i an d iaud,t it e control,download.e-bookshelf.de/.../0000/5805/34/l-g-0000580534-000238349… ·...

30
ROBERT R. MOELLER IT AUDIT, CONTROL, AND SECURITY

Upload: lamkhanh

Post on 05-Jun-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

R o b e R t R . M o e l l e R

It AudIt,CoNtRol, ANd

SeCuRItY

It Au

dIt, C

oN

tRol,

AN

d SeC

uR

ItY

MoelleR

Page 2: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FFIRS 08/30/2010 19:24:8 Page 2

Page 3: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FFIRS 08/30/2010 19:24:8 Page 1

IT Audit, Control,and Security

Page 4: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FFIRS 08/30/2010 19:24:8 Page 2

Page 5: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FFIRS 08/30/2010 19:24:8 Page 3

IT Audit, Control,and Security

ROBERT MOELLER

John Wiley & Sons, Inc.

Page 6: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FFIRS 08/30/2010 19:24:8 Page 4

Copyright# 2010 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any

form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise,

except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without

either the prior written permission of the Publisher, or authorization through payment of the

appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers,

MA 01923, (978) 750-8400, fax (978) 646-8600, or on the web at www.copyright.com.

Requests to the Publisher for permission should be addressed to the Permissions Department,

John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201)

748-6008, or online at www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best

efforts in preparing this book, they make no representations or warranties with respect to the

accuracy or completeness of the contents of this book and specifically disclaim any implied

warranties of merchantability or fitness for a particular purpose. No warranty may be created or

extended by sales representatives or written sales materials. The advice and strategies contained

herein may not be suitable for your situation. You should consult with a professional where

appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other

commercial damages, including but not limited to special, incidental, consequential, or other

damages.

For general information on our other products and services or for technical support, please

contact our Customer Care Department within the United States at (800) 762-2974, outside the

United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in

print may not be available in electronic books. For more information about Wiley products, visit

our web site at www.wiley.com.

Library of Congress Cataloging-in-Publication Data:Moeller, Robert R.

IT audit, control, and security / Robert Moeller.

p. cm.

Includes bibliographical references and index.

ISBN: 978-0-471-40676-1 (cloth); 978-0-470-87741-8 (ebk); 978-0-470-87767-8 (ebk);

978-0-470-87768-5 (ebk)

1. Information technology—Auditing. 2. Electronic data processing departments—

Auditing. 3. Computer security. 4. Computer networks—Security measures. I. Title.

T58.5.M645 2010

658.4’78–dc22 2010013505

Printed in the United States of America

10 9 8 7 6 5 4 3 2 1

Page 7: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FFIRS 08/30/2010 19:24:8 Page 5

Dedicated to my best friend and wife, Lois Moeller.

Lois has been my companion and partner for over 40 years,

whether we are on our Lake Michigan sailboat,

skiing in Utah or elsewhere,

traveling to interesting places in the world,

gardening in the backyard,

or cooking its produce.

Page 8: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FFIRS 08/30/2010 19:24:8 Page 6

Page 9: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FTOC 09/17/2010 15:36:11 Page 7

Contents

Introduction xiii

PART ONE: AUDITING INTERNAL CONTROLSIN AN IT ENVIRONMENT 1

Chapter 1: SOx and the COSO Internal Controls Framework 3

Roles and Responsibilities of IT Auditors 4

Importance of Effective Internal Controls and COSO 6

COSO Internal Control Systems Monitoring Guidance 21

Sarbanes-Oxley Act 22

Wrapping It Up: COSO Internal Controls and SOx 31

Notes 31

Chapter 2: Using CobiT to Perform IT Audits 32

Introduction to CobiT 33

CobiT Framework 35

Using CobiT to Assess Internal Controls 39

Using CobiT in a SOx Environment 51

CobiT Assurance Framework Guidance 54

CobiT in Perspective 55

Notes 55

Chapter 3: IIA and ISACA Standards for the ProfessionalPractice of Internal Auditing 57

Internal Auditing’s International Professional Practice Standards 58

Content of the IPPF and the IIA International Standards 61

Strongly Recommended IIA Standards Guidance 75

ISACA IT Auditing Standards Overview 76

Codes of Ethics: The IIA and ISACA 79

Notes 81

Chapter 4: Understanding Risk Management Through COSO ERM 82

Risk Management Fundamentals 83

Quantitative Risk Analysis Techniques 92

IIA and ISACA Risk Management Internal Audit Guidance 94

COSO ERM: Enterprise Risk Management 97

vii

Page 10: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FTOC 09/17/2010 15:36:11 Page 8

IT Audit Risk and COSO ERM 113

Notes 115

Chapter 5: Performing Effective IT Audits 117

IT Audit and the Enterprise Internal Audit Function 118

Organizing and Planning IT Audits 122

Developing and Preparing Audit Programs 127

Gathering Audit Evidence and Testing Results 132

Workpapers and Reporting IT Audit Results 142

Preparing Effective IT Audits 148

Notes 149

PART TWO: AUDITING IT GENERAL CONTROLS 151

Chapter 6: General Controls in Today’s IT Environments 153

Importance of IT General Controls 154

IT Governance General Controls 157

IT Management General Controls 158

IT Technical Environment General Controls 174

Note 174

Chapter 7: Infrastructure Controls and ITIL ServiceManagement Best Practices 175

ITIL Service Management Best Practices 176

ITIL’s Service Strategies Component 179

ITIL Service Design 181

ITIL Service Transition Management Processes 189

ITIL Service Operation Processes 194

Service Delivery Best Practices 198

Auditing IT Infrastructure Management 199

Note 200

Chapter 8: Systems Software and IT Operations General Controls 201

IT Operating System Fundamentals 202

Features of a Computer Operating System 206

Other Systems Software Tools 209

Chapter 9: Evolving Control Issues: Wireless Networks,Cloud Computing, and Virtualization 214

Understanding and Auditing IT Wireless Networks 215

Understanding Cloud Computing 220

Storage Management Virtualization 225

PART THREE: AUDITING AND TESTING IT APPLICATION CONTROLS 227

Chapter 10: Selecting, Testing, and Auditing IT Applications 229

IT Application Control Elements 230

Selecting Applications for IT Audit Reviews 239

viii & Contents

Page 11: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FTOC 09/17/2010 15:36:11 Page 9

Performing an Applications Controls Review: Preliminary Steps 242

Completing the IT Applications Controls Audit 249

Application Review Case Study: Client-Server Budgeting System 255

Auditing Applications under Development 258

Importance of Reviewing IT Application Controls 266

Notes 266

Chapter 11: Software Engineering and CMMi 267

Software Engineering Concepts 267

CMMi: Capability Maturity Model for Integration 269

CMMi Benefits 280

IT Audit, Internal Control, and CMMi 281

Note 282

Chapter 12: Auditing Service-Oriented Architecturesand Record Management Processes 283

Service-Oriented Computing and Service-Driven Applications 284

IT Auditing in SOA Environments 294

Electronic Records Management Internal Control Issues and Risks 300

IT Audits of Electronic Records Management Processes 301

Notes 303

Chapter 13: Computer-Assisted Audit Tools and Techniques 304

Understanding Computer-Assisted Audit Tools and Techniques 305

Determining the Need for CAATTs 308

CAATT Software Tools 311

Steps to Building Effective CAATTs 326

Importance of CAATTs for Audit Evidence Gathering 327

Chapter 14: Continuous Assurance Auditing, OLAP, and XBRL 329

Implementing Continuous Assurance Auditing 330

Benefits of Continuous Assurance Auditing Tools 338

Data Warehouses, Data Mining, and OLAP 339

XBRL: The Internet-Based Extensible Markup Language 346

Newer Technologies, the Continuous Close, and IT Audit 351

Notes 351

PART FOUR: IMPORTANCE OF IT GOVERNANCE 353

Chapter 15: IT Controls and the Audit Committee 355

Role of the Audit Committee for IT Auditors 356

Audit Committee Approval of Internal Audit Plans and Budgets 357

Audit Committee Briefings on IT Audit Issues 359

Audit Committee Review and Action on Significant IT Audit Findings 360

IT Audit and the Audit Committee 362

Chapter 16: Val IT, Portfolio Management,and Project Management 363

Val IT: Enhancing the Value of IT Investments 364

IT Systems Portfolio and Program Management 371

Contents & ix

Page 12: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FTOC 09/17/2010 15:36:11 Page 10

Project Management for IT Auditors 374

Notes 383

Chapter 17: Compliance with IT-Related Lawsand Regulations 384

Computer Fraud and Abuse Act 386

Computer Security Act of 1987 387

Gramm-Leach-Bliley Act 390

HIPAA: Healthcare and Much More 395

Other Personal Privacy and Security Legislative Requirements 403

IT-Related Laws, Regulations, and Audit Standards 404

Chapter 18: Understanding and Reviewing Compliancewith ISO Standards 407

Background and Importance of ISO Standards in a World

of Global Commerce 408

ISO Standards Overview 410

ISO 19011 Quality Management Systems Auditing 419

ISO Standards and IT Auditors 421

Notes 421

Chapter 19: Controls to Establish an EffectiveIT Security Environment 422

Generally Accepted Security Standards 423

Effective IT Perimeter Security 429

Establishing an Effective, Enterprise-Wide Security Strategy 430

Best Practices for IT Audit and Security 432

Notes 433

Chapter 20: Cybersecurity and Privacy Controls 434

IT Network Security Fundamentals 435

IT Systems Privacy Concerns 443

PCI-DSS Fundamentals 446

Auditing IT Security and Privacy 447

Security and Privacy in the Internal Audit Department 448

Notes 453

Chapter 21: IT Fraud Detection and Prevention 454

Understanding and Recognizing Fraud in an

IT Environment 455

Red Flags: Fraud Detection Signs for IT and

Other Internal Auditors 456

Public Accounting’s Role in Fraud Detection 461

IIA Standards and ISACA Materials for Detecting and

Investigating Fraud 462

IT Audit Fraud Risk Assessments 464

IT Audit Fraud Investigations 467

x & Contents

Page 13: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FTOC 09/17/2010 15:36:11 Page 11

IT Fraud Prevention Processes 468

Fraud Detection and the IT Auditor 471

Notes 471

Chapter 22: Identity and Access Management 472

Importance of Identity and Access Management 473

Identity Management Processes 474

Separation of Duties Identify Management Controls 477

Access Management Provisioning 478

Authentication and Authorization 479

Auditing Identity and Access Management Processes 481

Note 485

Chapter 23: Establishing Effective IT DisasterRecovery Processes 486

IT Disaster and Business Continuity Planning Today 487

Building and Auditing an IT Disaster Recovery Plan 489

Building the IT Disaster Recovery Plan 497

Disaster Recovery Planning and Service Level Agreements 503

Newer Disaster Recovery Plan Technologies: Data

Mirroring Techniques 505

Auditing Business Continuity Plans 506

Disaster Recovery and Business Continuity Planning

Going Forward 508

Notes 508

Chapter 24: Electronic Archiving and Data Retention 509

Elements of a Successful Electronic Records Management Process 510

Electronic Documentation Standards 516

Implementing Electronic IT Data Archiving 517

Auditing Electronic Document Retention and

Archival Processes 519

Chapter 25: Business Continuity Management,BS 25999, and ISO 27001 521

IT Business Continuity Management Planning Needs Today 522

BS 25999 Good Practice Guidelines 524

Auditing BCM Processes 540

Linking the BCM with Other Standards and Processes 543

Notes 543

Chapter 26: Auditing Telecommunications and ITCommunications Networks 544

Network Security Concepts 545

Effective IT Network Security Controls 549

Auditing a VPN Installation 555

Note 557

Contents & xi

Page 14: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1FTOC 09/17/2010 15:36:11 Page 12

Chapter 27: Change and Patch Management Controls 558

IT Change Management Processes 559

Auditing IT Change and Patch Management Controls 573

Notes 576

Chapter 28: Six Sigma and Lean Technologies 577

Six Sigma Background and Concepts 578

Implementing Six Sigma 580

Lean Six Sigma 587

Notes 590

Chapter 29: Building an Effective IT Internal Audit Function 591

Establishing an IT Internal Audit Function 592

Internal Audit Charter: An Important IT Audit Authorization 593

Role of the Chief Audit Executive 595

IT Audit Specialists 596

IT Audit Managers and Supervisors 598

Internal and IT Audit Policies and Procedures 599

Organizing an Effective IT Audit Function 601

Importance of a Strong IT Audit Function 604

Note 605

Chapter 30: Professional Certifications: CISA, CIA, and More 606

Certified Information Systems Auditor Credentials 607

Certified Information Security Manager Credentials 609

Certificate in the Governance of Enterprise IT 611

Certified Internal Auditor Responsibilities and Requirements 612

Beyond the CIA: Other IIA Certifications 623

CISSP Information Systems Security Professional Certification 628

Certified Fraud Examiner Certification 628

ASQ Internal Audit Certifications 629

Other Internal Auditor Certifications 630

Note 631

Chapter 31: Quality Assurance Auditing and ASQ Standards 632

Duties and Responsibilities of Quality Auditors 633

Role of the Quality Auditor 635

Performing ASQ Quality Audits 638

Quality Assurance Reviews of IT Audit Functions 641

Future Directions for Quality Assurance Auditing 647

Notes 648

Index 649

xii & Contents

Page 15: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:36 Page 13

Introduction:Importance of IT Auditing

W ELCOME TO THE WORLD of IT Audit, Control, and Security. Much has

changed in information technology (IT) auditing since we published our

first edition of this book when we were then called Computer Auditors. Back

in those days, traditional mainframe or legacy computer systems were still common, we

had difficulty envisioning laptop systems as serious business information systems tools,

and the Internet was little more than an e-mail and text document communications tool

for many. Computer security then was largely based on locked, secured mainframe

facilities, and we were just seeing the very first computer viruses. Many auditors, both

internal and external, typically had only limited knowledge about IT systems controls,

and there were wide knowledge gaps among auditors, systems security specialists, and

developers. It is hard to focus on just one development or event that has turned our view

of IT audit controls into a separate discipline. However, the overall influence of the Web

along with audit, security, and internal controls concerns has made IT controls more

important to many today.

This book focuses on both the technical and professional issues facing today’s audit,

security, and internal control specialists in an information systems environment, with the

goal of providing an understanding of key IT audit security and internal controls issues.

We have expanded our audience beyond just auditors to include IT security and internal

control specialists as well. Although some may not have not have specific job titles cover-

ing these audit, security, and internal controls disciplines, many professionals in today’s

enterpriseshavea responsibility to ensure that good ITcontrolshavebeen installedandare

operating. IT auditors are key persons responsible for assessing these controls. Although

the individual chapters of this book, outlined next, cover a broad range of technical and

audit-related topics, each of the chapters focuses on three broad IT audit topic areas:

1. Technology-driven audit and internal controls. The effective IT auditor

today needs to have a good understanding of a wide range of IT technologies as well as

appropriate related audit, security, and control issues and techniques. As our first broad

concentration area, the text addresses some of the more significant technology changes

today along with their audit, security, and internal control implications. This book is not

a detailed technology tutorial, but we describe important IT issues and introduce their IT

control procedures in the following broad areas:

& Electronic commerce systems, including the use of the XBRL protocol as well as

wireless and cloud computing. This area generally goes under the name of

‘‘e-business’’ with evolving standards and good practices.

xiii

Page 16: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 14

& Modern application implementation processes, including the use of comprehensive

enterprise resource planning (ERP) software packages, software as a service

(SAAS) implementation approaches and object oriented-application development

processes.& Effective IT continuity planning processes. Because virtually all enterprise opera-

tions today are tied to often interlocking IT processes, facilities must be in place to

restore them to normal operations if some unexpected event arises.& Systems infrastructure controls for managing existing applications and operations.

Configuration management, service-level agreements, and effective customer

service functions are all important in today’s modern IT environment.& Effective IT governance procedures. Whether Sarbanes-Oxley Act (SOx) rules or

international standards guidelines, all IT organizations today must understand and

complywith themanynew rules covering all aspects of IT governance and operations.& The importance of storage management. Effective processing rules and IT govern-

ance requirements require that we keep backup copies of much of the data we use

in IT operations as well as database operations to allow an enterprise to search for

and retrieve that data easily. IT storage audit, security and internal control issues,

and newer concepts such as virtualization are important IT concerns.& Modern computer security procedures, including trusted networks and firewall-

protected systems. Enterprises need to protect their data in light of ever-increasing

threats in today’s Web and wireless environments.

This list is not all-encompassing but highlights the overall topics in these chapters.

Although some of these expressions may seem like buzzwords or techno-jargon to some

readers, the chapters to come introduce many technical concepts with an emphasis on

their related audit, security, and internal control concepts and procedures.

2. Security, privacy, and continuity issues. As the secondbroad topic area in this

book, we discuss disaster recovery planning aswell as effective continuity and information

systems security processes in a modern IT environment. The emphasis is more on getting

the business back in operation rather than just getting the IT resources working again.

Closely related to security matters, privacy is another issue facing IT auditors. We are

increasingly seeing legislation mandating privacy protections over multiple types of

information systems data, such as medical records, financial data, and other areas. These

new rules have encouraged many enterprises to install strengthened internal controls.

3. Auditing legislative and governance changes. Professionals constantly face

legal and other changes that impact their work. Understanding and developing

appropriate procedures is this book’s third broad objective. Although it occurred years

ago now, the catastrophic failure of the then-prominent corporation, Enron, introduced

a raft of new issues. Based on its stock market capitalization, Enron was then a rapidly

growing large company engaged in trading oil, gas, and other commodities. Enron’s

financial reports, in retrospect, contained many red-flag warnings of possible troubles.

Despite these warning signs, Enron’s external auditors seemingly looked the other way.

Enron subsequently collapsed, hurting many and leaving a trail of recriminations

and questions about the overall independence and objectivity of its external auditors.

As a result, the U.S. Congress passed the Sarbanes-Oxley Act (SOx), which changed the

xiv & Introduction

Page 17: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 15

process of auditing internal accounting controls for financial management as well as for

external and internal auditors. The text discusses how SOx rules continue to impact

auditors and financial management with a focus on internal controls, security, and IT

auditing.

The worldwide market meltdown starting in 2008 has caused a series of other

concerns when what were then major financial and other enterprises worldwide either

totally failed or lost value to investors. Audit, security, and internal control issues and

concerns do not just arise because of a single event, such as the 9/11 terrorism attack or

the Enron bankruptcy. Our third focus area, auditing legal and governance changes,

evolves over time, and we will discuss newer issues and what we feel are evolving

concerns. Our emphasis over these next chapters is on newer rules, evolving tech-

nologies, and their combined impact on today’s IT audit professional.

Our text covers a blend of audit, internal control, and security issues that are key

knowledge areas for IT auditors. These are also topics where financial (often external)

auditors, internal audit management, and other professionals who are not IT audit

specialists should have at least some general understanding. IT security and controls

issues have become so pervasive today that enterprise professionals at many levels

should have a general knowledge of them.

An overall objective of this book is to highlight areas that are the most important,

from an internal controls risk perspective, for today’s IT auditors. These chapters present

a high-level overview of each of the three broad objective areas just discussed. Nomatter

what the technical topic, there are always opportunities to present even more detailed

technical information. However, we focus on areas that we feel are important to today’s

professional, whether an enterprise IT audit staff member, a manager, or a student

learning more. In summary, the chapter-by-chapter IT audit, control, and security

topics discussed in this book include:

Chapter 1, SOx and the COSO Internal Controls Framework. The Sarbanes-

Oxley Act and its internal controls assessment rules have been the biggest regulatory

changes in decades, and they have impacted both auditors and enterprise management in

the United States and worldwide. This chapter summarizes the SOx Section 404 require-

ments for internalcontrolreviewstosupportanenterprise’sfinancialreports.Ouremphasis,

however, is on internal accounting controls reviews of primarily IT applications. The

chapter also discusses the newer financial audit AS5 rules released in late 2008.

In addition, we discuss the Committee of Sponsoring Organizations (COSO) frame-

work on internal controls as well as some the newly released COSO guidance materials

for monitoring internal control systems. This chapter emphasizes an IT auditor’s

responsibility for understanding and using the COSO internal controls framework.

Chapter 2, Using CobiT to Perform IT Audits. A more IT-oriented internal

controls framework, called Control Objectives for Information and related Technology

(CobiT), was in place even before SOx, andmany enterprises began to use CobiTwhen SOx

became the law as a preferred tool for complying with its Section 404 internal controls

procedures. The CobiT framework provides guidance on evaluating and understanding

internal controls, with an emphasis on enterprise IT resources. CobiT is not a replacement

for the COSO internal controls framework but is a different way to look at internal controls

in today’s IT-centric world.

Introduction & xv

Page 18: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 16

Although originally launched as a tool to help specialist internal and external

auditors who reviewed IT-related internal controls, CobiT today is a helpful tool for

evaluating all internal controls across an enterprise. It emphasizes the linkage of IT

with other business resources to deliver overall value to an enterprise. This chapter

provides an overview of the CobiT framework and its key components. More

important, the chapter describes the relationship between CobiT objectives and

the COSO internal control framework for use in internal audit reviews. Even if an

internal auditor does not use the CobiT framework in reviews of internal controls, all

internal and IT auditors should have a high-level knowledge of the basic CobiT

framework. Knowledge of CobiT and the COSO internal controls framework will help

an IT auditor to better understand the role of IT controls and risks in many enterprise

environments.

Chapter 3, IIA and ISACA Standards for the Professional Practice of

Internal Auditing. Every profession requires a set of standards to govern their

practices, general procedures, and ethics. The key standards for all internal auditors

are the Institute of Internal Auditors’ (IIA’s) Professional Standards for the Practice of

Internal Auditing, a set of guidance materials that were most recently revised in 2009.

This chapter summarizes the current IIA standards and provides guidance on how to

apply them. The chapter also introduces the IIA’s Global Technology Audit Guide

(GTAG) series IT guidance materials. An understanding of the IIA’s International

Standards is an absolute must for all internal and IT auditors. These standards provide

the support for many if not nearly all internal audit professional activities.

This chapter also revisits the IIA Code of Ethics, an important supporting foundation

for internal and IT auditors, as well as the Code of Ethics for the Information Systems

Audit and Control Association (ISACA). ISACA members are often IIA members or

Certified Public Accountants, but the ISACA Code of Ethics places a special emphasis on

IT-related activities. Although ISACA does not have the same type of standards as the

IIA, its CobiT IT internal control framework provides standards guidance for IT auditors.

The chapter also highlights ISACA’s standards and guidelines. These are particularly

important for IT auditors.

In addition, Chapter 31 introduces another very important set of internal audit

standards, the quality audit standards from the American Society for Quality (ASQ).

ASQ’s internal audit standards and its quality auditors represent a different dimension

and discipline when contrasted with the IIA’s and ISACA’s approaches and standards.

They also represent an area that must be better represented and understood in the

overall world of internal auditing.

Chapter 4, Understanding Risk Management through COSO ERM. Al-

though the term enterprise risk management (ERM) is frequently used, many IT auditors

do not have a consistent understanding of and how to use it as a tool for effective

internal audit reviews. This chapter introduces the COSO Enterprise Risk Management

(COSO ERM) framework and its elements. Although their basic framework models look

similar, COSO ERM is different from the COSO internal controls framework discussed in

Chapter 1. COSO ERM is an important reference to better understand and evaluate the

risks surrounding internal controls at all levels. This chapter describes the major

elements of the COSO ERM framework and looks at how IT auditors can better build

xvi & Introduction

Page 19: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 17

COSO ERM into their review processes as well as steps for auditing the effectiveness of an

enterprise’s risk management processes.

Every IT auditor needs to have an understanding of risk assessment approaches and

the overall risk management process, with an emphasis on COSO ERM. This chapter

presents IT audit techniques for understanding and assessing risks in many areas, from

selecting items to review to evaluating risks as part of IT audit reviews.

Chapter 5, Performing Effective IT Audits. This chapter describes basic pro-

cesses for performing an effective IT audit. Basic reviews can be performed by many

specialists in an enterprise, but this chapter focuses on basic audit steps for performing an

IT internal audit review, ranging from risk-based audit planning to preparing effective

internal audit reports.

This chapter does not describe the overall internal audit review process but

emphasizes some of the key elements necessary to perform effective IT-related reviews.

Chapter 6, General Controls in Today’s IT Environments. IT processes and

systems today range from an application to control an enterprise’s accounting general

ledger to the all-pervasive Internet. Although the lines of separation are sometimes

difficult, we can generally think of IT controls on two broad levels: application controls

that cover a specific process—such as an accounts payable application to pay invoices

from purchases—and what are called general IT controls. This latter category covers

internal controls that do not relate just to specific IT applications but are important for

all aspects of an enterprise’s IT operations.

The concept of IT general controls goes back to the early days of centralized,

mainframe computers. At that time, internal auditors sometimes looked for such things

as an access control lock on a computer center door as a general control that covered all

processes and applications operating from within the centralized IT operations center.

Today, we often think of the processes that cover all enterprise IT operations as the IT

infrastructure, a concept further discussed in Chapter 7.

This chapter discusses reviews of IT general controls from an IIA standards and

CobiT perspective. Although general controls were once considered in terms of cen-

tralized mainframe computer center operations in an earlier era, today we should think

of them as those controls impacting any set of similar IT machine resources. For

example, an internal audit functionmay equip its entire staff with laptop computers, and

good general controls are necessary in this environment to encourage all internal and IT

auditors to use common software control procedures on those assigned laptops. General

controls weaknesses can impact all IT processes.

Chapter 7, Infrastructure Controls and ITIL Service Management Best

Practices. This chapter looks at IT general controls based on the worldwide recognized

set of best or good practices called the Information Technology Infrastructure Library

(ITIL). These ITIL recommended best practices outline the type of framework an IT

auditor should consider when reviewing IT internal control risks and recommending

effective IT general controls improvements.

ITIL processes cover what we frequently call the IT infrastructure—the supporting

processes that allow IT applications to function and deliver their results to systems users.

For example, an ITIL process outlines best practices for installing an effective IT help

desk operation for all systems users. All too often, auditors have focused their attention

Introduction & xvii

Page 20: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 18

on the application development side of IT and ignored important service delivery and

support IT processes. An enterprise can put massive efforts into building and imple-

menting a new budget forecasting system, but that application will be of little value

unless there are good problem and incident management processes in place to allow the

users of this budget forecasting system to resolve systems difficulties. Also needed are

good capacity and availability processes to allow the new application to run as expected.

ITIL processes are part of what is called the IT infrastructure. IT auditors should have a

good understanding of these enterprise processes, and they should be covered in IT audit

general controls reviews.

Chapter 8, Systems Software and IT Operations General Controls.Whether

it is a MicrosoftWindows operating system on a laptop computer or Linux controlling an

office server, the operating system (OS) and its supporting software are key components

to any computer system operation. This chapter discusses some of the various OS

types and the supporting systems software that are essential in an IT operation. IT

auditors should have a very general understanding of the purposes and importance of

these types of IT software and should look for effective general controls when performing

reviews in this important general controls area.

Chapter 9, Evolving Control Issues: Wireless Networks, Cloud Computing,

and Virtualization. New IT technologies make many processes easier to use or more

efficient, but they often introduce new internal control concerns. This chapter has

selected three of these newer areas and considers internal control risks and potential

audit procedures for each. Wireless networks is the first topic here. Although it is

certainly convenient to not have to connect IT terminals and other devices through a

formal cable network, the very open environment of using wireless technology

approaches introduces some security and control risks. The chapter looks at wireless

networks from an audit, security, and control perspective.

As a second topic area, the chapter introduces the rapidly evolving IT configura-

tion called cloud computing. Although the term sounds almost exotic to many, it

has become a significant concept today with our growing dependence on using

Web-based applications for many business processes rather than applications down-

loaded to home office servers. Cloud computing processes are also called web services,

software as a service (SaaS), or service-oriented architecture (SOA). In cloud comput-

ing, many different Internet applications—supported by multiple vendors and oper-

ating on multiple servers—operate together out of what looks like a large fuzzy

Internet cloud. This chapter introduces cloud computing concepts and discusses some

security and controls concerns that may impact IT auditors in their assessments of

IT general controls.

This chapter’s third topic is virtualization. With the massive amount of data and

information that most enterprises retain, storage management is very important for

almost all IT operations. Whether it is the very high-capacity miniature USB devices so

common today or new database tools, there is a need to install appropriate controls in

these storage management environments. In virtualization, any device can be defined to

look like another. This concept can create a challenging environment for an IT auditor,

and the chapter provides some introductory internal controls guidance to these evolving

areas.

xviii & Introduction

Page 21: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 19

Chapter 10, Selecting, Testing, and Auditing IT Applications. In order to

perform internal controls reviews in specific areas of enterprise operations, such as

accounting, distribution, or engineering, IT auditors must have the skills to understand,

evaluate, and test the controls over their supporting IT applications. Reviews of specific

application controls often are more critical to achieving overall audit objectives than

reviews of general IT controls.

This chapter discusses approaches to review internal accounting controls in IT

applications, using several different types of applications as examples. The chapter also

discusses audit approaches for evaluating and testing those application controls as well

as techniques for reviewing new applications under development. We focus on the

internal control characteristics of different types of applications and then discuss how to

select appropriate applications in internal controls reviews. There are many differences

from one application to another; this chapter focuses on how an IT auditor should select

higher-risk applications as candidates for IT audit reviews; the tools and skills needed to

understand and document application internal controls; and, finally, processes to test

and evaluate those applications.

Chapter 11, Software Engineering and CMMi. The Carnegie-Mellon Univer-

sity Software Engineering Institute’s IT-based Capability Maturity Model for integration

(CMMi1) is an effective approach for an enterprise and its IT software development

functions to assess howwell they are organized. It is ameasure onwhether processes are

well managed, repeatable, or even unpredictable. IT auditors can use CMMi as a tool to

measure how well they are doing, and it can serve as a guide for process improvements.

The chapter provides an overview of how IT audit specialists can use CMMi in their

assessments of internal controls and in organizing their own IT projects.

Chapter 12, Auditing Service-Oriented Architecture and Record Manage-

ment Processes. SOA is an IT systems approach where an application’s business logic

or individual functions are modularized and presented as services for consumer/client

applications. This chapter introduces SOA concepts for the IT auditor and discusses

internal control and IT auditor issues surrounding the development and operations of IT

applications using this technology. The chapter also reviews the importance of effective

records management systems in today’s enterprises from an internal controls and IT

audit perspective. Today, almost all business records are created and most live their

entire lives electronically. Failure to manage electronic records and physical records in

accordance with established records management principles ignores potential risk.

Chapter 13, Computer-Assisted Audit Tools and Techniques. IT auditors

test and review the internal controls surrounding their IT systems, and they often need

tools to better understand and evaluate the completeness and accuracy of the data

stored in the IT applications’ files and databases. This chapter reviews approaches to

retrieving data through computer-assisted audit tools and techniques (CAATTs), the use

of independent auditor–controlled software to assess organization IT files and docu-

ments. Whether purchased software administered by an IT auditor or an operational

procedure to better analyze IT data, many tools and techniques can help make audit

reviews of IT-supported systems more efficient and effective. The chapter provides IT

auditors with a basic understanding on the general use of CAATTs to access and review

automated data to support IT audits.

Introduction & xix

Page 22: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 20

Chapter 14, Continuous Assurance Auditing, OLAP, and XBRL. Continuous

assurance auditing (CAA) is the process of installing control-related monitors in

automated systems such that these monitors will send messages to internal auditors

if the system’s processing signals a deviation from an established audit limit or

parameter. This chapter discusses CAA as an improved alternative approach for

reviewing automated systems as well as an overview of continuous monitoring

(CM), business controlled procedures that can be subject to periodic internal IT audits.

The chapter also introduces XBRL, the extensible business reporting language

developed by the American Institute of Certified Public Accountants. XBRL is a

standards-based way to communicate business and financial information across multi-

ple enterprises. IT auditors should have a basic understanding of XBRL, a methodology

that is growing in recognition and use, and its necessary supporting internal controls.

Chapter 15, IT Controls and the Audit Committee. The management or

supervisory authority of enterprise’s internal audit function is the board of directors’

audit committee. This committee is responsible for approving internal audit plans,

reviewing audit reports, hiring internal audit management, and taking other actions as

appropriate. Although historically much of an audit committee’s interests have been

based on audited financial statements and an enterprise’s financial audit, IT audit has an

important role here as well. This chapter examines planning and reporting key IT audit

activities to the enterprise’s audit committee.

Chapter 16, Val IT, Portfolio Management, and Project Management. This

chapter looks at three knowledge areas that are important to IT auditors: (1) ISACA’s

enterprise value initiative, called Val IT, to better manage and understand IT invest-

ments; (2) portfolio management approaches to better deal with the large number of

diverse applications and IT resources in the typical enterprise; and (3) project manage-

ment good practices to better control and manage many IT activities. Internal audit

functions normally should develop an audit universe list, a compilation of all potential

auditable entities for that enterprise. The chapter also looks at audit universe portfolio

management from an IT audit perspective.

The chapter also discusses the importance of effective project management proce-

dures. Audits and internal control activities should be planned and performed in a

well-organized manner. The program and project management procedures described in

the chapter will aid in this process.

Chapter 17, Compliance with IT-Related Laws and Regulations. Both in the

United States and worldwide, a wide range of laws and regulations impact enterprise IT

operations. Some of these have direct IT connections, such as the U.S. Computer Fraud

and Abuse Act (CFAA), while others, such as SOx, are not really IT-related laws but

nevertheless have multiple IT relationships. This chapter reviews a series of primarily U.

S. IT-related laws and regulations, highlighting areas that should be considered in IT

audit reviews.

Chapter 18, Understanding and Reviewing Compliance with ISO Stan-

dards. The International Standards Organization (ISO) has guidance that covers a wide

range of areas, such as defining fastener screw threads in an automobile engine, the

thickness of a personal credit card, and IT quality standards. This chapter provides an

overview and introduction to several of the many ISO standards that are particularly

xx & Introduction

Page 23: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 21

important for IT auditors, with a focus on ISO 27001 and 27002 computer security

standards. The chapter also provides an introduction to several other ISO standards,

including international standards for IT management systems and for quality manage-

ment. Enterprise compliance with appropriate ISO standards is important worldwide

today, as they establish benchmarks for worldwide compliance.

Chapter 19, Controls to Establish an Effective IT Security Environment.

Effective IT security is very important in all enterprises. Beyond password controls and

backup processes discussed in other chapters, an enterprise needs a high-level enterprise

commitment to IT security as well as strong procedures to build effective IT security

processes. These procedures can range from such matters as a strong enterprise code of

conduct setting the rules for enterprise associates to overall management policies

promoting the need for an effective security environments. This chapter outlines

some techniques as well IT audit procedures to review enterprise-wide IT security

effectiveness.

Chapter 20, Cybersecurity and Privacy Controls. In our Web-dominated

world today, IT security or cybersecurity and privacy controls over data and information

are very important. This chapter discusses these controls from two focus areas: (1) some

of themany cybersecurity and privacy concerns that IT auditors should consider in their

reviews of systems and processes and (2) IT privacy issues. We have limited our focus to

only some cybersecurity areas because the field of IT security controls is vast and

sometimes very technical, beyond the skills of many auditors. Regarding IT privacy,

there is a growing set of issues about how much personal data and information

individuals should allow to be given to interested enterprises, government authorities,

and even other individuals.

Chapter 21, IT Fraud Detection and Prevention. An effective auditor needs to

recognize potential fraudulent business practices as part of any IT audit and then should

recommend controls and procedures to limit exposure to the fraudulent activity. This

chapter outlines some of the red flags—common conditions that an IT auditor might

encounter when faced with a potential fraud as well as steps to identify, test, and

properly process fraudulent activities. Fraud investigation can be a very detailed and

specialized activity, but IT auditors should have a high level understanding of how to

audit for potentially fraudulent activities as well as of processes for investigating and

reporting fraud. Fraudulent activities represent a breakdown in a wide range of good

practices and procedures, but IT auditors must recognize that fraudulent activities

always may exist.

Chapter 22, Identity and Access Management. With all of the personal data

stored in so many IT databases and systems, there is always a major concern that some

perpetrator will hijack and steal someone’s personal information to use for improper

purposes. The concern that someone will steal this personal information is called

identity management. Although certain laws are in place to prohibit such actions, an

enterprise needs to establish strong procedures to discourage such improper activities.

Starting with effective IT password access controls and the monitoring of potential

password violations, an enterprise needs to have strong identity and access manage-

ment processing in place. This chapter outlines procedures that are effective for IT

security management and provides guidance for performing effective IT audits.

Introduction & xxi

Page 24: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 22

Chapter 23, Establishing Effective IT Disaster Recovery Processes. This

chapter introduces what is called IT disaster recovery planning processes. (Chapter 25

discusses business continuity controls, which are similar but very different.) IT disaster

recovery includes effective backup processes for restoring all aspects of IT operations,

whether a classic server-based data center or a network of laptop or desktop system

operations. The chapter briefly introduces some of the technical tools, such as data

mirroring, that improve IT disaster recovery procedures today. The chapter concludes

with guidance on testing disaster recovery plans as well as steps for auditing such plans.

Because of our massive dependence on IT operations, effective disaster recovery plans

are key components in IT operations.

Chapter 24, Electronic Archiving and Data Retention. Because so much data

and supporting documentation is recorded on databases or other IT media formats, it

is important to preserve backup copies in separate, independent locations. This is as

true for an enterprise with massive business transactions as it is for an IT auditor. The

chapter discusses some best practice approaches for saving and archiving data as well as

control procedures for its access. In addition, the chapter outlines steps for an audit of

data retention processes.

Chapter 25, Business Continuity Management, BS 25999, and ISO 27001.

This chapter introduces best practices for effective enterprise IT continuity and disaster

recovery planning processes including establishing enterprise internal controls in

enterprise-critical areas. Going beyond Chapter 24’s disaster recovery backup proce-

dures, continuity planning is based on the concept that an enterprise needs to have

processes in place to resume normal business operations in the event of a major

disruption in IT services. This major task involves restoring business process operations

beyond just the IT applications.

This chapter also discusses BS 25999, a U.K.-based standard for business continuity

management as well as the ISO 27001 international standards. The chapter uses BS

25999 to describe the processes necessary for effective continuity planning for a sample

enterprise.

Chapter 26, Auditing Telecommunications and IT Communications Net-

works. Moving beyond the wireless networks discussed in Chapter 9, enterprise IT

systems typically are tied to vast telecommunications networks, internally or through

the Web. This chapter provides an introduction to the wide variety of network top-

ologies in place today and outlines processes surrounding IT network controls and tools

such as scanners and sniffers. The chapter outlines approaches for an IT auditor’s

internal controls and security-related review of an enterprise’s telecommunications

including its wireless operations.

Chapter 27, Change and Patch Management Controls. Enterprises can be

exposed to major security vulnerabilities in the event of unauthorized or inappropriate

changes to its IT systems and programs. Strong IT change management processes are

always needed. This chapter discusses effective IT change and patch management

controls and introduces procedures for auditing internal controls in these areas.

Chapter 28, Six Sigma and Lean Technologies. Enterprise operations manag-

ers, at all levels, are regularly looking for ways to improve their operations, whether in

shop-floor production processes, office administrative procedures, or elsewhere. Many

xxii & Introduction

Page 25: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 23

have found six sigma processes to be effective here. This chapter provides a high-level

introduction to six sigma concepts and how they can be applied to enterprise IT

operations. We provide an overview of six sigma and the lean approaches to imple-

menting it. Even though an internal or IT audit function may not be using six sigma

concepts as part of their overall operations, IT auditors should have a basic under-

standing of this important quality improvement concept.

Chapter 29, Building an Effective IT Internal Audit Function. Other

chapters have discussed many aspects of IT audits. This chapter steps back and looks

at some the requirements for an enterprise to build an effective IT audit function as part

of their overall internal audit group. The chapter reviews IT audit positions descriptions,

audit planning, workpapers, audit reports, and other factors needed to build an effective

IT internal audit function.

Chapter 30, Professional Certifications: CISA, CIA, and More. IT auditors

have a need for strong and well-recognized professional certifications. Many have joined

the profession with no specific certification requirements beyond their undergraduate

college degrees; others attained accounting degrees and prepared for the Certified Public

Accountant (CPA) examination. Today, an IT auditor can take a qualifying examina-

tion and complete other requirements to become a Certified Information Systems

Auditor (CISA), a Certified Internal Auditor (CIA), a Certified Fraud Examiner (CFE),

or any of a series of other certifications. This chapter discusses the professional

designations that are important to the IT auditor, with an emphasis on the CIA and

CISA certifications, including their qualification and examination requirements. In

addition, the chapter considers some other certification options available to IT auditors,

including the Certified Information Systems Security Professional (CISSP) requirements.

Chapter 31, Quality Assurance Auditing and ASQ Standards. This chapter

reviews the role of quality auditors in an enterprise, their practices and standards.

There are many similarities between the activities of quality auditors and the IT

auditors that are themain focus of this book.With a growing convergence of enterprise

activities to improve governance, IT processes, and internal controls, we can expect to

see these internal audit groups become more closely aligned. Although we focus more

on IIA and ISACA types of IT internal auditors, there also is a need for a general

understanding of the roles, responsibilities, and activities of quality auditors. In

addition, we also consider internal audit Quality Assurance (QA) reviews of an IT

audit function performed by members of the internal audit team themselves or by

contracted outside reviewers.

HOW TO USE THIS BOOK

The role of an IT auditor is changing now and will change even more in the future. The

internal control SOx, COSO, and CobiT models presented in Chapters 1 and 2 suggest a

much broader role for the IT audit and internal controls specialist of the future. In

addition, technology changes and new concepts, such as many of the newer issues

introduced throughout this book, will require that IT auditors develop expanded

knowledge needs. An overall objective of this book is to introduce some of these newer

Introduction & xxiii

Page 26: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 24

concepts. Our objective is not to provide an exhaustive tutorial in each subject area but

to discuss concepts and related IT audit, security, and internal controls issues.

The chapters throughout this book contain many suggested audit programs—the

steps necessary to perform actual IT audits. There is an increasing need for persons with

a broad knowledge of IT audit, security, and internal controls. Although there is also a

need for some with very specialized skills, such as a computer crime investigator or a

financial auditor with detailed knowledge of a specialized area, such as bond indentures,

today’s IT auditor should have good skills in the overall areas of audit, control, and

security. Providing an overview and some background guidance is a goal of this edition.

The author hopes that this edition and potentially more frequent updates will help to

provide both new and experienced audit and internal control specialists with informa-

tion to help them become more effective professionals.

xxiv & Introduction

Page 27: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 25

IT Audit, Control,and Security

Page 28: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1CINTRO 09/18/2010 11:6:37 Page 26

Page 29: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1C01 08/06/2010 14:5:3 Page 1

IPART ONE

Auditing Internal Controlsin an IT Environment

Page 30: I AN d IAud,t It e CoNtRol,download.e-bookshelf.de/.../0000/5805/34/L-G-0000580534-000238349… · COSO Internal Control Systems Monitoring Guidance 21 ... IIA and ISACA Risk Management

E1C01 08/06/2010 14:5:3 Page 2