IT Service Delivery and Support Overview IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA, MS, CIA, CISA, CISSP) 1.

Slides:



Advertisements
Similar presentations
Chapter 10 Accounting Information Systems and Internal Controls
Advertisements

Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Control and Accounting Information Systems
Auditing Concepts.
Internal Control.
TI BISNIS ITG using COBIT &
COBIT - II.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
Managing the Information Technology Resource Jerry N. Luftman
IS Audit Function Knowledge
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
The Information Systems Audit Process
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Session 3 – Information Security Policies
Sarbanes-Oxley Project Summary of COSO Framework Presented by Larry Dillehay & Scott Reitan Parkfield Group LLC.
ITIL Process Management An Overview of Service Management Processes Presented by Jerree Catlin, Sue Silkey & Thelma Simons.
INTERNAL CONTROL OVER FINANCIAL REPORTING
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Internal Control Systems
INTERNAL CONTROL OVER FINANCIAL REPORTING
Chapter Three IT Risks and Controls.
Internal controls. Session objectives Define Internal Controls To understand components of Internal Controls, control environment and types of controls.
Chapter 5 Internal Control over Financial Reporting
Internal Control in a Financial Statement Audit
Roles and Responsibilities
ITIL Process Management An Overview of Service Management Processes Thanks to Jerree Catlin, Sue Silkey & Thelma Simons University of Kansas.
ITIL and the Help Desk Craig Bennion University of Utah
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Internal Control in a Financial Statement Audit
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
1. IT AUDITS  IT audits: provide audit services where processes or data, or both, are embedded in technologies.  Subject to ethics, guidelines, and.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Evaluation of Internal Control System
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
Chapter 9: Introduction to Internal Control Systems
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
S5: Internal controls. What is Internal Control Internal control is a process Internal control is a process Internal control is effected by people Internal.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Section 404 Audits of Internal Control and Control Risk Chapter 10.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
©©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Internal Control Chapter 10.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Auditing Concepts.
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Internal control - the IA perspective
Alignment of COBIT to Botswana IT Audit Methodology
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

IT Service Delivery and Support Overview IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA, MS, CIA, CISA, CISSP) 1

 Introduction  Goals and Objectives  Expectations  IT Service and Delivery Overview IT Service Delivery and Support 2

 Understanding the Roles and Responsibilities of IT Operations within Organizations  Understanding Risks and Controls Related to IT Service and Delivery  Understanding How to Evaluate and Test the Controls Related to IT Operations  Passing CISA Examination  Seeking Job Opportunities in IT Auditing Field Goals and Objectives 3

 Attend the Class and Join the Discussion  Ask Questions – there are no dumb questions  Do Your Homework and Assignment  Read the CISA Review Manual (Chapter Four) and Textbook  Don’t Miss the Final Examination Expectations 4

Course Syllabus IT Service Delivery and Support 5

 Information Systems Review  Maintenance of Information Systems  Information Security  Data Administration Practices  Capacity and Performance Monitoring  Problem and Incident Management  Change, Configuration and Release Management  End-User Procedures and Operations  Backup and Restoration of Systems  Service Level Management Practices  Third-Party Management Practices Related ISACA Curriculum Topics 6

7 Fundamentals of IT Audit  IT Audit Objectives  IT Audit Requirements  IT responsibilities within the Organization  Manage Risks in an Automated Environment  Mitigate Security Risks  Addressing Risks via Internal Controls  Definition of Internal Control  Audit Risk

8 IT Audit Objectives  Provide complete coverage of the organization’s or business unit’s risks associated with technologies  Provide management with a complete opinion on the control environment and how it impacts risk and audit coverage  Include all aspects of audit, both automated and manual procedures

9 Requirements  Knowledge of the industry, the organization, and the technology in use  Commitment from senior management  Commitment from audit client management  Commitment from audit management  Training  Appropriate resources, staffing and planning (possible on loan from IT units for specific expertise)

10 IT Responsibilities within Organizations  IT is the backbone of organizations day-to-day operations  Information Sharing  Data Repository  Internal and External Communication  Transaction Processing  Organizations rely up IT as the primary control points for business activities:  Confidentiality  Integrity  Availability  Accountability  MIS Reporting - Basis of business decisions

11 IT Risks and Controls  What are risks associated with technologies?  Identifying Risks  Identifying Control Gaps  Mitigating risks via internal controls  Control Testing  Design of Controls  Operating Effectiveness of Controls

12 Risks Examples  Inadequate protection of assets (both physical and information)  Interruption of the business activities and cycles  Loss of revenue  Loss of productivity  Loss of privacy, confidentiality  Loss of competitive edge  Lack of data integrity  Loss of company reputation  Non compliance of regulation or legal requirements  Inaccurate reporting  No audit trails  Business decisions made based on incorrect/inaccurate information – the sin of all sins

13 Mitigate Security Risks  You can NOT eliminate risks!!!  70% of IT risks are related to security risks  Physical security – absence of the following, - security policy, fire alarm, fire extinguisher (including the expired ones), sign in and sign out control, raise floor in the data center, environment control, power balance, auxiliary power unit (APU - generator), emergency power unit (batteries), locations of primary and secondary data center, data media, location of media storage and its policy  Logical security – Security policy, access and its privileges to application programs, procedure to enter information, distribution of paper and electronic output, periodic review/monitor by management, application platforms and its OS, outdated or non- supported platforms and technologies selected and used  Policies – Password, create, approve, and remove of a user, logon process, idle/inactive users, generic system users,

14 Internal Control Definition The COSO study provided a uniform definition of control for an organization: Internal control is a process, affected by an entity’s board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories:  Effectiveness and efficient of operations  Reliability of financial reporting  Compliance with applicable laws and regulations  Safeguarding asset

15 Internal Control Definition  It’s a process at a point in time  Effected by people – not just policies and procedures – at all levels of organization  Provides reasonable assurance, not absolute assurance  Geared to achievement of objectives in one or more of the four COSO categories.  Influenced by the “commitment at the top”

IT Service Delivery and Support Frameworks  COSO: The Committee of Sponsoring Organizations of the Treadway Commission (COSO) is a joint initiative of five private sector organizations, established in the United States, dedicated to providing thought leadership to executive management and governance entities on critical aspects of organizational governance, business ethics, internal control, enterprise risk management, fraud, and financial reporting.United Statesbusiness ethicsenterprise risk managementfraudfinancial reporting  CoBit: an IT governance and control framework that focus on what should be addressed to ensure good governance of all IT-related processes (*CoBit 5 is available on ISACA’s website.)  Information Technology Infrastructure Library (ITIL): provides best practices describing how to plan, design and implement effective service management capabilities. 16

17 COSO Components of Internal Control

IT Service Delivery and Support Elements – By ITIL Service support : Service support describes the day-to-day operation and support of IT services. It includes the service desk function as well as the following five processes:  Service desk – The service desk function is the single point of contact between users and IT service management. Tasks include handling incidents and requests, and providing an interface for other ITSM processes.  Incident management – Incident management's goal is to restore service operation as quickly as possible with minimal disruption to users.  Problem management – Problem management is a process designed to minimize the adverse effects of incidents and problems caused by infrastructure errors. It also seeks to proactively prevent the recurrence of these incidents and problems. 18

IT Service Delivery and Support Elements – By ITIL  Configuration management – Configuration management is a process of identifying and defining configuration items within a system. It also involves monitoring the status of these items, processing requests for change, and verifying the completeness and correctness of configuration items.  Change management – Change management is a process of controlling changes within IT services or systems, with proper approval and minimal disruptions.  Release management – Release management is the process of introducing new or changed configuration items to the infrastructure. These configuration items have been approved by change management, tested, and determined to be ready for implementation. 19

IT Service Delivery and Support Elements – By ITIL Service delivery: Service delivery describes the long-term planning and improvement of IT service provision. It addresses the following five processes:  Service level management – Service level management negotiates and agrees to service requirements as defined by the customer and agreed to by IT within the service level agreement. Then it monitors, measures, and reports on the achieved service levels.  Financial management for IT services – This is a process concerned with cost awareness; more specifically the identification, allocation, forecasting, and monitoring of costs associated with IT services. 20

IT Service Delivery and Support Elements – By ITIL  Capacity management – ensures the projected business needs will be met in a cost-effective and timely manner. It also ensures the infrastructure can handle new technology. Capacity entails storage, facilities, networking capabilities, and people.  IT service continuity management – ensures that the proper and required IT technical and service facilities can be recovered in the agreed upon and required time frame following a disruption to the business.  Availability management – ensures services are available when and at the level the customer requires them, as defined by the service level agreement. 21

22 CoBit Framework The COBit framework is based on domains, processes, activities and tasks. CoBit focused on the standards, and procedures of the IT organization. The four domains are:  Plan and Organize  Acquire and Implement  Deliver and Support  Monitor and Evaluate

23 CoBit Framework (continued) Seven Qualities of Information  Effectiveness  Efficiency  Confidentiality  Integrity  Availability  Compliance  Reliability

24 Delivery and Support Domain DS1Define and Manage Service levels DS2Manage Third-Party Services DS3Manage Performance and Capacity DS4Ensure Continuous Service DS5Ensure Systems Security DS6Identify and Allocate Costs DS7Educate and Train Users DS8Assist and Advise Customers DS9Manage the Configuration DS10 Manage Problem and Incidents DS11Manage Data DS12 Manage Facilities DS13Manage Operations

25 CoBit Framework (continued)

There are several new and modified processes that reflect current thinking, in particular: APO03 Manage enterprise architecture APO04 Manage innovation APO05 Manage portfolio APO06 Manage budget and costs APO08 Manage relationships APO13 Manage security BAI05 Manage organisational change enablement BAI08 Manage knowledge BAI09 Manage assets DSS05 Manage security service DSS06 Manage business process controls 26 CoBit 5 New and Modified Process

27 Audit Risk Audit risk “refers to the risk that an auditor may issue unqualified report due to auditors failure to detect material misstatement either due to error or fraud.” (source: wikipedia) Audit Risk is something keeping you up at night as an auditor When the controls are adequate and reliable, there may be less need to look at the details of transactions Therefore, the auditor can take an approach that allows some reviews or test of controls, also called compliance or functional tests, reducing the need for detailed (substantive) tests. This decision is based on risk analysis; control of high-risk transactions or events need to be reviewed first. Controls of low-risk transactions or events can be evaluated as time permit.

28 Audit Risk (continued) However, when the controls do not appear to exist, or do not function as intended, then auditors need to look much more deeply into the details of balance, doing additional substantive testing of that information. Additionally the auditor needs to recommend that the missing control is create or the defective control is replaced.

Auditing IT Infrastructure and Operations  Risks Types  Inherent Risk  Mitigate Risk/Residual Risk  Controls Types  Preventive Controls  Detective Controls  Deterrent Controls  System Controls vs. Application Controls  Manual Controls vs. Automated Controls 29

30 Risk Types  Inherent Risk – is something you can not change. Controls can be designed to mitigate the risks.  Control Risk – is the risk that the controls do not in fact do the job they were intended to do.  Detection Risk – is the risk that the controls will not detect errors or deliberate abuse.  Audit Risk – is the combination of all these to express the confidence that the audit will come a conclusion that is in fact correct.

Risk Assessment – Likelihood and Impact  Likelihood  Impact 31 Likelihood Impact H L

IS Operations Review  CISA Review Manual Exhibit 4.26 – IS Operations Review  Key areas to focus:  Adequate instructions for running programs including emergency procedure  Training, peer reviews and performance records  Up-to-date standard operation procedures  Preventive Maintenance Schedule  Tape Backup and offsite procedure  Problem management procedures  Separation of duties – programmers, operators and database administrators  Security!!! 32

33 Review and Discussion 1.What are some current system-related risks that you have experienced in your organization? 2.How does the control environment affect IT? 3.What is the purpose of all auditors having some understanding of technology?