Minor Project Report ON: "General It Control - RCM"
Minor Project Report ON: "General It Control - RCM"
Minor Project Report ON: "General It Control - RCM"
ON
“GENERAL IT CONTROL - RCM”
Submitted To
MASTER OF SCIENCE
In
CYBER SECURITY
Submitted By
Sejal Umesh Sawratkar
(032300300008002025)
a. The work contained in the dissertation is original and has been done by
myself under the supervision of Dr. Raj Jaiswal.
b. The work has not been submitted to any other Institute for any degree or
diploma.
c. I have conformed to the norms and guidelines given in the Ethical Code of
Conduct of the Institute.
d. Whenever I have used materials (data, theoretical analysis, and text) from
other sources, I have given due credit to them by citing them in the text of the
dissertation and giving their details in the references.
e. Whenever I have quoted written materials from other sources and due credit
is given to the sources by citing them.
f. From the plagiarism test, it is found that the similarity index of whole
dissertation 15% and single paper is less than 10 % as per the university
guidelines.
I
CERTIFICATE
II
ACKNOWLEDGEMENTS
I would like to take this opportunity to convey my heartfelt thanks to all those
who have helped me make this project a success.
Special thanks to Dr. Raj Jaiswal for his valuable guidance during the course of
the project.
Finally, I thank my family members and friends who have helped me complete
this project successfully.
Last but not least, I would be thankful to the university for giving me an
opportunity
With Sincere Regards,
III
ABSTRACT
IV
The purpose of this research is to shed light on Fabtech Technologies' IT control
mechanisms by doing an in-depth investigation of them to determine whether or
not they comply with regulations and industry standards. The results and
recommendations offered in this report are designed to help the continual
improvement of the company's IT governance and risk management framework,
eventually safeguarding the organization's information assets and supporting its
business objectives.
V
LIST OF ABBREVIATIONS
Abbreviation Description
VI
LIST OF FIGURES
Page
Fig. No Figure Description
No.
Figure 1 Use Case
VII
TABLE OF CONTENTS
Acknowledgement III
Abstract IV
Abbreviations VI
List of Figures VII
List of screenshots
Chapter 1. Introduction 1-X
1.1 Introduction and Problem Summary
1.2 Aim and Objectives of the Project
1.3 Scope of the Project
Chapter 2. Literature Survey 2-X
2.1 Current/Existing System
2.1.1 Study of Current System
2.1.2 Problem & Weakness of Current System
2.3 Feasibility Study
2.3.1 Technical Feasibility
2.3.2 Operational Feasibility
2.4 Tools/Technology Required
Chapter 3. Design: Analysis, Design Methodology and
3-X
Implementation Strategy
3.1 Function of System
VIII
3.1.1 Use Case Diagram
3.1.2 Activity Diagram
Chapter 4. Implementation 4-X
4.1 Implementation
4.1.1 IT Policy
4.2 Screenshots/Snapshots
Chapter 5. Summary of Results and Future Scope 5-X
5.1 Advantages/Unique Features
5.2 Results and Discussions
5.3 Future Scope of Work
Chapter 6. Conclusion 6-X
Bibliography- List of references
IX
Chapter 1: Introduction
In an era where digital transformation is altering business operations, organizations are more
dependent on information technology (IT) to deliver efficiency, innovation, and competitive
advantage. However, growing reliance on IT also exposes firms to many risks, including data
breaches, system breakdowns, and regulatory concerns. As a result, the adoption of efficient
General IT Controls (GITCs) has become important for securing sensitive information and
assuring the stability of IT systems.
This project focuses on the General IT Controls framework within Fabtech Technologies
Private Limited, intending to analyse the existing status of IT controls and their efficacy in
mitigating risks. GITCs contain a set of policies, procedures, and practices that govern the
administration of IT resources, including access controls, change management, data backup
and recovery, and incident response. By reviewing these controls, the project tries to identify
risks and opportunities for improvement, ensuring that the business adheres to industry best
practices and regulatory standards.
Problem Summary:
Despite the crucial relevance of GITCs, many firms, including Fabtech Technologies, face
difficulty in properly carrying out and sustaining these controls. Typical challenges include
inadequate documentation of IT rules, insufficient training for personnel on security
processes, and a lack of regular evaluations and upgrades of existing controls. These
deficiencies can lead to illegal access, data loss, and non-compliance with regulatory
standards, ultimately harming the organization's operational integrity and reputation.
The main obstacle addressed in this project is the requirement for an exhaustive evaluation of
the existing General IT Controls at Fabtech Technologies. By identifying gaps and
vulnerabilities in the current control environment, the project intends to give practical
recommendations that will enhance the organization's IT security framework, decrease risks,
and build a culture of compliance and accountability.
1
1.2 Aims and Objectives of the Project
2
● Monitor and review: To construct a framework for ongoing monitoring and periodic
examination of IT controls to ensure continuous improvement.
The scope of the project on General IT Controls at Fabtech Technologies Private Limited
explains the boundaries and scope of work that needs to be performed. It defines what will be
included and excluded in the project, ensuring clarity and focus. Here’s an in-depth
description of the project scope:
3
● Assess the existing level of employee awareness of IT security rules and
procedures, and identify training gaps to promote understanding and
compliance.
o Recommendations for Improvement:
● Develop actionable recommendations based on the evaluation findings to
enhance the effectiveness of GITCs and fix identified weaknesses.
o Implementation Planning:
● Create a clear implementation plan for the identified improvements, including
dates, resource allocation, and accountable parties.
o Monitoring and Review Framework:
● Establish a structure for constant monitoring and periodic evaluation of IT
controls to ensure continuous improvement and adaptation to evolving risks.
4
Chapter 2
Literature Survey
The assessment of the current system includes a complete investigation of the existing
General IT Controls (GITCs). The study does to understand how the current controls
are implemented, their effectiveness, and any gaps that may exist. The following
components indicate the important areas to be considered in the examination of the
current system:
o IT Policies and Procedures
● Documentation Review: Evaluate the existing IT rules and processes to verify
they are well-documented, up-to-date, and aligned with industry standards.
● Policy Coverage: Assess whether the policies cover critical areas such as data
security, access control, incident response, and change management.
o Access Control Mechanisms
● User Access Management: Analyze the processes for granting, changing, and
revoking user access to systems and data.
● Role-Based Access Control (RBAC): Review the implementation of RBAC to
ensure that users have access only to the information essential for their jobs.
● Authentication mechanisms: Evaluate the effectiveness of authentication
mechanisms employed, such as passwords, multi-factor authentication, and
biometric systems.
o Change Management Processes
5
● Change Request Procedures: Examine the procedures for submitting,
reviewing, and approving change requests relating to IT systems and
applications.
● Documentation and Testing: Assess how modifications are documented and
whether enough testing is undertaken before implementation to avoid
interruptions.
o Data Backup and Recovery Backup Procedures
● Review the data backup processes, including frequency, storage techniques,
and retention regulations.
● Disaster Recovery Plans: Evaluate the effectiveness of disaster recovery plans
to ensure that vital data can be restored in the case of a breakdown or incident.
o Incident Response and Management
● Incident Reporting: Analyze the procedures for reporting and responding to IT
security issues, including roles and responsibilities.
● Post-Incident Review: Assess whether there is a mechanism for conducting
post-incident evaluations to identify lessons learned and enhance future
responses.
o Employee Training and Awareness Training Programs
● Evaluate the efficiency of training programs relating to IT security rules and
procedures for employees.
● Awareness Campaigns: Assess the activities in place to enhance awareness of
IT security threats and best practices among staff.
o Monitoring and Auditing
● Control Monitoring: Review the systems in place for monitoring the
effectiveness of IT controls and identifying potential issues.
● Audit Trails: Assess the availability and integrity of audit trails for essential
systems to ensure accountability and traceability.
o Compliance with Regulations
● Regulatory Requirements: Identify important regulatory obligations (e.g.,
GDPR, HIPAA) and examine the organization’s compliance status.
● Internal Compliance Audits: Review the frequency and findings of internal
compliance audits related to IT controls.
6
o Inadequate Documentation of IT Policies
● Lack of Clarity: Some IT regulations may not be clearly recorded or easily
available to staff, leading to misunderstanding regarding compliance and
duties.
● Outdated rules: Certain rules may not have been reviewed or updated
regularly, resulting in misalignment with current best practices and regulatory
obligations.
o Weak Access Control Mechanisms
● Insufficient Role-Based Access Control: The implementation of role-based
access control may not be full, allowing unauthorized users to access critical
information.
● Inconsistent User Access assessment: periodic assessments of access rights for
users may not be completed, increasing the danger of lingering access for
former workers or people who have changed positions.
o Ineffective Change Management Processes
● Lack of Formal Change Requests: Changes to IT systems may be done
without formal requests or approvals, leading to unlawful modifications and
consequent interruptions.
● Inadequate Testing of Changes: Changes may not be fully tested before
implementation, raising the risk of system failures or security vulnerabilities.
o Insufficient Data Backup and Recovery Procedures
● Infrequent Backups: Data backups may not be conducted routinely, risking
data loss in the event of a system breakdown or cyber incident.
● Unverified Recovery Plans: Disaster recovery plans may not be evaluated
regularly, leading to uncertainty about their usefulness during an actual crisis.
o Limited Incident Response Capabilities
● Delayed Incident Reporting: Employees may not be aware of the necessary
procedures for reporting IT security problems, leading to delays in reaction
and mitigation.
● Lack of Post-Incident Analysis: There may be no formal mechanism for
performing post-incident reviews, limiting the organization from learning
from past incidents and improving future responses.
o Insufficient Employee Training and Awareness
7
● Lack of Regular Training: Employees may not receive regular training on IT
security policies and best practices, leading to a lack of awareness of potential
risks.
● Limited Awareness Campaigns: There may be insufficient measures to
establish a culture of security awareness within the organization.
o Weak Monitoring and Auditing Practices
● Inadequate Monitoring of Controls: There may be insufficient mechanisms in
place to monitor the effectiveness of IT controls, leading to undetected
vulnerabilities.
● Lack of carry out Audit Trails: Critical systems might not maintain audit trails,
making it impossible to trace actions and hold individuals accountable.
8
o Scalability: Consider whether the solutions being provided can scale as the
organization grows. It includes investigating whether the technology can
handle greater information loads or user access in the future.
o Security and Compliance: Ensure that any new technology complies with
relevant security standards and regulation. This includes studying the security
features of new software or hardware.
o Impact on Staff: Consider how the changes will affect staff, including the
demand for training and changes to their employment. Assess whether
workers are willing and able to adapt to new processes or technologies.
o Support from Management: Ensure that there is buy-in from management and
key stakeholders for the organized enhancements. Leadership support is
necessary for successful implementation and sustainability.
9
Chapter 3
Design: Analysis, Design Methodology, and Implementation
Strategy
Actor:
- Employee: - use case for employee will be access control management, incident
management and training and awareness
-IT Manager: - use case for IT Manager is change management, Monitoring and
auditing
-ERP team: - use case for this is access control management and
10
Figure 1
Figure 1 explains that Employee looks after Access Control Management, Incident
Management and Training and Awareness.
Figure 2
Figure 2 explains that IT Manager looks after Change Management, Monitoring and Auditing
11
Figure 3
Figure 3 explains that Employee looks after Access Control Management and Change
Management
Activity diagrams are used to illustrate the flow of control in a system and refer to the steps
involved in the execution of a use case. We can depict both sequential processing and
concurrent processing of activities using an activity diagram, i.e., an activity diagram focuses
on the condition of flow and the sequence in which it happens.
12
Figure 4
Chapter 4
Implementation
4.1 IT Policy
1. Acceptable Use Policy (AUP)
13
● Get the word to the employees regarding the AUP and be sure they obey it.
● Check for regular updates and appreciation from users.
● Evaluate the effectiveness of communication and enforcement strategies.
14
● Assess the enforcement of password policies across the enterprise.
● Check for the implementation of secure password storage and handling methods.
● Review network architecture and security controls (e.g., firewalls, intrusion detection
systems).
● Assess network monitoring and logging structures
● Verify the set up and effectiveness of network segmentation and access controls.
4.2 Screenshot
(This screenshot covers the Area, process, Risk description, level of risk and control
description of IT policy and access security)
15
16
17
Chapter 5
Summary of Results and Future Scope
5.1 Advantages
1. Enhanced Security Posture
18
● Risk Mitigation: By identifying and making flaws in IT controls, the investigation
helps decrease risks associated with data breaches, unauthorized access, and other
security threats.
● Preventative Measures: Implementing recommended measures can avoid potential
malpractices and increase overall security.
● Regulatory Adherence: The report makes sure that a company complies with crucial
rules and regulations, reducing the risk of legal penalties and enhancing corporate
governance.
● Audit Preparedness: Regular audits and compliance checks as suggested in the report
prepare the organization for external audits.
● Increased Awareness: The study points out the need of training employees on IT
security rules, leading to a more security-conscious workforce.
● Reduction in Human Error: Training can significantly reduce the likelihood of human
errors that could lead to security issues.
4. Continuous Improvement
Risk Control Matrix (RCM): The report includes a complete RCM that maps risks to
specific controls, offering a clear perspective of the organization's risk landscape.
19
Employee Training Focus: The research highlights the significance of IT the start and
ongoing training for employees, defining a culture of security awareness.
Integration of Detective and Corrective Controls: It outlines both detective and corrective
controls, ensuring a comprehensive approach to risk management.
Management Involvement: The report highlights the need for management oversight and
approval in implementing IT controls, promoting accountability at all levels.
Adaptability to Change: The report supports a framework which allows for changes based
on new dangers and improvements in technology.
20
● Discussion: The adoption of these controls has led to increased compliance with
industry norms and regulations. Initial feedback from employees reveals a better grasp
of security norms.
● Findings: A framework for ongoing monitoring and periodic audits was built,
enabling for real-time assessment of control effectiveness.
● Discussion: Early results from the monitoring activities reveal that most controls are
performing as planned, but some areas require further refinery. Regular audits will
assist uncover these areas for development.
● Findings: The beginning of the risk control matrix has allowed for better identification
and management of IT risks.
● Discussion: By aligning controls with noticed risks, the organization has drastically
reduced its exposure to possible threats, increasing overall resilience.
Include a short executive summary at the beginning of the report that discusses key results,
ideas, and the overall significance of the IT controls evaluation.
Clearly detect the objectives and scope of the report, describing which components of IT
controls were examined and what the expected results are.
Provide a full description of the method used for the assessment, including tools, frameworks,
and criteria for evaluating IT controls.
Use charts, graphs, and tables to visually communicate data and findings, making complex
material more digestible.
Create a section dedicated to feedback ways and continuous improvement projects, enabling
steady review of IT controls.
Chapter 6:
CONCLUSION
21
The inspection of IT controls discovered many advantages and challenges within the current
framework. Key areas of concern included inadequate documentation of security strategy,
insufficient training for employees, and a lack of regular assessments of IT security
procedures. Additionally, the study showed specific vulnerabilities related to unauthorized
access and data management ways.
The findings indicate the importance of complete IT controls in preserving sensitive data and
maintaining operational integrity. The noticed deficiency symbolizes potential hazards that
could lead to data breaches, regulatory non-compliance, and reputational damage. Therefore,
solving these obstacles is not only an issue of compliance but also crucial for the
organization's entire risk management strategy.
Looking ahead, the company should stay careful and adaptable to the emerging nations of IT
security. Continuous monitoring, testing of performance regulations and staying current about
new technologies will all be key in continuing effective IT leadership. By defining a
proactive approach to IT security, the organization let not only protect its assets but also
position itself as a leader in compliance and risk management.
List of references
[1] “IT General Controls ACCA UK’s Internal Audit Network held a series of seven
webinars on de-mystifying.” Available: https://www.accaglobal.com/content/dam/members-
beta/docs/sectors-industries-roles/ia/IT%20General%20Controls.pdf
22
[2] K. Kinzer, “Definition & Examples of IT General Controls (ITGC),” JumpCloud, Jul. 20,
2022. https://jumpcloud.com/blog/what-are-it-general-controls-itgc
[4] JumpCloud, “What Are IT General Controls (ITGC)?,” YouTube, Apr. 28, 2023.
https://www.youtube.com/watch?v=8TseSrOt5Ro (accessed Jul. 23, 2024).
[6] “What is IT audit (information technology audit)? | Definition from TechTarget,” CIO.
https://www.techtarget.com/searchcio/definition/IT-audit-information-technology-
audit#:~:text=An%20IT%20audit%20uses%20a
[8] Wikipedia Contributors, “Information technology audit,” Wikipedia, Feb. 01, 2019.
https://en.wikipedia.org/wiki/Information_technology_audit
23