INTOSAI IT Audit IT Methods Awareness

Slides:



Advertisements
Similar presentations
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
Advertisements

More CMM Part Two : Details.
Chapter 2 The Software Process
ANSI/EIA A EIA STANDARD Earned Value Management Systems Overview May 2, 2006 NDIA Program Management Systems Committee Walt Berkey, Lockheed.
©2006 OLC 1 Process Management: The Foundation for Achieving Organizational Excellence Process Management Implementation Worldwide.
CPIS 357 Software Quality & Testing I.Rehab Bahaaddin Ashary Faculty of Computing and Information Technology Information Systems Department Fall 2010.
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
Enterprise Architecture. 2 Agenda What is Enterprise Architecture (EA)? Roles in EA? Why is EA Important? Tangible Benefits from EA? What Do We Need to.
Environmental Management Systems An Overview With Practical Applications.
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Capability Maturity Model (CMM) in SW design
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Chapter 3 The Structure of the CMM
Quality evaluation and improvement for Internal Audit
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Software Process CS 414 – Software Engineering I Donald J. Bagert Rose-Hulman Institute of Technology December 17, 2002.
Capability Maturity Model
Acquiring Information Systems and Applications
Enterprise Architecture
Effective Methods for Software and Systems Integration
Integrated Capability Maturity Model (CMMI)
Chapter 4 Interpreting the CMM. Group (3) Fahmi Alkhalifi Pam Page Pardha Mugunda.
N By: Md Rezaul Huda Reza n
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Engineering, Operations & Technology | Information TechnologyAPEX | 1 Copyright © 2009 Boeing. All rights reserved. Architecture Concept UG D- DOC UG D-
OSF/ISD Project Portfolio Management Framework January 17, 2011.
J. R. Burns, Texas Tech University Capability Maturity Model -- CMM n Developed by the Software Engineering Institute (SEI) in 1989 –SEI is a spinoff.
CMMi What is CMMi? Basic terms Levels Common Features Assessment process List of KPAs for each level.
NIST Special Publication Revision 1
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
The Challenge of IT-Business Alignment
Introduction to Software Engineering LECTURE 2 By Umm-e-Laila 1Compiled by: Umm-e-Laila.
Soft Tech Development Inc. 1 Software Project Tracking A CMM Level 2 Key Process Area Soft Tech Development Inc.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Software Engineering Lecture # 17
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Software process improvement Framework for SPI SPI support groups, maturity and immaturity models Assessment and gap analysis Education and training Selection.
University of Sunderland CIFM03Lecture 2 1 Quality Management of IT CIFM03 Lecture 2.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Georgia Institute of Technology CS 4320 Fall 2003.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
SWEN 5130 Requirements Engineering 1 Dr Jim Helm SWEN 5130 Requirements Engineering Requirements Management Under the CMM.
Software Engineering - I
CMMI. 1.Initial - The software process is characterized as ad hoc, and occasionally even chaotic. Few processes are defined, and success depends on individual.
Michael Campe U.S. Army Aviation and Missile Command NDIA TID Technical Information Division Symposium Royal Sonesta Hotel, New Orleans, LA August 2003.
Ch-1 Introduction The processes used for executing a software project have major effect on quality of s/w produced and productivity achieved in project…
Level 1 Level 1 – Initial: The software process is characterized as ad hoc and occasionally even chaotic. Few processes are defined, and success depends.
Page 1 The Capability Maturity Model (CMM) distinguishes between immature and mature software organizations. Immature software organizations are typically.
1 EMS Fundamentals An Introduction to the EMS Process Roadmap AASHTO EMS Workshop.
Information Technology Investment Management (ITIM) Solomon Negash, Ph.D.
COMP 6710 Course NotesSlide 3-0 Auburn University Computer Science and Software Engineering Course Notes Set 3: Software Process Maturity Computer Science.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
~ pertemuan 4 ~ Oleh: Ir. Abdul Hayat, MTI 20-Mar-2009 [Abdul Hayat, [4]Project Integration Management, Semester Genap 2008/2009] 1 PROJECT INTEGRATION.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Capability Maturity Model. CS460 - Senior Design Project I (AY2004)2 Immature Organisations Software processes are often rigorously followed. Organisation.
Cmpe 589 Spring Fundamental Process and Process Management Concepts Process –the people, methods, and tools used to produce software products. –Improving.
July 27, Brain Works Consulting, LLC 1.
Capability Maturity Model. What is CMM? n CMM: Capability Maturity Model n Developed by the Software Engineering Institute of the Carnegie Mellon University.
CS4311 Spring 2011 Process Improvement Dr
Level 1 Level 1 – Initial: The software process is characterized as ad hoc and occasionally even chaotic. Few processes are defined, and success depends.
TSMO Program Plan Development
CMMI – Staged Representation
GAO’s Approach to Assessing an Organization’s Investment Maturity:
By Jeff Burklo, Director
Software Engineering Lecture 16.
Software Engineering I
Capability Maturity Model
Vijay Rachamadugu and David Snyder September 7, 2006
Capability Maturity Model
Presentation transcript:

INTOSAI IT Audit IT Methods Awareness

Outline Scope Overview It Methods Methods Description Methods Usage Audit Reporting

Scope It Methods Described For: Project Selection, Control, Evaluation Systems Development Systems Acquisition Enterprise Architecture Development Security Assessment

Overview Methods Listed Here Are Generally Accepted in The Community Methods Assess or Prescribe “What” Must Be Done Not “How” to Accomplish Activity Methods Provide a Framework to Audit It Activity

It Methods

Methods Description Module 1 Project Selection, Control, Evaluation

Project Selection, Control, Evaluation Wisely Managed Investments in It Can Improve Organizational Performance Internet and Local Area Networks Enable Data Sharing and Research Data Warehouse Permits Organizations to Discover Unknown Fiscal or Physical Resources

Project Selection, Control, Evaluation However, Along With the Potential to Improve Organizations, It Projects Can Become Risky, Costly, Unproductive Mistakes In Response, Gao Developed Guidance, That Provides a Method for Evaluating and Assessing How Well an Agency Is Selecting and Managing Its It Resources

Project Selection, Control, Evaluation The Select/control/evaluate Model Has Become a Central Tenet of the It Investment Management Approach

Project Selection, Control, Evaluation During the Selection Phase the Organization Selects Those It Projects That Will Best Support Its Mission Needs and Identifies and Analyzes Each Project’s Risks and Returns Before Committing Significant Funds to a Project.

Project Selection, Control, Evaluation During the Control Phase the Organization Ensures That, As Projects Develop, the Project Is Continuing to Meet Mission Needs at Expected Levels of Cost and Risk If the Project Is Not Meeting Expectations Steps Are Taken to Address the Deficiencies

Project Selection, Control, Evaluation Lastly, During the Evaluation Phase, Actual Versus Expected Results Are Compared to Assess the Project’s Impact on Mission Performance, Identify Any Changes or Modifications to the Project That May Be Needed, and Revise the Investment Management Process Based on Lessons Learned

Project Selection, Control, Evaluation Gao’s Information Technology Investment Model (Itim) Model Is Comprised of Five Stages of Maturity Each Stage Builds Upon the Lower Stages and Enhances the Organization’s Ability to Manage Its It Investment Stages

Project Selection, Control, Evaluation Five Stages Of Investment Maturity

Project Selection, Control, Evaluation Progressing Through the ITIM Stages of Maturity

Project Selection, Control, Evaluation Itim Is a Tool for Assessing the Maturity of an Organization An Itim Assessment Can Be Conducted for an Entire Organization or For One of Its Lower Divisions Itim Is Applicable to Organizations of Different Sizes

Project Selection, Control, Evaluation Itim Allows Auditors to Assesses the Maturity of Organizations to Manage Investments Itim Provides a Maturity Stage or “Level” for an Organization Each Maturity Stage or “Level” Has Required Practices or Activities

Project Selection, Control, Evaluation ITIM Required Processes

Project Selection, Control, Evaluation Applying the Model Requires Assessing Critical Processes, Such As the Processes Used to Create an It Investment Portfolio Core Elements, (Purpose, Organizational Commitment, Prerequisites, Activities, and Evidence of Performance)

Questions / Discussion Comments Discussion Etc.

Methods Description Module 2 Systems Development

Systems Development Systems Development Includes Activities Such As Project Management, Requirements Management, Configuration Management Software Development, Testing, Etc.

Systems Development Many Organizations Rely on Software-intensive Systems to Perform Their Missions Software Quality Is Governed by the Quality of the Processes Used To Develop the Software (Provide Reference)

Systems Development The Software Engineering Institute Has Developed a Number of Models That Facilitate Assessing the Maturity of Organizations Developing Software The Models Are Called Capability Maturity Models (Cmm)

Systems Development What Is the Cmm? An Ordered Collection of Practices for the Acquisition, Development or Maintenance of Systems Ordered by “Key Process Area” Practices Determined by the Community Through Broad Peer Reviews Defines the Stages Through Which Organizations Evolve As They Improve Their Acquisition Process Identifies Key Priorities, Goals and Activities on the Road to Improving an Organization's Capability to Do Its Job

Systems Development The Cmm Provides a Framework for Identifying an Organization’s Process Strengths and Weaknesses Assisting an Organization Develop a Structured Plan for Process Improvement

Systems Development Who Uses the Sw-cmm? Organizations That Develop or Maintain Products That Contain Software Organizations Who Want to Improve Their Software Development Processes Audit Organizations Who Want to Assess the Maturity Of Organizations Developing or Maintaining Software Products

Systems Development The Cmm Is Structured Into Five Maturity Levels Each Level Has Key Process Areas (Kpa) Each Kpa Has Goals Goals Require Certain Activities Be Performed Management Provides Support and Verifies That Activities Are Being Performed

Systems Development

Systems Development The Five Levels Are 1. Initial: The Software Process Is Characterized As Ad Hoc and Few Processes Are Defined 2. Repeatable: Basic Project Management Processes Are Established; Improvement Activities Are Begun 3. Defined: Software Processes Are Documented and Standardized; All Projects Use an Approved, Tailored Version of the Organization’s Standard Software Processes

Systems Development The Five Levels Are (Contd.) 4. Managed/quantitative: Detailed Measures of the Software Processes, Products, and Services Are Collected; the Software Processes and Products Are Quantitatively Measured and Controlled 5. Optimizing: Continuous Process Improvement Is Enabled by Quantitative Feedback From the Process and From Piloting Innovative Ideas and Technologies

Systems Development Software CMM Levels and KPAs

Systems Development Cmm Common Features Commitment To Perform Ability To Perform Activities Measurement & Analysis Verification

Systems Development Commitment To Perform Describes What an Organization Must Do to ‘Set the Stage’ for Process Improvement / Implementation Involves Establishing Policy Assigning Responsibility

Systems Development Ability To Perform Describes the Preconditions That Must Be Present to Facilitate Process Improvement / Implementation Assignment of Duties to Groups Providing Trained or Experienced Personnel Ensuring Adequacy of Resources

Systems Development Activities Describe the Activities, Roles, and Procedures That Are Necessary to Implement the Key Process Area Requires Formal and Informal Planning Documents Requires Formally Documented Procedures Requires (Depending on Kpa) Coordination With Other Affected Groups, Tracking Contractor Performance, Etc.

Systems Development Measurement & Analysis Describes the Practices That Must Be Accomplished to Enable the Group to Track the Status of the Kpa Effort & Funds Expended by the Project Team in Conducting Its Activities Tracking Their Schedule and Progress (for Developing Formal Plans, Requirements, Etc.)

Systems Development Verification Describes the Practices That Must Be Performed to Ensure That Project and Senior Management Oversee the Activities of the Group Includes Periodic or As Needed Project Level Reviews Senior Management Level Reviews

Systems Development Example From Model

Questions / Discussion Comments Discussion Etc.

Methods Description Module 3 Systems Acquisition

Systems Acquisition Systems Acquisition Includes Activities Such As Project Management, Requirements Management, Solicitation, Contractor Tracking Evaluation, Risk Management, Etc.

Systems Acquisition Many Organizations Rely on Software-intensive Systems to Perform Their Missions Organizations Have Been Increasingly Contracting Out for Software or Engineering Services

Systems Acquisition The Software Engineering Institute Has Developed a Number of Models That Facilitate Assessing the Maturity of Organizations That Acquire Software or Systems The Models Are Called Capability Maturity Models (Cmm)

Systems Acquisition Just As For Software Development There Is the Sw-cmm (or Just Cmm) For Assessing or Improving Acquisition Related Activities, The Sei Has Developed the Software Acquisition Capability Maturity Model (Sa-cmm)

Systems Acquisition Who Uses The Sa-cmm? Organizations That Acquire or Support Acquisition of Products That Contain Software, Including Software Support and Maintenance Organizations That Are Responsible for Acquisition Life Cycle From Requirements Development Through System Delivery and Support Audit Institutions That Want To Assess How Effectively Software or Services Are Being Acquired

Systems Acquisition The Sa-cmm Is Also Structured Into Five Maturity Levels Each Level Has Key Process Areas (Kpa) Each Kpa Has Goals Goals Require Certain Activities Be Performed Management Provides Support and Verifies That Activities Are Being Performed

Systems Acquisition

Systems Acquisition The Five Levels Are 1. Initial: The Software Process Is Characterized As Ad Hoc and Few Processes Are Defined 2. Repeatable: Basic Project Management Processes Are Established; Improvement Activities Are Begun 3. Defined: Software Processes Are Documented and Standardized; All Projects Use an Approved, Tailored Version of the Organization’s Standard Software Processes

Systems Acquisition The Five Levels Are (Contd.) 4. Managed/quantitative: Detailed Measures of the Software Processes, Products, and Services Are Collected; the Software Processes and Products Are Quantitatively Measured and Controlled 5. Optimizing: Continuous Process Improvement Is Enabled by Quantitative Feedback From the Process and From Piloting Innovative Ideas and Technologies

Systems Acquisition

Systems Acquisition Example From Model

Questions / Discussion Comments Discussion Etc.

Methods Description Module 4 Enterprise Architecture Development

Enterprise Architecture Development An Enterprise Architecture (Ea) Establishes the Agency-wide Roadmap to Achieve an Agency’s Mission Eas Are “Blueprints” for Systematically and Completely Defining an Organization’s Current (Baseline) or Desired (Target) Environment

Enterprise Architecture Development Eas Are Essential for Evolving Information Systems and Developing New Systems That Optimize Mission Value For Eas to Be Useful and Provide Business Value, Their Development, Maintenance, and Implementation Should Be Managed Effectively

Enterprise Architecture Development An Ea Is A Strategic Information Asset, Which Documents the Mission And, The Information , Technology, and the Processes Required to Perform the Mission An Ea Includes a Baseline Architecture, Target Architecture, and a Sequencing Plan

Enterprise Architecture Development Eas Typically Include Business or Operational Architecture Work Processes and Locations Information or Data Architecture Data or Information Needed to Perform Business Technical or Systems Architecture Technology Standards, It Systems Description

Enterprise Architecture Development EA Process Sections Refer to: A Practical Guide To Federal Enterprise Architecture

Enterprise Architecture Development Obtain Executive Buy-in and Support Ensure Agency Head Buy-in and Support Issue an Executive Enterprise Architecture Policy Obtain Support From Senior Executives and Business Units Establish Management Structure and Control Establish a Technical Review Committee Establish a Capital Investment Council Establish an Ea Executive Steering Committee Appoint Chief Architect Define an Architecture Process and Approach Define the Intended Use of the Architecture Define the Scope of the Architecture Determine the Depth of the Architecture

Enterprise Architecture Development Develop the Baseline Enterprise Architecture Collect Information Generate Products and Populate Ea Repository Develop the Target Enterprise Architecture Develop the Sequencing Plan Identify Gaps Define and Differentiate Legacy, Migration, and New Systems Planning the Migration

Enterprise Architecture Development Use the Enterprise Architecture Integrate the Ea With Cpic and Slc Processes Train Personnel Establish Enforcement Processes and Procedures Maintain the Enterprise Architecture As the Enterprise Evolves Reassess the Enterprise Architecture Periodically Manage Products to Reflect Reality

Questions / Discussion Comments Discussion Etc.

Methods Description Module 5 Security Assessment

Security Assessment Information and the Systems That Process It Are Among the Most Valuable Assets of Any Organization Adequate Security of These Assets Is a Fundamental Management Responsibility

Security Assessment Agency Must Ensure That Systems and Applications Provide Appropriate Confidentiality, Integrity, and Availability Protect Information Commensurate With the Level of Risk and Magnitude of Harm Resulting From Loss, Misuse, Unauthorized Access, or Modification

Security Assessment Agencies Must Plan for Security Ensure Appropriate Officials Are Assigned Security Responsibility Authorize (or ”Certify") System Processing Prior to Operations and Periodically As Necessary

Security Assessment The Federal It Security Assessment Framework Provides a Method for Determining the Current Status of Their Security Programs Establishing a Target for Improvements Where Necessary The Framework May Be Used to Assess the Status of Security Controls

Security Assessment The Framework Comprises Five Levels to Guide Assessments of Security Programs and Prioritization of Improvement Efforts

Security Assessment Level 1 Documented Policy Level 2 Documented Procedures Level 3 Implemented Procedures and Controls Level 4 Tested and Reviewed Procedures and Controls Level 5 Fully Integrated Procedures and Controls

Security Assessment Level 1 of the Framework Includes Formally Documented and Disseminated Security Policy Level 2 of the Framework Includes Formal, Complete, Documented Procedures for Implementing Policies Established at Level One

Security Assessment Level 3 of the Framework Includes Security Procedures and Controls That Are Implemented Level 4 of the Framework Includes Routinely Evaluating the Adequacy and Effectiveness of Security Policies, Procedures, and Controls Level 5 of the Framework Includes A Comprehensive Security Program That Is an Integral Part of an Agency’s Organizational Culture

Security Assessment

Security Assessment

Security Assessment

Security Assessment

Security Assessment

Questions / Discussion Comments Discussion Etc.

Methods Usage

Methods Usage Most Methods Have Specific Activities to Be Performed Can Be Applied to Specific Projects Need a Team of About 3 - 4 Auditors Requires Training or Understanding of the Method

Methods Usage Since Methods Have Specific Activities Questionnaires Can Be Generated Results Can Be Tabulated Analysis Can Be Formed Quickly From the Results

Methods Usage The Sw-cmm and Sa-cmm Methods Require the Audit Lead Be Specifically Trained

Methods Usage Sample Data Collection Instrument

Audit Reporting

Audit Reporting Audit Report Can Be Briefing Slides or Full Reports Briefing Slides Can Contain Both Summary or Detailed Results

Audit Reporting Sample SA-CMM Summary Results

Audit Reporting Sample SA-CMM Acquisition Risk Management Detailed Results

Questions / Discussion Comments Discussion Etc.

Contacts Keith Rhodes Madhav Panwar Phone 1 202 512 6412 Email rhodesk@gao.gov Madhav Panwar Phone 1 202 512 6228 Email panwarm@gao.gov