IT Governance Using COBIT® and Val IT™: Presentation, 2nd Edition

Slides:



Advertisements
Similar presentations
COBIT® 5 for Assurance Introduction
Advertisements

IT Management Frameworks
Presented by. © 2012 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored.
IT Governance Framework
Alignment of Enterprise Governance and IT Governance
Analisa Proses. Terjemahan model analisis menjadi desain software.
 2007 IT Governance Institute. All rights reserved. IT Governance Using C OBI T ® and Val IT™: Presentation, 2 nd Edition The explanation.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
TI BISNIS ITG using COBIT &
Centro de Convenciones, August 22-23, 2006
COBIT - II.
IT Governance Capability Maturity within Government
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
By Collin Smith COBIT Introduction By Collin Smith
Managing the Information Technology Resource Jerry N. Luftman
Overview of IT Governance and
IS Audit Function Knowledge
Information Systems Controls for System Reliability -Information Security-
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Continual Service Improvement Process
Information ITIL Technology Infrastructure Library ITIL.
The Challenge of IT-Business Alignment
 2007 IT Governance Institute. All rights reserved. IT Governance Using C OBI T ® and Val IT™: Presentation, 2 nd Edition The explanation.
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1. IT AUDITS  IT audits: provide audit services where processes or data, or both, are embedded in technologies.  Subject to ethics, guidelines, and.
Structures, Processes and Relational Mechanisms for IT Governance Minder Chen, Ph.D. Associate Professor Decision Sciences and MIS Area Coordinator School.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
© ITGI not for commercial use. 1 C OBI T ® Presentation Package Sample 10 Slides of 80-slide Deck The C OBI T ® framework explained in a complete.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
C OBI T and slides © 2007 IT Governance Institute. Used with permission. An Overview of C OBI T ®
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
© | Hansan Global | All Rights Reserved 1 INTRODUCTION TO IT SERVICE MANAGEMENT Hansan Global Pte Ltd.
#325 - CobiT and Service Delivery Debra Mallette, CISA, CSSBB Kaiser Permanente IT.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
IT Auditor’s Role in IT Governance Fred C. Roth, CISA MIS Training Institute Session 425.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
ISACA Willamette Valley Chapter Luncheon Thursday, March 20, 2008 Practical Auditors Guide for CobiT Steve Balough, CISA.
Information ITIL Technology Infrastructure Library ITIL.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
A Quick Overview of ITIL
COBIT® as a Risk Management Framework
COBIT® 5 for Assurance Introduction
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Information Sharing for Integrated care A 5 Step Blueprint
12.2 Conduct Procurements The process of obtaining seller responses, selecting a seller and awarding the contract The team applies selection criteria.
TechStambha PMP Certification Training
UNIT V QUALITY SYSTEMS.
COBIT 5 Executive Summary
COBIT 5 and GRC Date.
CMMI – Staged Representation
Asset Governance – Integrated Strategic Asset Management
همسویی چارچوب‏هاو به‏روشهای حاکمیت و مدیریت فناوری اطلاعات
COBIT 5 Executive Summary
Alignment of COBIT to Botswana IT Audit Methodology
COBIT® 5 for Assurance Introduction
COBIT® 5 for Assurance Introduction
Portfolio, Programme and Project
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
December 5, 2018.
COBIT 5 and GRC Date.
COBIT® 5 for Assurance Introduction
COBIT 5 and GRC Date.
COBIT 5 and GRC Date.
Presentation transcript:

IT Governance Using COBIT® and Val IT™: Presentation, 2nd Edition The explanation of the COBIT® framework in this PowerPoint presentation is designed for use by professors whose classes cover topics such as: Information systems management Information security management Auditing Information systems auditing Accounting information systems IT Governance Using COBIT® and Val IT™: Presentation, 2nd Edition

Disclaimer The IT Governance InstituteTM (ITGITM) and the author of IT Governance Using COBIT® and Val IT TM: Presentation, 2nd Edition, have designed the publication primarily as an educational resource for educators. ITGI, ISACA® and the authors make no claim that use of this product will assure a successful outcome. The publication should not be considered inclusive of all proper procedures and tests or exclusive of other procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific procedure or test, controls professionals should apply their own professional judgement to the specific control circumstances presented by the particular systems or IT environment. Note this publication is an update of COBIT in Academia: COBIT Presentation Package.  2007 IT Governance Institute. All rights reserved. www.itgi.org 2

Disclosure  2007 IT Governance Institute. All rights reserved. This publication is intended solely for academic use and shall not be used in any other manner (including for any commercial purpose). Reproductions of selections of this publication are permitted solely for the use described above and must include the following copyright notice and acknowledgement: ‘Copyright © 2007 IT Governance Institute. All rights reserved. Reprinted by permission.’ IT Governance Using COBIT® and Val IT™: Presentation, 2nd Edition, may not otherwise be used, copied or reproduced, in any form by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of ITGI. Any modification, distribution, performance, display, transmission or storage, in any form by any means (electronic, mechanical, photocopying, recording or otherwise) of IT Governance Using COBIT® and Val IT™: Presentation, 2nd Edition, is strictly prohibited. No other right or permission is granted with respect to this work. IT Governance Using COBIT® and Val IT™: Presentation, 2nd Edition ISBN 978-1-60420-029-4  2007 IT Governance Institute. All rights reserved. www.itgi.org 3

Acknowledgements Researcher Ed O’Donnell, University of Kansas, USA Contributors Roger Stephen Debreceny, Ph.D., FCPA, University of Hawaii, USA Steven DeHaes, University of Antwerp Management School, Belgium Erik Guldentops, CISA, CISM, University of Antwerp Management School, Belgium Robert Parker, CISA, CA, CMC, FCA, Canada V. Sambamurthy, Ph.D., Michigan State University, USA Scott Lee Summers, Ph.D., Brigham Young University, USA John Thorp, The Thorp Network, Canada Wim Van Grembergen, Ph.D., University of Antwerp Management School, Belgium Ramesh Venkataraman, Ph.D., Indiana University, USA  2007 IT Governance Institute. All rights reserved. www.itgi.org 4

This presentation includes... Driving forces for IT governance and Control Objectives for Information and related Technology (COBIT®) An introduction to: The COBIT framework COBIT supporting materials An explanation of where COBIT fits with other frameworks and standards  2007 IT Governance Institute. All rights reserved. www.itgi.org 5

The Governance Environment

Forces Driving IT Governance Business/IT Alignment ROI Compliance Project Execution Return on Investment (ROI) Security  2007 IT Governance Institute. All rights reserved. www.itgi.org 7

IT Governance Needs a Management Framework Driving Forces Map Onto the IT Governance Domains  2007 IT Governance Institute. All rights reserved. www.itgi.org 8

COBIT 4.1—The IT Governance Framework Brian, this originally stated “4”, but I’ve changed to 4.1, since specificity is preferred. Please change back if necessary. COBIT 4.1—The IT Governance Framework Internationally accepted good practices Management-oriented Supported by tools and training Freely available at www.itgi.org Sharing knowledge and leveraging expert volunteers Continually evolving Maintained by reputable not- for-profit organisation Maps 100 percent to COSO Maps strongly to all major related standards IT Processes IT Management Processes IT Governance Processes CobiT best practices repository for COBIT The only IT management and control framework that covers the end-to-end IT life cycle  2007 IT Governance Institute. All rights reserved. www.itgi.org 9

COBIT 4.1—The IT Governance Framework Is a reference, set of best practices, not an ‘off-the-shelf’ cure Enterprises still to need to analyse their control requirements and customise based on: Value drivers Risk profile IT infrastructure, organisation and project portfolio IT Processes IT Management Processes IT Governance Processes CobiT best practices repository for COBIT  2007 IT Governance Institute. All rights reserved. www.itgi.org 10

Key Driving Forces for COBIT How IT is organised to respond to the requirements What the stakeholders expect from IT The resources made available to—and built up by—IT Business Requirements IT Resources IT Processes Plan and Organise Aquire and Implement Deliver and Support Monitor and Evaluate Data Application systems Technology Facilities People Effectiveness Efficiency Confidentiality Integrity Availability Compliance Information reliability  2007 IT Governance Institute. All rights reserved. www.itgi.org 11

How Does COBIT Link to IT Governance? Goals Responsibilities Control Objectives Requirements Business IT Governance Information the business needs to achieve its objectives Information executives and board need to exercise their responsibilities Direction and Resourcing IT Governance  2007 IT Governance Institute. All rights reserved. www.itgi.org 12

An Overview of COBIT

Process Orientation Domains Natural grouping of processes, often matching an organisational domain of responsibility Processes A series of joined activities with natural control breaks Activities or Tasks Actions needed to achieve a measurable result—activities have a life cycle, whereas tasks are discrete  2007 IT Governance Institute. All rights reserved. www.itgi.org 14

Process Orientation IT Domains IT Processes Activities Plan and Organise Acquire and Implement Deliver and Support Monitor and Evaluate IT Processes IT strategy Computer operations Incident handling Acceptance testing Change management Contingency planning Problem management Activities Record new problem. Analyse. Propose solution. Monitor solution. Record known problem. Etc. … Natural grouping of processes, often matching an organisational domain of responsibility A series of joined activities with natural (control) breaks Actions needed to achieve a measurable result—activities have a life cycle, whereas tasks are discrete  2007 IT Governance Institute. All rights reserved. www.itgi.org 15

Process Orientation Plan and Organise Description This domain covers strategy and tactics, and concerns the identification of the way IT can best contribute to the achievement of the business objectives. The realisation of the strategic vision needs to be planned, communicated and managed for different perspectives. Proper organisation and technological infrastructure must be put in place. Topics Strategy and tactics Vision planned Organisation and infrastructure Questions Are IT and the business strategy aligned? Is the enterprise achieving optimum use of its resources? Does everyone in the organisation understand the IT objectives? Are IT risks understood and being managed? Is the quality of IT systems appropriate for business needs? Domains  2007 IT Governance Institute. All rights reserved. www.itgi.org 16

Waterfall Model 4 Domains - 34 Processes - 210 Control Objectives The control of IT Processes that satisfy Business Requirements is enabled by Control Statements considering Control Practices 4 Domains - 34 Processes - 210 Control Objectives  2007 IT Governance Institute. All rights reserved. www.itgi.org 17

IT Life Cycle COBIT Framework Business Objectives Criteria Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability IT Resources Data Application systems Technology Facilities People Monitor and Evaluate Plan and Organise IT Life Cycle Deliver and Support Acquire and Implement  2007 IT Governance Institute. All rights reserved. www.itgi.org 18

COBIT Processes Plan and Organise Acquire and Implement PO1 Define an IT strategic plan. PO2 Define the information architecture. PO3 Determine technological direction. PO4 Define the IT processes, organisation and relationships. PO5 Manage the IT investment. PO6 Communicate management aims and direction. PO7 Manage IT human resources. PO8 Manage quality. PO9 Assess and manage IT risks. PO10 Manage projects. Plan and Organise AI1 Identify automated solutions. AI2 Acquire and maintain application software. AI3 Acquire and maintain technology infrastructure. AI4 Enable operation and use. AI5 Procure IT resources. AI6 Manage changes. AI7 Install and accredit solutions and changes. Acquire and Implement  2007 IT Governance Institute. All rights reserved. www.itgi.org 19

COBIT Processes Deliver and Support Monitor and Evaluate DS1 Define and manage service levels. DS2 Manage third-party services. DS3 Manage performance and capacity. DS4 Ensure continuous service. DS5 Ensure systems security. DS6 Identify and allocate costs. DS7 Educate and train users. DS8 Manage service desk and incidents. DS9 Manage the configuration. DS10 Manage problems. DS11 Manage data. DS12 Manage the physical environment. DS13 Manage operations. Deliver and Support ME1 Monitor and evaluate IT performance. ME2 Monitor and evaluate internal control. ME3 Ensure compliance with external requirements. ME4 Provide IT governance. Monitor and Evaluate  2007 IT Governance Institute. All rights reserved. www.itgi.org 20

Processes in the Student Book The following processes are included in the Student Book, 2nd Edition: DS2 Manage third-party services. PO9 Assess and manage IT risks. AI2 Acquire and maintain application software. DS5 Ensure systems security. ME2 Monitor and evaluate internal control. DS2 is used as an example in the Student Book, 2nd Edition, and the following slides use DS2 to illustrate the related COBIT information for a process.  2007 IT Governance Institute. All rights reserved. www.itgi.org 21

Navigating in COBIT DS2 Process Level Information Criteria Waterfall IT Governance IT Resources  2007 IT Governance Institute. All rights reserved. www.itgi.org 22

DS2 Waterfall  2007 IT Governance Institute. All rights reserved. www.itgi.org 23

DS2 Management Guidelines  2007 IT Governance Institute. All rights reserved. www.itgi.org 24

DS2 Management Guidelines cont.  2007 IT Governance Institute. All rights reserved. www.itgi.org 25

DS2 Maturity Model DS2 Manage Third-party Services Management of the process Manage third-party services that satisfies the business requirement for IT of providing satisfactory third-party services whilst being transparent about benefits, costs and risks is: 0 Non-existent when Responsibilities and accountabilities are not defined. There are no formal policies and procedures regarding contracting with third parties. Third-party services are neither approved nor reviewed by management. There are no measurement activities and no reporting by third parties. In the absence of a contractual obligation for reporting, senior management is not aware of the quality of the service delivered. 1 Initial/Ad Hoc when Management is aware of the need to have documented policies and procedures for third-party management, including signed contracts. There are no standard terms of agreement with service providers. Measurement of the services provided is informal and reactive. Practices are dependent on the experience (e.g., on demand) of the individual and the supplier. 2 Repeatable but Intuitive when The process for overseeing third-party service providers, associated risks and the delivery of services is informal. A signed, pro forma contract is used with standard vendor terms and conditions (e.g., the description of services to be provided). Reports on the services provided are available, but do not support business objectives.  2007 IT Governance Institute. All rights reserved. www.itgi.org 26

DS2 Maturity Model cont. 3 Defined when Well-documented procedures are in place to govern third-party services, with clear processes for vetting and negotiating with vendors. When an agreement for the provision of services is made, the relationship with the third party is purely a contractual one. The nature of the services to be provided is detailed in the contract and includes legal, operational and control requirements. The responsibility for oversight of third-party services is assigned. Contractual terms are based on standardised templates. The business risk associated with the third-party services is assessed and reported. 4 Managed and Measurable when Formal and standardised criteria are established for defining the terms of engagement, including scope of work, services/deliverables to be provided, assumptions, schedule, costs, billing arrangements and responsibilities. Responsibilities for contract and vendor management are assigned. Vendor qualifications, risks and capabilities are verified on a continual basis. Service requirements are defined and linked to business objectives. A process exists to review service performance against contractual terms, providing input to assess current and future third-party services. Transfer pricing models are used in the procurement process. All parties involved are aware of service, cost and milestone expectations. Agreed-upon goals and metrics for the oversight of service providers exist. 5 Optimised when Contracts signed with third parties are reviewed periodically at predefined intervals. The responsibility for managing suppliers and the quality of the services provided is assigned. Evidence of contract compliance to operational, legal and control provisions is monitored, and corrective action is enforced. The third party is subject to independent periodic review, and feedback on performance is provided and used to improve service delivery. Measurements vary in response to changing business conditions. Measures support early detection of potential problems with third-party services. Comprehensive, defined reporting of service level achievement is linked to the third-party compensation. Management adjusts the process of third-party service acquisition and monitoring based on the measurers.  2007 IT Governance Institute. All rights reserved. www.itgi.org 27

Control Practices COBIT Control Practices, 2nd Edition Detailed guidance on each of the control objectives Management-oriented From three to 12 control practices per control objective  2007 IT Governance Institute. All rights reserved. www.itgi.org 28

DS2 Control Practices  2007 IT Governance Institute. All rights reserved. www.itgi.org 29

DS2 Control Practices cont.  2007 IT Governance Institute. All rights reserved. www.itgi.org 30

IT Assurance Guide IT Assurance Guide: Using COBIT Detailed guidance to support assurance practitioners in: Financial statement audit Internal audit Value for money Operational improvement Guidance on: How to leverage COBIT for assurance Detailed assurance testing steps  2007 IT Governance Institute. All rights reserved. www.itgi.org 31

DS2 Assurance Steps  2007 IT Governance Institute. All rights reserved. www.itgi.org 32

DS2 Assurance Steps cont.  2007 IT Governance Institute. All rights reserved. www.itgi.org 33

Implementation Guide, 2nd Edition IT Governance Implementation Guide, 2nd Edition Detailed, structured guidance to the implementation of IT governance Generic IT governance implementation guidance, not just COBIT  2007 IT Governance Institute. All rights reserved. www.itgi.org 34

Where COBIT Typically Sits King COSO Governance Layer COBIT Governance Layer IT ITIL 17799 Management Layer IT CMM TickIT  2007 IT Governance Institute. All rights reserved. www.itgi.org 35