Application Systems IT Audit Program.docx

上传人:b****4 文档编号:4901563 上传时间:2022-12-11 格式:DOCX 页数:15 大小:20.60KB
下载 相关 举报
Application Systems IT Audit Program.docx_第1页
第1页 / 共15页
Application Systems IT Audit Program.docx_第2页
第2页 / 共15页
Application Systems IT Audit Program.docx_第3页
第3页 / 共15页
Application Systems IT Audit Program.docx_第4页
第4页 / 共15页
Application Systems IT Audit Program.docx_第5页
第5页 / 共15页
点击查看更多>>
下载资源
资源描述

Application Systems IT Audit Program.docx

《Application Systems IT Audit Program.docx》由会员分享,可在线阅读,更多相关《Application Systems IT Audit Program.docx(15页珍藏版)》请在冰豆网上搜索。

Application Systems IT Audit Program.docx

ApplicationSystemsITAuditProgram

INTERNALAUDITPROGRAM

ApplicationITSystemsAudit

 

BusinessApplicationControlObjectives:

Themajorcontrolobjectivesassociatedwithanybusinessapplicationareasfollows:

∙Securityandconfidentialityofapplicationinformationisappropriate.

∙Integrityofthedataprocessedensuresaccurateandcompletemanagementreporting.

∙AvailabilityofinformationforbusinessusersisconsistentwithServiceLevelAgreement(SLA)requirements.

∙Effectiveandefficientprocessingofapplicationsystems.

∙Systemdocumentationisadequatelymaintained.

 

ApplicationRisks

1.Theapplicationmaybeinefficientorineffectivebecausemanualcontrolsareneededtocompensateforinadequatebuilt-incontrols.

2.Inaccurateand/orcorrupteddatamayleadtoerroneousmanagementdecisions.

3.Thelackofwrittenprocedurescouldresultinafailuretocomplywithcorporatepoliciesandguidelines,aswellas,regulatoryagency(e.g.,FFIEC)requirements.

4.Businessapplicationsmaynotbeadequatelyprotectedfromunauthorizedaccessduetoineffectivesecurityprocedures.

5.Customerinformationmaybelost,manipulatedorstolen.

AuditProgram

AuditProcedures

W/PRef.

Init/Date

Comments

IAUse

A.

PRELIMINARYAUDIT

A.1.

Ascertainwhetheraprioraudithasbeenperformed(e.g.,pre-implementation,financialaudit,CorporateAudit,ITAudit).Obtainpriorworkpapersanddeterminewhatinformationcanbepulledforwardforthecurrentaudit.

A.2.

Ifaprioraudithasbeenperformed,obtainacopyoftheauditreport.Foreachauditissue/finding/controlweakness,performthefollowingsteps:

a.Obtainanddocumentthecurrentstatusofeachauditissue(includethenameoftheindividualsyoumet,dateoftheinterviews,andstatusofeachissue).

b.Notethedispositionofeachissue(Corrected/StillOpen).

c.Iftheissuestillexists,carryitforwardtothecurrentauditreport.Noteinthefollow-upworkpaperthatitwasbroughtforwardintothecurrentauditreport.

A.3.

Requestthefollowingdocumentationfromtheapplicationandoperationalmanagers:

∙ListofENSstaffandtheirresponsibilitiesformaintainingtheapplication.

∙ListofBusinessUnitsthatutilizefunctionsoroutputoftheapplication.

∙OrganizationChartsfromboththebusinessunitsthatutilizethesystemandtheENSstaff.

∙ListofMajorChangesmadetothisapplicationsincethelasttimeaudited.

∙ListofMajorChangesplannedtobemadetothisapplicationoverthenext12months.

∙CopyoftheApplicationSystemUserandSecurityManuals.Notethatthismaybeanonlinedocument.

∙CopyoftheSystemDocumentation(e.g.,overviewsystemflowcharts,systemnarratives)relatingtothisapplication.Notethismaybeanonlinedocument.

∙VendorContracts

∙CopyoftheUserSecurityAdministrationproceduresforthisapplication.

∙ServiceLevelAgreementfromENS.

∙Contingency/DisasterRecoveryPlansforthisapplication.

∙Backup,RestartandRecoveryPlanfromComputerOperations.

A.4.

Interviewtheapplicationandbusinessunitownerstogainanunderstandingofhowtheapplicationoperatesandidentifyanycriticalcontrolpoints,including:

a.Keyconcernsrelatingtothisapplicationsystem

b.Ownerrolesindefining,prioritizing,testingandapprovingsystemchanges

c.Participationonkeysystemprojects

Prepareabriefnarrativetodocumentyourunderstanding.

A.5.

ReviewtheVendorcontractsupportingtheapplication,ensuringthatthefollowingareasareaddressed:

a.[YourCo.]Responsibilities

b.VendorResponsibilities

c.Ownershipandlocationoftheapplication/sourcecode.

d.Release/upgradetestingandinstallationresponsibilities.

e.Maintenanceagreementsandterms

f.Ifaccessingourdata,privacyclauses.

g.SAS70

DocumenttheinclusionofthecontractinthecentralContractManagementSpreadsheetmaintainedbyENSinBowlingGreen.

B.

APPLICATIONCONTROLS

B.1.

ReviewsystemdocumentationobtainedfromthePreliminaryAuditStepstoverifythatitcontainsadescriptionof:

a.Transactiontypesprocessed

b.Systeminterfaces

c.Criticalprogramnamesandprocessingfunctions

d.Batchjobschedule(tasks)andcriticalprocessingperformed

e.SecurityAdministrationandaccesscontrolprocedures

B.2.

ObtainfromthePreliminaryAuditStepsordevelopanoverviewsystemflowchart/narrativeshowingmajorinputsources(e.g.,systemnames/filenames)andoutputtypes(e.g.,reportnames/systemnames/filenames/businessuserareas/ITareas).

INPUTCONTROLS

B.3.

ObtainfromthePreliminaryAuditStepsordevelopaflowofcriticalonlineinputtransactions.Identifythescreennamesandfunctiontypeswherethetransactionsareprocessed.

B.4.

Describetheeditandvalidationcontrolsforcriticalinputtransactions.Reviewinputscreenstoseethattheyaredesignedtopreventtheomissionofdataandtheacceptanceofinvaliddata.Ensurethatsignificantinputisverifiedbyanassociateotherthanthepersoninputtingthedata.

B.5.

Iftheapplicationusesbatchprocessing,determinethroughtestandobservationthatcontrolsoverinput(e.g.controltotals,reconciliations)areeffective.

PROCESSINGCONTROLS

B.6.

Reviewsystemdocumentationtodeterminethatkeycomputationsarefullydocumented.Testasampleofkeycomputationsusingamanualrecalculationprocess.

B.7.

Determineanddocumenttheprocesstoensurethatrejectedtransactionsarecorrectedandre-enteredpromptly,andthatcorrectedtransactionsaresubjecttothesameeditandbalancingcontrolsastheoriginaltransactions.

B.8.

Verifythatareconciliationprocessisperformeddailyforallinterfacesandanyoutstandingitemsareagedandresolvedtimely.Ensurethatthereconciliationactivitiesareadequatelyseparatedfrominputactivities.

B.9.

Determinethatrejecteditemsarelogged,tracked,aged,andresolvedtimely.Reviewrejectitemsreportstodeterminethat:

a.Reportsareproducedanddistributedtothebusinessuserarea.

b.Reportsevidencethattheyarerevieweddailybyappropriatebusinessuserstaff(e.g.,userinitialsandreviewdate).

c.Rejectsareresolvedaccuratelyandtimely(e.g.,requestrejectfollow-upprocedures).

OUTPUTCONTROLS

B.10.

Verifythatcontrolsareinplacetoensurethatoutputconfidentialityismaintained(whennecessary).Obtainalistofreportsindicatingtheirfrequency,purpose,andtheidentityoftherecipient.

B.11.

Reviewreportsproducedbytheapplication.Provideanopinionontheadequacyofthereportstosatisfytherequirementsofmanagement.TheserequirementsshouldhavebeengatheredinthePreliminaryAuditSteps.

B.12.

Determinethatareviewofcriticaltransactionsisperformed.Thisshouldbeperformedbysomeoneotherthanthepersonwhoinputdatafromthesourcedocuments.

C.

LOGICALACCESSCONTROLS

C.1.

ReviewtheUserSecurityAdministratorProcedurestoensurethat:

a.Proceduresareinplaceforissuing,approvingandmonitoringapplicationaccess.

b.Applicationaccessprocedurescomplywiththepolicyof“minimumaccess”.

c.Useraccesscontrolreportsareperiodicallyreviewedforaccuracyandcompletenessbyusermanagement.

C.2.

EnsurethatUserSecurityAdministrationproceduresaredefinedforthetimelydeletion/disablingofuserIds(e.g.,hires,terminations,changesinresponsibility).

C.3.

VerifythatUserSecurityAdministrationproceduresexisttoensurethatuniqueuserIdsareassignedtosystemusers.Incaseswheretheaccesscontrolsystempreventsindividualaccountability,compensatingcontrolsmustexist.

C.4.

Obtainasampleofaccessrequestformsfor10usersoftheapplication.Ensurethattheformsevidenceproperapprovalsfortherequestedaccess.

C.5.

Obtainacopyofthesystemgenerateduseraccessreportthatidentifiesallusersandtheirassignedauthoritylevelsanddeterminethat:

a.Onlycurrentemployeeshaveaccesstotheapplication.

b.Allusersareuniquelyidentifiedontheaccesscontrolreport.

c.Passwordsarenotdisplayedonthereport.

d.Eachuserisgrantedanaccesslevelthatiscommensuratewiththeirjobresponsibility.

e.Managementperiodicallyreviewsandapprovesuserswhohaveaccesstotheapplication.Thereviewshouldbeperformedindependentlyofthe

C.6.

ObtainacopyofthecurrentPasswordManagement/AccessControlPolicy(SeeIntranetCentral)anddeterminethatthisapplicationcomplieswithguidelinesfor:

a.Charactercomponents

b.Length

c.Passwordchangefrequency

d.Invalidpasswordattempts

e.Passwordstorage

C.7.

ObtainajobdescriptionfortheApplicationSecurityAdministratorfunction.Ensurethatthereportinglinesandresponsibilitiesforthisfunctiondonotcompromisesecuritypolicies.

C.8.

Identifytheotherresponsibilitiesassignedtodatasecurity-relatedpersonnelbesidessecurityadministration.Evaluateifaseparationofdutiesdeficiencymayexist.

C.9.

Determinewhethertherearedesignatedback-upsecurityadministrators.Ensurethattheresponsibilitiesoftheback-upsecurityadministratorsdonotcauseseparationofdutiesdeficiencies.

C.10.

Obtaincopiesofthesecurityviolationreportsandverifythattheyevidencedocumentedmanagementreview.Verifythatquestionableactivitycanbeidentifiedandisappropriatelyaddressed.

C.11.

Determinethatareviewofthesecurityadministrator’smaintenanceactivityisperiodicallyperformedbysomeoneotherthantheUser

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 求职职场 > 简历

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1