ............................................................................. 23
2.6.2 Classification Policy .......................................................................................... 23
2.6.3 Classification Schema ....................................................................................... 24
2.7 The Concept of Responsibility in Information Security ................................................ 24
2.7.1 Ownership ......................................................................................................... 24
2.7.2 Custodianship ................................................................................................... 25
2.7.3 Controlling ......................................................................................................... 25
2.7.4 Human Resource Security ................................................................................. 25
2.8 Training and Education................................................................................................ 26
2.9 Implementation of Information Security Policies .......................................................... 27
2.9.1 Increasing Awareness ...................................................................................... 27
2.9.2 Communicating Effectively ................................................................................ 28
2.9.3 Simplify Enforcement ........................................................................................ 28
viii
2.9.4 Integration with Corporate Culture ..................................................................... 29
2.10 Issues and Challenges of Information Security Management ...................................... 29
2.11 Summary ..................................................................................................................... 30
2.12 Questions .................................................................................................................... 30
2.13 Answers and Explanations .......................................................................................... 32
ix
3.9.4 Maintenance Plan .............................................................................................. 45
3.9.5 Ventilation and Air Conditioning......................................................................... 45
3.9.6 Power Supplies ................................................................................................. 45
3.9.7 Fire Detection and Suppression ........................................................................ 46
3.10 Auditing Environmental Controls ................................................................................. 48
3.11 Summary ..................................................................................................................... 48
3.12 Questions .................................................................................................................... 49
3.13 Answers and Explanation ............................................................................................ 51
x
4.12 Summary ..................................................................................................................... 72
4.13 Questions .................................................................................................................... 72
4.14 Answers and Explanation ............................................................................................ 74
xi
Learning Objectives
This module focuses on different methods for protecting information assets. This primarily
covers following:
Risk response and definition of controls for protection of information assets
Essentials of information security management like objectives, processes, policies,
procedures, and compliance.
Information asset protection based on information classification
Essentials of Physical and environmental security
Logical access controls
Network and related security processes.
Audit guidelines for information protection controls
Chapter 1
Introduction to Protection of Information
Assets
1.1 Introduction
It has become imperative for today’s organizations to use technology for their business
process. Technology has inherent risks and hence it has to be adequately responded with the
right level of controls. In order to take benefits of technology, organizations must establish
processes for address the associated with technology.
1.3.1 OWASP
The Open Web Application Security Project (OWASP) is a non profit foundation that works to
improve the security of software. Through community-led open source software projects,
hundreds of local chapters worldwide, tens of thousands of members, and leading educational
and training conferences, the OWASP Foundation is the source for developers and
technologists to secure the web.
Tools and Resources
Community and Networking
Education & Training
The OWASP Top 10 is a standard awareness document for developers and web application
security. It represents a broad consensus about the most critical security risks to web
applications.
Globally recognized by developers as the first step towards more secure coding.
Companies should adopt this document and start the process of ensuring that their web
applications minimize these risks. Using the OWASP Top 10 is perhaps the most effective first
step towards changing the software development culture within your organization into one that
produces more secure code.
2
Introduction to Protection of Information Assets
Categories Description
D Damage potential How many assets can be affected?
R Reproducibility How easily the attack can be reproduced?
E Exploitability How easily the attack can be launched?
A Affected users What is the number of affected users?
D Discoverability How easily the vulnerability can be found?
The DREAD name comes from the initials of the five categories listed above. It was initially
proposed for threat modeling, but it was discovered that the ratings are not very consistent
and are subject to debate. It was out of use at Microsoft by 2008.
When a given threat is assessed using DREAD, each category is given a rating from 1 to 10.
The sum of all ratings for a given issue can be used to prioritize among different issues.
3
Background Material on Information Systems Audit 3.0 Course (Module 5)
4
Introduction to Protection of Information Assets
get on the network and may even cause the network to crash. Web application firewall
software may help to prevent DOS attack.
DNS Spoofing: It is a computer hacking attack, whereby data is introduced into a
Domain Name System (DNS) resolver's cache, causing the name server to return an
incorrect IP address, diverting traffic to the attacker's computer (or any other computer).
Keeping resolver private and protected is one of the controls against DNS spoofing.
Email Spoofing: It is the creation of email messages with a forged sender address.
The core email protocols do not have any mechanism for authentication, making it
common for spam and phishing emails to use such spoofing to mislead or even prank
the recipient about the origin of the message. Configuring reverse proxy may detect e-
mail spoofing in most of the cases.
Identity Theft: It is the deliberate use of someone else's identity, usually as a method
to gain a financial advantage or obtain credit and other benefits in the other person's
name, and perhaps to the other person's disadvantage or loss. The person whose
identity has been assumed may suffer adverse consequences, especially if they are
held responsible for the perpetrator's actions. Use of strong password, multi factor
authentication, monitoring transactions of the account are some of the preventive
controls.
Keystroke Logger: A keystroke logger monitors and records keyboard use. Some
require the attacker to retrieve the data from the host, whereas other loggers actively
transfer the data to another host through email, file transfer, or other means. Use of key
encryption software and installing anti malware may prevent this attack.
Logic Bomb: These are legitimate programs, to which malicious code has been added.
Their destructive action is programmed to “blow up” on occurrence of a logical event
such as time or a logical event as number of users, memory/disk space usage, etc.
Every time the infected program is run, the logic bomb checks external environment to
see whether the condition to trigger the bomb has been met. Anti-malware and use of
application from trusted source may be preventive controls.
Piggybacking: Unauthorized access to information by using a terminal that is already
logged on with an authorized ID (identification) and left unattended. In this case, idle
session timeout (i.e. disabling session after specific time period) may be a preventive
control.
Salami Theft: It is a series of minor attacks those together results in a larger attack.
Computers are ideally suited to automating this type of attack. By having proper
segregation of duties and proper control over code, organization may prevent this.
Sensitive Data Exposure: Many web applications and APIs (Application Program
5
Background Material on Information Systems Audit 3.0 Course (Module 5)
Interface) do not properly protect sensitive data, such as financial, healthcare, and PII
(Personally Identifiable Information). Attackers may steal or modify such weakly
protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data
may be compromised without extra protection, such as encryption at rest or in transit,
and requires special precautions when exchanged with the browser. Data leakage
prevention tools may prevent sensitive data exposure.
Injection: Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when
untrusted data is sent to an interpreter as part of a command or query. The attacker’s
hostile data can trick the interpreter into executing unintended commands or accessing
data without proper authorization. Input validation, security audits and vulnerability,
threat and risk (VTR) assessment may help to prevent injection attacks.
Trojan: A Trojan horse is a self-contained, no replicating program that, while appearing
to be benign, actually has a hidden malicious purpose. Trojan horses either replace
existing files with malicious versions or add new malicious files to hosts. They often
deliver other attacker tools to hosts. Sound policies and procedures should be in place
and anti-malware software should be installed.
Virus: A virus self-replicates by inserting copies of itself into host programs or data
files. Viruses are often triggered through user interaction, such as opening a file or
running a program. Sound policies and procedure should be in place and anti-malware
software should be installed. Viruses can be divided into the following two
subcategories:
Compiled Viruses: A compiled virus is executed by an operating system. Types
of compiled viruses include file infector viruses, which attach themselves to
executable programs; boot sector viruses, which infect the master boot records of
hard drives or the boot sectors of removable media; and multipartite viruses,
which combine the characteristics of file infector and boot sector viruses.
Interpreted Viruses: Interpreted viruses are executed by an application. Within
this subcategory, macro viruses take advantage of the capabilities of
applications’ macro programming language to infect application documents and
document templates, while scripting viruses infect scripts that are understood by
scripting languages processed by services on the OS.
Worm: A worm is a self-replicating, self-contained program that usually executes itself
without user intervention. Sound policies and procedure should be in place and anti-
malware software should be installed. Worms are divided into two categories:
Network Service Worms: A network service worm takes advantage of
vulnerability in a network service to propagate itself and infect other hosts.
6
Introduction to Protection of Information Assets
7
Background Material on Information Systems Audit 3.0 Course (Module 5)
Data Integrity
System Effectiveness
System Efficiency
8
Introduction to Protection of Information Assets
objectives are achieved and undesired risk events are prevented or detected and corrected.
This is achieved by designing an effective internal control framework, which comprises
policies, procedures, practices, and organizational structure that gives reasonable assurance
to achieve the business objectives. Ultimately, all these policies, procedures etc. are broken
into discrete activities and supporting processes, which can be either manual or automated.
Control is not solely a policy or a procedure, which is performed at a certain point of time;
rather it is an ongoing activity, based on the risk assessment of the organization.
9
Background Material on Information Systems Audit 3.0 Course (Module 5)
10
Introduction to Protection of Information Assets
day role is within the area of the organization that is being examined as they have the greatest
knowledge of how the processes operate. The two common techniques for performing the
evaluations are:
Workshops, that may be but do not have to be independently facilitated, involving some
or all staff from the business unit being tested;
Surveys or questionnaires completed independently by the staff.
On completion of the assessment, each control may be rated based on the responses
received to determine the probability of its failure and the impact if a failure occurred. It is
critical to note that both methods can be used for risk assessment and control design.
11
Background Material on Information Systems Audit 3.0 Course (Module 5)
1.8 Summary
Information Security is a paramount risk management concern. Information Risk Management
follows information as it is created, distributed, stored, copied, transformed and interacted
throughout its lifecycle. It includes understanding which information is critical to key business
initiatives, such as growth through acquisitions or expanding partnerships, where it exists
across the organization, where the points of vulnerability are, and what events could put the
business at risk. Investments are prioritized based on the amount of risk a given activity
entails relative to the potential business reward, and in keeping with the organization’s
appetite for risk. Once enterprise information has been located and a risk assessment
performed, next step is to implement controls — including policies, technologies, and tools —
to mitigate that risk.
1.9 Questions
1. Which of the following shall BEST help in deciding upon the protection level for
information asset?
A. Location of asset.
B. Impact of risk.
C. Vulnerabilities in asset.
D. Inventory of threats
2. Which of the following is a risk response option?
A. Determine likelihood of threat
B. Determine probability of risk
C. Deciding amount of insurance cover
D. Prepare risk profile report
3. After a Tsunami, a business decides to shift the location of data centre from
coastal area to mid land. Which type of risk response option it has exercised?
A. Accept
B. Avoid
C. Mitigate
D. Transfer
12
Introduction to Protection of Information Assets
13
Background Material on Information Systems Audit 3.0 Course (Module 5)
9. The quantum of risk after enterprise has implemented controls based on risk
mitigation plan is:
A. Accepted risk
B. Residual risk
C. Inherent risk
D. Current risk
10. Which of the following shall best help in aligning IT risk with enterprise risk?
A. Presenting IT risk results in business terms.
B. Conducting business impact analysis.
C. Making Chief risk officer accountable.
D. Align IT strategy with business strategy.
14
Introduction to Protection of Information Assets
affect the organization immediately as the organization may not need to take action.
Options A and D are internal decisions and will be done after risk assessment and
hence these are not risk factors.
8. D is the correct answer. Risk monitoring refers to review of identified and assed risks
based on changes, incidents, and periodically. Other options are part of risk
management framework.
9. B is the correct answer. Accepted risk is where controls are not implemented is part of
residual risk; Inherent risk is total risk before implementing controls. Current risk is
residual risk at a point in time during control implementation.
10. A is the correct answer. Expressing IT risk in business terms i.e. as impact on business
will help business in understating relevance of IT risks. Business impact analysis may
be useful however, it may or may not help depending upon scope of project. Making
chief risk officer accountable may help but best is A. Aligning IT strategy with business
strategy shall help in defining better IT plan, but it is at higher level.
15
Chapter 2
Administrative Controls of Information Assets
2.1 Information Security Management
Protection of information assets includes the key components that ensure confidentiality,
integrity and availability (CIA) of information assets. Controls to protect the assets are
designed, developed, selected and implemented based on risk evaluation and cost-benefit
analysis. The primary control for implementing protection strategy is defining and
implementing information security policy. Organization needs to focus on ensuring that
information security procedures are followed to meet the security objectives of the
organization derived from the stakeholder’s expectations. This requires implementation of
processes for information security management. The key elements of information security
management include:
Senior management commitment and support,
Policies and procedures,
Organization structure and roles and responsibilities,
Security awareness and education,
Monitoring,
Compliance,
Incident handling and response.
Continual improvement
17
Background Material on Information Systems Audit 3.0 Course (Module 5)
18
Administrative Controls of Information Assets
19
Background Material on Information Systems Audit 3.0 Course (Module 5)
20
Administrative Controls of Information Assets
The organization shall ensure that an entity controlled by it, or any other entity that
utilizes information provided by the organization to carry out its responsibilities, shall
have signed and agreed to abide by the terms of the data privacy and security policy or
shall have adopted a data privacy and security policy that is substantially similar to the
organization policy.
Acceptable Use of Information Assets Policy
An Acceptable Use Policy (AUP), also known as an Acceptable Usage policy or Fair Use
policy, is a set of rules that restrict the ways in which the information resources (Data,
Application Systems, Technology, Facilities and People) may be used. AUP often reduces the
potential for legal action that may be taken by a user, and often with little prospect of
enforcement.
Acceptable use policies are an integral part of the framework of information security policies; it
is often common practice to ask new members of an organization to sign an AUP before they
are given access to its information systems. For e.g. it may state that no user of company’s
Internet facility will use for personal purpose.
Physical Access and Security Policy
Physical security describes security measures that are designed to restrict unauthorized
access to facilities, equipment and resources, and to protect personnel and assets from
damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the
use of multiple layers of interdependent systems, which include CCTV surveillance, security
guards, Biometric access, RFID cards, access cards protective barriers, locks, access control
protocols, and many other techniques.
Asset Management Policy
This policy defines the business requirements for Information assets protection. It includes
assets like servers, desktops, handhelds, software, network devices etc. Besides, it covers all
assets used by an organization- owned or leased. E.g., asset management involves asset
acquisition, identification, storage, movement, accounting, disposal etc.
Network Security Policy
A network security policy defines the overall rules for organization’s network access,
determines how policies are enforced and lays down some of the basic architecture of the
company security/ network security environment.
Password Policy
This policy defines high-level configuration of password to be used within organization to
access the information assets. For example:
Password length must be more than 8 characters
21
Background Material on Information Systems Audit 3.0 Course (Module 5)
Password must meet complexity requirements, such as upper case, lower case,
numeric and special characters
Password must have defined maximum age
Password must have defined minimum age
Password must have history control
22
Administrative Controls of Information Assets
23
Background Material on Information Systems Audit 3.0 Course (Module 5)
2.7.1 Ownership
Organization has acquired (instead of “has acquired” “acquires”) a number of assets required
for business operations. The organization is legal owner of these assets. However, for security
and control the ownership is delegated to an employee or group of employees who need to
use these assets. In other words, users not only have right to use the assets but also are
responsible for the safekeeping of assets.
Every asset of the organization including the information assets should have a clearly defined
24
Administrative Controls of Information Assets
‘owner’. The owner should then have a defined set of responsibilities. Authorization is the
essential statement where an owner gives their assent to an activity happening.
2.7.2 Custodianship
In some instances, an owner is not able to manage a particular asset on a day-to-day basis,
perhaps for logical or technical reasons. In this scenario, the owner may delegate
responsibility to a custodian. The owner should clearly state the requirements; the
responsibilities and associated levels of authority of the custodian on the assets but finally
management responsibility will always reside with the owner. Example of custodian is a
database administrator.
2.7.3 Controlling
In all information, security areas there are key tasks, which can be called control points. It is at
these control points that the actual information security mechanism has its application. For
example, a system administrator acts as a control on who has access to information
resources. They carry out the task of adding and deleting user identifiers from the system or
modifying the task of adding available to them, and therefore effectively control the activities
of the owner, or other designated authority.
25
Background Material on Information Systems Audit 3.0 Course (Module 5)
and responsibilities of their job duties and that access is removed once employment is
terminated. The three areas of Human Resources Security are:
Pre-employment: It includes defining roles and responsibilities of the job, defining
appropriate access to sensitive information for the job, and determining candidate's
screening levels - all in accordance with the company's information security policy.
During employment: Employees and third parties those who have access to sensitive
information in the organization should receive periodic reminders of their responsibilities
and receive ongoing, updated security awareness training to ensure their understanding
of current threats and corresponding information security practices to mitigate
corresponding risks.
Termination or change of employment: To prevent unauthorized access to sensitive
information, access must be revoked immediately upon termination/separation of an
employee and third parties from the organization. This also includes the return of the
assets of the organization.
26
Administrative Controls of Information Assets
27
Background Material on Information Systems Audit 3.0 Course (Module 5)
28
Administrative Controls of Information Assets
29
Background Material on Information Systems Audit 3.0 Course (Module 5)
afterthought. Checklists are important as a starting point or as a tool to ensure that you
are not missing out anything but should not be totally relied upon.
Lack of integration in system design and security design: Development duality is a
phenomenon where systems and security design are undertaken in parallel rather than
in an integrated manner. This largely occurs when systems developers fail to recognize
the security requirements at the onset of the development process.
2.11 Summary
Information security management has become more important over the years due to increased
use of information system for conducting business. Information security management is a
business issue and it needs to be properly integrated into the organization’s overall business
goals and objectives because security issues may negatively affect the resources, which
is(remove “which is”) having dependency on the organization. The objectives of information
security are to provide confidentiality, integrity and availability to data and resources. The
need for complex networks is due to complexity of business operations and delivering
products and services to the customers. These networks have evolved from centralized
environments to distributed environments.
2.12 Questions
1. The Primary objective of implementing Information security management is to:
A. Ensure reasonable security practices
B. Comply with internal audit requirements
C. Adopt globally recognized standards
D. Protect information assets
2. Which of the following is primary function of information security policies?
A. Align information security practices with strategy
B. Communicate intent of management to stakeholders
C. Perform risk assessment of IT operations and assets
D. Ensure compliance with requirements of standards
3. Information security policies are set of various policies addressing different
information systems areas based on the IT infrastructure of organization. Which
of the following policy is most common in all organizations?
A. Acceptable use policy
30
Administrative Controls of Information Assets
31
Background Material on Information Systems Audit 3.0 Course (Module 5)
32
Administrative Controls of Information Assets
provisions may not be appropriate and hence need to be reviewed. Other options are
not concerning.
8. C is the correct answer. Primary purpose of information classification is to provide
appropriate level of protection to information assets. Options A, B and D are the
secondary with respect to information classification.
9. C is the correct answer. It helps in assessing the risks associated and determine the
protection level i.e. class of information. A, B and C are determined based on
classification.
10. B is the correct answer. Training users on how to classify information as per definition
provided in classification schema shall best help users in classifying the information. A.
Number of classes shall depend upon organization’s objectives. C and D are performed
after classification of information.
33
Chapter 3
Physical and Environmental Controls
3.1 Introduction
Prior to use of computers and communications technology, most business assets were in
physical form and securing them was primarily controlled manually. However, technology has
also enabled attackers to launch successful attack without being physically near the victim
organization. Today, there is a computer on almost every desk, and access to devices and
resources is spread throughout the environment, besides, organizations have several remote
and mobile users.
Use of technology has also added a requirement to ensure that the environmental controls are
in place so that the technology deployed can perform as expected. For example, computer
uses electrical energy to process, store and transmit data. In the process, they generate heat.
This heat can affect the small electronic circuits within computers resulting in non-availability
of technology. This means the environment must be able to provide and sustain climatic
conditions like appropriate level of temperature and humidity, dust free environment.
35
Background Material on Information Systems Audit 3.0 Course (Module 5)
Local considerations: What is the local rate of crime (such as forced entry and
burglary)?
External services: The relative proximity of local emergency services, such as police,
fire, and hospitals or medical facilities.
Visibility: Facilities such as data centres should not be visible or identifiable from the
outside, that is, no windows or directional signs.
Windows: Windows are normally not acceptable in a data centre to avoid data leakage
through electromagnetic radiation emitted by monitors. If they do exist, however, they
must be translucent (semi-transparent, i.e. allowing light without being able to view
things clearly) and shatterproof.
Doors: Doors in the computer centre must resist forcible entry and have a fire-rating
equal to the walls. Emergency exits must be clearly marked and monitored or alarmed.
Electric door locks on emergency exits should revert to a disabled state if power
outages occur to enable safe evacuation. While this may be considered a security
issue, personnel safety always takes precedence, and these doors should be manned
in an emergency.
36
Physical and Environmental Controls
37
Background Material on Information Systems Audit 3.0 Course (Module 5)
Combination or Cipher Locks: Combination door locks, also known as cipher locks,
use a numeric keypad or dial to gain entry. They do not prevent or reduce the risk of
piggybacking since unauthorized individuals may still gain access to the restricted area.
Electronic Door Locks: Such locks may use electronic card readers, smart card
readers or optical scanners to gain entry. They do not prevent or reduce the risk of
piggybacking, since unauthorized individuals may still gain access to the restricted
area.
Biometric Door Locks: These are some of the most secure locks since they enable
access based on physiological features such as voice, fingerprint, hand geometry,
retina or iris. However, they do not prevent or reduce the risk of piggybacking.
Perimeter Intrusion Detectors - The two most common types of physical perimeter
detectors are based on either photoelectric sensors or dry contact switches.
o Photoelectric Sensors - Photoelectric sensors receive a beam of light from a
light-emitting device, creating a grid of either visible white light, or invisible
infrared light. An alarm is activated when the beams are broken. The beams can
be physically avoided if seen; therefore, invisible infrared light is often used.
o Dry Contact Switches - Dry contact switches and tape is probably the most
common type of perimeter detection. This can consist of metallic foil tape on
windows or metal contact switches on doorframes to detect when a door or
window has been opened.
Video Cameras: Cameras provide preventive and detective control. Closed-Circuit
Television (CCTV) cameras have to be supplemented by security monitoring and
guards for taking corrective action. The location of such cameras and recording,
retention of tapes, images for future playback should be decided based on information
security strategy.
Identification Badge: Special identification badge such as employee cards, privileged
access pass, and visitor passes etc. enable tracking movement of personnel. This may
also be a card with signature and or photo identity. Security staff to permit or deny
access and to detect unauthorized access physically examines identification badges.
Manual Logging: All visitors to the premises are prompted to sign a visitor’s register
recording the date and time of entry and exit, name of entrant, organization, purpose
etc. The visitor may also be required to authenticate his identity by means of a business
card, photo identification card, driver’s license etc.
Electronic Logging: Electronic card users may be used to record the date and time of
entry and exit of the cardholder by requiring the person to swipe the card both time of
entry and exit. This is a faster and more reliable method for restricting access to
38
Physical and Environmental Controls
employees and pre- authorized personnel. This security mechanism can be made with
electronic or biometric devices.
Controlled Single Point Access: Physical access to the facility is granted through a
single guarded entry point. This involves identifying and eliminating or disabling entry
from all entry points except one. Multiple entry points may dilute administration of
effective security.
Controlled Visitor Access: A pre-designated responsible employee or security staff
escorts all visitors such as maintenance personnel, contract workers, vendors, and
consultants for a specified time period (unless they are for long-term, in that case guest
access may be provided).
Bonded Personnel: This is useful in situation where physical access to sensitive
facilities is given to employees or the contract employees. Bonding (contractors or
employees being required to execute a financial bond), such bond does not improve
security but reduces financial impact due to improper access/misuse of information
resources.
Wireless Proximity Readers. A proximity reader does not require physical contact
between the access card and the reader. The card reader senses the card in
possession of a user in the general area (proximity) and enables access.
Alarm Systems/Motion Detectors. Alarm systems provide detective controls and
highlight security breaches to prohibited areas such as access to areas beyond
restricted hours, violation of direction of movement. For example, in specific areas,
entry only or exit only doors are used. Motion detectors are used to sense unusual
movement within a predefined interior security area and thus detect physical breaches
of perimeter security, and may sound an alarm.
Secured Distribution Carts: One of the concerns in batch output control is to get the
printed hardcopy reports (which may include confidential materials) securely by the
intended recipients. In such cases, distribution trolleys with fixed containers secured by
locks are used. The respective user team holds the keys of the relevant container.
Cable Locks: A cable lock consists of a plastic-covered steel cable that chain a PC,
laptop or peripherals to the desk or other immovable objects.
Port Controls: Port controls are devices that secure data ports (such as a floppy drive
or a serial or parallel port) and prevent their use.
Switch Controls: A switch control is a cover for the on/off switch, which prevents a
user from switching on or off the power.
Peripheral Switch Controls: These types of controls are lockable switches that
prevent a device such as a keyboard from being used.
39
Background Material on Information Systems Audit 3.0 Course (Module 5)
Biometric Mouse: The input to the system uses a specially designed mouse, which is
usable only by pre-determined/pre-registered person based on the physiological
features of the user.
Laptops Security: Securing laptops and portables represent a significant challenge,
especially since; loss of laptops creates loss of confidentiality, integrity and availability.
Cable locks, biometric mice/fingerprint/iris recognition and encryption of the data is
some of the means available to protect laptops and data therein.
40
Physical and Environmental Controls
41
Background Material on Information Systems Audit 3.0 Course (Module 5)
facilities and supporting infrastructure, which house and support the computing equipment,
media and people. IS Auditor should review all factors that adversely affect confidentiality,
integrity and availability of the information, due to undesired changes in the environment or
ineffective environmental controls.
42
Physical and Environmental Controls
43
Background Material on Information Systems Audit 3.0 Course (Module 5)
44
Physical and Environmental Controls
activation of fire suppression systems. Administrative procedures should also provide for
Incident Handling procedures and protocols due to environmental exposures.
45
Background Material on Information Systems Audit 3.0 Course (Module 5)
of a few minutes to a number of days. UPS can be on-line or off-line, but for
computerized environment, on-line UPS is mandated.
Electrical surge protectors/line conditioners: Power supply from external sources
such a grid and generators are subject to many quality problems such as spikes,
surges, sag and brown outs, noise, etc. Surge protectors, spike busters and line
conditioners are equipment, which cleanses the incoming power supply of such quality
problems and delivery clean power for the equipment.
Power leads from two sub-stations: Failure of continued power supply to some high
consumption continuous processing could even result in concerns regarding public
safety such as refineries, nuclear reactors and hospitals. Electric power lines may be
exposed to many environmental and physical threats such as foods, fire, lightning,
careless digging, etc. To protect against such exposures, redundant power lines from a
different grid supply should be provided for. Interruption of one power supply should
result in the system immediately switching over to the stand-by line.
46
Physical and Environmental Controls
47
Background Material on Information Systems Audit 3.0 Course (Module 5)
3.11 Summary
This chapter deals with the physical and environmental threats and their control and audit
procedures on information system assets. The first step in providing a secured physical
environment for the information system assets is listing the various assets in the computing
environment. These assets could range from hardware, software, facilities and people that
form the computing environment. The next step is to identify the various threats and
48
Physical and Environmental Controls
vulnerabilities the assets are exposed to. These threats could include unauthorized access to
the resources, vandalism, and public disclosure of confidential information. The main source
of threats is from outside people and the employees of the organization. However, the
information assets are exposed to various other sources of threats like natural damage due to
environmental factors like food, earthquake, fire and rain etc.
3.12 Questions
1. Which of the following is first action when a fire detection system raises the
alarm?
A. Turn off the air conditioner
B. Determine type of fire
C. Evacuate the facility
D. Turn off power supply
2. Which of the following are most important controls for unmanned data center?
A. Access control for entry and exit for all doors
B. The humidity levels need not be maintained
C. The temperature must be at sub-zero level
D. Halon gas-based fire suppression system
3. Primary purpose of access controlled dead man door, turnstile, mantrap is to:
A. Prevent unauthorized entry
B. Detect perpetrators
C. Meet compliance requirement
D. Reduce cost of guard
4. Which of the following is the main reason for appointing human guards at main
entrance of facilities?
A. Address visitors’ requirements to visit
B. Issue the access cards to visitors
C. Cost of automation exceeds security budget
D. Deter the unauthorized persons
5. Which of the following is a major concern associated with biometric physical
access control?
49
Background Material on Information Systems Audit 3.0 Course (Module 5)
A. High acceptability
B. High false positives
C. High false negatives
D. High cost
6. Which of the following evidence is best to provide assurance on automated
environmental controls?
A. Annual maintenance contract with vendor
B. Simulation testing of devices during audit
C. Device implementation report by vendor
D. Documented results of periodic testing
7. What are the problems that may be caused by humidity in an area with electrical
devices?
A. High humidity causes excess electricity, and low humidity causes corrosion
B. High humidity causes power fluctuations, and low humidity causes static
electricity
C. High humidity causes corrosion, and low humidity causes static electricity
D. High humidity causes corrosion, and low humidity causes power fluctuations.
8. Automated access controls open doors based on access cards, pins, and/or
biometric devices and are powered by electricity. Which of the following is the
best policy in case of power failure?
A. Keep the door in locked state
B. Open door and appoint guard
C. Find root cause of power failure
D. Arrange for battery backup
9. While selecting site for a data center which of the site is best to be selected?
A. On topmost floor to delay the unauthorized visitor to reach
B. In the basement not easily accessible to perpetrator
C. On ground floor so that users can access it easily
D. On middle floor to strike the balance for above concerns
50
Physical and Environmental Controls
10. Which of the following is main reason for not allowing mobile devices into data
center?
A. Unauthorized changes and access in configuration
B. Prevent photography of data center layout
C. User can provide information to attacker on phone
D. Mobile devices generate wireless communication
51
Chapter 4
Logical Access Controls
4.1 Introduction
Today information systems store and process a wide variety of data in centrally hosted system
and provide access to the same to a large number of users. Keeping data stored centrally on
a system contributes to cost effective and efficient information sharing and processing.
Information that is residing on a system and accessed by many users has an associated risk
of unauthorized access. Logical access controls are a means of addressing concerns
associated with unauthorized accesses. Logical access controls are protection mechanisms
that limit users' access to data and restrict their access on the system.
53
Background Material on Information Systems Audit 3.0 Course (Module 5)
54
Logical Access Controls
55
Background Material on Information Systems Audit 3.0 Course (Module 5)
A – Password
B – Identified Badge
C – Fingerprint
D – Bank Card and PIN
E – Smart Card with Biometric template
F – Fingerprint Detectors with PIN entry
G – Identifying Badge with Photograph and associated Password
Single-factor authentication uses any one of these authentication factors. Two-factor or dual
factor authentication uses two factors and the three-factor authentication uses all the three
factors. Individual authentication strength increases when multiple authentication technologies
and techniques are combined and used. Authorized access to an information resource
requires identification and authentication of the person requesting access.
Once the user is authenticated, the system must be configured to validate that the user is
authorized (has a valid need-to-know) for the resource and can be held accountable for any
actions taken. A default denial policy, where access to the information resource is denied
unless explicitly permitted should be mandated. The decision to grant or deny access to an
information resource is the responsibility of the information owner.
Fig. 4.3: What you have (Token), what you know (password/PIN) and
who you are (Physiological features)
4.5.2.1 Passwords and PINs
Password: This is the most common authentication technique that depends on
remembered information. The user, initially, identifies him using his login-id to the
56
Logical Access Controls
system and then provides the password information. Once the system is able to match
and is successful for both fields, the system authenticates the user and enables access
to resources based on the access control matrix. However, if a match is not successful,
the system returns a message (such as “Invalid User-id or password”), preventing
access to resources.
Personal Identification Numbers (PINs): Is a type of password, usually a 4-digit
numeric value that is used in certain systems to gain access, and authenticate. The PIN
should be randomly generated such that a person or a computer cannot guess it in
sufficient time and attempt by using a guess and check method. PINs are commonly
used for gaining access to Automated Teller Machines (ATMs).
4.5.2.2 One-Time Passwords
One-time passwords solve the problems of user-derived passwords. With one-time
passwords, each time the user tries to log on he is given a new password. Even if an attacker
intercepts the password, he will not be able to use it to gain access because it is good for only
one session and predetermined limited time period. For example, one-time password for
online card transaction is provided by bank to user on registered mobile is valid for 100
seconds only. One-time passwords typically use a small hardware device or software that
generates a new password every time. The server also has the same software running, so
when a user types in his password, the server can confirm whether it is the correct password.
Each time the user logs on, he has a new password, and so it is more secure.
4.5.2.3 Challenge Response System
An alternative to one-time passwords is challenge response system. Instead of having the
device just blindly generating a password, a user identifies himself to the server, usually by
presenting his user ID. The server then responds with a challenge, which is usually a short
phrase of letters and numbers. The user types the challenge into the device and, based on the
challenge, the device responds with an output. The user sends that output to the server. This
scheme is slightly more complicated, but it allows the password to be based on changing input
rather than just time.
4.5.2.4 Passphrase
A passphrase is a sequence of words or other text used to control access to a computer
system, program or data. A passphrase is similar to a password in usage, but is generally
longer for added security. Passphrases are often used to control both access to, and
operation of, cryptographic programs and systems, especially those that derive an encryption
key from a passphrase. Passphrases are stronger than passwords because of:
They usually are (and always should be) much longer—20 to 30 characters or more is
typical—making some kinds of brute force attacks entirely impractical.
57
Background Material on Information Systems Audit 3.0 Course (Module 5)
If well chosen, they will not be found in any phrase or quote dictionary, so such
dictionary attacks will be almost impossible.
They can be structured to be more easily memorable than passwords without being
written down, reducing the risk of hardcopy theft.
Weaknesses of Logon Mechanism
Logon/password access security is based on information to be remembered by the user (what
the user knows). This results in the following weaknesses:
Passwords are easily shared.
Users often advertently or inadvertently reveal passwords
Repeated use of the same password could lead to being easily guessed by others.
If a password is too short or too easy, the chances of it being guessed are quite high.
If a password is too long or too complex, the user may forget or may write it down.
If many applications are to be accessed by one user, many passwords have to be
remembered.
Recommended Practices for Strong Passwords
The user should not share the authentication information viz. password.
The password should be easy for the user to remember but hard for the perpetrator to
guess.
System should be configured to must change password on first login.
System should be configured to force password change periodically e.g. once in 60
days.
System should be configured for minimum age of the password.
Concurrent logins should not be permitted.
Passwords should not be too short and should not use name of user, pet names,
common words found in dictionary or such other attributes.
Password combination should be random and use alphabetic, numeric and special
characters (such as “$”, “#”, “^”, etc.).
Passwords should be stored in an encrypted form using one-way encryption.
System should be configured for password history control; e.g. System will not accept
last five passwords
58
Logical Access Controls
59
Background Material on Information Systems Audit 3.0 Course (Module 5)
60
Logical Access Controls
types of access to specific resources. General operating systems access control functions
include:
Authentication of the user
User Management
Restrict Logon IDs to specific workstations and / or specific times
Manage account policies
o Password Policy
o Account Lockout Policy
Manage audit policy
Log events and report capabilities
Pluggable Authentication Modules
The pluggable authentication module (PAM) framework provides system administrators
with the ability to incorporate multiple authentication mechanisms into an existing
system using pluggable modules. Applications enabled to make use of PAM can be
plugged-in to new technologies without modifying the existing applications. This
flexibility allows administrators to do the following:
Select any authentication service on the system for an application
Use multiple authentication mechanisms for a given service
Add new authentication service modules without modifying existing applications
Use a previously entered password for authentication with multiple modules
A general authentication scheme independent of the authentication mechanism may be
used
File Permissions
In most operating systems, every file is owned by a user and can be accessed by its owner,
group or public, depending upon access permissions. When a user creates a file or directory,
that user becomes the default owner of that file or directory. A user may be member of one
group or many groups. Further, a user owner of a file may not be part of the group at also may
have access to the file. Again, most operating systems have at least three types of file
permissions; read, write and execute (execute permission is only for executable programs and
not every file). The users have to be given at least read access to many of the system files.
Access Control Lists (ACL)
An access control list is a table that tells, which access rights each user has to a particular
61
Background Material on Information Systems Audit 3.0 Course (Module 5)
system object, such as a directory/folder or an individual file. Each object has a security
attribute that identifies its access control list. The list has an entry for each system user with
his access privileges. The most common privileges include the ability to read a file (or all the
files in a directory), to write to the file or files, and to execute the file (if it is an executable file,
or program). Following table is an example of access control list:
User Resource Database X Database Y
62
Logical Access Controls
based on the job responsibilities confirmed by User manager. Information owner must approve
this. User registration process should answer:
Why the user is granted the access?
Has the data owner approved the access?
Has the user accepted the responsibility?
4.6.1.2 Privilege User Management
Access privileges are to be aligned with job requirements and responsibilities. The job
requirements are defined and approved by the information asset owner. For example, an
operator at the order counter shall have direct access to order processing activity of the
application system or an assistant in Bank may have access to enter transaction and a
manager can only approve but cannot enter/modify the transaction. Changes in privileges are
common activity based, on changes in roles of users. Sometimes some users are provided
additional privileges for temporary period or during emergencies. Revoking them should be
part of process. Many times, application or database privilege management does not provide
for automatic revocation of such accesses. In such cases, manual monitoring and periodic
reviews are compensating controls to correct the situation.
4.6.1.3 Default Users Management
Applications, operating systems and databases purchased from vendor have provision for
default users with administrative privileges required for implementation and/or maintenance of
application, OS or database. Many-a-times there are multiple default users in the products.
The user ID and Passwords for these default users are published by the vendor in their
user/system manuals. It is expected that these default users’ names and passwords must be
changed as soon as system is implemented. While reviewing logical access controls, IS
auditor must ensure that default user-ids are either disabled, or their passwords have been
changed and suitably controlled by the organization.
4.6.1.4 Password Management
Password management should be taken care of, based on the password policy. Following are
some of the Password management functions:
Allocations of password which is generally done by system administrators
Secure communication of password to the user
Force change on first login by the user so as to prevent possible misuse by system
administrators
Storage of password should not be done in clear text. Most of the systems store
passwords as hash value of the password.
63
Background Material on Information Systems Audit 3.0 Course (Module 5)
64
Logical Access Controls
Enforced path: Based on risk assessment, it is necessary to specify the exact path or
route connecting the networks; say, for example Internet access by employees will be
routed through a firewall.
Clock synchronization: Clock synchronization is useful control to ensure that event
and audit logs maintained across an enterprise are in synch and can be correlated. This
helps in auditing and tracking of transactions along with date and time that is uniform
across organization. In modern networks, this function is centralized and automated.
This may also be useful in case of legal dispute.
65
Background Material on Information Systems Audit 3.0 Course (Module 5)
he/she administers. To address this problem, solutions have been proposed including the
segregation of DBAs from user data, as in the case of the Oracle Database Vault product, and
techniques for joint administration of critical database objects.
Oracle Database Vault restricts access to specific areas in an Oracle database from any user,
including users who have administrative access. For example, company can restrict
administrative access to employee salaries, customer medical records, or other sensitive
information. This enables company to apply fine-grained access control to its’ sensitive data in
a variety of ways. It hardens company’s Oracle Database instance and enforces industry
standard best practices in terms of separating duties from traditionally powerful users. Most
importantly, it protects the data from super-privileged users but still allows them to maintain
the Oracle databases. Oracle Database Vault is an integral component of the enterprise.
66
Logical Access Controls
transaction beyond this time period. For example, no computer access after 8.00 pm
and before 8.00 am or on a Saturday or Sunday.
The core objective of an IDAM system is setting one identity per individual. Therefore, IDAM
system provides administrators the tools and technologies to enforce logical access control
policies on an ongoing basis across an entire enterprise and to ensure compliance with
corporate policies, legal and regulatory requirements.
Privileged Logons
Privileged user is a user who has been allocated powers within the computer system, which
are significantly greater than those available to the majority of users. Such persons will
include, for example, the system administrator(s) and Network administrator(s) who are
responsible for keeping the system available and may need powers to create new user profiles
as well as add to or amend the access rights of existing users.
Privileged access should be assigned based upon function and job necessity and are subject
to approval by the information owner. All Users that have access to privileged accounts should
67
Background Material on Information Systems Audit 3.0 Course (Module 5)
be assigned their own user ID for normal business use. Privileged Users must use their
personal user IDs for conducting non-privileged activities. Wherever possible the User must
login to a system using their personal user ID prior to invoking a privileged account.
68
Logical Access Controls
69
Background Material on Information Systems Audit 3.0 Course (Module 5)
of the sequence of events of a transaction, from its inception to output of results. Violation
reports present significant, security-oriented events that may indicate either actual or
attempted policy transgressions reflected in the audit trail. Information owner to identify any
unauthorized change or access should regularly review violation reports. Audit information
comprises a history of transactions, including who processed the transaction, the date and
time of the transition, where the transaction occurred, and related information. An audit of
information system security searches for the following:
Internal and external attempts to gain unauthorized access to a system
Patterns and history of accesses
Unauthorized privileges granted to users
Occurrences of intrusions and their resulting consequences
Depending upon requirements, logs are generated at various levels. At application level, logs
of business transaction with time stamp are generated. Administrator activity logs at
application level, data base level, network device level and operating system level are critical
to ensure security. Because of their importance, the integrity of the audit logs should be
maintained.
70
Logical Access Controls
Evaluate the various logical security techniques and mechanisms for their effective
implementation, operation and administration.
Test the effectiveness and efficiency of logical access controls
Test the appropriateness of system configuration and parameter settings.
Test the compliance of system configuration with the organizational information security
policy, standards and manufacturer baseline security requirements.
Test the existence and implementation of process of authorization for configuration of
access security settings and parameters and changes thereto.
Evaluate and review the documentation of controls over privileged and special purpose
logons
Evaluate the existence of procedure for control over purchase, custody and
management of system utilities. Many systems utilities are powerful and can break
through the various levels of access security.
Verify the control of authorization, operation and termination over use of tokens such as
memory and smart cards.
Verify the control over special terminals and devices. For instance, a hub may be
exposed physically but with proper levels of encryption, logical security of information
can be ensured.
Verify the security practices relating to unattended terminals, security of data in transit
and control over production resources.
Verify the logging of transactions and events.
Evaluate mechanisms for vulnerability analysis in s access control features and
software
Evaluate the effectiveness of user management procedures
Test user profiles and group profiles to determine the access privileges and controls
thereon.
Review audit trails, access violation reports in respect of all privileged logons and
special user accounts
Review the adequacy of process for monitoring and incident handling procedures
Review the control over systems files and directories containing critical hardware and
systems software configuration and parameter files such as driver information, etc.
Review the control over application files and directories containing application
programs, support files, program libraries, parameter files, initialization files, etc.
71
Background Material on Information Systems Audit 3.0 Course (Module 5)
Evaluate the control over production data and directories containing production files and
production resources.
Verify whether bypassing of security procedures is being done, if any.
4.12 Summary
When deciding on a logical access control strategy, it is important to review compliance and
internal security requirements necessary to protect access to information assets. This can
best be achieved by conducting a risk analysis that identifies the typical threats and
vulnerabilities. Most important consideration is identifying users, type of access, and the
asset. It is best to adopt a least privilege policy on the basis of “need to know, need to do”.
Auditor should know that access control defines how users should be identified, authenticated,
and authorized. This is generally addressed in information security policies and procedures,
hence the starting point of audit of logical access controls should be to understand the policies
and procedures and ensure that these are implemented uniformly across the organization.
4.13 Questions
1. Which of the following pair of authentications can be considered as two factors?
A. Password and passphrase
B. Passphrase and PIN
C. Token and access card
D. Access card and PIN
2. Which of the following is primary requirement of granting user access to
information asset?
A. Identification
B. Authorization
C. Authentication
D. Need to know
3. Mandatory access controls are those controls that are:
A. Based on global standards
B. Defined by security policy
C. Part of compliance requirements
D. Granted by asset owner
72
Logical Access Controls
73
Background Material on Information Systems Audit 3.0 Course (Module 5)
9. Which of the following attack to break the user password is difficult to control?
A. Brute Force
B. Dictionary attack
C. Spoofing
D. Social engineering
10. Which of the following is a primary objective of implementing logical access
controls?
A. Identify users on the system
B. Fixing accountability of actions
C. Authorize users based on role
D. Compliance with policy
74
Logical Access Controls
configuration. This may also detect unwarranted changes made by a malicious user
(who obtains administrative access) in the password configuration. However, option A
and D may provide assurance for compliance of password policy configurations in the
system, not the policy itself. Option D is not relevant.
8. A is correct answer. Strength of one-time password is that it is active for short time, if
user does not login during that time the one-time password expires. One-time password
is unique for each session and user; however, it is not a strength. It can be
communicated by suitable means.
9. D is correct answer. In Social engineering attacks, the weakest link is unsuspecting
human user. Attacker uses techniques to compel users to reveal passwords and other
confidential information. For example, in Phishing. Other options are technology-based
attacks and can be detected or controlled.
10. C is correct answer. Primary objective of implementing access controls is to restrict
access to authorized people. Fixing accountability of actions is the primary objective of
audit trail. Others are means to implement access controls not objectives.
75
Chapter 5
Network Security Controls
5.1 Introduction
We have seen the use of networks for business communication and application hosting in e-
learning, in this section, we will review the risks and controls that are specific to networked
environment. Now-a-days, real life organizations are using large and complex network
infrastructure. Hence, it is necessary to focus on enterprise architecture as a whole for
designing and implementing controls. Network related controls are important since it is the
first layer of architecture that is generally having focus of attacker. Therefore networks are
also far more vulnerable to external and internal threats.
Organization level general controls like physical security (cables, intruders trying to connect to
network), environmental security (ensuring segregation between electrical and data cables,
protecting cables from rodents), access controls, security policies (acceptable usage of
information assets) are applicable to network security. In addition one needs to look at
network specific controls to ensure that organization’s information security objectives are
achieved.
networks, that aim to compromise the confidentiality, integrity, or availability of data. However
it needs to be understood that most of these threats operate in tandem and it is difficult to
associate them with network security alone. The threats and vulnerabilities are listed under
the following heads:
Information Gathering
Communication Subsystem Vulnerabilities
Protocol Flaws
Impersonation
Message Confidentiality Threats
Message Integrity Threats
Web Site Defacement
Denial of Service
Information Gathering
A serious attacker will spend a lot of time obtaining as much information as s/he may have
about the target before launching an attack. The techniques to gather information about the
networks are examined below:
Port scan: An easy way to gather network information is to use a port scanner, a
program that, for a particular IP address, reports which ports respond to messages and
which of several known vulnerabilities seem to be present.
Social engineering: Social engineering involves using social skills and personal
interaction to get someone to reveal security-relevant information and perhaps even to
do something that permits an attack. The point of social engineering is to persuade the
victim to be helpful. The attacker often impersonates someone occupying a senior
position inside the organization and is in some difficulty. The victim provides the
necessary assistance without verifying the identity of the caller, thus compromising
security.
Reconnaissance: Reconnaissance is the general term for collecting information. In
security, it often refers to gathering discrete bits of information from various sources
and then putting them together to make a coherent picture. One commonly used
reconnaissance technique is “dumpster diving.” It involves looking through items that
have been discarded in garbage bins or waste paper baskets. One might find network
diagrams, printouts of security device configurations, system designs and source code,
telephone and employee lists, and more. Even outdated printouts may be useful.
Operating system and application fingerprinting: Here the attacker wants to know
77
Background Material on Information Systems Audit 3.0 Course (Module 5)
which commercial server application is running, what version, and what the underlying
operating system and version are. How a system responds to a prompt (for instance, by
acknowledging it, requesting retransmission, or ignoring it) can also reveal the system
and version. New features also offer a clue, for example a new version will implement a
new feature but an old version will reject the request. All these peculiarities, sometimes
called the operating system or application fingerprint, can mark the manufacturer and
version.
Bulletin boards and chats: Bulletin boards and chat rooms support exchange of
information among the hackers. Attackers can post their latest exploits and techniques,
read what others have done, and search for additional information on systems,
applications, or sites.
Documentation: The vendors themselves sometimes distribute information that is
useful to an attacker. For example, resource kits distributed by application vendors to
other developers can also give attackers tools to use in investigating a product that can
subsequently be the target of an attack.
Malware: Attacker may use malware like virus or worms to scavenge the system and
keep sending information to attacker over network without the knowledge of system
user.
Exploiting communication subsystem vulnerabilities
Eavesdropping and wiretapping: An attacker can pick off the content of a
communication passing in unencrypted form. The term eavesdrop implies overhearing
without expending any extra effort. For example, an attacker (or a system administrator)
is eavesdropping by monitoring all traffic passing through a node. (The administrator
might have a legitimate purpose, such as watching for inappropriate use of resources.)
A more hostile term is wiretap, which means intercepting communications through some
effort. Passive wiretapping is just “listening,” just like eavesdropping. But active
wiretapping means injecting something into the communication stream. A wiretap can
be done in such a manner that neither the sender nor the receiver of a communication
will know that the contents have been intercepted.
Microwave signal tapping: Microwave signals are broadcast through the air, making
them more accessible to outsiders. An attacker can intercept a microwave transmission
by interfering with the line of sight between sender and receiver. It is also possible to
pick up the signal from an antenna located close to the legitimate antenna.
Satellite signal interception: In satellite communication, the potential for interception
is even greater than with microwave signals. However, because satellite
communications are heavily multiplexed, the cost of extracting a single communication
is rather high.
78
Network Security Controls
Wireless: Wireless networking is becoming very popular, but threats arise in the ability
of intruders to intercept and spoof a connection. A wireless signal is strong for
approximately 30 to 60 meters. A strong signal can be picked up easily. Wireless also
has a second problem, the possibility of unauthorized use of a network connection, or a
theft of service.
Optical fiber: It is not possible to tap an optical system without detection. Further
optical fiber carries light energy, not electricity, which does not emanate a magnetic
field as electricity does. Therefore, an inductive tap is impossible on an optical fiber
cable. However, the repeaters, splices, and taps along a cable are places at which data
may be intercepted more easily than in the fiber cable itself.
Zombies and BOTnet: BOTnets is a term (robotic network) used for virtual network of
zombies. BOTnet operator launches malware/virus on system that once activated
remains on system and can be activated remotely. This malware helps the BOTnet
operator use the compromised system (Zombie) remotely with to launch attack or
collect information. For example Zombies have been used extensively to send e-mail
spam. This allows spammers to avoid detection and presumably reduces their
bandwidth costs, since the owners of zombies pay for their own bandwidth.
Protocol Flaws
Internet protocols are publicly posted for scrutiny. Many problems with protocols have been
identified by reviewers and corrected before the protocol was established as a standard.
Despite this process of peer review, flaws exist in many of the commonly used protocols.
These flaws can be exploited by an attacker. For example FTP is known to transmit
communication including user id and password in plain text.
Impersonation
In many instances, an easy way to obtain information about a network is to impersonate
another person or process. An impersonator may foil authentication by any of the following
means:
Authentication foiled by guessing: Guess the identity and authentication details of
the target, by using common passwords, the words in a dictionary, variations of the user
name, default passwords, etc.
Authentication foiled by eavesdropping or wiretapping: When the account and
authentication details are passed on the network without encryption, they are exposed
to anyone observing the communication on the network. These authentication details
can be reused by an impersonator until they are changed.
Authentication foiled by avoidance: A flawed operating system may be such that the
buffer for typed characters in a password is of fixed size, counting all characters typed,
79
Background Material on Information Systems Audit 3.0 Course (Module 5)
including backspaces for correction. If a user types more characters than the buffer
would hold, the overflow causes the operating system to by-pass password comparison
and act as if a correct authentication has been supplied. Such flaws or weaknesses can
be exploited by anyone seeking unauthorized access.
Non-existent authentication: Here the attacker circumvents or disables the
authentication mechanism at the target computer. If two computers trusts each other’s
authentication an attacker may obtain access to one system through an authentication
weakness (such as a guest password) and then transfer to another system that accepts
the authenticity of a user who comes from a system on its trusted list. The attacker may
also use a system that has some identities requiring no authentication. For example,
some systems have “guest” or “anonymous” accounts to allow outsiders to access
things the systems want to release to the public. These accounts allow access to
unauthenticated users.
Well-Known authentication: Most vendors often sell computers with one system
administration account installed, having a default password. Or the systems come with
a demonstration or test account, with no required password. Some administrators fail to
change the passwords or delete these accounts, creating vulnerability.
Spoofing and masquerading: Both of them are impersonation. Refer to chapter on
logical access controls for details.
Session hijacking: Session hijacking is intercepting and carrying on a session begun
by another entity. In this case the attacker intercepts the session of one of the two
entities that have entered into a session and carry it over in the name of that entity. For
example, in an e- commerce transaction, just before a user places his order and gives
his address, credit number etc. the session could be hijacked by an attacker.
Man-in-the-middle attack: A man-in-the-middle attack is a similar to session hijacking,
in which one entity intrudes between two others. The difference between man-in-the-
middle and hijacking is that a man-in-the-middle usually participates from the start of
the session, whereas a session hijacking occurs after a session has been established.
The difference is largely semantic and not particularly significant.
Message Confidentiality Threats
An attacker can easily violate message confidentiality (and perhaps integrity) because of the
public nature of networks. Eavesdropping and impersonation attacks can lead to a
confidentiality or integrity failure. Here we consider several other vulnerabilities that can affect
confidentiality.
Mis-delivery: Message mis-delivery happens mainly due to congestion at network
elements which causes buffers to overflow and packets dropped. Sometimes messages
80
Network Security Controls
are mis- delivered because of some flaw in the network hardware or software. Most
frequently, messages are lost entirely, which is an integrity or availability issue.
Occasionally, however, a destination address will be modified or some router or
protocol will malfunction, causing a message to be delivered to someone other than the
intended recipient. All of these “random” events are quite uncommon. More frequent
than network flaws are human errors, caused by mistyping an address.
Exposure: The content of a message may be exposed in temporary buffers, at
switches, routers, gateways, and intermediate hosts throughout the network; and in the
workspaces of processes that build, format, and present the message. A malicious
attacker can use any of these exposures as part of a general or focused attack on
message confidentiality.
Traffic analysis (or traffic flow analysis): Sometimes not only is the message itself
sensitive but the fact that a message exists is also sensitive. For example, if a wartime
enemy sees a large amount of network traffic between headquarters and a particular
unit, the enemy may be able to infer that significant action is being planned involving
that unit. In a commercial setting, messages sent from the president of one company to
the president of a competitor could lead to speculation about a takeover or conspiracy
to fix prices.
Message Integrity Threats
In most cases, the integrity or correctness of a communication is more important than its
confidentiality. Some of the threats which could compromise integrity are by:
Changing some or all of the content of a message
Replacing a message entirely, including the date, time, and sender/ receiver
identification
Reusing (replaying) an old message
Combining pieces of different messages into one false message
Changing the apparent source of a message
Redirecting a message
Destroying or deleting a message These attacks can be perpetrated in the ways already
stated, including:
Active wiretap
Trojan horse Impersonation
Compromised host or workstation
81
Background Material on Information Systems Audit 3.0 Course (Module 5)
82
Network Security Controls
83
Background Material on Information Systems Audit 3.0 Course (Module 5)
Injection: Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when
untrusted data is sent to an interpreter as part of a command or query. The attacker’s
hostile data can trick the interpreter into executing unintended commands or accessing
data without proper authorization.
Broken authentication: Application functions related to authentication and session
management is often implemented incorrectly, allowing attackers to compromise
passwords, keys, or session tokens, or to exploit other implementation flaws to assume
other users’ identities temporarily or permanently.
Sensitive data exposure: Many web applications and APIs do not properly protect
sensitive data, such as financial, healthcare, and PII. Attackers may steal or modify
such weakly protected data to conduct credit card fraud, identity theft, or other crimes.
Sensitive data may be compromised without extra protection, such as encryption at rest
or in transit, and requires special precautions when exchanged with the browser.
XML external entities (XXE): Many older or poorly configured XML processors
evaluate external entity references within XML documents. External entities can be
used to disclose internal files using the file URI handler, internal file shares, internal
port scanning, remote code execution, and denial of service attacks.
Broken access control: Restrictions on what authenticated users are allowed to do are
often not properly enforced. Attackers can exploit these flaws to access unauthorized
functionality and/or data, such as access other users’ accounts, view sensitive files,
modify other users’ data, change access rights, etc.
Security misconfiguration: Security misconfiguration is the most commonly seen
issue. This is commonly a result of insecure default configurations, incomplete or ad
hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose
error messages containing sensitive information. Not only must all operating systems,
frameworks, libraries, and applications be securely configured, but also, they must be
patched/upgraded in a timely fashion.
Cross-site XSS: XSS flaws occur whenever an application includes untrusted data in a
new web page without proper validation or escaping, or updates an existing web page
with user-supplied data using a browser API that can create HTML or JavaScript. XSS
allows attackers to execute scripts in the victim’s browser, which can hijack user
sessions, deface web sites, or redirect the user to malicious sites.
Insecure deserialization: Insecure deserialization often leads to remote code
execution. Even if deserialization flaws do not result in remote code execution, they can
be used to perform attacks, including replay attacks, injection attacks, and privilege
escalation attacks.
84
Network Security Controls
85
Background Material on Information Systems Audit 3.0 Course (Module 5)
servers communicate with each other periodically, determining if the other is still active.
If one fails, the other takes over processing.
Eliminate single points of failure: Good network architecture provides for its
availability by eliminating single points of failure. This is true for all critical components
including servers, network devices and communication channels in a network.
5.5.2 Cryptography
Cryptography is a branch of cryptology. It is a method of protecting information and
communications through the use of codes so that only those for whom the information is
intended can read and process it. The pre-fix "crypt" means "hidden" or "vault" and the suffix
"graphy" stands for "writing." There are two essential elements of cryptography, one is
algorithm and the other is key.
Cryptanalysis: The goal of cryptanalysis is to find some weakness or insecurity in a
cryptographic scheme, thus permitting its subversion or evasion.
86
Network Security Controls
Cryptology
Cryptography Cryptanalysis
87
Background Material on Information Systems Audit 3.0 Course (Module 5)
o It is one-way encryption.
o It gives message digest or hash value of fixed length. Length of massage digest
or hash value depends upon hashing algorithm.
o It is always unique to the text. Any change in the text, results in changing the
message digest or hash value dynamically.
Examples of hashing algorithms are MD5, SHA1, SHA2, SHA3 (Secured Hashing Algorithm)
etc.
A cryptographic hash function must ensure that the following is computationally infeasible:
Determining the content of a message from its Cryptographic Checksums
Finding “collisions”, wherein two different messages have the same Cryptographic
Checksums.
Cryptographic checksums are also known as message digests, message authentication
codes, integrity check-values, modification detection codes, or message integrity codes.
5.5.2.2. Public Key Infrastructure (PKI)
A public key infrastructure (PKI) is a set of roles, policies, hardware, software and
procedures needed to create, manage, distribute, use, store and revoke digital
certificates and manage public-key encryption.
Public-key cryptography uses a key pair to encrypt and decrypt content. The key pair
consists of one public and one private key that are mathematically related. Public keys
, which may be disseminated widely, and private keys which are known only to the
owner of the digital certificate.
Components of PKI
Digital Certificates: A Digital Certificate is a digitally signed document that associates a
public key with a individual or web site. The certificate can be used to verify that a public key
belongs to an individual or web site. In a typical public key infrastructure (PKI) scheme, the
signature will be of a certifying/ certification authority (CA). The signatures on a certificate are
attestations by the certificate signer that the identity information and the public key belong
together.
In general it is issued by certifying authorities. However, private digital certificates may also be
generated. Private digital certificates are not acceptable by the legal systems.
Types of digital certificates:
Digital Signing Certificate: Issued to the Individuals
Digital Encryption Certificate: Issued to individuals or servers
Code Signer (Software code)
88
Network Security Controls
89
Background Material on Information Systems Audit 3.0 Course (Module 5)
90
Network Security Controls
Almost any service on the Internet can be protected with TLS. TLS is being used for
Secure online credit card transactions.
Secure system logins and any sensitive information exchanged online e.g. secure
Internet Banking session
Secure cloud-based computing platforms.
Secure connection between E-mail Client and E-mail Server.
91
Background Material on Information Systems Audit 3.0 Course (Module 5)
92
Network Security Controls
93
Background Material on Information Systems Audit 3.0 Course (Module 5)
pre-determined number and then enables the user to access the resources based on
authentication. A weakness in this procedure is call forwarding. An unauthorized person could
enable calls to a pre-determined number to be forwarded to the number designated by him,
thus enabling him to gain unauthorized access to the resources.
Other Controls
To minimize the risk of unauthorized dial-in access, remote users should never store their
passwords in plain text login scripts on notebooks and laptops.
Authentication Servers
In widely dispersed networked environment, it is crucial to accomplish user management and
enabling authorized access to users including to mobile users. In such circumstances all
access control is transferred to a centralized or decentralized access authentication
mechanism. Two of the popular applications of remote authentication mechanisms depending
on centralized/decentralized access authentication implementations are TACACS (Terminal
Access Controller Access Control System) and RADIUS (Remote Authentication Dial in User
Service). Some of the features of such systems are:
Enable secure remote access
Facilitates centralized user management
Facilitates centralized access monitoring and control
Enables modification of users access permission centrally
Provides event logging and extended audit trails
94
Network Security Controls
keystrokes. However, not all viruses carry a destructive payload or attempt to hide
themselves—the defining characteristic of viruses is that they are self-replicating computer
programs which install themselves without the user's consent.
Viruses are classified based on the type of damage they do when infected. The major types
are:
Master boot record (MBR) viruses: Affects the boot sector of storage device and
further infects when the storage is accessed.
Stealth viruses: Stealth viruses hide themselves by tampering the operating system to
fool antivirus software into thinking that everything is functioning normally.
Polymorphic viruses: Polymorphic viruses are difficult to detect because they can
modify themselves and change their identity thus able to hide themselves from antivirus
software
Macro viruses: Macro viruses are the most prevalent computer viruses and can easily
infect many types of applications, such as Microsoft Excel and Word.
Logic bomb/Time bomb: Logic bombs are malicious code added to an existing
application to be executed at a later date. These can be intentional or unintentional. For
example Year 2000 problem was an unintentional logic bomb. Every time the infected
application is run, the logic bomb checks the date to see whether it is time to run the
code. If not, control is passed back to the main application and the logic bomb waits. If
the date condition is correct, the rest of the logic bomb’s code is executed and the
result can be anything from a harmless message to a system crash.
Worms
Worms are stand-alone viruses in that, they are transmitted independently and execute
themselves.
Trojan Horse
It is a malicious code hidden under legitimate program, such as a game or simple utility.
Attackers, to infect the system and then get control remotely, to make that system work for
them, primarily use Trojans.
Malware Protection Mechanisms
Various countermeasures that can be deployed to protect against virus are:
Anti-virus: Antivirus is most common protection from virus. Most of the antivirus software
utilizes a method known as signature detection to identify potential virus attack on a system.
Antivirus tools have three types of controls:
Active monitor: Monitors traffic and activity to check the viruses. Although most tools
95
Background Material on Information Systems Audit 3.0 Course (Module 5)
use signatures, few have developed heuristic scan abilities to look for possible
malicious codes.
Repair or quarantine: These tools try to remove the virus from file/mail or quarantines
and reports.
Scheduled scan: Users are prompted for scanning the storages to detect virus already
present that were not detected by active monitors.
Incident handling: Incident Handling is an action plan for dealing with malware attack. In
case of malware incidents it is most essential to find out root cause to stop the reoccurrence.
Training and awareness programs: Human resources are the weakest link in information
security. Periodic training and awareness programs need to be organized to ensure that
employees and other third party users are made aware of the risks arising out of malware
attack. This covers:
Enforcing policy on use of removable devices
Handling of mail attachments particularly from unknown senders
Accessing Internet
Ensuring antivirus is updated and scheduled scan are performed
5.5.5. Firewalls
The technical details of firewalls, their types and configurations have been dealt with in the e-
learning. Only certain specialized applications of firewalls for network security are dealt with
here.
Intranet
An intranet is a network that employs the same types of services, applications, and protocols
present in an Internet implementation, without involving external connectivity. For example, an
enterprise network employing the TCP/IP protocol suite, along with HTTP for information
dissemination would be considered an Intranet. Most organizations currently employ some
type of intranet, although they may not refer to the network as such. Within the internal
network (intranet), many smaller intranets can be created by the use of internal firewalls. As
an example, an organization may protect its personnel network with an internal firewall, and
the resultant protected network may be referred to as the personnel intranet. Since intranets
utilize the same protocols and application services present on the Internet, many of the
security issues inherent in Internet implementations are also present in intranet
implementations. Therefore, intranets are typically implemented behind firewall environments.
Extranets
An extranet is usually a business-to-business intranet; that is, two intranets are joined via the
96
Network Security Controls
Internet. The extranet allows limited, controlled access to remote users via some form of
authentication and encryption such as provided by a VPN. Extranets share nearly all of the
characteristics of intranets, except that extranets are designed to exist outside a firewall
environment. By definition, the purpose of an extranet is to provide access to potentially
sensitive information to specific remote users or organizations, but at the same time denying
access to general external users and systems. Extranets employ TCP/IP protocols, along with
the same standard applications and services. Many organizations and agencies currently
employ extranets to communicate with clients and customers. Within an extranet, options are
available to enforce varying degrees of authentication, logging, and encryption.
Securing a Firewall
Firewall platforms should be implemented on systems containing operating system builds that
have been stripped down and hardened for security applications. The hardening procedure
used during installation should be tailored to the specific operating system undergoing
hardening. Some often-overlooked issues include the following:
Any unused networking protocols should be removed from the firewall operating system
build. Unused networking protocols can potentially be used to bypass or damage the
firewall environment.
Any unused network services or applications should be removed or disabled. Unused
applications are often used to attack firewalls because many administrators neglect to
implement default-restrictive firewall access controls. In addition, unused network
services and applications are likely to run using default configurations, which are
usually much less secure than production-ready application or service configurations.
Any unused user or system accounts should be removed or disabled. This particular
issue is operating system specific, since all operating systems vary in terms of which
accounts are present by default as well as how accounts can be removed or disabled.
Applying all relevant operating system patches is also critical. Since patches and hot
fixes are normally released to address security-related issues, they should be
integrated into the firewall build process. Patches should always be tested on a non-
production system prior to rollout to any production systems.
Unused physical network interfaces should be disabled or removed from the server
chassis.
97
Background Material on Information Systems Audit 3.0 Course (Module 5)
98
Network Security Controls
Wireless networking presents many advantages like network configuration and reconfiguration
is easier, faster, and less expensive. However, wireless technology also creates new threats
and alters the existing information security risk profile. For example, because communication
takes place "through the air" using radio frequencies, the risk of interception is greater than
with wired networks. If the message is not encrypted, or encrypted with a weak algorithm, the
attacker can intercept and read it, thereby compromising confidentiality.
Wireless network has numerous vulnerabilities such as:
Ad-hoc networks: Ad-hoc networks can pose a security threat. Ad-hoc networks are
defined as peer-to peer networks between wireless computers that do not have an
access point in between them.
Non-traditional networks: Non-traditional networks such as personal network
Bluetooth devices are not safe and should be regarded as a security risk. Even barcode
readers, handheld PDAs, and wireless printers and copiers should be secured. IT
personnel who have narrowly focused on laptops and access points commonly overlook
these non- traditional networks.
MAC spoofing: MAC spoofing is a technique for changing a factory-assigned Media
Access Control (MAC) address of a network interface on a networked device. The MAC
address is hard-coded on a network interface card (NIC) and cannot be changed.
However, there are tools, which can make an operating system believe that the NIC has
a MAC address different from it’s real MAC address.
Man-in-the-middle attacks: A man-in-the-middle attack is an attack which is active
eavesdropping. The attacker makes independent connections with the victims and
relays messages between them to make them believe they are talking directly to each
other over a private connection, when in fact the entire conversation is controlled by the
attacker. The attacker becomes capable enough to capture, insert and modify
messages during message transmission.
Accidental association: Unauthorized access to organization’s wireless and wired
networks can come from a number of different methods and intents. One of these
methods is referred to as “accidental association”. When a user turns on a computer
and it latches on to a wireless access point from a neighboring organization’s
overlapping network, the user may not even know that this has occurred. However, it is
a security breach in that, proprietary organization information is exposed and now there
could exist a link from one organization to the other. This is especially true if the laptop
is also hooked to a wired network.
Denial of service: It is an attempt to make a machine not available to its intended user.
Wireless network provides numerous opportunities to increase productivity and manage costs.
Most common controls, which are implemented in wireless environment, are:
99
Background Material on Information Systems Audit 3.0 Course (Module 5)
100
Network Security Controls
Endpoint security is becoming a more common information security function and greater
concern as more employees bring consumer mobile devices to work and companies
allow its mobile workforce to use these devices on the corporate network.
101
Background Material on Information Systems Audit 3.0 Course (Module 5)
102
Network Security Controls
103
Background Material on Information Systems Audit 3.0 Course (Module 5)
Intercepting mail, courier packages or even trash to search for sensitive information on
printed materials. Social-engineering activities can test a less technical, but equally
important, security component; the ability of the organization’s people to contribute to,
or prevent, unauthorized access to information and information systems.
Risks Associated with Penetration Testing
While management sponsors the penetration testing activities, however, such testing
represents some level of risk. Some of the key risks include the following:
The penetration test team may fail to identify significant vulnerabilities;
Misunderstandings and miscommunications may result in the test objectives not being
achieved;
Testing activities may inadvertently trigger events or responses that may not have been
anticipated or planned for (such as notifying law enforcement authorities);
Sensitive security information may be disclosed, increasing the risk of the organization
being vulnerable to external attacks.
Generally, external experts perform penetration testing, hence it is necessary to enforce
non- disclosure agreement and also classify content of report as confidential, since it
will contain the vulnerabilities within the system.
104
Network Security Controls
considerations and plan accordingly to achieve his audit objectives. The considerations while
auditing network security are:
Locating logical access paths by reviewing network diagrams
Identifying network topologies, virtual paths spanning across LANs, WANs and the open
networks such as shared networks and the Internet
Recognizing logical access threats, risks and exposures in the networked environment
Identifying and controlling over access paths used for distributed processing and
distributed databases
Evaluating network management and change control with respect to technical
components such as modems, switches, routers, firewalls, VPNs, network management
and access control software, encryption, protocols, middleware controls and Internet
security
Identifying information resource owners can be quite complex since in a distributed
computing environment, an application process can span several systems and
networks, including that outside the organization’s control
Evaluating logical network security policies and practices
Evaluate network event logging and monitoring
Evaluating effectiveness of logical access security with respect to network security
components such as:
Firewalls and filtering routers - architecture, configuration setting as per firewall security
policy, port services, anti-virus configuration, reporting and management controls
Intrusion detection systems - architecture, configuration, interface with other security
applications, reporting and management controls
Virtual private networks - architecture, devices, protocol, encryption process integration
with firewall security, change management
Security protocols - selection of appropriate protocol, seamless security integration of
protocols between devices running different protocols
Encryption - selection of appropriate encryption methods to various application
processes
Middleware controls - middleware design and access control with respect to
identification, authentication and authorization, management of components and
middleware change management.
105
Background Material on Information Systems Audit 3.0 Course (Module 5)
5.12 Summary
Networks are veins of market place. Organizations cannot imagine implementing information
system without networks. Networks have added most important attribute to business
performance, that is efficiency. However it is not without risks. This has helped organizations
in expanding their business empire and also attackers, in remaining anonymous. Most security
breaches today are due to availability of networks. And therefore it is most essential for
organizations to protect their networks, in order to ensure that reasonable security has been
implemented. IS auditors, also must focus on the network security. Although sometimes, it
may not be in scope, but considering the architecture, auditors cannot perform any IS audit
without evaluating network controls
Cryptography is the science and art of coding messages, provide us a method to transmit
messages over open networks, like Internet and still achieve the objectives of confidentiality,
integrity, authenticity and non-repudiation. Digital certificates provide a means to digitally sign
the message. PKI offers us the infrastructure to manage the Asymmetric keys, and a means of
certifying the authenticity of holder of key. Cryptographic systems provide ability of secure
communication over networks. Many Secure protocols and frameworks have application of
cryptographic techniques like SSL, HTTPS, IPsec, SSH, SET and S-MIME to name a few.
5.13 Questions
1. Which of the following is a method used to gather information about the
communication network?
A. Reconnaissance
B. Brute force
C. Eavesdropping
D. Wiretapping
2. Message digest helps organization in getting assurance on:
A. Communication delivery
B. Data availability
C. Data integrity
D. Data confidentiality
3. While auditing organization’s network which of the following control IS auditor
must verify first?
A. Encrypted communication
106
Network Security Controls
B. Network zoning
C. Firewall configuration
D. Penetration test report
4. Cryptographic checksum is a network control that:
A. Adds a parity bit after adding the data bits.
B. Translates data in a file into a hash value.
C. Transmits the data after encryption.
D. Translates the data into a parity checksum combination.
5. Primary function of Security operations center (SOC) is to:
A. Define baseline
B. Configure firewall
C. Monitor logs
D. Implement Antivirus
6. The intrusion detection monitoring on a host for data integrity attack by malicious
software is a:
A. Technical control
B. Corrective control
C. Detective Control
D. Preventive Control
7. Which of the following is most important while performing penetration testing?
A. Maintain secrecy about testing
B. Get consent from affected stakeholders
C. Report to be provided to all users
D. Perform test after office hours
8. Most web based application attacks can be prevented by:
A. Input validation
B. Encryption
C. Penetration test
D. Access controls
107
Background Material on Information Systems Audit 3.0 Course (Module 5)
108
Network Security Controls
8. A is correct answer. Most web application attacks like SQL injection can be prevented
by validating input, which can reject the attackers input that can exploit vulnerability.
Encryption may or may not prevent an attack. Penetration test shall provide input on
vulnerability that must be closed. Access controls may prevent some attacks.
9. D is correct answer. Social engineering attack is attack on human and hence no
technology can prevent it. Awareness training best prevents it.
10. D is correct answer. Worms are self-executable. Rest of the options use system
resources for execution of malicious codes.
References
Security in Computing, 3rd Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger
Published Dec 2, 2002 by Prentice Hall.
ISA 2.0 Background Study Material
http://compnetworking.about.com/
http://theirm.org/
http://www.cert.org/
http://www.isaca.org/
http://www.iso.org/iso/home/standards/iso31000.htm
http://www.webopedia.com
https://na.theiia.org/Pages/IIAHome.aspx
https://www.dataprotection.ie/
www.ehow.com
www.en.wikipedia.org
www.firesafetyinstitute.org
www.resources.infosecinstitute.com/access-control-models-and- methods
www.technet.microsoft.com/en-us
https://owasp.org/www-project-top-ten/
https://en.wikipedia.org/wiki/Threat_model#Threat_modeling_tools
https://en.wikipedia.org/wiki/DREAD_(risk_assessment_model)
https://en.wikipedia.org/wiki/STRIDE_(security)
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf
https://en.wikipedia.org/wiki/Separation_of_duties
109
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
ISA Background Material
ISA
ISBN - 978-81-8441-995-5
INFORMATION SYSTEMS
AUDIT 3.0 COURSE
Module - 6
Emerging Technologies
Module - 6
Digital Accounting and Assurance Board
The Institute of Chartered Accountants of India August | 2020 | P2724 (Revised)
ICAI Bhawan,Hostel Block, 7th Floor
A-29, Sector-62 Digital Accounting and Assurance Board
Noida - 201309, India The Institute of Chartered Accountants of India
Tel (Direct): +91 120 3045992/961
Web: www.icai.org (Set up by an Act of Parliament)
New Delhi
Background Material
on
Information Systems Audit 3.0 Course
Module-6 :
Emerging Technologies
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form, or by any means, electronic mechanical, photocopying, recording, or
otherwise, without prior permission, in writing, from the publisher.
DISCLAIMER
The views expressed in this material are those of author(s). The Institute of Chartered Accountants
of India (ICAI) may not necessarily subscribe to the views expressed by the author(s).
The information in this material has been contributed by various authors based on their expertise
and research. While every effort have been made to keep the information cited in this material error
free, the Institute or its officers do not take the responsibility for any typographical or clerical error
which may have crept in while compiling the information provided in this material. There are no
warranties/claims for ready use of this material as this material is for educational purpose. The
information provided in this material are subject to changes in technology, business and regulatory
environment. Hence, members are advised to apply this using professional judgement. Please visit
34& portal for the latest updates. All copyrights are acknowledged. Use of specific
hardware/software in the material is not an endorsement by ICAI.
Email : [email protected]
ISBN : 978-81-8441-995-5
vi
Contents
Learning Objectives....................................................................................................................... ix
6.1. Artificial Intelligence ....................................................................................................... 1
6.1.1 Meaning ................................................................................................................ 1
6.1.2 Examples in Finance ............................................................................................. 8
6.1.3 Use Cases ............................................................................................................. 9
6.1.4 Impact on Audit ..................................................................................................... 9
6.1.5 Risks and Challenges.......................................................................................... 11
6.1.6 Governance and Controls ................................................................................... 12
6.1.7 Professional Opportunities .................................................................................. 12
6.2. Blockchain ..................................................................................................................... 14
6.2.1. Meaning .............................................................................................................. 14
6.2.2. Examples in Finance ........................................................................................... 16
6.2.3. Use Cases ........................................................................................................... 17
6.2.4. Impact on Audit ................................................................................................... 17
6.2.5. Risks and Challenges.......................................................................................... 18
6.2.6. Governance and Controls ................................................................................... 19
6.2.7. Professional Opportunities .................................................................................. 20
6.3. Cloud Computing .......................................................................................................... 22
6.3.1. Meaning .............................................................................................................. 22
6.3.2. Cloud Computing Architecture, Environment and Service Model ........................ 24
6.3.3. Security Frameworks in Cloud ............................................................................ 31
6.3.4. Impact on Audit and auditors............................................................................... 32
6.3.5. Risks and Challenges.......................................................................................... 32
6.3.6. Governance and Controls ................................................................................... 34
6.3.7. Professional Opportunities .................................................................................. 35
6.4. Data Analytics ............................................................................................................... 37
6.4.1. Meaning .............................................................................................................. 37
Emerging Technologies
viii
Learning Objectives:
● Understand concepts of the following Emerging Technologies and the evolving
landscape
○ Artificial Intelligence, Blockchain, Cloud Computing, Data Analytics, Internet of
Things and Robotic Process Automation
● Understand the Impact on the Profession
● Understand the Risks in Emerging Technologies
● Evaluate the approach of Governance and Controls in these Technologies
● Understand the inter-relationship with these emerging technologies.
● Understand Role of Professionals
6.1 Artificial Intelligence
6.1.1 Meaning
Artificial intelligence (AI) is an advanced computer system that can simulate human
capabilities, based on predetermined set of rules. Some of the activities computers with
artificial intelligence are designed for include:
• Speech recognition
• Learning
• Planning
• Problem solving
Machine Learning
It refers to the use of computing resources that have the ability to learn, acquire and apply
knowledge and skills. These cognitive systems have the potential to learn from business
related interactions and deliver evidence-based responses to transform how organizations
think, act and operate.
TRADITIONAL
DATA COMPUTER
OUTPUT
PROGRAM
ARTIFICIAL INTELLIGENCE
DATA COMPUTER
PROGRAM
OUTPUT
2
Emerging Technologies
3
Background Material on Information Systems Audit 3.0 Course (Module 6)
Types of AI
Artificial Intelligence can be divided in various types which are based on capabilities and
based on functionally of AI.
AI: Based on Capabilities
1. Weak AI or Narrow AI:
• Narrow AI is a type of AI, which is able to perform a dedicated task with
intelligence. The most common and currently available AI is Narrow AI in the
world of Artificial Intelligence.
• Narrow AI cannot perform beyond its field or limitations, as it is only trained for
one specific task. Hence it is also termed as weak AI. Narrow AI can fail in
unpredictable ways if it goes beyond its limits.
• Some Examples of Narrow AI are playing chess, purchasing suggestions on e-
commerce site, self-driving cars, speech recognition, and image recognition.
2. General AI:
• General AI is a type of intelligence, which could perform any intellectual task with
efficiency like a human.
• The idea behind the general AI to make such a system that could be smarter and
think like a human.
• Currently, there is no such system exist which could come under general AI and
can perform any task as perfect as a human.
3. Super AI:
• Super AI is a level of Intelligence of Systems at which machines could surpass
human intelligence and can perform any task better than human with cognitive
properties. It is an outcome of general AI.
• Some key characteristics of strong AI include capability include the ability to
think, to reason, solve the puzzle, make judgments, plan, learn, and
communicate by its own.
• Super AI is still a hypothetical concept of Artificial Intelligence.
AI: Based on functionality
1. Reactive Machines
• Purely reactive machines are the most basic types of Artificial Intelligence
systems.
4
Emerging Technologies
• Such AI systems do not store information or past experiences for future actions.
• These machines only focus on current scenarios and react as per possible best
action.
2. Limited Memory
• Limited memory machines can store past experiences or some data for a short
period of time.
• These machines can use stored data for a limited time period only.
• Self-driving cars are one of the best examples of Limited Memory systems.
These cars can store recent speed of nearby cars, the distance of other cars,
speed limit, and other information to navigate the road.
3. Theory of Mind
• Theory of Mind AI should understand the human emotions, people, beliefs, and
be able to interact socially like humans.
• This type of AI machines is still not developed, but researchers are making lots of
efforts and improvement for developing such AI machines.
4. Self-Awareness
• Self-awareness AI is the future of Artificial Intelligence. These machines will be
super intelligent, and will have their own consciousness, sentiments, and self-
awareness.
• These machines will be smarter than human mind.
• Self-Awareness AI does not exist in reality still and it is a hypothetical concept.
AI Platforms
The following are a few of the AI Platforms
• IBM – Watson Analytics
• Google – Deep Mind – Tensor Flow
• Microsoft – Cognitive Services
• Amazon – AWS AI Services
• Facebook – FB Learner Flow
AI and Speech Recognition
Speech recognition is technology that can recognize spoken words, which can then be
converted to text. A subset of speech recognition is voice recognition, which is the technology
5
Background Material on Information Systems Audit 3.0 Course (Module 6)
for identifying a person based on their voice. Speech recognition has become increasingly
embedded in our everyday lives with voice-driven applications like Amazon’s Alexa, Apple’s
Siri, Microsoft’s Cortana, or the many voice-responsive features of Google.
The technology to support voice-powered interfaces is growing powerful by the day. With the
advancements in artificial intelligence and ample amount of speech data that can be easily
mined for machine learning purposes, it would not be surprising if it becomes the next
dominant user interface.
Problem Types & Analytic Techniques used in AI
6
Emerging Technologies
Advantages of AI
1. Error Reduction: Artificial intelligence helps us in reducing the error and the chance of
reaching accuracy with a greater degree of precision. It is applied in various studies such as
exploration of space.
2. Difficult Exploration: Artificial intelligence and the science of robotics can be put to
use in mining and other fuel exploration processes. These complex machines can also be
used for exploring the ocean floor and hence overcome the human limitations.
3. Daily Application: Computed methods for automated reasoning, learning and
perception have become a common phenomenon in our everyday lives. We are also hitting
the road for long drives and trips with the help of GPS. The smartphone is an apt and
everyday example of how we use artificial intelligence. When we take a picture, the artificial
intelligence algorithm identifies and detects the person’s face and tags the individuals when
we are posting our photographs on social media sites.
4. Digital Assistants: Highly advanced organizations use avatars that are replicas or
digital assistants that can actually interact with the users, thus saving the need for human
resources. Emotions are associated with moods that can cloud judgment and affect human
efficiency. This is completely ruled out for machine intelligence.
5. Repetitive Jobs: Repetitive jobs, which are monotonous in nature, can be carried out
with the help of machine intelligence. Machines think faster than humans and can be put to
multi-tasking. Machine intelligence can be employed to carry out dangerous tasks. Their
parameters, unlike humans, can be adjusted. Their speed and time are calculation-based
parameters only.
7
Background Material on Information Systems Audit 3.0 Course (Module 6)
8
Emerging Technologies
9
Background Material on Information Systems Audit 3.0 Course (Module 6)
For all organizations, audit should include AI in its risk assessment and also consider
using AI in its risk-based audit plan.
For organizations exploring AI, audit should be actively involved in AI projects from the
beginning, providing advice and insight, contributing to successful implementation. To
avoid impairment to both independence and objectivity, auditor should not be
responsible for implementation of AI processes, policies and procedures.
Auditor should provide assurance on management of risks related to the reliability of the
underlying algorithms and the data on which the algorithms are based.
AI must be dealt with, disciplined methods to evaluate and improve the effectiveness of
risk management, control and governance process.
Fraud Investigator can use Artificial Intelligence in detecting the fraud. While statistical
& data analysis is used to detect fraud passively, artificial intelligence detects fraud
actively and directly besides improving speed of processing.
It is to be noted that Operational managers should own and manage AI risks on a day-to-day
basis and the auditors should assess operational-level AI policies and procedures, verifying
that control objectives are adequate and working as designed. Further, Compliance, ethics,
risk management, and information privacy and security are some other requirements that
likely to draw attention towards some aspect of AI risks.
Scenarios wherein Artificial intelligence techniques can be used for fraud management:
1. Data mining - is the process of discovering the patterns in large data sets involving
methods at the intersection of machine learning, statistics and database systems. So, data
mining is to classify, cluster and segment the data and also automatically find associations
and rules in the data, which may point towards interesting patterns of fraud.
2. Expert system – knowledge based expert system is used to develop software that
store all the human expertise and then using stored human intelligence to detect fraud.
3. Machine learning and pattern recognition – machine learning is closely related to
computational statistics, which also focuses on prediction making through the use of
information technologies. Machine learning can also be unsupervised and be used to learn
and establish baseline behavioural profiles for various entities and further used to find
meaningful anomalies related to fraud or any other transactions.
4. Neural network – fraud detection system is totally based on the human brain working
principal. Neural network technology has made a computer system capable of reasoning. The
inherent nature of neural networks includes the ability to learn and ability to capture and
represent complex input/output relationship.
10
Emerging Technologies
11
Background Material on Information Systems Audit 3.0 Course (Module 6)
12
Emerging Technologies
CAs possess the domain knowledge and experience to create the relevant learning
algorithms for identifying patterns in Finance and Audit
CAs should work closely with AI programmers to convert their functional ideas into
reality. These concepts and thought process can be extended to various other business
sectors beyond Finance Audit.
The future may see most of the business transactions flowing through neural networks,
which will learn patterns of behaviour and send out real time alerts of any suspicious
transactions for investigation.
The profession can exploit technology and potentially change the scope of what it
means to be a CA. The CFO of the future will need to know as much about technology
as they do about financial management. CAs must embrace technology to be relevant
in the profession and to ensure sustainability and growth in this digital era.
13
Background Material on Information Systems Audit 3.0 Course (Module 6)
6.2 Blockchain
6.2.1 Meaning
Block chain refers to the transparent, thrustless, and publicly accessible ledger that allows us
to securely transfer the ownership of units of value using public key encryption and proof of
work methods.
The technology uses decentralized consensus to maintain the network, which means it is not
centrally controlled by a bank, corporation, or government. In fact, the larger the network
grows and becomes increasingly decentralized, the more secure it becomes.
At its most basic level, blockchain is literally just a chain of blocks, but not in the traditional
sense of those words. When we say the words “block” and “chain” in this context, we are
actually talking about digital information (the “block”) stored in a public database (the “chain”).
14
Emerging Technologies
15
Background Material on Information Systems Audit 3.0 Course (Module 6)
16
Emerging Technologies
on frictionless P2P basis. The blockchain technology’s application has the potential to reduce
risk, transaction costs and to improve speed, efficiency and transparency.
(b) Issuance, ownership and transfer of financial information: A blockchain-based
securities market allows traders to buy or sell stocks directly on exchanges or directly to other
market participants in a P2P manner without the intermediary’s services provided by a broker
or clearing house.
(c) Clearing and settlement latency: On the blockchain, the entire lifecycle of a trade,
including its execution, clearing and settlement can occur at a trade level, lowering post-trade
latency and reducing counterparty.
17
Background Material on Information Systems Audit 3.0 Course (Module 6)
electronic and manual formats. Each audit begins with different information and
schedules that require an auditor to invest significant time when planning an audit.
In a blockchain, the auditor could have near real-time data access via read-only nodes
on blockchains. This may allow an auditor to obtain information required for the audit in
a consistent, recurring format. With blockchain-enabled digitization, auditors could
deploy more automation, analytics and machine-learning capabilities such as
automatically alerting relevant parties about unusual transactions on a near real-time
basis. Supporting documentation, such as contracts, agreements, purchase orders, and
invoices could be encrypted and securely stored or linked to a blockchain. By giving
auditors access to unalterable audit evidence, the pace of financial reporting and
auditing could be improved.
While the audit process may become more continuous, auditors will still have to apply
professional judgment when analysing accounting estimates and other judgments made
by management in the preparation of financial statements. In addition, for areas that
become automated, they will also need to evaluate and test internal controls over the
data integrity of all sources of relevant financial information.
At the same time, an auditor would also have newer roles in this ecosystem. Auditing
Smart Contracts and Oracles, which are embedded into the blockchain, are new roles to
take up. Checks such as interface testing, events, which trigger transactions into the
blockchain, are areas where the auditors may have to focus.
Another area could be audit of consortium blockchains, where as a “Service Auditor” the
auditor can validate the system and set up, and give assurance to the participants on
the conformity of controls in place.
18
Emerging Technologies
(b) Credential Security: Even though the blockchain is known for its high-security levels, a
blockchain-based system is only as secure as the system’s access point. When
considering a public Blockchain-based system, any individual who has access to
the private key of a given user, which enables him/her to “sign” transactions on
the public ledger, will effectively become that user, because most current systems do
not provide multi-factor authentication. Also, loss of an account’s private keys can lead
to complete loss of funds, or data, controlled by this account; this risk should be
thoroughly assessed.
(c) Legal and Compliance: It is a new territory in all aspects without any legal or
compliance precedents to follow, which poses a serious problem for manufacturers and
services providers. This challenge alone will scare off many businesses from using
blockchain technology.
(d) Data security and confidentiality: Not all data on a distributed ledger should be
accessible and available to others. It is feasible that hackers may be able to obtain the
keys to access the data on the disturbed ledger, considering the users having multiple
point of access.
(e) Scalability issues: Relating to the size of blockchain ledger that might lead to
centralization as it's grown over time and required some record management which is
casting a shadow over the future of the blockchain technology.
(f) Interoperability between block chains: There are new blockchain networks showing
up, which lead to new chains that offer different speeds, network processing, use-
cases. Blockchain interoperability aims to improve information sharing across diverse
blockchain networks. These cross-chain services improve blockchain interoperability
and also make them more practical for daily usage
(g) Processing power and time: Required to perform encryption algorithms for all the
objects involved in Blockchain -based ecosystem given the fact that ecosystems are
very diverse and comprised of devices that have very different computing capabilities,
and not all of them will be capable of running the same encryption algorithms at the
desired speed.
(h) Storage will be a hurdle: Blockchain eliminates the need for a central server to store
transactions and device IDs, but the ledger has to be stored on the nodes themselves,
and the ledger will increase in size as time passes. That is beyond the capabilities of a
wide range of smart devices such as sensors, which have very low storage capacity.
19
Background Material on Information Systems Audit 3.0 Course (Module 6)
20
Emerging Technologies
21
Background Material on Information Systems Audit 3.0 Course (Module 6)
22
Emerging Technologies
(iv) Rapid elasticity allows consumers to expand or contract the resources they use from
the pool thereby enabling them to match resource consumption with demand.
(v) Measured service meters what is provided to ensure that consumers only use what they
are allotted, and, if necessary, to charge them for it.
Further, ISO/IEC 17788 lists six key characteristics, the rest of which are identical to the NIST
characteristics. The only addition is multitenancy, which is distinct from resource pooling.
Advantages of Cloud Computing
Cost Efficiency
o Most cost-efficient method to maintain and upgrade. More productivity is
achieved with fewer systems and hence cost per unit of project
Reduce spending on technology infrastructure
o Minimal upfront spending and pay as you go
Unlimited Storage
o Storing information in the cloud gives us almost unlimited storage capacity with
an option to scale
Backup & Recovery
o Backing it up and restoring the same is relatively much easier than storing the
same on a physical device
Automatic Software Integration
o Software integration is usually something that occurs automatically and be
customized with great ease.
Easy Access to Information and Globalize the workforce
o Access the information from anywhere
Reduce Capital costs
o No need to spend huge money on hardware, software etc.
Quick Deployment
o The entire system can be fully functional in a matter of a few minute depending
upon technology
Less Personnel training and minimize maintenance and licensing software
o Fewer people to do more work
Improved Flexibility and effective monitoring of projects
o Quick changes possible
23
Background Material on Information Systems Audit 3.0 Course (Module 6)
24
Emerging Technologies
Private Cloud
resides within the boundaries of an organization and is used exclusively for the
organization’s benefits
built primarily by IT departments within enterprises
Optimize utilization of infrastructure resources
can either be
– private to the organization and managed by the single organization (On-Premise
Private Cloud) or
– can be managed by third party (Outsourced Private Cloud)
Private Cloud – Characteristics
Secure:
– Deployed and managed by the organization itself
– least probability of data being leaked out of the cloud.
Central Control:
– managed by the organization itself,
– no need for the organization to rely on anybody other than operations.
Weak Service Level Agreements (SLAs):
– SLAs are agreements between the user and the service provider
– Formal SLAs do not exist or are weak as it is between the organization and user
of the same organization.
– High availability and good service may or may not be available and is dependent
upon SLAs.
Advantages
– Improve average server utilization
– Reduces costs
– Higher Security & Privacy of User
– Higher automations possible
Limitation
– Invest in buying, building and managing the clouds independently
25
Background Material on Information Systems Audit 3.0 Course (Module 6)
26
Emerging Technologies
Stringent SLAs:
o SLAs strictly and violations are not avoided
Advantages
o widely used at affordable costs
o deliver highly scalable and reliable applications
o no need for establishing infrastructure for setting up and maintaining the cloud.
o Strict SLAs are followed.
o There is no limit for the number of users
Limitations
o Security
o Organizational autonomy are not possible.
Hybrid Cloud
Combination of public, private and community cloud.
Normally a vendor has a private cloud and forms a partnership with public cloud
provider or vice versa
27
Background Material on Information Systems Audit 3.0 Course (Module 6)
Stringent SLAs:
– Overall, the SLAs are more stringent than the private cloud and might be as per
the public cloud service providers.
Complex Cloud Management:
– Cloud management is complex as it involves more than one type of deployment
models and also the number of users is high.
Advantages
– highly scalable and gives the power of both private and public clouds.
– Provides better security than the public cloud.
The limitation
– security features are not as good as the private cloud and complex to manage
Community Cloud
exclusive use by a specific community of consumers from organizations that have
shared concerns
owned, managed, and operated by one or more of the organizations in the community,
a third party or some combination of them
may exist on or off premises
suitable for organizations that cannot afford a private cloud and cannot rely on the
public cloud either
Characteristics of Community Cloud
28
Emerging Technologies
29
Background Material on Information Systems Audit 3.0 Course (Module 6)
30
Emerging Technologies
31
Background Material on Information Systems Audit 3.0 Course (Module 6)
32
Emerging Technologies
33
Background Material on Information Systems Audit 3.0 Course (Module 6)
34
Emerging Technologies
the process for any response to a breach of protocol, and the set of decision makers who are
responsible for mitigation and communication.
The following are critical for having a Governance in place:
(a) Governance of Cloud Computing Services: Governance functions are established to
ensure effective and sustainable management processes that result in transparency of
business decisions, clear lines of responsibility, information security in alignment with
regulatory and customer organization standards, and accountability.
(b) Enterprise Risk Management: Risk management practices are implemented to
evaluate inherent risk within the cloud computing model, identify appropriate control
mechanisms and ensure that residual risk is within acceptable levels.
(c) IT Risk Management: A process to manage IT risk exists and is integrated into the
organization’s overall ERM framework. IT risk management metrics are available for
the information security function to manage risk within the risk appetite of the data
owner.
(d) Third-party Management: The customer recognizes the outsourced relationship with
the service provider. The customer understands its responsibilities for controls, and the
service provider has provided assurances of sustainability of those controls.
(e) Legal Compliance: The service provider and customer establish bilateral agreements
and procedures to ensure contractual obligations are satisfied, and these obligations
address the compliance requirements of both the customer and service provider. Legal
issues relating to functional, jurisdictional and contractual requirements are addressed
to protect both parties, and these issues are documented, approved and monitored. The
use of cloud computing should not invalidate or violate any customer compliance
requirements.
(f) Right to Audit: The right to audit is clearly defined and satisfies the assurance
requirements of the customer’s board of directors, audit charter, external auditors and
any regulators having jurisdiction over the customer.
(g) Certifications: Service provider security assurance is provided through ISO 27001
Certification.
(h) Service Transition Planning: Planning for the migration of data, such as meta data
and access, is essential to reducing operational and financial risk at the end of the
contract. The transition of services should be considered at the beginning of contract
negotiations.
35
Background Material on Information Systems Audit 3.0 Course (Module 6)
(a) Assessment with respect to costs and benefits on migration to cloud versus in-house
tools
(b) Cloud based solution Implementation for clients
(c) Assessment on the model of cloud to be deployed and the variants for the same.
(d) Consulting with respect to the migration from traditional facilities to cloud based
infrastructure.
(e) Training to the user staff as regards the operating of these facilities;
(f) IT audit of these facilities
36
Emerging Technologies
37
Background Material on Information Systems Audit 3.0 Course (Module 6)
Example – Airlines use it to analyse route profitability, Retail chains use it for tracking
customer buying patterns, Banking uses it to analyse the performance of its product.
Data Warehouse is an architecture and Big Data is a technology to handle huge data. If an
organization wants to know what is going on in its operations or next year planning based on
current year performance data etc – it is preferable to choose data warehousing as it needs
reliable data.
If organization needs to compare with a lot of big data, which contain valuable information and
help them to take a better decision like how to lead more revenue or more profitability or more
customers etc, they obviously preferred Big Data approach.
DATA MARTS
These are the subsets of Data Warehouse used by specific business groups like HR, Finance,
Sales, Inventory, Procurement & Resourcing. They are much smaller than Data Warehouses
and usually controlled by a specific department.
BUSINESS INTELLIGENCE (BI)
It encompasses a variety of data analysis tools & applications that access the data within Data
Warehouse and creates reports & dashboards used in decision making
DATABASE
It is generally used to capture and store data from a single source, such as an invoice
transactional system. Databases aren’t designed to run across very large data sets.
DATA LAKE
It is a central storage for all kinds of structured, semi structured or unstructured raw data
collected from multiple sources even outside of company’s operational systems.
Therefore, it is not a good fit for average business analytics but used as a playground by Data
Scientists & other data experts as it allows more types of data analytics. It can be used for text
searches, machine learning & real-time analytics.
DATA SCIENCE
It is a combination of three skills: Statistical/Mathematical, Coding & Domain/Business
knowledge.
Types of data analytics
1. Descriptive Analytics: provides insight based on past information. It is used in the
report generation, providing basic editor function along with the horizontal and vertical
analysis of financial statement.
2. Diagnostic Analytics: examines the cause of past result and is used in variance
analysis and interactive dashboards to examine the causes of past outcome.
38
Emerging Technologies
39
Background Material on Information Systems Audit 3.0 Course (Module 6)
Different common and certain fields which are location, name etc
different
4 Pareto Displays items in two separate tabs of Profiling Payments into High,
80:20 Medium & Low
5 ABC Analysis Displays items in three separate
categories as per the same
percentage given for each category.
6 Quadrant / Displays items in four quadrants as
Pattern per the specific same percentage
Analysis given for each category.
7 Relative Size Displays the variation between highest Deriving vendor ratio of
Factor (RSF) value and 2nd highest value (in terms highest and 2nd highest bill
of difference and proportion). and check ratios beyond a
"x%"
8 Max Variance Displays the variation between highest Deriving vendor ratio of
Factor (MVF) and lowest value (in terms of highest and least bill and
difference and proportion). check ratios beyond a "x%"
9 Benford Law Displays variance in patterns of Identify Payments which fall
numeric data based on Benford Law as an exception to Benford's
for first digit beginning with 1 to 9. Law
40
Emerging Technologies
41
Background Material on Information Systems Audit 3.0 Course (Module 6)
42
Emerging Technologies
43
Background Material on Information Systems Audit 3.0 Course (Module 6)
44
Emerging Technologies
Modelling and Visualization for the purpose of planning or performing the audit.
Financial Statement Assertions can be evaluated by auditors by using data analytics on the
relevant digital data. For example, financial data can be evaluated for:
Completeness: Whether all transactions and the resulting information are complete.
Accuracy: Whether all transactions are processed accurately and as intended and the
resulting information is accurate.
Validity: Whether only valid transactions are processed, and the resulting information is
valid.
Authorization: Whether only appropriately authorized transactions have been
processed.
Segregation of duties: Whether controls regarding appropriate segregation of duties and
responsibilities as defined by management are working as envisaged.
Compliance: Whether all applicable compliances are complied with, within the required
timeframe.
Cut off: Whether only the transactions for the period which they belong are accounted.
45
Background Material on Information Systems Audit 3.0 Course (Module 6)
46
Emerging Technologies
47
Background Material on Information Systems Audit 3.0 Course (Module 6)
Benefits of IoT
The internet of things offers a number of benefits to organizations, enabling them to:
• Monitor their overall business processes;
• Improve the customer experience;
• Save time and money;
• Enhance employee productivity;
• Integrate and adapt business models;
• Make better business decisions; and
• Generate more revenue.
IoT encourages companies to rethink the ways they approach their businesses, industries and
markets and gives them the tools to improve their business strategies.
Advantages of IoT
1. Improved business insight and customer experience – companies are gaining much
greater insights into their business operations and how their customers use their products or
services. When a company understands how its customers use its products, they can better
fulfill their needs and improve the customer experience.
Example: In a shopping environment, IoT is all about reducing friction in the buying
experience and helping customers to interact with products, often in a virtual or augmented
reality environment, pre-purchase. And as with many customer-facing types of IoT
implementation, there are other benefits too: improved stock/inventory control and supply
chain management, for example, as reams of data is gathered about popular products and up-
or cross-selling opportunities.
2. Efficiency and productivity gains - Employees at Ford’s Valencia Engine Assembly
Plant in Spain are using a special suit equipped with body-tracking technology.
The technology is similar to the motion-tracking systems that record how athletes sprint or
turn, or actors move and speak. Ford has been using the same type of technology to design
less physically stressful workstations to enhance its manufacturing processes. By accurately
tracking its workers’ movements, Ford is enabling data-driven changes to its vehicle
production processes, making them safer and more efficient.
3. Asset tracking and waste reduction - Closely linked to efficiency and productivity is
the drive to reduce waste, to which IoT tracking is integral. The more IoT components in a
business operation, the more it stands to benefit from IoT implementation.
48
Emerging Technologies
4. Cost and downtime reductions - One of the benefits of these new insights is often a
reduction in operational expenditure and downtime. For example, the rapid emergence of
digital twin technology - digital models of physical assets built from real-time data, either in
pure data form or as exportable 3D representations - is a key competitive differentiator in
industrial IoT applications.
5. Newer business models - IoT revolve around efficiency, productivity, and process
monitoring and companies recognize the scope for it to provide them with information about
their customers and how they use their products. The IoT also allows organizations to move
away from conventional business models to new revenue streams. The data acquired often
holds value in itself, but, more significantly, customers can be offered subscription-based
services that draw on the connected nature of the company’s products, often offsetting the
initial cost of entry.
49
Background Material on Information Systems Audit 3.0 Course (Module 6)
50
Emerging Technologies
Fig. 6.5.2 Few of the applications of IoT in Smart Cities. Source: Internet
51
Background Material on Information Systems Audit 3.0 Course (Module 6)
remediation. It will also offer real-time management which will enable businesses and
CAs alike to respond to issues immediately.
IoT makes it easier for organizations to keep tabs on their resources, in relation to
Inventory and Assets, and that has direct implications for the accountants who are
responsible for overseeing the budget and its relation to assets.
IoT also helps in reducing time lapse between an event and its recording for more
timely decision making and facilitating assessment of process-driven activities.
With IoT in place, there would be more data, more action, more observation, and
reduction of immediate direct human impact.
Technologies such as Drone can help gathering evidences to support assertions and
perform audit much faster and in fact in real time. This could be used for physical
verification of inventory, assessing the mines and quarries etc.
IoT based automation and intelligent systems can ensure that the presence of
personnel is detected and their physical appearance checked for ensuring the safety
measures have been taken care by the worker, every check conducted leaves an audit
trail and if there are exceptions found and alarms raised with evidences. Also, if the
situation got corrected the issue or alarm raised could get closed. No longer there may
be a need for any such evidences of compliance as the compliance is ensured
automatically.
IoT cloud-based workplace and process enhancements will lead to ground-breaking
transformations. The workplace is now touted to be commonplace for humans as well
as robots to work together. The raw materials needed get demanded or pulled from the
repositories or warehouses based on the jobs at hand and planned for the day. The raw
materials automatically routed to the place of work. Every step moved ahead in the
workflow gets detected or communicated to get additional inputs and take the outputs to
the next step in the process. This kind of a self-managed factory setup will have the all
the statistics and logs around the process already created and available.
Quality will hardly need any sample checks as all the items will go through a
compulsory test. Every item would have its own set of quality requirements embedded
and would reach out to instruments which can verify a specific parameter; thus, each
end product would have its size verified by a machine, based on the specifications
embedded.
The documentation is one thing that may be solved on its own since the workflow or
process maps which would be used for automation themselves are good enough
documentation. Also, the need for documentation now gets reduced from instructional
purposes since it is the IoT data, which drives the processes.
52
Emerging Technologies
53
Background Material on Information Systems Audit 3.0 Course (Module 6)
Challenges
There are many challenges facing the implementation of IoT. The scale of IoT application
services is large, covers different domains and involves multiple ownership entities. There is a
need for a trust framework to enable users of the system to have confidence that the
information and services are being exchanged in a secure environment.
Insecure web interface
Insufficient authentication/authorization
Insecure network services
Lack of transport encryption
Privacy concerns
Insecure cloud interface
Insecure mobile interface
Insufficient security configurability
Insecure software/firmware
Poor physical security
54
Emerging Technologies
55
Background Material on Information Systems Audit 3.0 Course (Module 6)
56
Emerging Technologies
57
Background Material on Information Systems Audit 3.0 Course (Module 6)
58
Emerging Technologies
components will cost extra money and skill set which might not produce the expected results
to the business leaders.
4. Vaguely defined business continuity plans - The expectation about RPA projects is
set in such a way that once the bots are deployed in production, there should be minimum to
no maintenance required to ensure smooth delivery. However, the reality is that it does
require maintenance in terms of identification of new unhandled scenarios during bot
execution. Issues are faced in production environments, defining bot execution schedules
based on requirements from multiple business units operating from different time zones and
mitigation plans during major failures.
59
Background Material on Information Systems Audit 3.0 Course (Module 6)
automation will drive between 75 and 375 million people to reskill themselves and switch
occupations.
Robotic Process Automation (RPA) is not replacing accountants but evolving their role and
augmenting their effectiveness through automation. It is a progressive, positive, and
necessary shift that is creating the digital workspace for accounting and finance professionals
to focus on the greatest value they can provide to their organisation.
Source / References
https://www.isaca.org/pages/default.aspx
https://www.aicpa.org/
https://www.cimaglobal.com/
https://www.accaglobal.com/in/en.html
https://www.nist.gov/
Various Blogs on the Internet
Recommended Reading
ICAI Publication on "Guide to Cloud Computing for Accountants"
ICAI "E- learning on Robotics Process Automation"
ICAI Concept Paper on "Blockchain Technology - Adoption Trends and Implications for
Accountancy Profession"
ICAI Concept Paper on "Embracing Robotic Process Automation - Opportunities and
Challenges for Accountancy Profession"
Webinars organized by Digital Accounting and Assurance Board of ICAI
ICAI Journals
ISACA Publications / Tech Briefs on Emerging Technologies
ISACA Audit Programs on Emerging Technologies
MCQs
1. What does P2P technology stand for?
a. Password to Password
b. Peer to Peer
60
Emerging Technologies
c. Product to Product
d. Private Key to Public Key
2. What is Blockchain?
a. A distributed ledger on a peer to peer network
b. A type of cryptocurrency
c. An exchange
d. A centralized ledger
3. Which of the following is not a step involved in RPA?
a. Preparation of project
b. Development of business cases
c. Implementation of RPA
d. Data Cleaning
4. Which of the following statements about RPA is false?
a. It is walking talking robot
b. It is a computer coded software
c. These are programs that replace human repetitive tasks
d. These perform in cross functional platforms
5. Which of the following is a system of inter-connected and inter-related computing
devices which have ability to transfer the data over network:
a. Blockchain
b. Internet of Things
c. Robotic Process Automation
d. Artificial Intelligence
6. Which one is simplest form of analytics?
a. Predictive
b. Descriptive
c. All of the mentioned
d. Prescriptive
61
Background Material on Information Systems Audit 3.0 Course (Module 6)
62
Emerging Technologies
Answers
1. Option b – Peer to Peer
P2P stands for Peer to Peer Technology where every participant acts as an individual
peer in the network
2. Option a - A distributed ledger on a peer to peer network
Blockchain is a distributed ledger on a peer to peer network
3. Option d – Data Cleaning
Data Cleaning is not an activity within RPA. Preparation of project, Development of
business cases and Implementation of RPA are steps within the RPA project.
4. Option a - It is walking talking robot
RPA is not a walking talking robot. It is instead a computer coded software, that replace
human repetitive tasks which can perform in cross functional platforms
5. Option b - Internet of things
The internet of things, or IoT, is a system of interrelated computing devices, mechanical
and digital machines, objects, animals or people that are provided with unique
identifiers (UIDs) and the ability to transfer data over a network without requiring
human-to-human or human-to-computer interaction.
6. Option b – Descriptive Analytics
Descriptive analytics is a preliminary stage of data processing that creates a summary
of historical data to yield useful information and possibly prepare the data for further
analysis
7. Option b – Data Mining
Data mining refers to a method where companies analyze customer data or other types
of information in an effort to identify patterns and discover relationships between
different data elements.
8. Option b – Data Lake
63
Background Material on Information Systems Audit 3.0 Course (Module 6)
Data Lake is a central storage for all kinds of structured, semi structured or
unstructured raw data collected from multiple sources even outside of company’s
operational systems.
9. Option a – Simulation
Predictive Analytics analyses the past behaviour and makes predictions about the
future to identify the new trends. Simulation is one such technique used in predictive
analytics. Graphical reports and statistical analysis are more commonly associated with
historical / descriptive analytics. Machine Leaning is used in Cognitive analytics.
10. Option c – IaaS
Private, Public and Hybrid are cloud deployment models. IaaS is a Cloud Service Model
as per NIST categorisation.
11. Option b – Big Data
Big Data refers to huge and voluminous data characterised by volume, variety and
velocity. Machine Leaning, Speech recognition and NLP are streams in AI.
12. Option d – Microsoft Power BI
Microsoft Power BI is a predominantly a Data Analytics Platform. Watson, Tensor Flow
and AWS AI are AI Platforms.
64
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
Notes
………………………...................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
..........……………………………………………….........
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................................……………………
…………………………...............................................
...................................................................................
........................................………………......................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
...................................................................................
......................................……………………………..…
.……………................................................................
...................................................................................
...................................................................................
Lab Manuals and Case Studies
INFORMATION SYSTEMS AUDIT 3.0 COURSE
Lab Manuals
and Case Studies
ISBN - 978-81-8441-995-5
INFORMATION SYSTEMS
AUDIT 3.0 COURSE
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form, or by any means, electronic mechanical, photocopying, recording, or
otherwise, without prior permission, in writing, from the publisher.
DISCLAIMER
The views expressed in this material are those of author(s). The Institute of Chartered Accountants
of India (ICAI) may not necessarily subscribe to the views expressed by the author(s).
The information in this material has been contributed by various authors based on their expertise
and research. While every effort have been made to keep the information cited in this material error
free, the Institute or its officers do not take the responsibility for any typographical or clerical error
which may have crept in while compiling the information provided in this material. There are no
warranties/claims for ready use of this material as this material is for educational purpose. The
information provided in this material are subject to changes in technology, business and regulatory
environment. Hence, members are advised to apply this using professional judgement. Please visit
34& portal for the latest updates. All copyrights are acknowledged. Use of specific
hardware/software in the material is not an endorsement by ICAI.
Email : [email protected]
ISBN : 978-81-8441-995-5
vi
Contents
Module 1 Case Study 1: IT Enabled Assurance Services 1
Module 1 Lab Manual 1: Audit Planning 5
Module 1 Case Study 2: CAAT 7
Module 1 Lab manual 2: IS Audit Report 9
Module 2 Case Study 3: Governance 13
Module 2 Lab Manual 3: Asset Classification & Criticality 18
Module 2 Case Study 4: BCP / DRP 22
Module 2 Lab Manual 4: Risk Assessment and Treatment 26
Module 3 Case Study 5: SDLC 33
Module 3 Lab Manual 5: Input Validation 38
Module 3 Case Study 6: Testing 40
Module 3 Lab Manual 6: RACI Matrix & Threat Modelling 44
Module 4 Case Study 7: Healthcare system implementation 51
Module 4 Lab Manual 7: User Management and Security Policies 56
Module 4 Case Study 8: Help Desk Function / Password Management 65
Module 4 Lab Manual 8: SQL 68
Module 5 Case Study 9: Information Security Management 80
Module 5 Lab Manual 9: Security Controls, Auditing and Firewall Configuration 85
Module 5 Case Study 10: Data Centre Security 98
Module 5 Lab Manual 10: Hygiene Check 101
Glossary 103
MODULE 1
Case Study 1
IT Enabled Assurance Services
Scenario
AIA Aircrafts Ltd., a Company engaged in the manufacturing of private jets and aviation
accessories has implemented a newly conceptualized Firewall System over its legacy ERP
Suite. The company has appointed an IS Auditor to audit the effectiveness of the Firewall
system along with its interfaces with the ERP System. There were multiple Firewalls installed
at the Company but the one placed in between the company intranet and internet is in
question and have some issues.
Initially Firewall audit was not in the plan but included at the last moment at the request of the
auditee. The IS Auditor included the same in the scope of the audit and finally agreed to
conduct the audit.
The IS Auditor, while carrying out an IS Audit, was verifying a sample of Firewall Operation
Logs and found that 2 users were constantly trying to access a particular external source
which was denied by the Firewall system as per the security policy of the company. The
Auditor immediately issued an audit finding and went to seek explanations from the
management.
Moreover, while verifying the Firewall Operation Logs further, he observed that a particular
site was not prevented by the Firewall which, ideally should be prevented as per the
company’s security policy. When, it came to the notice of IT Management, they immediately
re-configured the Firewall and made it proper.
Discussion Points
1. What to do and how to audit firewall during an audit process
2. Roles and responsibilities of an auditor during the audit process
3. Meaning of professional independence may also be discussed.
Questions
As an IS auditor performing the IS audit, respond to the following:
1. What should an IS Auditor do FIRST, when he observed that two users are constantly
trying to access some external sources?
Lab Manuals and Case Studies
Guidelines to Faculty
1. Students may be reminded with the roles and responsibilities of auditor
2. Basics of Firewall
3. Coverage Area: IS Auditor’s Roles and responsibilities.
4. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
5. Relevant Standards / regulations / frameworks like COBIT 2019, ISO27001, and GDPR
may be referred to and explained in the class while discussing the answers.
6. The faculty can teach some theory which s/he might not have covered during the class.
4
Lab Manual 1
Audit Planning
Learning Objective
To make an effective audit plan covering different aspects of IS Audit process - audit charter,
audit planning, audit universe, risk-based audit approach, IS Audit standards, guidelines,
regulations, procedures and audit reporting.
Scenario
A Bank data centre is manned by around 400 people out of whom 250 are from an outsourced
company. There are 50 applications running including their core banking solution. Around 100
plus network devices like firewall, IDS, IPS, Router, Switches, Gateways etc. are there along
with 500 plus high end servers. Appropriate communication lines with all required
redundancies are present. The asset register maintained by the bank is not updated and not
reviewed for the last two years. You will not get the idea of location and ownership of the
asset from this information. There is a Network operation centre (NOC), a building
management system (BMS) and a security operation centre (SOC) separately placed along
the data centre. All infrastructures are managed by the outsourcing agency.
They are having issues with access control mechanism. The menu access was not controlled
by any authorization matrices. Anybody can access any menu in the core banking systems.
System of frisking is there but not regular. Bank’s data centre needs a biometric access
system, but the management feels that implementing biometric control to regulate entry of
people in the data centre will be too costly and complex for them. Therefore, they plan to
appoint extra security guard as a compensatory control who is instructed to allow only those
people into DC who is having appropriate access card and also maintaining a register for
entering access details which is supervised by the security officers. There are three cases of
violation of logical access control happened in recent passed which was recorded in incident
register but no follow-up action was made.
In the data centre, the testing team and development team share the same server and at
times with the permission of the system administrator they access the production system and
implement the program. There is no librarian to maintain version control. Change management
system is also not application driven and done manually. User access review being done once
in a year. DBA team controls the patch management system and the network management
team takes care of anti-malware system. There are also issues with the management of
backup tapes and blank tapes.
Lab Manuals and Case Studies
Step-by-Step Activities:
Activity to be performed in a group (4 or 5 groups depending on number of participants).
Each group will present the output within 5 minutes presentation.
6
Case Study 2
CAAT
Scenario
The IS Auditor has been asked to perform preliminary work that will assess the readiness of
the organization for a review to measure compliance with new regulatory requirements. These
requirements are designed to ensure that management is taking an active role in setting up
and maintaining a well-controlled environment, and accordingly will assess management’s
review and testing of the general IT controls. Areas to be assessed include logical and
physical security, change management, operations control and network management, IT
governance, and end-user computing. The IS auditor has been given six months to perform
this preliminary work so that sufficient time should be available. It should be noted that in
previous years, problems have been identified and reported in the areas of logical security and
change management. Hence these areas would most likely require some degree of
remediation. Logical security deficiencies noted include the sharing of administrator accounts
and failure to enforce adequate controls over passwords. Change management deficiencies
include improper segregation of incompatible duties and failure to document all changes.
Additionally, the process of deploying operating systems update to servers was found to be
only partially effective. Chief Information Officer directed the IS Auditor to report to him
directly. CIO also instructed IT department to make changes in the process flow. Accordingly,
the actions were taken and approval was made by the relevant process owners as well as the
CIO, and then forwarded to the IS auditor for examination.
Discussion points
1. Various types of CAATs
2. Uses of CAATs in continuous audit
3. Change Management process.
Questions
1. What should IS auditor do first?
A. Perform an IT Risk assessment
B. Perform a survey audit of logical access control
C. Revise the Audit plan to focus on risk-based auditing
D. Begin testing controls that the IS Auditor feels are most critical
Lab Manuals and Case Studies
2. While auditing program change management, how the sample should be selected?
A. Change management documents should be selected at random and examined for
appropriateness
B. Changes to production code should be sampled and traced to the appropriate
authorizing documents
C. Change management documents should be selected based on system criticality
and examined for appropriateness
D. Changes to production code should be sampled and traced back to system-
produced logs indicating the date and time of the change.
3. The most appropriate CAAT tools the auditor should use to test security configuration
settings for the entire application system is:
A. Generalised Audit Software (GAS)
B. Test data
C. Utility software
D. Expert system.
Guidelines to Faculty
1. Various types of CAATS may be explained again, if necessary
2. Change management process may also be explained.
3. Coverage area: Change Management and CAAT Tools
4. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
5. Relevant Standards / regulations / frameworks like COBIT 2019, ISO27001, and GDPR
may be referred to and explained in the class while discussing the answers.
6. The faculty can teach some theory which s/he might not have covered during the class.
8
Lab Manual 2
IS Audit Report
Learning Objective
To write an IS Audit report, essential information, applicable general IT controls & application
controls and maintaining quality.
Scenario
A Bank data centre is manned by around 400 people out of which 250 are from an outsourced
company. There are 50 applications running including their core banking solution. Around 100
plus network devices like firewall, IDS, IPS, Router, Switches, Gateways etc. are there along
with 500 plus high end servers. Appropriate communication lines with all required
redundancies are present. The asset register maintained by the bank is not updated and not
reviewed for the last two years. You will not get the idea of location and ownership of the
asset from this information. There is a Network operation centre (NOC), a building
management system (BMS) and a security operation centre (SOC) separately placed along
the data centre. All infrastructures are managed by the outsourcing agency.
They are having issues with access control mechanism. The menu access was not controlled
by any authorization matrices. Anybody can access any menu in the core banking systems.
System of frisking is there but not regular. Bank’s data centre needs a biometric access
system, but the management feels that implementing biometric control to regulate entry of
people in the data centre will be too costly and complex for them. Therefore, they plan to
appoint extra security guard as a compensatory control who is instructed to allow only those
people into DC who is having appropriate access card and also maintaining a register for
entering access details which is supervised by the security officers. There are three cases of
violation of logical access control happened in recent passed which was recorded in incident
register but no follow-up action was made.
In the data centre, the testing team and development team share the same server and at
times with the permission of the system administrator they access the production system and
implement the program. There is no librarian to maintain version control. Change management
system is also not application driven and done manually. User access review being done once
in a year. DBA team controls the patch management system and the network management
team takes care of anti-malware system. There are also issues with the management of
backup tapes and blank tapes.
Lab Manuals and Case Studies
Sample Formats
1. Classification Criteria for Risk
Classification Implication
Very High Breach could result in financial losses, or in exceptionally grave injury
to individual or the organization and the business process will fail
High Breach could result in very serious loss or injury, and the business
process could fail
10
Module 1
Medium Breach could result in serious loss or injury, and the business process
could be negatively affected
0 1 2 3 4
The observations have been classified into five categories based on their Risk / Implication
viz., ’Very High’, 'High', 'Medium', 'Low' and ‘Negligible’. This classification is subjective and is
based on the business criticality, desired correction timeline and on the judgment of the
Business / Infosec team who performed this review.
# Observations Severity
1. Privileged access menu links were accessible from low profile user id High
(Junior Officer Role).
2. There are 48 generic user available in the system with privileged access like High
administrator
3. Menus could be accessed directly without any authentication. High
11
Lab Manuals and Case Studies
12
MODULE 2
Case Study 3
Governance
Scenario
A small organization’s structure consists of the following hierarchy:
The board has approved development of Customer Relationship Management (CRM) software
by the In-house application programmer. In the absence of a full time CTO, the CFO has been
entrusted to monitor the progress of the software being developed and report on its progress
to the Board on a periodic basis. The Data Protection Officer of the company ensures that the
organization processes the personal data of its staff, customers, providers or any other
individuals (also referred to as data subjects) in compliance with the applicable data
protection rules.
The application programmer reports to the Database Administrator and seeks his approval for
any changes to the software code and to access the production data. The database
administrator also migrates the program codes to the production environment.
The CISO had recommended that the development environment (where changes are originally
made) and production environment (what end users use) should be separated, to ensure
Lab Manuals and Case Studies
phased deployment (rollout), testing, and rollback in case of problems. However, due to lack
of funds the company declined his idea.
The Information Systems Auditor carried out an Information Security Audit of the CRM
software and has identified that the software as designed, may be missing several critical
controls regarding how the system stores the sensitive customer information. The audit report
has been submitted to the CFO and to the CISO who in turn presents the audit findings to the
Board. The financial results of the entity are reviewed in detail and signed off by the business
managers for correctness of data contained therein.
Discussion points
1. What should be the Correct Organizational Structures to meet governance objectives?
2. How Segregation of Duties between incompatible functions should be achieved?
3. Distinction between roles of CTO, CISO, CFO, DPO.
4. Change Management Process and its importance.
Questions
1. What would be of GREATEST concern from an IT governance perspective?
A. The organization does not have a full-time CTO.
B. The organization does not have an IT steering committee.
C. The CFO plays a major role in monitoring IT initiatives.
D. The information systems Auditor reports to the CFO.
2. What would be of GREATEST concern from a segregation of duties perspective?
A. Application programmers are required to obtain approval only from the DBA for
direct write access to data.
B. Application programmers are required to turn over the developed program code
to the program librarian for migration to production.
C. The internal audit department reports to the CFO.
D. Business performance reviews are required to be signed off only by the business
managers.
3. Which of the following would BEST address data integrity concerns from a mitigating
control standpoint?
16
Module 2
A. Application programmers are required to obtain approval from DBA for direct
access to data.
B. Application programmers are required to hand over the developed program codes
to the program librarian for transfer to production.
C. The internal audit department reports to the CFO.
D. Business performance results are required to be reviewed and signed off by the
business managers.
4. The auditor has identified that the software may be missing several critical controls
regarding how the system stores sensitive customer information. The IS auditor should
FIRST:
A. Determine whether application programmers have proper training on adequate
security measures.
B. Determine whether system administrators have disabled security controls for any
reason.
C. Verify that security requirements have been properly specified in the project plan.
D. Validate whether security controls are based on requirements which are no
longer valid.
5. The application programmer performs program modifications and migration to the
production environment. Which of the following should the IS auditor recommend?
A. Automated logging of changes to development libraries
B. Additional staff to provide separation of duties
C. Procedures that verify that only approved program changes are implemented
D. Access controls to prevent the operator from making program modifications
Guidelines to Faculty
1. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
2. Standards / regulations / frameworks like COBIT 2019, ISO27001, and GDPR may be
referred to and explained in the class while discussing the answers.
3. The faculty can teach some theory which s/he might not have covered during the
class.
17
Lab Manual 3
Asset Classification & Criticality
Learning Objectives
Review the risk optimization processes and practices in place to assess whether these are
appropriate to mitigate risks as per risk management strategy.
Objective
This exercise is aimed at determining the correct information security classification level for an
information asset for a business process.
An impact assessment matrix is used to assess the impact of the information asset being
compromised, and to guide the determination of the information security classification.
Scenario
GRC Marketing Pvt. Ltd. is an email marketing company in India. It works with leading
companies to send marketing emails to prospective customers on behalf of the client. The
Database of the prospective customers is generated, owned and maintained by GRC
Marketing Pvt. Ltd.
The various business process / departments in the company are as follows:
Email Marketing Department
Finance and Accounts Department
Information Technology Department
Human Resource Department
Compliance Department
You are nominated by the management to classify the assets as per their criticality so that it
can help in the process of conducting a risk assessment.
19
Lab Manuals and Case Studies
20
Module 2
Based on the individual scores assigned to each impact type due to loss of
Confidentiality, Integrity and availability, an average score is calculated for each asset.
Formula to calculate the average:
(Confidentiality Value + Integrity Value + Availability Value)
3
Depending on the average score of the asset, Asset Criticality to the organization is
determined as per the following table:
List out all the critical assets for which the risk assessment has to be performed for the next
activity.
21
Case Study 4
BCP / DRP
Scenario
A small co-operative bank is updating its BCPs and DRPs for its Head / Corporate office and a
network of 25 branch offices. The plan was developed 5 years back, however due to lack of
resources the plan has not been updated since then. Although the plan has been implemented
by the bank and is in force, it has not been tested in any of the years. The new MD of the bank
has decided to update the BCP / DRP and also test the plans for its effectiveness.
The following describes the IT setup of the Bank.
their secure off-site records storage facilities, where they’ll be classified and tagged using the
bank’s schema, tracked with RFID labels, and made available to the bank on demand.
The Branch office data not being so critical follows a different policy. Backup of the data is
performed on a daily basis on tapes. The branches have entered into reciprocal agreements
with the nearby branches of the bank. Daily backup tapes are sent to the reciprocal branch for
offsite storage.
Discussion Points
1. Concepts of MPLS and Turtle Box to be discussed.
2. Difference between Recovery Time Objective (RTO) and Recovery Point Objective
(RPO). RTO of 3 to 5 days for critical applications for a financial institution may have an
adverse impact on business and creditability.
3. Need for VSAT connectivity (advantages / disadvantages), VPN, Proxy servers,
Firewall
4. Issues like testing, workability concerned with Reciprocal arrangements among
branches. Particularly so, when some of the branches are on VSAT.
23
Lab Manuals and Case Studies
5. In view of small size of the bank, are the contracted facilities at Hot Site not over-
estimated?
6. Some of the branches may not have a nearby branch wherein daily transportation of
back-up might not be feasible.
7. Whether the required time-lines will be met by the hot-site service provider in case of
disaster / disruption of services and facilities at its site. How this issue has been
addressed in the contract.
Questions
1. On the basis of the above information, which of the following should the IS auditor
recommend concerning the hot site?
A. Desktops at the hot site should be increased to 1000.
B. An additional 35 servers should be added to the hot site contract.
C. All backup media should be stored at the hot site to shorten the RTO.
D. Desktop and server equipment requirements should be reviewed quarterly.
2. On the basis of the above information, which of the following should the IS auditor
recommend concerning branch office recovery?
A. Add each of the branches to the existing hot site contract.
B. Ensure branches have sufficient capacity to back each other up.
C. Relocate all branch mail and file/print servers to the data centre.
D. Add additional capacity to the hot site contract equal to the largest branch.
3. When developing a disaster recovery plan (DRP), the criteria for determining the
acceptable downtime should be the:
A. Annualized loss expectancy (ALE).
B. Service delivery objective.
C. Quantity of orphan data.
D. Maximum tolerable outage.
4. The PRIMARY outcome of a business impact analysis (BIA) is:
A. A plan for resuming operations after a disaster.
B. A commitment of the organization to physical and logical security.
24
Module 2
Guidelines to Faculty
1. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
2. Relevant Standards / regulations / frameworks like COBIT 2019; ISO22301 may be
referred to and explained in the class while discussing the answers.
3. The faculty can teach some theory which s/he might not have covered during the
class.
25
Lab Manual 4
Risk Assessment and Treatment
Learning Objectives
Review the risk optimization processes and practices in place to assess whether these are
appropriate to mitigate risks as per risk management strategy.
Objective
This exercise is aimed at illustrating the Risk Assessment methodologies and tools and
how these relate to the requirements of the Information Security Management System
of an organization.
It gives the candidate a chance to consider options for evaluating risks and identifying
realistic assessments shown to them during audits. Auditing the risk assessment
demonstrates that the organisation has performed the risk assessment in accordance
with their stated process, and allows the auditor to determine whether or not the risk
assessment is repeatable and logical.
To prepare the candidate for conducting risk assessment by identifying and classifying
assets
To familiarize the candidate with the risk assessment process.
To familiarize the candidate with the risk management process.
To familiarize the candidate with controls to mitigate the risk.
Scenario
In continuation to our previous lab activity, you are nominated by the management to conduct
a risk assessment process of the company. The objective of the assignment is to assess
plausible information security risks to the company.
27
Lab Manuals and Case Studies
28
Module 2
29
Lab Manuals and Case Studies
30
Module 2
31
Lab Manuals and Case Studies
32
MODULE 3
Case Study 5
SDLC
Scenario
EasyCash Pvt Ltd is a virtual pre-paid cards company operating in India. It has its corporate
and registered office in Mumbai. There are various franchisee and distributors of the
EasyCash for distribution of prepaid cards. The cards issued by the company are of 2 types.
One is a virtual card to be used on Internet and the other is a mobile based card to be used on
mobile phones as mobile wallets. The company has its IT systems, but outsourced the data
centre to a company located in Hyderabad called as Netizens India Pvt Ltd. The DR site of the
company is located in Chennai.
EasyCash has about 15 in-house programmers, system administrators, database
administrators, network administrators and security manager. It also outsources key
development of code for new systems which are being planned. HR dept looks after
recruitment, termination, and other HR related matters. Legal dept has about 3 people who
look after agreements and initiating changes to the financials in the agreement, thru back-end
system. All changes to the data are done by IT dept. IT dept also has operations team which
looks after various IT operations such as monitoring of servers and networking devices,
firewall administration, network monitoring, security monitoring, database monitoring and tune
up, transaction logs monitoring and resorting to customer / merchants / franchisees queries.
Since the business of the company is fast expanding, the company has set-up a separate call
centre which is outsourced.
IT Dept has recently developed a MIS system in-house which has gone live recently. However,
users are facing many functionality and other issues in the system. Therefore, users are
suggesting changes to be made to the software. This was also going on when the system was
under development. The management feels that the method used by IT Dept for developing
system is not proper. Users should have been involved more in the system development. The
management also feels that the testing of the software has not been carried out properly.
Later on, System Audit was initiated by the company. Some important observations of the
System Auditors are given below:
1. The system accepts any amount even zero or –ve amounts are accepted by the system
2. All the users can view all the columns of important database tables such as customer
master, customer’s ledgers etc.
3. DBA carries out direct updation of database tables by accessing database directly
4. Developers have followed agile development methodology
Lab Manuals and Case Studies
Discussion points
1. Roles & responsibilities of programmers, system administrators, database
administrators, network administrators and security manager should be discussed.
2. Various types of Application Controls – Source data generation, Input, Processing,
Output etc
3. Various types of Information Systems viz Operator Information System, MIS, DSS etc
4. Various types of operations carried out by IT Dept – e.g. monitoring of centralised IT
equipment, configuration management, user creation etc
5. Importance of users’ involvement in various stages of SDLC
Questions
Based on the above case study, please answer the following questions
1. The management wants to know from the auditor about this recently developed project.
The IS auditor should evaluate which of the following?
A. Business case document
B. Requirements gathered so far
C. Feasibility study document
D. Design and development document
2. The management feeling that, high level of user interaction and participation is required
for system development, will be satisfied by which of the following methodology?
A. Prototyping model
B. Waterfall model
C. V-model
D. Object oriented model
3. System auditor has stated that users are able to view all the columns of some important
tables, to which IT Dept claims that, only authorised users can modify the data in the
important master tables. System auditor should point out which of the following risks?
36
Module 3
A. Confidentiality
B. Integrity
C. Availability
D. Hacking
4. Direct back-end database correction of data by DBA poses which of the following risks,
which is GREATEST?
A. Misappropriation by DBA cannot be ruled out
B. Wrong updation of data by DBA
C. There is no risk, this is a standard practice
D. Users will not know about the changes done by DBA
5. Which of the following will help IT Dept in identifying issues due to lack of applying
operating system patches?
A. A simulated test server for testing patches
B. Install the patches since security is most important
C. Do not install patches for smooth functioning of business application software
D. Modify the business application software
Guidelines to Faculty:
1. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
2. Relevant Standards / regulations / frameworks like COBIT 2019, ISO27001, and GDPR
may be referred to and explained in the class while discussing the answers.
3. The faculty can teach some theory which s/he might not have covered during the class.
37
Lab Manual 5
Input Validation
Learning Objective
Student shall learn about various Input Validations, which are a part of Application Controls.
Input validations ensure that errors are prevented or detected and users are forewarned about
the errors.
Scenario
A company wishes to analyse the bills submitted by various employees for reimbursement.
The newly joined DISA qualified CA from Accounts & Finance Dept has been asked to develop
a system in Excel to enter the mobile bills submitted by the employees. The company also
wants to analyse age wise, amount of bills. The required data items (fields/columns) were
identified by the CA and designed the Excel sheet accordingly. However, when the data was
entered by the accounts dept clerks, on a test basis, it was observed that, erroneous data is
being entered in various columns of excel. Therefore, the CA decided to redesign the Excel
sheet by providing certain Input controls, so that the errors would be minimum.
Certain columns of excel table designed for above purpose are shown in the following table:-
Column
B C D E F G H
A
Date of
Claim Date of Date of Check
receipt of Employee ID Dept ID Dept Name
No bill approval Digit
claim
I J K L M N O P
The following input validation checks were to be designed. You may help the CA to
design these validation checks, in Excel as given below.
Module 3
Note: 2 more input validation checks are not given in the above list which are:
Reasonableness check and Key verification check. Reasonableness check
requires history of transactions should be built. Key verification check requires input
by two separate operators.
39
Case Study 6
Testing
Scenario
Newline Software Systems Pvt Ltd is a software development company based in Pune, India
undertakes software projects in India and outside India. The company has many developers
and other staff such as quality assurance, testers, functional experts, DBAs etc.
Newline has many developers and undertakes development in various platforms. The
company was very small about 5 years ago but has rapidly grown since and now employs
about 400 people.
A new CIO joined the company. After about 6 months in the company, the CIO got a grip on
the company’s software division. CIO discussed and called for meetings with various teams,
users, departmental heads, testers, developers etc.
CIO has made the following observations and put forth them in several meetings:
1. We are undertaking feasibility studies before going ahead with the purchase of the
software or development of a software. However, we are doing only technical studies.
We have to carry out all types of feasibility studies.
2. Recently we have purchased a software based on Internet information. Have we taken
management approval for such a procedure?
3. We carry out UAT which is good. But what about other testing? E.g. have we carried out
a stress testing for our recent web site project for a university? University users have
complained about a very slow response for the web site.
4. Some of the old systems were being reworked to take advantage of new technology.
These systems were successfully implemented and were operational and useful. In
doing so, the old system’s design and some of the developed code was reused and
reengineered. This has been done nicely and I want to congratulate the team for it.
5. How do we decide cost of developing a software? Our accounts department has no clue
about it and when I enquired, I was told that, the developers count the number of lines
of source codes and arrive at the size or the software and number of days it would take.
This is very old method and may not work correctly for modern development
methodology. We have to use latest methods of software size estimation and then
arrive at its cost.
Module 3
6. I have also found that, we are not using project management practices. We manage
projects haphazardly. We have to follow project management techniques such as
PERT/CPM.
7. Our project on medical diagnosis, which is based on artificial intelligence and which we
are developing on a pilot basis for a super speciality hospital has been halted. It was
informed to me that, some expert doctors working on this project have left this hospital
and joined another hospital. This new hospital is now launching the same product which
we thought of.
8. In one of the banking projects, there was a conflict between company’s developers and
bank’s user management. The bank management insisted on exact mapping of the
software modules with the current manual processing done in the bank, which involves
heavy customisation of the software. The bank has appointed an IS auditor to review
the development done by the company so far.
9. Developers are using their own laptops and also take them home, which pose security
threats. Can we eliminate this?
Discussion points
1. What other areas should be included in a Feasibility Study? Can the company accept or
reject in part or full, the feasibility study done by an expert? Who will approve the
Feasibility Study?
2. What are the different types of testing which need to be carried out apart from UAT?
3. How to decide cost of the software? Who will decide it? As mentioned in the case, if
Accounts dept should decide the cost of software, what inputs/training the accounts
dept will require? Which costing model/methods will be used for arriving at cost of
software development?
4. What are important considerations for developing and protecting AI based systems?
5. What is meant by customisation of software? Why it is needed? Can a customisation be
done on a purchased software?
6. If developers have to work from home, should company provide them the laptops or can
company have BYOD policy? If so, what are the precautions the company/developers
should take?
41
Lab Manuals and Case Studies
Questions
Based on the above case study, please answer the following questions
1. Which of the following testing will be done to check by putting limit on the hard disk
space availability or memory space availability?
A. Stress Testing
B. Functional Testing
C. Structural Testing
D. Performance Testing
2. The technique of reworking old systems into new systems, is known as :
A. reengineering.
B. reverse engineering.
C. prototyping.
D. software reuse.
3. Which of the following shall be checked to ensure availability of technical and skilled
human resources required for developing/acquiring and implementing the required
solution?
A. Resources Feasibility
B. Technical Feasibility
C. Economic Feasibility
D. Operational Feasibility
4. In a software development project, if the project is going to overrun, which of the
following should be critically examined? Activities :
A. that have zero slack time.
B. whose sum of activity time is the shortest.
C. that give the longest possible completion time.
D. whose sum of slack time is the shortest.
5. Which of the following method is MOST useful when the project manager is faced with
challenge in delivering on time and with acceptable quality?
A. Assign expert resources to complete critical path activities of the project
42
Module 3
B. Use GANTT chart to allocate 100% of time of expert resources for 90% of work
C. Use GANTT chart to define milestones and make experts responsible for
milestones
D. Identify some activities with slack times and allocate them to expert resources to
reduce slack time.
Guidelines to Faculty
1. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
2. Relevant Standards / regulations / frameworks like COBIT 2019, ISO27001, and GDPR
may be referred to and explained in the class while discussing the answers.
3. The faculty can teach some theory which s/he might not have covered during the class.
43
Lab Manual 6
RACI Matrix & Threat Modelling
Learning Objective
Learn RACI matrix for various roles in requirement analysis phase of SDLC
Identify security objectives of the software, threats to software, vulnerabilities in the
software being developed
Scenario
RACI Matrix is the name given to a table, which is used to describe the type and degree of
involvement that stakeholders have in completing tasks or deliverables for a project or
business process. Also sometimes called the Responsibility Assignment Matrix or Linear
Responsibility Chart, it is a common tool used by business analysts and project managers for
establishing roles and responsibilities early on in a project. In this way it reduces project risk
and sets expectations about the level of involvement that is expected by various stakeholders.
No tasks should have more than one role accountable. Resolve any conflicts where
there is more than one for a particular task.
Share, discuss and agree the RACI Matrix with your stakeholders before your project
starts.
RACI Definitions
R Responsible: person or role responsible for doing or completing the item
A Accountable: person or role accountable for ensuring that the item is
completed
C Consulted: person or role whose subject matter expertise is required in order
to complete the item
I Informed: person or role that must be kept informed of the status of item
completion
Activities and Roles are given in the table for Requirement Analysis phase of SDLC.
You need to identify and map the RACI role definitions for various activities and roles.
Roles Definitions
Project Manager Project managers have the responsibility of the planning,
procurement and execution of a project, in any undertaking that
has a defined scope, defined start and a defined finish;
regardless of industry.
Application An Application Developer is responsible for developing and
Developer modifying source code for software applications.
Business Analyst A business analyst analyzes an organization or business
domain and documents its business or processes or systems,
assessing the business model or its integration with technology.
Solution Architect A solution architect is responsible for the design of one or more
applications or services within an organization, and is typically
part of a solution development team. A solution architect is the
person in charge of leading the practice and introducing the
overall technical vision for a particular solution.
Enterprise An enterprise architect is someone who is responsible for
Architect making sure that a company's business strategy uses proper
technology systems architecture to achieve its goals.
45
Lab Manuals and Case Studies
Roles Definitions
Technology Technology architects are responsible for designing the high-
Architect level structure of new technology solutions, including the
emerging technologies that development teams may use. This
also includes planning the resources needed to implement the
new solution and identifying potential roadblocks.
Technology Technical Support provides assistance and maintenance to all
Support computer systems and hardware. Their work may include
installing, configuring, and updating hardware and software, as
well as fixing any issue related to the equipment that may come
up on a daily basis.
Program/Project The Program/Project Sponsor is an executive with overall
Sponsor accountability for the project. A Program/Project Sponsor acts
as the link between the project, the business community, and
strategic level decision-making groups.
Account Manager The account manager role is to ensure that client needs are
understood and satisfied. They build and manage
client relationships, collect information, and ensure that
company offerings meet the individual needs of clients.
Work Product Work Product Reviewer prepares the test scenarios executes
Reviewer tests on product usability, analyzes test results on database
impacts, errors or bugs, and usability. Also Participates in
design reviews and provides input on requirements, product
design, and potential problems.
Key User A key user is a representative of a number of its own business
processes and they have a leading role within a system
implementation. They represent during (and after) the project
some of the processes in which they are involved.
Steering The Steering Committee’s role is to provide advice, ensure
Committee delivery of the project outputs and the achievement of project
outcomes.
46
Module 3
Requirements Analysis
Roles
Phase
Account Manager/Service
Program/Project Sponsor
Technology Architect
Technology Support
Enterprise Architect
Steering Committee
Solution Architect
Business Analyst
Project Manager
Sr.
Key User
Manager
No.
Activity
1 Confirmation of
Requirement Definition from
Subject Matter Expert
2 Development of Process
model
3 Development of Use Cases
4 Identification of Technology
Platform
5 Evaluation of Technology
Vendor
6 Definition of Reliability,
Availability, SLA
Requirements
7 Definition of performance
needs
8 Identification of Security,
legal, Regulatory and
Compliance Requirements
9 Mapping Existing Solution to
Requirements
10 Identification of Functional
Gaps
11 Identification of phases for
implementation
12 Conducting Requirements
Review
47
Lab Manuals and Case Studies
4. 1.
Document Diagram
and Validate Application
Architecture
3.
Identify 2.
Priorities and Identify
Implement Threats
Controls
48
Module 3
Classify the following items into four groups of “Threat Modelling Process”
49
MODULE 4
Case Study 7
Healthcare System Implementation
Scenario
Star Hospital located in Kolkata, is one of the largest hospitals and has seven Clinics with Out
Patient Department and Pathological facilities. The Hospital has invested to upgrade the
facilities and has been recently rated as one of the best Super Specialty Hospitals in the
country. The Hospital has seen steady growth over the past 3 years. The existing IT
infrastructure including application software was inadequate to support such volume and the
management recently implemented a client-server based Healthcare Information System (HIS)
called Superb-10000. Superb-10000 is an enterprise resource planning software developed on
tier-2 technology. HIS is package software and has been implemented by ABC Consultants in
all 7 Clinics of the Hospital as well.
Each clinic has a high-end PC serving as server, which synchronizes data with the main
server located in the Hospital. Synchronization is scheduled twice a day, once at 12 am and
again at 12 pm.
Post implementation, users observed that the functionalities related to Pathology are not
working as per their requirements and the users started using old standalone Pathology
system. As a result consolidated MIS report could not be generated. Senior management of
the Hospital was facing problem with consolidation of reports in time.
ABC Consultant confirmed that the problems would be addressed in their next version, which
would be ready for release only next year as they are migrating to 3-tier technology. ABC
consultants also informed that company would not provide further support for the current 2-tier
technology. However, they agreed to develop an Interface for the Pathology system for free.
The Interface will work as under:
— HIS will automatically generate text file with necessary data as required by the users at
each clinic in a designated folder in the local server twice a day.
— Data once generated in Clinics will not be selected again by the Interface program.
— Identified Users having access to the folder will upload the text file through FTP to a
designated folder in the Central server of the Hospital.
— No users would have access to this folder in the Hospital, HIS will run a schedule
process every 12 hours to upload the data to central HIS.
— Text file once uploaded in the central HIS will be automatically deleted from the folder
and will be saved in a backup folder.
Lab Manuals and Case Studies
Discussion Points:
1. What are the step-by-step processes to be followed while acquiring new application
systems?
2. What are the basic control points/ security of interface software?
3. What are the different testing mechanisms before implementation of software?
4. What are the strength and weaknesses of centralized and distributed systems?
5. What are the correct processes of generating MIS?
Questions
As an IS Auditor, while performing post-implementation audit, for validating Healthcare
Information System, please address the following:
1. Which of the following may be greatest concern for an IS auditor, while reviewing the
proposed new interface for the Pathology system?
A. System generated text files are uploaded in the Central server by users.
B. HIS is a de-centralized system resulting in various interface problems. .
C. The system is based on an outdated client-server technology.
D. Users do not have access to the folder from which data is uploaded in the central
server.
2. Which of the following could have identified problems with Pathology system before
implementation?
A. Documentation of Users’ Requirements.
54
Module 4
B. Detail SLA should have been signed with the ABC Consultants, so that support is
provided.
C. Quality Assurance (QA) of the software should have been done before
implementation.
D. User Acceptance Testing should have been conducted detail testing.
3. Which of the following is the best control in the new Interface over the others:
A. System uploads file in central server.
B. Users upload files through FTP.
C. Text files are deleted once they are uploaded in central server.
D. Text files are generated twice a day.
4. Which is the following is identified as GREATEST risk by the IS Auditor, while reviewing
the process of generating the consolidated report?
A. The system is a de-centralized system hosted at various locations.
B. The system is based on a tier-2 client-server technology.
C. The reports are generated by the system automatically and are emailed by the
users manually.
D. The reports are generated by the users by running a batch program and are
emailed by the system automatically.
5. Which of the following should be the first preference for an IS auditor, while reviewing
the HIS system post implementation?
A. Evaluating the gap between the functionalities in RFP (Request for Proposal) with
the functionalities provided in HIS.
B. The additional functionalities, which were added after implementation of HIS.
C. The additional functionalities which are available in the new HIS but not used by
the client
D. The SLA (service Level Agreement) between the ABC Consultants and Star
Hospital.
Guidelines to Faculty
1. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
2. Relevant Standards / regulations / frameworks like COBIT 2019, ISO27001, and GDPR
may be referred to and explained in the class while discussing the answers.
3. The faculty can teach some theory which s/he might not have covered during the class.
55
Lab Manual 7
User Management and Security Policies
Learning Objective
To learn controls in user management process
To learn configuration of local security policy such as “Account lockout Policy” and Password
policy
To learn configuration of Access Control List
Scenario
A new user has joined the finance department of an organization. His user-id has to be
registered and access permission are required to be configured according to his roles and
responsibilities. Further, as per information security policy, controls are also to be
implemented. For security events, audit logs are to be generated.
Now when we switch user and logon as ISA user system will force us to change the password.
You may test the options of “Account is disabled” to Disable and then enable an
account.
You should also try the options of making ISA user a member of Administrator group.
Go to Start>Control Panel> Administrative tools > Computer Management>Local User
and Groups>Groups > Administrators
57
Lab Manuals and Case Studies
Go to Start > Control Panel > Administrative tools > Computer Management > Event
Viewer > Windows logs > Security
58
Module 4
Try to configure the Password Policy parameters and read the “explain”.
Go to Start > Control Panel > Administrative tools > Local Security Policy > Account Policy
> Account Lockout Policy
59
Lab Manuals and Case Studies
Try to configure the Account Lockout Policy parameters and read the “explain”.
Go to Start > Control Panel > Administrative tools > Local Security Policy > Local Policy >
Audit Policy
Try to configure the Audit Policy parameters and read the “explain”.
60
Module 4
Go to Start > Control Panel > Administrative tools > Local Security Policy > Local Policy >
User Rights Assignments
61
Lab Manuals and Case Studies
You may add and delete users here and also assign different rights.
By selecting “Security” and then “Advanced”, you may go to the ACL (Access Control
List)
Try to give read only permission on test document to a specific user.
After switching to the specific user, verify the access permission.
This activity helps us to understand the access permission assigned to various users
accordingly to their roles and responsibilities.
Below is the screen shot of Access Control List.
62
Module 4
63
Lab Manuals and Case Studies
You will get various options, for them you may configure audit policy
Click on any option. You will get the audit parameters for that option. Click on any
parameter, it will enable you to configure audit policy. In the following screen, we have
selected “Account Logon” option and “Audit Credential Validation” parameter.
64
Case Study 8
Help Desk Function / Password Management
Scenario
Safe Bank is having more than 1000 branches across the country. They have implemented
Core Banking Solution (CBS), which was maintained by a system integrator along with the
Bank’s own staff. A Tire-III Data centre was established in a metro town with its Disaster
Recovery centre in another metro about 1500 kms apart. They use their own internal network
with mostly leased line, MPLS (Multi Protocol Label Switching) and V-SAT in remote areas.
Operations management activities were mostly managed by Bank’s own staff that controls the
user management as well. Help Desk has recently been outsourced to the system integrator
who manages the entire IT issues of the branches and offices in close co-ordination with the
regional level support personnel from Bank.
One day, a call was received by Help Desk team at Data Centre from a remote Rajasthan
Branch to reset the Branch Manager’s password. Though it was not the responsibility of Help
Desk, but on repeated request by Branch Head, the Help Desk employee arranged to reset
the password through the Bank’s team.
On resetting the password on verbal request, new password was communicated to the user
and also confirmed over e-mail by the Bank’s team to the branch head of Rajasthan branch.
While on-line with VOIP line, the Branch head asked his colleague to verify correctness of his
newly set password which was overheard by the help desk employee.
Help Desk employee was in dire need of some money to repay his debt. For next ten minutes,
he was frantically trying to log on into the system with branch head ID and password, but
failed. He got the access at 11th minute, search the branch database and found a dormant
account having balance of Rs.3,00,000. He immediately informed his friend to deposit Rs. 100
in cash to the said account. On receiving the confirmation from his friend, he transferred Rs
30,000 from the dormant account to his personal account. Afterwards he transferred Rs.
15,000/= from his account to his friend account at Muzaffarpur. The Help Desk employee
immediately informed his friend in Muzaffarpur to withdraw Rs. 10,000/= from his account. His
friend withdrew Rs. 10,000/= from a remote ATM and finding available fund in the account
withdraw another Rs. 5,000/= using nearby ATM at Muzaffarpur Branch.
At the end of the day (during verification process at EOD), Rajasthan branch informed to Data
Centre about two outstanding transactions, which happened with branch head ID but actually
was not done by Branch Head. On further enquiry, it was found that the IP address of the
terminal through which transactions were happened belong to Help Desk. Those transactions
Lab Manuals and Case Studies
were re-verified and on confirmation, instructed the Branch to reverse those transactions and
subsequently to close the branch so that central EOD may take place at Data Centre level.
Ultimately with the help of CCTV logs, actual culprit was identified and he lost his job and
fraud case was registered with the local Police Station.
Discussion points
1. What should be the mechanism of password creation and distribution to restrict its
leakage?
2. Whether maker-checker system has been violated in this case? If yes, how? If no, detail
the process?
3. What should be the process for monitoring error messages?
4. What are the additional control measures may be taken, so that such cases may be
avoided in future?
5. What are the guidelines of outsourcing? How much can be done by whom (internal Vs
external).
66
Module 4
B. Control on IP-range
C. Static IP address
D. Power-on password
4. Find out the best statement relating to outsourcing?
A. Help desk function should not be outsourced
B. No core function should be outsourced
C. Outsourced people should not be accommodated within Data Centre.
D. For each and every operation outsource entity require the prior permission
5. What should be best way of preventing error in the present situation?
A. System should be locked after three/five unsuccessful attempt by the user
B. A higher level of authentication should have been asked when no of attempt
exceed pre-defined level.
C. CISO department should be issuing offline explanation on multiple failures of
logging attempt
D. Help Desk should not have access to banks’ user log-in screen.
Guidelines to Faculty
1. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
2. Relevant Standards / regulations / frameworks like COBIT 2019, ISO27001, and GDPR
may be referred to and explained in the class while discussing the answers.
3. The faculty can teach some theory which s/he might not have covered during the class.
67
Lab Manual 8
SQL
Learning Objectives
1. What is a database – RDBMS and what are database tables?
2. Concept of unique key constraint for a database table. Concept of referential integrity
for two or more database tables
3. What are basic SQL queries such as Select and Update
4. Concept of database audit trail/log with the help of triggers
Scenario
A books library wants to create a simple database of Books and types of books in its library. A
programmer, who is also a DBA, has given this responsibility. He designs a database having 2
tables viz “Books” and “Category”. Columns and other details of table “Books” and table
“Category” are given below. We have to understand the concepts of Primary key, Foreign key,
how to select records from a database table, how to update a record in a database table and
finally how to make an audit log.
69
Lab Manuals and Case Studies
70
Module 4
For this activity a database has already been provided by the name of “DISA-30” Click
on the folder symbol and search folder where you have copied the database file “DISA-
30”, select “DISA-30” and click on “OK”. The database will be added to the
SQLiteStudio screen.
Now, below your database you will see “Tables” and “Views”. You will find 2 tables viz.
“Category” and “Books”.
Table Books – has 6 columns –
(i) Bookid – Integer as Primary Key
(ii) Catcode – Varchar(10)
(iii) Bookname – Varchar(25)
(iv) Authorname – Varchar(30)
(v) Bookprice – Numeric(6,2) ---- 2 decimal places
(vi) Pubyear – Numeric(4)
Table Category – has 2 columns –
(vii) Catcode – Varchar(10) as Primary Key
(viii) Category – Varchar(25), as shown below
71
Lab Manuals and Case Studies
72
Module 4
Select tab “Data”. You will find that this table contains 7 records. Add a new record, by
clicking on the “+” tab. Type in Catcode column “Law” and in Category column “Law
Books”. Since this record is already present, you will not be able to add another record
due to Primary Key constraint defined in the table. You will get an error as shown
below.
Remove the record by clicking on “-“ tab and refresh the table by clicking on
73
Lab Manuals and Case Studies
You will not be able to add the record and will get an error as shown in above diagram.
This is because; we are trying to add a book with Catcode as “Audit”. But this category
is not present in the Category table. This is because, in Books table definition, we have
defined the Catcode column as a “Foreign key” and which is the “Primary key” of
Category table, as given below.
74
Module 4
You will find that, now you are able to add the above record to the “Books” table. This is
because by definition of Referential Integrity “The foreign key column should be either a
valid value or should be Null”.
75
Lab Manuals and Case Studies
Run the following different types of queries and analyse the results.
Note: You can type all the commands given below in upper or lower case. The case of the
characters typed does not matter.
76
Module 4
Add Columns to this newly created “Audit” table : ID –Integer, oldname – Text 25,
newname - Text 25, oldprice - Double, newprice – Double, Datetime – datetime
Now, create a trigger on table books :
o Right click on “Books” table and create trigger as given below.
o Give name to the trigger “audit”.
o Select “AFTER” in column “When”.
o Select “Update OF” and click on next small box. You will get “Triggering columns”
as shown. In that, select “Bookprice”.
o Thus, we are defining a trigger “audit”, to run “After” “Update Of” “Bookprice”.
o Now type the command given in the column “Code”
In Code type the following query
o INSERT INTO Audit (ID, oldname, newname, oldprice, newprice, DATETIME)
VALUES (old.Bookid, old.bookname, new.bookname, old.bookprice,
new.bookprice, datetime('now');;
77
Lab Manuals and Case Studies
Explanation – The command given in “Code” section, inserts a record into table “Audit”
and updates columns mentioned.
Now, give the command
update books set bookprice = 1000 where bookid = 1”.
By giving this command we are updating a record of “bookid = 1”. You will notice that
system gives message that 2 rows are affected. I.e. one row added in Audit table. This
will create a new record in the “Audit” table.
2 Management Accounting Management Accounting 1000 5000 2020-07-11 13:10:11
Note that the time updated is not the current time of your machine, but time set in
SQLiteStudio. If you want your machine’s time, then, change the command in Code
section as (‘now’,’localtime’), instead of just ‘now’.
Faculty Notes
This exercise is supposed to complete in 1.5 hours. However, depending upon batch size and
students, it may take less or more time.
78
MODULE 5
Case Study 9
Information Security Management
Scenario
The IS auditor has recently been asked to perform an external and internal network security
assessment for an organization that processes health insurance claims. The organization has
a complex network infrastructure with multiple local area and wireless networks; a VPN
network connects the head office to the branch offices. Additionally, there is a web site that is
accessed by doctors and hospitals through Internet.
The web site has both public areas and sections containing medical claim information that
requires an ID and password to access. Another web site is also available, which is accessed
through Intranet and allows employees to check on the status of their personal medical claims
and purchase prescription drugs at a discount using a credit card. The VPN network carries
unencrypted non-sensitive statistical data that are sent to regulatory agencies but do not
include any customer identifiable information.
The last review of network security was performed more than five years ago. At that time,
numerous exposures were noted as follows:
1. Firewall rule management was not adequate
2. Patch management for application servers were not being performed.
3. Internet applications were found to be susceptible to SQL injection.
4. Anti Virus software was not installed within the organization.
5. The wireless access points had Dynamic Host Configuration Protocol (DHCP) enabled
for assigning IP addresses to the connected devices.
Since the last review, the following measures have been implemented:
1. A new firewall has been installed.
2. Patch management is now controlled by a centralized mechanism for pushing patches
out to all servers.
3. Internet applications have been upgraded to take advantage of newer technologies.
4. An intrusion detection system has been added, and reports produced by this system are
monitored on a daily basis.
5. Dynamic Host Configuration Protocol (DHCP) also has been disabled at all wireless
access points.
Module 5
Management is also contemplating implementation of an Anti Virus Solution but is not sure
which type of solution should be implemented given the scale of operations.
Traffic over the network involves a mix of protocols, as a number of legacy systems are still in
use. All sensitive network traffic traversing the Internet is first encrypted prior to being sent.
Traffic on the internal local area and wireless networks is encoded in hexadecimal so that no
data appears in clear text. A number of devices also utilize Bluetooth to transmit data between
PDAs and laptop computers.
Discussion points:
1. Discuss about the security in Virtual Private Network (VPN)
2. Discuss about the best practices for patch management
3. Discuss about the DHCP and SQL Injection
Questions
1. In performing an external network security assessment, which of the following should
normally be performed FIRST?
A. Exploitation
B. Enumeration
C. Reconnaissance
D. Vulnerability scanning
2. The Dynamic Host Configuration Protocol (DHCP) is disabled at all wireless access
points. This practice:
A. reduces the risk of unauthorized access to the network.
B. is not suitable for small networks.
C. automatically provides an IP address to anyone.
D. increases the risk associated with Wireless Encryption Protocol (WEP).
3. Which of the following antivirus software implementation strategies would be the MOST
effective in the interconnected corporate network of the organization?
A. Server-based antivirus software
B. Enterprise-based antivirus software
C. Workstation-based antivirus software
D. Perimeter-based antivirus software
83
Lab Manuals and Case Studies
4. Which of the following attacks is MOST likely to impact the availability of a network
resource?
A. Man-in-the-middle
B. Denial-of-service (DoS)
C. Phishing
D. Structured Query Language (SQL) injection
5. Which of the following should be of MOST concern to the IS auditor while reviewing the
corporate web server?
A. System patches are not applied.
B. The server is not accessed through a virtual private network (VPN).
C. Server logs are not being captured.
D. The network address translation is not enabled.
Guidelines to Faculty:
1. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
2. Relevant Standards / regulations / frameworks like COBIT 2019, ISO27001, and GDPR
may be referred to and explained in the class while discussing the answers.
3. The faculty can teach some theory which s/he might not have covered during the class.
84
Lab Manual 9
Security Controls, Auditing and Firewall
Configuration
Learning Objectives
Learn firewall configuration for enabling and disabling services, application or websites
Learn to enable and disable USB mass storage
Learn to use discovery tool for identifying vulnerabilities.
Scenario
An IS auditor has been assigned to audit the end point security controls in an organization.
There are 200 desktops, and 20 laptops in the organization. These end point devices are
running Different versions of Microsoft Windows operating system and some stand alone
applications like MS-Office. Some users are having access to Internet for discharging their
responsibilities. As an IS auditor, you need to verify the compliance of information security
policy of the organization.
CAUTION: Tampering with registry is always a huge risk, please backup registry before
doing this exercise and with utmost caution.
1. Run Regedit.exe
2. Go to HKEY_LOCAL_MACHINE\SYSTEM\Current Control Set\Services\USBSTOR
3. Under start value 3 signifies USB port will accept Storage device.
4. To disable we should make the value as 4.
86
Module 5
Features
1 Device Control :
2 All USB devices are uniquely identified. User can add or remove the devices to the
database. User can bind one or more USB devices to be accessed using enabled
username. Any unauthorized new USB device cannot be accessed, unless it is
registered.
3 User Authentication :
4 Whenever a USB device gets plugged in, the user is asked to authenticate with
username and password. Only authenticated user can access the device. If the user
fails to authenticate, he gets access denied message.
5 Secure Storage :
6 Data on the USB storage devices can be encrypted.
7 Malware Detection:
8 USB Pratirodh scans the plugged USB device for malware.
Benefits
USB device control with password protection
Data Encryption on USB devices
Auto run protection and Malware Detection
Configurable read/write privilege protection
87
Lab Manuals and Case Studies
88
Module 5
On the left pane, we can see various links like, Change notification settings, Turn
Windows Firewall on or off, Restore defaults and Advanced settings etc.
On the right pane, there are two types of networks link for which we can set firewall
settings. They are Home or Work (Private) networks and Public networks
By default the Firewall state is ON for both the networks.
Click the Change Notification settings button in the Allowed Programs window.
Click Allow an app or feature through Windows Firewall in the left column of the
window. Click Advanced settings.
We can see the options of Inbound Rules, Outbound Rules, Connection Security Rules
and Monitoring.
Click on the Inbound Rules link in the left pane. A list of all Inbound Rules is displayed.
We can see the properties of a rule by selecting a rule and then its properties.
89
Lab Manuals and Case Studies
90
Module 5
91
Lab Manuals and Case Studies
Select all the three viz. Domain, Private and Public and click on Next.
92
Module 5
Give name to the rule. Here we have given “Chrome Block”. Click finish.
After this try to run Google Chrome. You should not be able to run Google Chrome.
B. Create a rule to block a website:
In our example we are blocking “icai.org”. Before creating a rule, we need to know the
IP address of the website. For this go to the command prompt after entering “CMD” in
Run and at command prompt write “ping icai.org” and press enter. You will get the IP
address of icai.org.
Click Advanced settings > Outbound Rules > New Rule
The new Rule could be based on Program, Port, Predefined or Custom. We will
build a Custom rule.
93
Lab Manuals and Case Studies
Click on Next.
94
Module 5
95
Lab Manuals and Case Studies
Select all the three viz. Domain, Private and Public and click on Next
Give name to the rule. Here we have given “ICAI block”. Click finish
96
Module 5
Note: Windows Firewall will not work if endpoint security software is installed on your machine.
To make windows firewall effective, you need to disable endpoint security software.
97
Case Study 10
Data Centre Security
Scenario
Client company, Silver Cloud Technologies Inc., a cloud service provider has recently setup a
data centre in Bengaluru, India to serve its clientele from Asia and middle east. This data
centre is supposed to be a Tier-IV data centre with all the redundancies available for all the
facilities. The data centre is setup on a RCC structure with state of the art technology and
equipment. The data centre is secured with high end physical as well as logical security
mechanisms with IT Security policy. IS auditor is appointed to carry out the compliance audit
for IT security and submit the report to the BODs.
The data centre has an electronic badge system as a part of access control mechanism under
which all the employees are allotted a badge having the photo identification as well as a smart
card to gain entry inside the data centre as well as high secured zones of the data centre.
It was also observed that all the access control cards for the visitors are not available in full at
the end of the day and there is no periodical reconciliation of these cards. It may be possible
that some of the cards are missing and not returned by the visitors.
Apart from this, there are Biometric control devices installed at each critical entry points which
are programmed to give access to only those persons who are specifically authorized by the
data centre authorization committee. But the retina scan available at the entry point is not
effective as the female staffs are not willing to come too close to scanner and hence there are
many instances of false rejection cases.
Whenever, a visitor wants to enter the data centre, a written recommendation letter is asked
for. Moreover, a temporary badge is created along with photo identification by registering the
person on the spot. In spite of all these strict measures, when a security guard is busy in
checking the formalities of one visitor, other visitors can bypass the checking process. It was
also observed that no frisking was done at any point of time since inception of the data centre.
Discussion Points
1. Discuss about the various physical access control procedures.
2. What are pros and cons of various bio-metric control procedures?
3. Is there any special logical access control for cloud service providers?
4. What is the meaning of Tier-III or Tier-IV data centre?
Module 5
Questions
As an IS auditor performing the IS audit, respond to the following:
1. Which of the following rate should compulsorily be LOWEST for preventing the
unauthorized user gain entry through biometric devices?
A. False Acceptance Rate (FAR)
B. False Rejection Rate (FRR)
C. Equal Error Rate (EER)
D. Average Error Rate (AER)
2. While verifying the security policy on visitors, the auditor will consider it MOST effective
when
A. A visitor’s photo ID and address proof is scanned and stored for future reference.
B. A visitor is escorted by a specially appointed escort team.
C. A visitor is scanned through x-ray machine and metal detector before entering
into the data centre facility.
D. A log of visitor is maintained with signature and contact number.
3. IS Auditor finds that the Data Centre has a good number of employees working inside it
as well as plenty of servers and network devices. Which of the following fire
extinguishers will BEST suit the needs of the data centre?
A. Wet pipe – Water based sprinkler
B. Carbon Dioxide – air based
C. Halon Gas – air based
D. Dry Pipe – Water based sprinkler
4. Which of the following is the strongest access control mechanism for Data Centre?
A. Finger printing
B. Finger printing with PIN and access card
C. Retina scan, access card and PIN
D. Authority letter, retina scan and access card.
5. What is the immediate action to be taken to improve the access control mechanism?
A. Reconcile the access control cards on daily basis.
99
Lab Manuals and Case Studies
Guidelines to Faculty
1. In all questions, explanation of each incorrect option may be given in a properly
delineated form for easy understanding.
2. Relevant Standards / regulations / frameworks like COBIT 2019, ISO27001, and GDPR
may be referred to and explained in the class while discussing the answers.
3. The faculty can teach some theory which s/he might not have covered during the class.
100
Lab Manual 10
Hygiene Check
Suggested Time: Hygiene Check – 1 hour and Discussion 30 minutes
102
Glossary
1 A proof of concept A proof of concept (POC) is a demonstration, the purpose of
(POC) which is to verify that certain concepts or theories have the
potential for real-world application. POC is therefore a
prototype that is designed to determine feasibility, but does
not represent deliverables.
2 Acceptable Use Policy A policy that establishes an agreement between users and
(AUP) the enterprise and defines for all parties’ the ranges of use
that are approved before gaining access to a network, the
Internet or the services. An AUP clearly states what the user
is allowed and what it is not allowed to do with these
resources.
3 Acceptance Testing Acceptance testing is a test conducted to determine if the
requirements of a specification or contract are met. It may
involve physical tests or performance tests.
4 Access Control The processes, rules and deployment mechanisms that
control access to information systems, resources and
physical access to premises.
5 Access Control List An internal computerized table of access rules regarding the
levels of computer access permitted to logon IDs and
computer terminals. With respect to a computer file system,
it lists permissions attached to an object. An ACL specifies
which users or system processes are granted access to
objects, as well as what operations are allowed on given
objects. Also referred to as access control tables.
6 Access Control Matrix In computer science, an Access Control Matrix or Access
Matrix is an abstract, formal security model of protection
state in computer systems that characterize the rights of
each subject with respect to every object in the system.
7 Active Wiretap Active wiretapping is an attack that attempts to alter data
being communicated or otherwise affect data flow.
8 Adaptive software Adaptive Software Development (ASD) is a direct outgrowth
development (ASD) of an earlier agile framework, Rapid Application
Development (RAD). It aims to enable teams to quickly and
effectively adapt to changing requirements or market needs
Lab Manuals and Case Studies
104
Glossary
105
Lab Manuals and Case Studies
23 Asset Risk Asset Risk is the risk associated with the asset, when any of
the three get compromised: - Integrity, Confidentiality and
Availability. In the context of Investment portfolio, Asset Risk
also refers to market changes or poor investment
performance of a financial asset (e.g. shares, options,
futures, currency).
24 Asset-Liability Asset-Liability Committee – ALCO is a risk-management
Committee - ALCO' committee in a bank or other lending institution that
generally comprises the senior-management levels of the
institution. The ALCO's primary goal is to evaluate, monitor
and approve practices relating to risk due to imbalances in
the capital structure.
25 Assurance Part of corporate governance in which, a management
provides accurate and current information to the
stakeholders about the efficiency and effectiveness of its
policies and operations, and the status of its compliance with
the statutory obligations.
26 Asymmetric Asymmetric cryptography, also known as Public-
cryptography key cryptography is a class of cryptographic protocols based
on algorithms that require two separate keys, one of which is
secret (or private) and the other is public. Although different,
the two parts of this key pair are mathematically linked.
27 Asynchronous A high-bandwidth low-delay switching and multiplexing
Transfer Mode (ATM) technology that allows integration of real-time voice, video
and data. It is a data link layer protocol. ATM is a protocol
independent transport mechanism. It allows high-speed data
transfer rates at up to 155 Mbit/s. The acronym ATM should
not be confused with the alternate usage for ATM, which
refers to an automated teller machine.
28 Attenuation Attenuation is the gradual loss in intensity of signal as it
travels over a media.
29 Availability Availability, in the context of a computer system, refers to
the ability of a user to access information or resources in a
specified location and in the correct format. This term is also
used by some computer storage manufacturers and storage
service providers (SSPs) to describe products and services
that ensure that data continues to be available at a required
106
Glossary
107
Lab Manuals and Case Studies
software commercially.
38 Big data Big data is a broad term for data sets, both structured and
unstructured, so large or complex that traditional data
processing applications are inadequate. It is used to provide
customer insights for transparent and simpler products, by
analyzing and predicting customer behaviour through data
derived from various sources, both internal and external.
39 Biometric Access Biometric access control is the science and technology of
Control Devices the business as it relates to analyzing biological data as a
means to control access. Devices which help in these
controls are called Biometric Access control devices.
40 Biometric Mouse A Biometric Mouse includes a fingerprint reader on the
thumb side of the device. It takes less than a second for the
EyeD Mouse to verify a fingerprint.
41 Biometrics Biometrics is the measurement and statistical analysis of
people's unique physical and behavioural characteristics,
such as a fingerprint, retina scan etc. The technology is
mainly used for identification and access controls.
42 Black-box testing A testing approach that focuses on the functionality of the
application or product, as per specifications and does not
require knowledge of the internal design, structure or logic.
43 Botnet A botnet (also known as a zombie army) is a number of
Internet computers that, although their owners are unaware
of it, have been set up to forward transmissions (including
spam or viruses) to other computers on the Internet.
44 Bring your own Bring your own device (BYOD)—also called bring your own
device (BYOD) technology (BYOT), bring your own phone (BYOP),
and bring your own PC (BYOPC)—refers to the policy of
permitting employees to bring personally owned mobile
devices (laptops, tablets, and smart phones) to their
workplace, and to use those devices to access privileged
company information and applications.
45 Brute force Brute force is a trial and error method used by application
programs to decode encrypted data such as passwords or
Data Encryption Standard (DES) keys, through exhaustive
effort (using brute force) rather than employing intellectual
strategies.
108
Glossary
109
Lab Manuals and Case Studies
organization.
54 Business Drivers A business driver is a resource, process or condition that is
vital for the continued success and growth of a business. A
company must identify its business drivers and attempt to
maximize any that are under their control.
55 Business model In theory and practice, the term business model is used for a
broad range of informal and formal descriptions to represent
core aspects of a business, including purpose, business
process, target customers, offerings, strategies,
infrastructure, organizational structures, sourcing, trading
practices, and operational processes and policies.
56 Business process A business process is a collection of linked tasks which find
their end in the delivery of a service or product to a client.
A business process has also been defined as a set of
activities and tasks that, once completed, will accomplish an
organizational goal.
57 CAAT Any automated audit technique, such as generalized audit
software (GAS), test data generators, computerized audit
programs and specialized audit utilities which helps in
analysing and evaluating data.
58 Call Tree A call tree, sometimes referred to a phone tree, call list,
phone chain or text chain, is a layered hierarchical
communication model used for notifying specific individuals
of an event.
59 Capability Maturity Capability Maturity Model Integration (CMMI) is a model
Model Integration used by many organizations to identify best practices useful
(CMMI) in helping them assess and increase the maturity of their
software development processes.
60 Capacity Planning In information technology, capacity planning is the science
and art of estimating the space, computer hardware,
software and connection infrastructure resources that will be
needed over some future period of time.
61 Cash Reserve Cash Reserve Ratio (CRR) is a specified minimum fraction
Ratio (CRR) of the total deposits of customers, which commercial banks
have to hold as reserves either in cash or as deposits with
the central bank. CRR is set according to the guidelines of
the central bank of a country.
62 Certification & Certification and Accreditation (C&A or CnA) is a process for
110
Glossary
111
Lab Manuals and Case Studies
112
Glossary
75 Cognitive science Cognitive science is the scientific study of the human mind.
The field is highly interdisciplinary, combining ideas and
methods from psychology, computer science, linguistics,
philosophy, and neuroscience.
76 Command Centre A command center or command centre(often called a war
room) is any place that is used to provide
centralized command for some purpose. While frequently
considered to be a military facility, these can be used in
many other cases by governments or businesses.
77 Committee of The Committee of Sponsoring Organizations of the
Sponsoring Treadway Commission (COSO) is a joint initiative of five
Organizations of the private sector organizations, established in the United
Treadway States, dedicated to providing thought leadership to
Commission (COSO) executive management and governance entities on critical
aspects of organizational governance, business ethics,
internal control, enterprise risk management, fraud, and
financial reporting.
78 Common Object The Common Object Request Broker Architecture (CORBA)
Request Broker is a standard defined by the Object Management Group
Architecture (CORBA) (OMG) designed to facilitate the communication of systems
that are deployed on diverse platforms. CORBA enables
collaboration between systems on different operating
systems, programming languages, and computing hardware.
79 Compliance Compliance means conforming to a rule, such as a
specification, policy, standard or law. Compliance is a
prevalent business concern because of an ever-increasing
number of regulations that require companies to be vigilant
about maintaining a full understanding of their
regulatory compliance requirements.
80 Compliance testing Tests of controls designed to obtain audit evidence on both
the effectiveness of the controls and their operation during
the audit period.
81 Compiler A program that translates code written in programming
language (source code) into machine executable instructions
(object code).
82 Component Object Component Object Model (COM) is a binary-interface
standard for software components introduced by Microsoft in
113
Lab Manuals and Case Studies
115
Lab Manuals and Case Studies
117
Lab Manuals and Case Studies
113 Data Base An individual or department responsible for the security and
Administrator information classification implementation of the shared data
(DBA) stored on a database system. This responsibility includes the
design, definition and maintenance of the database.
114 Data Base A software system that controls the organization, storage
Management System and retrieval of data in a database.
(DBMS)
115 Data Diddling Data diddling is the changing of data before or during entry
into the computer system. Examples include forging or
counterfeiting documents used for data entry and
exchanging valid disks and tapes with modified
replacements.
116 Data Encryption An algorithm for encoding binary data. It is a secret key
Standard (DES) cryptosystem published by the National Bureau of Standards
(NBS), the predecessor of the US National Institute of
Standards and Technology (NIST). DES was defined as a
Federal Information Processing Standard (FIPS) in 1976 and
has been used commonly for data encryption in the forms of
software and hardware implementation. (See private key
cryptosystem).
117 Data Flow Diagrams A data flow diagram (DFD) is a graphical representation of
(DFD) the "flow" of data through an information system, modelling
its process aspects. A DFD is often used as a preliminary
step to create an overview of the system, which can later be
elaborated.
118 Data Leak /loss Data loss prevention (DLP) is a strategy for making sure that
Prevention (DLP) end users do not send sensitive or critical information
outside the corporate network. The term is also used to
describe software products that help a network administrator
control what data end users can transfer.
119 Data Management Data management is the development, execution and
supervision of plans, policies, programs and practices that
control, protect, deliver and enhance the value of data and
information assets.
120 Data Migration Data migration is the process of transferring data between
storage types, formats, or computer systems. It is a key
consideration for any system implementation, upgrade or
consolidation.
118
Glossary
119
Lab Manuals and Case Studies
121
Lab Manuals and Case Studies
122
Glossary
123
Lab Manuals and Case Studies
124
Glossary
166 Extranet A private network that resides on the Internet and allows a
company to securely share business information with
customers, suppliers, or other businesses as well as to
execute electronic transactions. different from an intranet in
that it is located beyond the company’s firewall. Therefore,
an extranet relies on the use of securely issued digital
certificates (or alternative methods of user authentication)
and encryption of messages. A virtual private network (VPN)
and tunneling are often used to implement extranets, to
ensure security and privacy
167 Extreme Extreme programming (XP) is a software development
programming (XP) methodology which is intended to improve software quality
and responsiveness to changing customer requirements.
168 False acceptance The false acceptance rate, or FAR, is the measure of the
rate(FAR) likelihood that the biometric security system will
incorrectly accept an access attempt by an unauthorized
user. A system's FAR typically is stated as the ratio of the
number of false acceptances divided by the number of
identification attempts.
169 False rejection The false rejection rate is the measure of the likelihood that
rate (FRR) the biometric security system will incorrectly reject an access
attempt by an authorized user. A system's FRR typically is
stated as the ratio of the number of false rejections divided
by the number of identification attempts.
170 Feasibility The state or degree of being easily or conveniently done.
171 Feasibility Study A phase of a system development life cycle (SDLC)
methodology that researches the feasibility and adequacy of
resources for the development or acquisition of a system
solution to a user need.
125
Lab Manuals and Case Studies
126
Glossary
180 Function Point Function Point Analysis (FPA) is a sizing measure of clear
Analysis (FPA) business significance. First made public by Allan Albrecht of
IBM in 1979, the FPA technique quantifies the functions
contained within software in terms that are meaningful to the
software users.
181 Functional Functional organization is a type of organizational structure
organization that uses the principle of specialization based on function or
role.
182 Functional In software engineering (and systems engineering), a
Requirement functional requirement defines a function of a system and its
components. A function is described as a set of inputs, the
behaviour, and outputs. Functional requirements may be
calculations, technical details, data manipulation and
processing and other specific functionality that define what a
system is supposed to accomplish.
183 Functional testing Functional testing is a quality assurance (QA) process and a
type of black box testing that bases its test cases on the
specifications of the software component under test.
184 Gantt Chart A Gantt chart is a horizontal bar chart developed as a
production control tool in 1917 by Henry L. Gantt, an
American engineer and social scientist. Frequently used in
project management, a Gantt chart provides a graphical
illustration of a schedule that helps to plan, coordinate, and
track specific tasks in a project.
185 Gateway A device (router, firewall) on a network that connects two
networks using different transmission protocols as an
entry/exit point for a network.
186 Generalized audit Multipurpose audit software that can be used for general
software (GAS) processes, such as record selection, matching, recalculation
and reporting.
187 Governance The collection of mechanisms, processes and relations by
which corporations are controlled and operated so that
stakeholder needs, conditions and options are evaluated to
determine balanced, agreed-on enterprise objectives to be
achieved; setting direction through prioritization and decision
making; and monitoring performance and compliance
against agreed on direction and objectives.
127
Lab Manuals and Case Studies
128
Glossary
129
Lab Manuals and Case Studies
131
Lab Manuals and Case Studies
221 Ionosphere The ionosphere is the part of the atmosphere that is ionized
by solar radiation. It plays an important part in atmospheric
electricity and forms the inner edge of the magnetosphere. It
has practical importance because, among other functions, it
influences radio propagation to distant places on the Earth. It
forms the boundary between Earth's lower atmosphere -
where we live and breathe and the vacuum of space.
222 IP Spoofing An attack using packets with the spoofed source Internet
packet (IP) addresses. This technique exploits applications
that use authentication based on IP addresses. This
technique also may enable an unauthorized user to gain root
access on the target system.
223 ISACA ISACA is an international professional association focused
on IT Governance. Previously known as the Information
Systems Audit and Control Association, ISACA now goes by
its acronym only, to reflect the broad range of IT governance
professionals it serves.
224 ISMS (Information An ISMS is a framework of policies and procedures that
Security Management includes all legal, physical and technical controls involved in
System) an organisation's information risk management processes.
225 ISO 27001 ISO 27001:2013 is an information security standard that was
published on the 25th September 2013. It is a specification
for an information security management system (ISMS).
226 ISO 31000 ISO 31000:2009, Risk management – Principles and
guidelines, provides principles, framework and a process for
managing risk. It can be used by any organization regardless
of its size, activity or sector.
227 ISO/IEC 15504 ISO/IEC 15504 Information technology — Process
assessment, also known as SPICE (Software Process
Improvement and Capability Determination), is a set of
technical standards documents for the computer software
development process and related business management
functions.
228 ISO/IEC 27001 The ISO 27000 formally specifies an Information Security
Management System (ISMS), a suite of activities concerning
the management of information risks (called ‘information
security risks’ in the standard). The ISMS is an overarching
132
Glossary
133
Lab Manuals and Case Studies
237 Key Man policies An employer may take out a key person insurance policy on
the life or health of any employee whose knowledge, work,
or overall contribution is considered uniquely valuable to the
company. The employer does this to offset the costs (such
as hiring temporary help or recruiting a successor) and
losses (such as a decreased ability to transact business until
successors are trained) which the employer is likely to suffer
in the event of the loss of a key person.
238 Key Performance A measure that determines how well the process is
Indicator (KPI) performing in enabling the goal to be reached. A lead
indicator of whether a goal will likely be reached or not, and
a good indicator of capabilities, practices and skills. It
measures the activity goal, which is an action that the
process owner must take to achieve effective process
performance.
239 Key Risk Indicator A Key Risk Indicator, also known as a KRI, is a measure
(KRI) used in management to indicate how risky an activity is.
240 Kickoff Meeting The Kickoff Meeting is the first meeting with the project team
and the client of the project. This meeting would follow
definition of the base elements for the project and other
project planning activities.
241 Linker a linker or link editor is a computer program that takes one
or more object files generated by a compiler and combines
them into a single executable file, library file, or another
object file.
242 LISP Acronym for list processor, a high-level programming
language especially popular for artificial intelligence
applications.
243 Loader In computing, a loader is the part of an operating system that
is responsible for loading programs and libraries. It is one of
the essential stages in the process of starting a program, as
it places programs into memory and prepares them for
execution.
244 Logic bomb A logic bomb is a piece of code intentionally inserted into a
134
Glossary
135
Lab Manuals and Case Studies
137
Lab Manuals and Case Studies
139
Lab Manuals and Case Studies
141
Lab Manuals and Case Studies
required.
292 PCI DSS The Payment Card Industry Data Security Standard (PCI
DSS) is a proprietary information security standard for
organizations that handle branded credit cards from the
major card schemes including Visa, MasterCard, American
Express, Discover, and JCB.
293 Penetration test A live test of the effectiveness of security defenses through
mimicking the actions of real life attackers. Penetration
testing, also called pen testing or ethical hacking, is the
practice of testing a computer system, network or web
application to find security vulnerabilities that an attacker
could exploit. Penetration testing can be automated with
software applications or performed manually.
294 Performance testing Comparing the system’s performance to other equivalent
systems, using well-defined benchmarks. Performance
testing is the process of determining the speed,
responsiveness and stability of a computer, network,
software program or device under a workload. Performance
testing can involve quantitative tests done in a lab, or occur
in the production environment in limited scenarios.
295 Personal Identification A type of password (i.e., a secret number assigned to an
Number (PIN) individual) that, in conjunction with some means of
identifying the individual, serves to verify the authenticity of
the individual. PINs have been adopted by financial
institutions as the primary means of verifying customers in
an electronic funds transfer (EFT) system.
296 Personally identifiable Personally identifiable information (PII) is any data that could
information (PII) potentially identify a specific individual. Any information that
can be used to distinguish one person from another and can
be used for de-anonymizing anonymous data can be
considered PII.
297 Phishing This is a type of electronic mail (email) attack that attempts
to convince a user that the originator is genuine, but with the
intention of obtaining information for use in social
engineering. Phishing is the fraudulent attempt to obtain
sensitive information such as usernames, passwords and
credit card details by disguising oneself as a trustworthy
entity in an electronic communication.
142
Glossary
143
Lab Manuals and Case Studies
144
Glossary
145
Lab Manuals and Case Studies
147
Lab Manuals and Case Studies
149
Lab Manuals and Case Studies
150
Glossary
151
Lab Manuals and Case Studies
152
Glossary
153
Lab Manuals and Case Studies
and applications.
379 Simple Object Access A platform-independent formatted protocol based on
Protocol (SOAP) extensible markup language (XML) enabling applications to
communicate with each other over the Internet. Use of
SOAP may provide a significant security risk to web
application operations since use of SOAP piggybacks onto a
web-based document object model and is transmitted via
Hypertext Transfer Protocol (HTTP) (port 80) to penetrate
server firewalls, which are usually configured to accept port
80 and port 21 File Transfer Protocol (FTP) requests. Web-
based document models define how objects on a web page
are associated with each other and how they can be
manipulated while being sent from a server to a client
browser. SOAP typically relies on XML for presentation
formatting and also adds appropriate HTTP-based headers
to send it. SOAP forms the foundation layer of the web
services stack, providing a basic messaging framework on
which more abstract layers can build. There are several
different types of messaging patterns in SOAP but, by far the
most common is the Remote Procedure Call (RPC) pattern,
in which one network node (the client) sends a request
message to another node (the server), and the server
immediately sends a response message to the client.
380 Simplex Simplex communication is a communication channel that
sends information in one direction only.
381 Single Point of Failure A single point of failure (SPOF) is a part of a system that, if it
fails, will stop the entire system from working.
382 Single sign-on (SSO) Single sign-on (SSO) is a property of access control of
multiple related, but independent software systems. With this
property a user logs in with a single ID to gain access to
connected systems without being prompted for different
usernames or passwords, or in some configurations
seamlessly sign on at each system.
383 SMART Objectives SMART is a mnemonic acronym, giving criteria to guide in
the setting of objectives. Objective should be:
Specific – target a specific area for improvement.
Measurable – quantify or at least suggest an indicator of
154
Glossary
progress.
Assignable – specify who will do it.
Realistic – state what results can realistically be achieved,
given available resources.
Time-related – specify when the result(s) can be achieved.
384 Snapshot technique The snapshot technique involves having software take
"pictures" of a transaction as it flows through an application
system. Typically auditors embed the software in the
application system at those points where they deem material
processing occurs.
385 Social Engineering Social engineering is a non-technical method of intrusion.
Hackers use that relies heavily on human interaction and
often involves tricking people into breaking normal security
procedures and their psychological manipulation into
performing actions or divulging confidential information.
386 Social responsibility Social responsibility is an ethical framework which suggests
that an entity, be it an organization or individual, has an
obligation to act for the benefit of society at large. Social
responsibility is a duty every individual has to perform so as
to maintain a balance between the economy and the
ecosystems.
387 Socket A socket is an endpoint for communication between . two
programs running on the network. A socket is bound to a
port number so that the TCP layer can identify the
application that data is destined to be sent to. An endpoint is
a combination of an IP address and a port number.
388 Software Software, in its most general sense, is a set of instructions or
programs instructing a computer to do specific
tasks. Software is a generic term used to describe computer
programs. Scripts, applications, programs and a set of
instructions are all terms often used to describe software.
389 Software Asset Software asset management (SAM) is a business practice
Management that involves managing and optimizing the purchase,
deployment, monitoring, maintenance, utilization, and
disposal of software assets within an organization.
390 Software license A software license is a legal instrument (usually by way of
contract law, with or without printed material) governing the
155
Lab Manuals and Case Studies
156
Glossary
405 Stealth virus A stealth virus is complex malware that hides itself after
157
Lab Manuals and Case Studies
158
Glossary
159
Lab Manuals and Case Studies
161
Lab Manuals and Case Studies
162
Glossary
446 Water fall Model The waterfall model is a sequential design process, used in
software development processes, in which progress is seen
as flowing steadily downwards (like a waterfall) through the
phases of conception, initiation, analysis, design,
construction, testing, production/implementation and
maintenance.
447 Web Service WSDL is an XML format for describing network services as a
Description Language set of endpoints operating on messages containing either
(WSDL) document-oriented or procedure-oriented information. The
operations and messages are described abstractly, and then
bound to a concrete network protocol and message format to
define an endpoint.
448 White-box testing White-box testing (also known as clear box testing, glass
box testing, transparent box testing, and structural testing) is
a method of testing software that tests internal structures or
workings of an application, as opposed to its functionality.
451 Work package (WP) In project management, a work package (WP) is a subset of
a project that can be assigned to a specific part for
execution.
452 Worm A computer worm is a standalone malware computer
program that replicates itself in order to spread to other
163
Lab Manuals and Case Studies
164