Introduction To IS Auditing

Similar documents
"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Trust Services Principles and Criteria

Auditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance

The Common Controls Framework BY ADOBE

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

RISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS

Position Description IT Auditor

Information Technology General Control Review

Certified Information Systems Auditor (CISA)

CISA Training.

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12

THE TEXAS A&M UNIVERSITY SYSTEM RECORDS RETENTION SCHEDULE

Records Retention Schedule

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Definition of Internal Control

Auditing in an Automated Environment: Appendix B: Application Controls

Contracting for an IT General Controls Audit

Risk Management in Electronic Banking: Concepts and Best Practices

No IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK

IT General Controls and Why We Need Them -Dennis McLaughlin, CISA (Cyber AIT) Dennis McLaughlin - Cyber AIT 1

COURSE BROCHURE CISA TRAINING

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

SECURITY & PRIVACY DOCUMENTATION

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

Data Backup and Contingency Planning Procedure

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

CITY OF MONTEBELLO SYSTEMS MANAGER

San Francisco Chapter. What an auditor needs to know

01.0 Policy Responsibilities and Oversight

Mapping of FedRAMP Tailored LI SaaS Baseline to ISO Security Controls

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager.

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c.

!IlflimTIII~III~III~l~I~IIII!

Chapter 8: General Controls and Application Controls

FRAUD-RELATED INTERNAL CONTROLS

BYOD Policy. Table of Contents

Altius IT Policy Collection

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

PART 5: INFORMATION TECHNOLOGY RECORDS

Projectplace: A Secure Project Collaboration Solution

ISO Implementation

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

HIPAA Security and Privacy Policies & Procedures

EXHIBIT A. - HIPAA Security Assessment Template -

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

HIPAA Compliance Checklist

PeopleSoft Finance Access and Security Audit

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

FOLLOW-UP REVIEW OF RISK MANAGEMENT ETC RISK MANAGEMENT FRAMEWORK

QuickBooks Online Security White Paper July 2017

I. PURPOSE III. PROCEDURE

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

DIACAP IA CONTROLS. Requirements Document. Sasa Basara University of Missouri-St. Louis

EU GDPR & ISO Integrated Documentation Toolkit integrated-documentation-toolkit

Standard CIP Cyber Security Security Management Controls

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Sparta Systems TrackWise Digital Solution

Business Continuity Planning

AUTHORITY FOR ELECTRICITY REGULATION

7.16 INFORMATION TECHNOLOGY SECURITY

Information Technology Risks & Controls for Financial Systems PEM-PAL Treasury CoP Workshop 2011 Kristin Lado Tufan

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

BCM Program Development

Business Continuity Management Standards A Side-by-Side Comparison

Chapter 08. Consideration of Internal Control in an Information Technology Environment. McGraw-Hill/Irwin

Introduction to Business continuity Planning

DATA BACKUP AND RECOVERY POLICY

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

CCISO Blueprint v1. EC-Council

ITG. Information Security Management System Manual

Disaster Recovery and Business Continuity Planning (Mile2)

University of Wisconsin-Madison Policy and Procedure

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

CIS 444: Computer. Networking. Courses X X X X X X X X X

WORKSHARE SECURITY OVERVIEW

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

CISA ITEM DEVELOPMENT GUIDE

Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices

Critical Cyber Asset Identification Security Management Controls

Information technology Security techniques Information security controls for the energy utility industry

Checklist: Credit Union Information Security and Privacy Policies

HIPAA Compliance and OBS Online Backup

An Introduction to the ISO Security Standards

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

COM Operating Personnel Communications Protocols. October 31, 2013

Standard CIP Cyber Security Systems Security Management

SECURITY PLAN DRAFT For Major Applications and General Support Systems

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

ISO based Written Information Security Program (WISP) (a)(1)(i) & (a)(3)(i) & (ii) & (A) (A)(5)(ii) & (ii)(a)

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx

Standard Development Timeline

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Standard: Data Center Security

Transcription:

Introduction To IS Auditing Instructor: Bryan McAtee, ASA, CISA Bryan McAtee & Associates - Brisbane, Australia * Course, Presenter and Delegate Introductions * Definition of Information Technology (IT) Auditing * IT Audit Standards & IT Best Practice * The IT Control Mix * Classification of IT Controls * Overview of IT Audit Process * IT Control Areas IT Management * Planning for the IT Department/Activity - Long-Range Planning for the Organization - The Planning or Steering Committee for the IT Department - Long-Range Planning for the IT Department - Short-Range Planning for the Organization and for the IT Department - Review of Planning for the Organization and for the IT Department * Policies, Standards and Procedures - Policies - Standards - Procedures * Organizational Responsibilities and Personnel Management - The Organizational Location of the IT Department - Description of Responsibilities Within the IT Department - The Segregation of Duties - The IT Department Position Descriptions - Personnel Selection - Personnel Security Clearance Procedures - Personnel Separation Procedures - Personnel Training - Employee Job Performance Evaluation * IT Department/Activity Quality Assurance - Responsibility for Quality Assurance (QA) - Organizational Aspects of the QA Function - The Qualifications of QA Personnel

- The QA Review Plan - The QA Review of the Achievement of the IT Department s Objectives - The QA Review of Adherence to the IT Department s Standards and Procedures - The QA Review of Systems Controls - The QA Review of Other Aspects of the IT Department s Functions - Reports of Quality Assurance Reviews * External Requirements - Research the Applicable External requirements for an Organization - Evaluate Organization s Level of Compliance * Case Study on Management Controls IT Systems Development * Systems Development Life Cycle Methodology and Responsibility (SDLC) - System Development Life Cycle Methodology - Roles and Responsibilities - Updating the System Development Life cycle * Project Initiation - Project Definition - User Department Participation in Project Initiation - Project Team Membership and Responsibilities - Definition of Information Requirements - Project Approval * Feasibility Study - Formulation of Alternative Courses of Action - Technological Feasibility Study - Economic Feasibility Study - Risk Analysis Report - Project Approval - Project Master Plan - Cost Monitoring * Design Phase - Design Methodology - Output Requirements Definition and Documentation - Input Requirements Definition and Documentation - File Requirements Definition and Documentation - Processing Requirements Definition and Documentation - Program Specifications - Source Data Collection Design - Controls and Security Design - Audit Trails Design - Design Approval - Program Documentation Standards - Validation, Verification and Test Plan * Development and Implementation

- Programming Objectives - Detailed Program Documentation - Application Software Packages - Contract Application Programming - Operations and Maintenance Manual - User Manuals - Training Plan - Program Testing Standards - System Testing Standards - System Testing Documentation - Evaluation of Test Results - Conversion Plan - Parallel Testing - Final Acceptance Test * Operation and Maintenance - Operations Control Procedures - Cost Monitoring - System Modifications - Re-evaluation of User Requirements * Post Implementation Review - Post Implementation Review Plan - Results Evaluation - Evaluation of Meeting User Requirements - Evaluation of Cost-Benefit Analysis - Evaluation of Adherence to Development Standards - Reporting Post Implementation Review Findings * Case Study on SDLC IT Operations & Networks * IT Resource Planning and Management - The Annual IT Operating Budget - Hardware Acquisition Plan - Capacity Management of Hardware * Computer Operations - Workload Scheduling - Personnel Scheduling - Preventive Maintenance for Hardware - Problem Management - Change Management - Job Cost Accounting - User Billing and Chargeback Procedures - Media Library Management Responsibilities - The Media Library Management System - Magnetic Media External Identification and Control - Processing Operations Procedures

* Networks & Distributed Processing - Understanding Company Management Objectives - Network Implementation Plan - Control Standards for the Network - Hardware and Software Control Features - Database Distribution - Network Data Standards - Access to Network Data - Network Data Review Mechanism - Hardware and Software Backup Provisions - Network Operations - Software Communications - Access to Network Operating Systems Software - Access to Network Processing Facilities - Data Encryption - Network Security - Network Security Reviews - Documentation & Training of Network Operations Personnel - Network Post-Implementation Review - Network Performance Monitoring - Network Contingency Operations Plans * Network Redundancy Case Study * Operating System Software - Selection of System Software - Cost-Benefit of Systems Software - Installation of Changed System Software - System Software Maintenance - System Software Change Control - System Software Problem Management - System Software Security * Logical and Physical Security - Responsibility for Logical and Physical Security - Access to Computer Facility - Visitor Escort - Password Administration - Violation and Security Activity Reports - Logical Access Restrictions - Security of On-Line Access to Data - Limited Identification of the Data Processing Site - Fire Protection - Training in Security Procedures and Awareness * Disaster Recovery Planning - The Disaster Recovery Plan - Personnel Safety and Training in Emergency Procedures - Critical Data Processing Applications - Critical Computer Resources

- Telecommunication Services Restoration - Back-Up: Site and Hardware - Programming for Back-Up Operations - Data File Recovery Procedures - Disaster Recovery Supplies - Testing the Disaster Recovery Plan - Reconstruction of the IT Operations Site - User Department Manual Processing Back-Up Procedures * Video on Disaster Recovery Planning Application Software * Data Origination Controls - Data Preparation Procedures - Source Document Design - Source Document Control - Data Input Authorization Procedures - Source Document Retention * Data Input Controls - Data Conversion and Entry Procedures - On-Line Data Conversion and Entry Procedures - Data Validation and Editing - Data Input Error Handling * Data Processing Controls - Data Processing Integrity - Data Processing Integrity Provisions in Application Program Software - Data Processing Validation and Editing - Data Processing Error Handling * Data Output Control - Output Review - Output Balancing and Reconciliation - Output Distribution - Output Error Handling - Output Handling and Retention - Security Provisions for Output Reports * Case Study on Application Controls Note: Throughout the course copies of Control Benchmarks for implementation by management, corresponding Audit Plans (160 in all) for use by the auditor, and flowcharts of audit programs are provided to delegates.