Chapter One - Indiana University

Download Report

Transcript Chapter One - Indiana University

Chapter Three
IT Risks and Controls
1
The Risk Management Process
Identify IT
Risks
Assess IT
Risks
Monitor IT Risks
and Controls
Identify IT
Controls
Document
IT Controls
2
Types of IT Risks
Business risk
 Audit risk = IR * CR * DR

– inherent risk (IR)
– control risk (CR)
– detection risk (DR)
Security risk
 Continuity risk

3
Assessing IT Risk

Threats and vulnerabilities
Risk (residual risk) =
+ Expected value of risk (Asset Value * Risk Likelihood)
– Percentage of risk mitigated by the current controls
+ Uncertainty of knowledge about the vulnerability

Risk indicators and risk measurement
– Risks relative to IT processes
4
Valuation of Asset

Assets: People, Data, Hardware, Software,
Facilities, (Procedures)

Valuation Methods
–
–
–
–
–
–
Criticallity to the organization’s success
Revenue generated
Profitability
Cost to replace
Cost to protect
Embarrassment/Liability
5
Internal Control (IC)

COSO – 5 components of IC
–
–
–
–
–

Control environment
Risk assessment
Control activities
Information and communication
Monitoring
International IC Standards
– Cadbury
– CoCo
– Other country standards
6
Quality Control Standards
ISO 9000 series – certifies that
organizations comply with documented
quality standards
 Six Sigma – an approach to process and
quality improvement

7
Statements on
Auditing Standards
Issued by AICPA’s Accounting Standards
Board
 SAS 78 Consideration of IC in a Financial
Statement Audit: An Amendment to SAS No.
55
 SAS 94 The Effect of IT on the Auditor’s
Consideration of IC in a Financial
Staetment Audit
 New standards related to risk assessment

8
ISACA’s CobiT




Integrates IC with information and IT
Three dimensions: information criteria, IT
processes, and IT resources
Requirements (information criteria) of quality,
fiduciary, and security
Organizes IT internal control into domains and
processes
– Domains: planning and organization, acquisition and
implementation, delivery and support, and monitoring
– Processes detail steps in each domain
9
IT Control Domains and
Processes
10
IT Controls

COSO identifies two groups of IT controls:
– Application controls – apply to specific
applications and programs, and ensure data
validity, completeness and accuracy
– General controls – apply to all systems and
address IT governance and infrastructure, security
of operating systems and databases, and
application and program acquisition and
development
A574 Internal Controls For Business
11
Segregation of Duties
Transaction
authorization is separate from
transaction processing.
Asset custody is separate from record-keeping
responsibilities.
The tasks needed to process the transactions are
subdivided so that fraud requires collusion.
A574 Internal Controls For Business
12
Separation of Duties within IS
13
Classification of Controls
Preventive
Controls: Issue is prevented from
occurring – cash receipts are immediately
deposited to avoid loss
Detective Controls: Issue is discovered –
unauthorized disbursement is discovered
during reconciliation
Corrective Controls: issue is corrected –
erroneous data is entered in the system and
reported on an error and summary report; a
clerk re-enters the data
14
Application Control Goals
For business event inputs, ensure
– Input validity
– Input completeness
– Input accuracy
 For master data, ensure
– Update completeness
– Update accuracy

15
Application Control Goals

Input validity
– Input data approved and represent actual
economic events and objects

Input completeness
– Requires that all valid events or objects be
captured and entered into the system

Input Accuracy
– Requires that events be correctly captured and
entered into the system
16
Systems Reliability Assurance
SysTrust
 WebTrust
 New AICPA Trust Principles

17
Documenting IT Controls
Internal control narratives
 Flowcharts – internal control flowchart
 IC questionnaires

18
Risk Control Strategies

Avoidance
– Policy, Training and Education, or Technology

Transference – shifting the risk to other assets,
processes, or organizations (insurance,
outsourcing, etc.)

Mitigation – reducing the impact through
planning and preparation

Acceptance – doing nothing if the cost of
protection does not justify the expense of the
control
19
Monitoring IT Risks
and Controls
CobiT control objectives associated with
monitoring and evaluation
 Need for independent assurance and audit
of IT controls

20
21