SlideShare ist ein Scribd-Unternehmen logo
1 von 121
2007 CISA   Review Course CHAPTER   1 The IS Audit Process
Chapter Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Area Objective Ensure that the CISA candidate… “ The objective of the process area is to ensure that the CISA candidate has the knowledge necessary to provide information systems (IS) audit services in accordance with IS audit standards, guidelines and best practices to assist the organization in ensuring that its information technology and business systems are protected and controlled . ”
Process Area Summary According to the CISA Certification Board,  this Process Area will represent approximately 10% of the CISA examination  (approximately 20 questions).
Process Area  Tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Area  Knowledge Statements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Area  Knowledge Statements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
I - INTRODUCTION 1.  Organization of the IS Audit Function   ,[object Object],[object Object],[object Object],[object Object],[object Object]
I - INTRODUCTION 2.  IS Audit Resource Management  ,[object Object],[object Object],[object Object]
3. Audit Planning   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],I - INTRODUCTION
3. Audit Planning  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],I - INTRODUCTION
4.  Effect of Laws and Regulations on IS Audit Planning  ,[object Object],[object Object],[object Object],[object Object],[object Object],I - INTRODUCTION
4.  Effect of Laws and Regulations on IS Audit Planning  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],I - INTRODUCTION
II - ISACA IS Auditing Standards and Guidelines 1.  ISACA Code of Professional Ethics The Association’s Code of Professional Ethics provides guidance for the professional and personal conduct of members of the Association and/or holders of the CISA and CISM designation
II - ISACA IS Auditing Standards and Guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards  Objectives of ISACA IS Auditing Standards ,[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards  IS Auditing  Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards  ,[object Object],[object Object],[object Object],[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards  ,[object Object],[object Object],[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards  ,[object Object],[object Object],[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards
[object Object],[object Object],[object Object],[object Object],II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards
[object Object],[object Object],[object Object],[object Object],[object Object],II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards
[object Object],[object Object],[object Object],II - ISACA IS Auditing Standards and Guidelines 2.  ISACA IS Auditing Standards
3.  ISACA IS Auditing Guidelines  II - ISACA IS Auditing Standards and Guidelines G1 Using the Work of Other Auditors, effective 1 June 1998 G2 Audit Evidence Requirement, effective 1 December 1998 G3 Use of Computer Assisted Audit Techniques (CAATs), effective 1 December 1998 G4 Outsourcing of IS Activities to Other Organisations, effective 1 September 1999 G5 Audit Charter, effective 1 September 1999 G6 Materiality Concepts for Auditing Information Systems, effective 1 September 1999 G7 Due Professional Care, effective 1 September 1999 G8 Audit Documentation, effective 1 September 1999 G9 Audit Considerations for Irregularities, effective 1 March 2000 G10 Audit Sampling, effective 1 March 2000 G11 Effect of Pervasive IS Controls, effective 1 March 2000 G12 Organizational Relationship and Independence, effective 1 September 2000 G13 Use of Risk Assessment in Audit Planning, effective 1 September 2000 G14 Application Systems Review, effective 1 November 2001 G15 Planning Revised, effective 1 March 2002 G16 Effect of Third Parties on an Organization’s IT Controls, effective 1 March 2002 G17 Effect of Nonaudit Role on the IS Auditor’s Independence, effective 1 July 2002 G18 IT Governance, effective 1 July 2002 G19 Irregularities and Illegal Acts, effective 1 July 2002
3.  ISACA IS Auditing Guidelines  II - ISACA IS Auditing Standards and Guidelines G20 Reporting, effective 1 January 2003 G21 Enterprise Resource Planning (ERP) Systems Review, effective 1 August 2003 G22 Business-to-consumer (B2C) E-commerce Review, effective 1 August 2003 G23 System Development Life Cycle (SDLC) Review, effective 1 August 2003 G24 Internet Banking, effective 1 August 2003 G25 Review of Virtual Private Networks, effective 1 July 2004 G26 Business Process Reengineering (BPR) Project Reviews, effective 1 July 2004 G27 Mobile Computing, effective 1 September 2004 G28 Computer Forensics, effective 1 September 2004 G29 Post-implementation Review, effective 1 January 2005 G30 Competence, effective 1 June 2005 G31 Privacy, effective 1 June 2005 G32 Business Continuity Plan (BCP) Review From IT Perspective, effective 1 September 2005 G33 General Considerations on the Use of the Internet, effective 1 March 2006 G34 Responsibility, Authority and Accountability, effective 1 March 2006 G35 Follow-up Activities, effective 1 March 2006
II - ISACA IS Auditing Standards and Guidelines 4.  ISACA IS Auditing Procedures  Procedures developed by the ISACA Standards Board provide examples of possible processes an IS auditor might follow in an audit engagement. ,[object Object],[object Object]
II - ISACA IS Auditing Standards and Guidelines 4.  ISACA IS Auditing Procedures  P1 IS Risk Assessment, effective 1 July 2002 P2 Digital Signatures, effective 1 July 2002 P3 Intrusion Detection, effective 1 August 2003 P4 Viruses and Other Malicious Code, effective 1 August 2003 P5 Control Risk Self-assessment, effective 1 August 2003 P6 Firewalls, effective 1 August 2003 P7 Irregularities and Illegal Acts, effective 1 November 2003 P8 Security Assessment—Penetration Testing and Vulnerability Analysis, effective 1 September 2004 P9 Evaluation of Management Controls Over Encryption Methodologies, effective 1 January 2005
II - ISACA IS Auditing Standards and Guidelines 5. Relationship among Standards, Guidelines  and Procedures  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
III – Risk Analysis ,[object Object],[object Object]
III – Risk Analysis ,[object Object],[object Object],[object Object],[object Object]
III – Risk Analysis ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],III – Risk Analysis
IV – Internal Controls ,[object Object],[object Object],[object Object],[object Object],[object Object]
1.  Internal Control Objectives   ,[object Object],[object Object],[object Object],[object Object],IV – Internal Controls
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1.  Internal Control Objectives  IV – Internal Controls
2. IS  Control Objectives Internal control objectives apply to all areas, whether manual or automated. Therefore, conceptually, control objectives in an IS environment remain unchanged from those of a manual environment IV – Internal Controls
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2.  IS  Control Objectives IV – Internal Controls
[object Object],[object Object],[object Object],[object Object],2.  IS  Control Objectives (Cont) IV – Internal Controls
3.  CobiT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IV – Internal Controls
4. General Control Procedures ,[object Object],IV – Internal Controls
4. General Control Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IV – Internal Controls
5. IS Control Procedures  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IV – Internal Controls
Definition of Auditing  Systematic process by which a competent, independent person objectively obtains and evaluates evidence regarding assertions about an economic entity or event for the purpose of forming an opinion about and reporting on the degree to which the assertion conforms to an identified set of standards.   V – Performing an IS Audit Definition of  IS  Auditing  Any  audit that encompasses review and evaluation (wholly or partly) of automated information processing systems, related non - automated processes and the interfaces between them .
V – Performing an IS Audit 1.  Classification of Audits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 2.  Audit Programs  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 2.  Audit Programs  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 2.  Audit Programs
V – Performing an IS Audit 3.  Audit Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 3.  Audit Methodology
[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 3.  Audit Methodology
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 3.  Audit Methodology
V – Performing an IS Audit 3.  Audit Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 3.  Audit Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 3.  Audit Methodology
4.  Fraud Detection V – Performing an IS Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 5.  Audit Risk and Materiality  ,[object Object],[object Object],[object Object]
V – Performing an IS Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],5.  Audit Risk and Materiality
V – Performing an IS Audit 5.  Audit Risk and Materiality  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 5.  Audit Risk and Materiality  ,[object Object],[object Object]
V – Performing an IS Audit 6. Risk Assessment Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 7.  Audit Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
8. Compliance vs. Substantive Testing V – Performing an IS Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 9.  Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 9.  Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit ,[object Object],[object Object],[object Object],[object Object],10.  Interviewing and Observing Personnel in action
V – Performing an IS Audit 11.  Sampling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 11.  Sampling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 11.  Sampling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 11.  Sampling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit 12. Using the Services of Other Auditors and Experts  Considerations when using services of other auditors and experts: •  Restrictions on outsourcing of audit/security services provided by laws and regulations •  Audit charter or contractual stipulations •  Impact on overall and specific IS audit objectives •  Impact on IS audit risk and professional liability •  Independence and objectivity of other auditors and experts •  Professional competence, qualifications and experience
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 12. Using the Services of Other Auditors and Experts
V – Performing an IS Audit 13.  Computer-assisted Audit Techniques  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 13.  Computer-assisted Audit Techniques
[object Object],[object Object],V – Performing an IS Audit 13.  Computer-assisted Audit Techniques  ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 13.  Computer-assisted Audit Techniques
V – Performing an IS Audit 14. Evaluation of Audit Strengths and Weaknesses  ,[object Object],[object Object],[object Object],[object Object]
V – Performing an IS Audit ,[object Object],[object Object],[object Object],14. Evaluation of Audit Strengths and Weaknesses
15.  Communicating Audit Results V – Performing an IS Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 15.  Communicating Audit Results
16. Management Implementation of Recommendations  V – Performing an IS Audit ,[object Object],[object Object]
17.  Audit Documentation V – Performing an IS Audit ,[object Object],[object Object],[object Object]
Documentation should include, at a minimum, a record of the: •  Planning and preparation of the audit scope and objectives  •  Description and/or walkthroughs on the scoped audit area  •  Audit program  •  Audit steps performed and audit evidence gathered  •  Use of services of other auditors and experts  •  Audit findings, conclusions and recommendations   V – Performing an IS Audit 17.  Audit Documentation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit 17.  Audit Documentation
[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit Chapter 1 Question
V – Performing an IS Audit Chapter 1 Question ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit Chapter 1 Question
[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit Chapter 1 Question
V – Performing an IS Audit Chapter 1 Question ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit Chapter 1 Question
[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit Chapter 1 Question
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V – Performing an IS Audit Chapter 1 Question
V – Performing an IS Audit Chapter 1 Question ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VI - Control Self-Assessment  ,[object Object],[object Object],[object Object]
VI - Control Self-Assessment   ,[object Object],[object Object],[object Object]
VI - Control Self-Assessment  1.  Benefits of CSA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VI - Control Self-Assessment   ,[object Object],[object Object],[object Object],[object Object],1.  Benefits of CSA
VI - Control Self-Assessment  2.  Disadvantages of CSA ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],VI - Control Self-Assessment
3.  Auditor Role in CSA VI - Control Self-Assessment  ,[object Object],[object Object],[object Object],>>>>  the auditors are facilitators   >>>>  the management client is the participant in the CSA process
VI - Control Self-Assessment  4. Technology Drivers for CSA  ,[object Object],[object Object],[object Object],[object Object],Group decision making is an essential component of a workshop-based CSA where employee empowerment is a goal
5.  Traditional vs. CSA Approach VI - Control Self-Assessment  Traditional approach  Any approach in which the primary responsibility for analyzing and reporting on internal control and risk is assigned to auditors and, to a lesser extent, controller departments and outside consultants.   CSA approach  Emphasizes management and accountability over developing and monitoring internal controls of an organization’s sensitive and critical business processes
[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 1 Question VI - Control Self-Assessment
VII - Emerging changes in the IS audit process  1.  Automated Work papers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VII - Emerging changes in the IS audit process  1.  Automated Work papers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VII - Emerging changes in the IS audit process  2. Integrated Auditing ,[object Object],[object Object],[object Object]
VII - Emerging changes in the IS audit process  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2. Integrated Auditing
VII - Emerging changes in the IS audit process  3.  Continuous Auditing Definition “ A methodology that enables independent auditors to provide written assurance on a subject   matter using a series of auditors’ reports issued simultaneously with, or a short period of time after, the occurrence of   events  underlying the subject matter”
VII - Emerging changes in the IS audit process  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3.  Continuous Auditing
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VII - Emerging changes in the IS audit process  3.  Continuous Auditing
[object Object],[object Object],[object Object],[object Object],[object Object],VII - Emerging changes in the IS audit process  3.  Continuous Auditing
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VII - Emerging changes in the IS audit process  3.  Continuous Auditing
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VII - Emerging changes in the IS audit process  3.  Continuous Auditing
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VII - Emerging changes in the IS audit process  3.  Continuous Auditing
VIII - Chapter 1 Case Study 1.  Case study Scenario The IS auditor has been asked to perform preliminary work that will assess the readiness of the organization for a review to measure compliance with new regulatory requirements. These requirements are designed to ensure that management is taking an active role in setting up and maintaining a well-controlled environment and, accordingly, will assess management’s review and testing of the general IT control environment. Areas to be assessed include logical and physical security, change management, production control and network management, IT governance, and end-user computing. The IS auditor has been given six months to perform this preliminary work, so sufficient time should be available. It should be noted that in previous years, repeated problems have been identified in the areas of logical security and change management, so these areas will most likely require some degree of remediation. Logical security deficiencies noted included the sharing of administrator accounts and failure to enforce adequate controls over passwords. Change management deficiencies included improper segregation of incompatible duties and failure to document all changes. Additionally, the process for deploying operating system updates to servers was found to be only partially effective. In anticipation of the work to be performed by the IS auditor, the chief information officer (CIO) requested direct reports to develop narratives and process flows describing the major activities for which IT is responsible. These were completed, approved by the various process owners and the CIO, and then forwarded to the IS auditor for examination.
VIII - Chapter 1 Case Study 2. Case study Questions 1. What should the IS auditor do FIRST?   A. Perform an IT risk assessment. B. Perform a survey audit of logical access controls. C. Revise the audit plan to focus on risk-based auditing. D. Begin testing controls that the IS auditor feels are most critical.
VIII - Chapter 1 Case Study 2. Case study Questions 2.  When testing program change management, how should the sample be selected? A. Change management documents should be selected at random and examined for appropriateness B. Changes to production code should be sampled and traced to appropriate authorizing documentation C. Change management documents should be selected based on system criticality and examined for appropriateness D. Changes to production code should be sampled and traced back to system-produced logs indicating the date and time of the change

Weitere ähnliche Inhalte

Was ist angesagt?

Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit complianceonline123
 
Internal Audit Plan 2015
Internal Audit Plan 2015Internal Audit Plan 2015
Internal Audit Plan 2015Mohammad Kashif
 
An introduction to internal auditing
An introduction to internal auditingAn introduction to internal auditing
An introduction to internal auditinggrifff
 
Introduction to internal auditing
Introduction to internal auditingIntroduction to internal auditing
Introduction to internal auditingDavid Griffiths
 
internal audit function ans controller's role in investors relation
 internal audit function ans controller's role in investors relation internal audit function ans controller's role in investors relation
internal audit function ans controller's role in investors relationArgentinaMorata
 
Topic 4 internal control system (ics)
Topic 4 internal control system (ics)Topic 4 internal control system (ics)
Topic 4 internal control system (ics)sakura rena
 
Basic Internal Auditing Presentation
Basic Internal Auditing PresentationBasic Internal Auditing Presentation
Basic Internal Auditing PresentationVernon Benjamin
 
Internal control system
Internal control systemInternal control system
Internal control systemMadiha Hassan
 
Audit report writing 5
Audit report writing 5Audit report writing 5
Audit report writing 5DJones68
 
Risk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesRisk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesManoj Agarwal
 
Basic internal auditing
Basic internal auditingBasic internal auditing
Basic internal auditingKhalid Aziz
 
Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013Matthew Green
 
Introduction to auditing, Meaning, Objects and Techniques
Introduction to auditing, Meaning, Objects and TechniquesIntroduction to auditing, Meaning, Objects and Techniques
Introduction to auditing, Meaning, Objects and Techniquesmack19921
 

Was ist angesagt? (20)

Basics of internal audit
Basics of internal auditBasics of internal audit
Basics of internal audit
 
Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit
 
Internal audit ppt
Internal audit pptInternal audit ppt
Internal audit ppt
 
Internal Audit Plan 2015
Internal Audit Plan 2015Internal Audit Plan 2015
Internal Audit Plan 2015
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
An introduction to internal auditing
An introduction to internal auditingAn introduction to internal auditing
An introduction to internal auditing
 
Internal auditing
Internal auditingInternal auditing
Internal auditing
 
Introduction to internal auditing
Introduction to internal auditingIntroduction to internal auditing
Introduction to internal auditing
 
internal audit function ans controller's role in investors relation
 internal audit function ans controller's role in investors relation internal audit function ans controller's role in investors relation
internal audit function ans controller's role in investors relation
 
Internal controls
Internal controlsInternal controls
Internal controls
 
Topic 4 internal control system (ics)
Topic 4 internal control system (ics)Topic 4 internal control system (ics)
Topic 4 internal control system (ics)
 
Basic Internal Auditing Presentation
Basic Internal Auditing PresentationBasic Internal Auditing Presentation
Basic Internal Auditing Presentation
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Audit report writing 5
Audit report writing 5Audit report writing 5
Audit report writing 5
 
Workshop presentation on internal control and internal audit by Jose Viegas R...
Workshop presentation on internal control and internal audit by Jose Viegas R...Workshop presentation on internal control and internal audit by Jose Viegas R...
Workshop presentation on internal control and internal audit by Jose Viegas R...
 
Risk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesRisk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling Techniques
 
Basic internal auditing
Basic internal auditingBasic internal auditing
Basic internal auditing
 
Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013Hanrick Curran Audit Training - Internal Controls - March 2013
Hanrick Curran Audit Training - Internal Controls - March 2013
 
Introduction to auditing, Meaning, Objects and Techniques
Introduction to auditing, Meaning, Objects and TechniquesIntroduction to auditing, Meaning, Objects and Techniques
Introduction to auditing, Meaning, Objects and Techniques
 
The Internal Audit Framework
The Internal Audit FrameworkThe Internal Audit Framework
The Internal Audit Framework
 

Andere mochten auch

Andere mochten auch (17)

CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice question
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
des
desdes
des
 
Chap3 2007 Cisa Review Course
Chap3 2007 Cisa Review CourseChap3 2007 Cisa Review Course
Chap3 2007 Cisa Review Course
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
Chap5 2007 Cisa Review Course
Chap5 2007 Cisa Review CourseChap5 2007 Cisa Review Course
Chap5 2007 Cisa Review Course
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review Course
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
CISA Review Course Slides - Part1
CISA Review Course Slides - Part1CISA Review Course Slides - Part1
CISA Review Course Slides - Part1
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
Audit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, AuditingAudit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, Auditing
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review Course
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
Anypoint connectorfor ibm as 400
Anypoint connectorfor ibm as 400Anypoint connectorfor ibm as 400
Anypoint connectorfor ibm as 400
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 

Ähnlich wie Chap1 2007 Cisa Review Course

Auditing Standard and Practice
Auditing Standard and Practice Auditing Standard and Practice
Auditing Standard and Practice Bikash Kumar
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
Internal Audit effectiveness
Internal Audit effectivenessInternal Audit effectiveness
Internal Audit effectivenessKaran Puri
 
Standards of Internal Audit
Standards of Internal AuditStandards of Internal Audit
Standards of Internal AuditKaran Puri
 
Ris Based Auditing Training March 2020.pptx
Ris Based Auditing Training March 2020.pptxRis Based Auditing Training March 2020.pptx
Ris Based Auditing Training March 2020.pptxRansfordArmahACCAMSc
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detailecarrow
 
PART II INTERNAL AUDITING in local government.ppt
PART II  INTERNAL AUDITING in local government.pptPART II  INTERNAL AUDITING in local government.ppt
PART II INTERNAL AUDITING in local government.pptCamellaCandon
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSShivamSharma909
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrainInfosecTrain
 
Internal Audit Training with different .pptx
Internal Audit Training with different .pptxInternal Audit Training with different .pptx
Internal Audit Training with different .pptxBonAlexisGuatato
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsNimonik
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1Cheng Olayvar
 
Risk-Based Financial Statements Auditing.pptx
Risk-Based Financial Statements Auditing.pptxRisk-Based Financial Statements Auditing.pptx
Risk-Based Financial Statements Auditing.pptxRansfordArmahACCAMSc
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
Auditing Information Security Management System Using ISO 27001 2013
Auditing Information Security Management System Using ISO 27001 2013Auditing Information Security Management System Using ISO 27001 2013
Auditing Information Security Management System Using ISO 27001 2013Andrea Porter
 
Audit prsentation
Audit prsentationAudit prsentation
Audit prsentationlogyonetimi
 

Ähnlich wie Chap1 2007 Cisa Review Course (20)

Auditing Standard and Practice
Auditing Standard and Practice Auditing Standard and Practice
Auditing Standard and Practice
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
Auditing concept
Auditing conceptAuditing concept
Auditing concept
 
Internal Audit effectiveness
Internal Audit effectivenessInternal Audit effectiveness
Internal Audit effectiveness
 
SFC Plan of engagement
SFC Plan of engagementSFC Plan of engagement
SFC Plan of engagement
 
Standards of Internal Audit
Standards of Internal AuditStandards of Internal Audit
Standards of Internal Audit
 
Ris Based Auditing Training March 2020.pptx
Ris Based Auditing Training March 2020.pptxRis Based Auditing Training March 2020.pptx
Ris Based Auditing Training March 2020.pptx
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
PART II INTERNAL AUDITING in local government.ppt
PART II  INTERNAL AUDITING in local government.pptPART II  INTERNAL AUDITING in local government.ppt
PART II INTERNAL AUDITING in local government.ppt
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
Auditing
AuditingAuditing
Auditing
 
Silabus el5213 internal auditing (audit internal) v021
Silabus el5213 internal auditing (audit internal) v021Silabus el5213 internal auditing (audit internal) v021
Silabus el5213 internal auditing (audit internal) v021
 
Internal Audit Training with different .pptx
Internal Audit Training with different .pptxInternal Audit Training with different .pptx
Internal Audit Training with different .pptx
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality Audits
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 
Risk-Based Financial Statements Auditing.pptx
Risk-Based Financial Statements Auditing.pptxRisk-Based Financial Statements Auditing.pptx
Risk-Based Financial Statements Auditing.pptx
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
Auditing Information Security Management System Using ISO 27001 2013
Auditing Information Security Management System Using ISO 27001 2013Auditing Information Security Management System Using ISO 27001 2013
Auditing Information Security Management System Using ISO 27001 2013
 
Audit prsentation
Audit prsentationAudit prsentation
Audit prsentation
 

Mehr von Desmond Devendran (20)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000175
File000175File000175
File000175
 
File000174
File000174File000174
File000174
 
File000173
File000173File000173
File000173
 
File000172
File000172File000172
File000172
 
File000171
File000171File000171
File000171
 
File000170
File000170File000170
File000170
 
File000169
File000169File000169
File000169
 
File000168
File000168File000168
File000168
 
File000167
File000167File000167
File000167
 
File000166
File000166File000166
File000166
 
File000165
File000165File000165
File000165
 
File000164
File000164File000164
File000164
 
File000163
File000163File000163
File000163
 

Chap1 2007 Cisa Review Course

  • 1. 2007 CISA  Review Course CHAPTER 1 The IS Audit Process
  • 2.
  • 3. Process Area Objective Ensure that the CISA candidate… “ The objective of the process area is to ensure that the CISA candidate has the knowledge necessary to provide information systems (IS) audit services in accordance with IS audit standards, guidelines and best practices to assist the organization in ensuring that its information technology and business systems are protected and controlled . ”
  • 4. Process Area Summary According to the CISA Certification Board, this Process Area will represent approximately 10% of the CISA examination (approximately 20 questions).
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. II - ISACA IS Auditing Standards and Guidelines 1. ISACA Code of Professional Ethics The Association’s Code of Professional Ethics provides guidance for the professional and personal conduct of members of the Association and/or holders of the CISA and CISM designation
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. 3. ISACA IS Auditing Guidelines II - ISACA IS Auditing Standards and Guidelines G1 Using the Work of Other Auditors, effective 1 June 1998 G2 Audit Evidence Requirement, effective 1 December 1998 G3 Use of Computer Assisted Audit Techniques (CAATs), effective 1 December 1998 G4 Outsourcing of IS Activities to Other Organisations, effective 1 September 1999 G5 Audit Charter, effective 1 September 1999 G6 Materiality Concepts for Auditing Information Systems, effective 1 September 1999 G7 Due Professional Care, effective 1 September 1999 G8 Audit Documentation, effective 1 September 1999 G9 Audit Considerations for Irregularities, effective 1 March 2000 G10 Audit Sampling, effective 1 March 2000 G11 Effect of Pervasive IS Controls, effective 1 March 2000 G12 Organizational Relationship and Independence, effective 1 September 2000 G13 Use of Risk Assessment in Audit Planning, effective 1 September 2000 G14 Application Systems Review, effective 1 November 2001 G15 Planning Revised, effective 1 March 2002 G16 Effect of Third Parties on an Organization’s IT Controls, effective 1 March 2002 G17 Effect of Nonaudit Role on the IS Auditor’s Independence, effective 1 July 2002 G18 IT Governance, effective 1 July 2002 G19 Irregularities and Illegal Acts, effective 1 July 2002
  • 30. 3. ISACA IS Auditing Guidelines II - ISACA IS Auditing Standards and Guidelines G20 Reporting, effective 1 January 2003 G21 Enterprise Resource Planning (ERP) Systems Review, effective 1 August 2003 G22 Business-to-consumer (B2C) E-commerce Review, effective 1 August 2003 G23 System Development Life Cycle (SDLC) Review, effective 1 August 2003 G24 Internet Banking, effective 1 August 2003 G25 Review of Virtual Private Networks, effective 1 July 2004 G26 Business Process Reengineering (BPR) Project Reviews, effective 1 July 2004 G27 Mobile Computing, effective 1 September 2004 G28 Computer Forensics, effective 1 September 2004 G29 Post-implementation Review, effective 1 January 2005 G30 Competence, effective 1 June 2005 G31 Privacy, effective 1 June 2005 G32 Business Continuity Plan (BCP) Review From IT Perspective, effective 1 September 2005 G33 General Considerations on the Use of the Internet, effective 1 March 2006 G34 Responsibility, Authority and Accountability, effective 1 March 2006 G35 Follow-up Activities, effective 1 March 2006
  • 31.
  • 32. II - ISACA IS Auditing Standards and Guidelines 4. ISACA IS Auditing Procedures P1 IS Risk Assessment, effective 1 July 2002 P2 Digital Signatures, effective 1 July 2002 P3 Intrusion Detection, effective 1 August 2003 P4 Viruses and Other Malicious Code, effective 1 August 2003 P5 Control Risk Self-assessment, effective 1 August 2003 P6 Firewalls, effective 1 August 2003 P7 Irregularities and Illegal Acts, effective 1 November 2003 P8 Security Assessment—Penetration Testing and Vulnerability Analysis, effective 1 September 2004 P9 Evaluation of Management Controls Over Encryption Methodologies, effective 1 January 2005
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. 2. IS Control Objectives Internal control objectives apply to all areas, whether manual or automated. Therefore, conceptually, control objectives in an IS environment remain unchanged from those of a manual environment IV – Internal Controls
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48. Definition of Auditing Systematic process by which a competent, independent person objectively obtains and evaluates evidence regarding assertions about an economic entity or event for the purpose of forming an opinion about and reporting on the degree to which the assertion conforms to an identified set of standards. V – Performing an IS Audit Definition of IS Auditing Any audit that encompasses review and evaluation (wholly or partly) of automated information processing systems, related non - automated processes and the interfaces between them .
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75. V – Performing an IS Audit 12. Using the Services of Other Auditors and Experts Considerations when using services of other auditors and experts: • Restrictions on outsourcing of audit/security services provided by laws and regulations • Audit charter or contractual stipulations • Impact on overall and specific IS audit objectives • Impact on IS audit risk and professional liability • Independence and objectivity of other auditors and experts • Professional competence, qualifications and experience
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87. Documentation should include, at a minimum, a record of the: • Planning and preparation of the audit scope and objectives • Description and/or walkthroughs on the scoped audit area • Audit program • Audit steps performed and audit evidence gathered • Use of services of other auditors and experts • Audit findings, conclusions and recommendations V – Performing an IS Audit 17. Audit Documentation
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106. 5. Traditional vs. CSA Approach VI - Control Self-Assessment Traditional approach Any approach in which the primary responsibility for analyzing and reporting on internal control and risk is assigned to auditors and, to a lesser extent, controller departments and outside consultants. CSA approach Emphasizes management and accountability over developing and monitoring internal controls of an organization’s sensitive and critical business processes
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112. VII - Emerging changes in the IS audit process 3. Continuous Auditing Definition “ A methodology that enables independent auditors to provide written assurance on a subject matter using a series of auditors’ reports issued simultaneously with, or a short period of time after, the occurrence of events underlying the subject matter”
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119. VIII - Chapter 1 Case Study 1. Case study Scenario The IS auditor has been asked to perform preliminary work that will assess the readiness of the organization for a review to measure compliance with new regulatory requirements. These requirements are designed to ensure that management is taking an active role in setting up and maintaining a well-controlled environment and, accordingly, will assess management’s review and testing of the general IT control environment. Areas to be assessed include logical and physical security, change management, production control and network management, IT governance, and end-user computing. The IS auditor has been given six months to perform this preliminary work, so sufficient time should be available. It should be noted that in previous years, repeated problems have been identified in the areas of logical security and change management, so these areas will most likely require some degree of remediation. Logical security deficiencies noted included the sharing of administrator accounts and failure to enforce adequate controls over passwords. Change management deficiencies included improper segregation of incompatible duties and failure to document all changes. Additionally, the process for deploying operating system updates to servers was found to be only partially effective. In anticipation of the work to be performed by the IS auditor, the chief information officer (CIO) requested direct reports to develop narratives and process flows describing the major activities for which IT is responsible. These were completed, approved by the various process owners and the CIO, and then forwarded to the IS auditor for examination.
  • 120. VIII - Chapter 1 Case Study 2. Case study Questions 1. What should the IS auditor do FIRST?   A. Perform an IT risk assessment. B. Perform a survey audit of logical access controls. C. Revise the audit plan to focus on risk-based auditing. D. Begin testing controls that the IS auditor feels are most critical.
  • 121. VIII - Chapter 1 Case Study 2. Case study Questions 2. When testing program change management, how should the sample be selected? A. Change management documents should be selected at random and examined for appropriateness B. Changes to production code should be sampled and traced to appropriate authorizing documentation C. Change management documents should be selected based on system criticality and examined for appropriateness D. Changes to production code should be sampled and traced back to system-produced logs indicating the date and time of the change

Hinweis der Redaktion

  1. Title slide for Chapter 1.