IS Audit Controls
Nimish Sonar
"Account Security Officer" with 22 yrs varied experience | Certifications: ISO27K, ITIL, PMP, CSM | Skills: ISO9/20/27K, BSS/OSS, CISA, CISSP, BCP/DRP, VAPT/CR, Azure500, Linux, Compliance, Audit, Risk, SDM, PM
This topic is related to Information Systems Auditing (IS auditing). Before we jump into understanding the "controls", we must understand the difference between IS and IT.
IS (Information Systems): These are combination of strategic, managerial and operational activities and related processes which are involved in gathering, processing, sorting, distributing and using information and its related technologies.
IT (Information Technology): It is h/w, s/w, communication and other facilities to input, store, process, transmit and output the data in given form.
IS has IT component that interacts with process components.
Coming back to "controls" in auditing, IS Auditors ensure that, appropriate controls are present in an organization to prevent, detect or correct an incident.
Controls: These are nothing but policies, procedures, practices and organizational structure which are implemented to prevent, detect and correct risk events and to reduce the risk to an organization. An audit function or department in an organization reports to audit committee and it further reports to board of directors. Hence, board of directors and senior management are responsible to facilitate an effective and efficient internal control system.
Control objectives: These are statements which describe the desired result or purpose of the activities defined in a control. They provide complete set of high level requirements to be considered by management for effective control of each IT process area. They provide reasonable assurance that business objectives will be achieved and undesired events will be prevented, detected or corrected.
Typical control objectives are mentioned below which are defined to ensure:
Control Matrix: An IS auditor assesses the strength and weaknesses of existing controls and determine if they are useful to meet control objectives. For that, a "control matrix" is used by auditors. Known type of errors are placed on top axis and known controls are placed on side axis. Then using "ranking methods", the matrix is filled with appropriate measurements. When completed, the matrix shows the areas where the controls are weak or lacking.
Overlapping and compensating controls:
In some instances, a strong control may compensate for a weak control. If there are two overlapping controls, then both are considered as strong. A group of controls aggregated together may act as a compensating control.
Example of overlapping control is when an employee required a card to swipe at data center entry and security guard also checks the card from employees.
Example of compensating control is when there is a secondary signature required to authorize critical or sensitive transactions passed by one person with his signature.
Compensating/mitigating controls may exist to mitigate the risks resulting from a lack of appropriate segregation of duties (SoD). These controls include audit trails, reconciliation, supervisory reviews and transaction logs. In other words we can say that, due to the nature of the business, and for efficiency, the same user performs both tasks. To prevent fraud, oversight is required. So, we need a compensating control – for example, we may specify that a second user must perform a reconciliation, reviewing the cash against the recorded transactions.
领英推荐
Here it is important to note that, more than one controls may satisfy one control objective.
General Controls:
Some general controls can be listed as below:
IS specific controls:
Each general control can be translated to IS specific control. Before we could see few examples of IS specific controls, we must learn the three categories of IS controls.
They are:
Examples of preventive controls:
Examples of detective controls:
Examples of corrective controls: