SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Key Areas
ITGC AUDIT OF ERP
SYSTEMS
J A Y E S H D A G A
• DEVELOP AND MAINTAIN POLICIES AND PROCEDURES
• INSTALL AND TEST APPLICATION SOFTWARE AND TECHNOLOGY
INFRASTRUCTURE
• MANAGE CHANGES
• DEFINE AND MANAGE SERVICE LEVELS
• MANAGE THIRD PARTY SERVICES
• ENSURE SYSTEM SECURITY
• MANAGE PROBLEMS AND INCIDENTS
• MANAGE DATA
• MANAGE OPERATIONS
KEY AREAS
J A Y E S H D A G A
• The organization’s System Development Life Cycle (SDLC) methodology
and associated policies and procedures are regularly reviewed, updated and
approved by management.
• The organization ensures that its systems and applications are developed in
accordance with its supported, documented policies and procedures.
DEVELOP AND MAINTAIN POLICIES AND
PROCEDURES
J A Y E S H D A G A
• A testing strategy is developed and followed for all significant changes in
applications and infrastructure technology, which addresses unit, system,
integration and user acceptance level testing to help ensure that deployed
systems operate as intended.
• Load and stress testing is performed according to a test plan and established
testing standards.
• Interfaces with other systems are tested to confirm that data transmissions are
complete, accurate and valid.
• The conversion of data is tested between its origin and its destination to
confirm that it is complete, accurate and valid.
INSTALL AND TEST APPLICATION SOFTWARE
AND TECHNOLOGY INFRASTRUCTURE
J A Y E S H D A G A
• Requests for program changes, system changes and maintenance (including
changes to system software) are standardized documented and subject to
formal change management procedures.
• Emergency change requests are documented and subject to formal change
management procedures.
• Controls are in place to restrict migration of programs to production only by
authorized individuals.
• Configuration change (e.g., tolerances, pricing, number ranges) process is
documented and the process includes evidencing of authorization and approval
of the changes.
MANAGE CHANGES
J A Y E S H D A G A
• Service levels are defined and managed to support financial reporting
system requirements.
• A framework is defined to establish key performance indicators to manage
service level agreements, both internally and externally.
DEFINE AND MANAGE SERVICE LEVELS
J A Y E S H D A G A
• Selection of vendors for outsourced services is performed in accordance with
the organization’s vendor management policy.
• Third-party service contracts address the risks, security controls and procedures
for information systems and networks in the contract between the parties.
• Procedures exist and are followed to ensure that a formal contract is defined
and agreed upon for all Third party services before work is initiated, including
definition of internal control requirements and acceptance of the
organization’s policies and procedures.
• A regular review of security, availability and processing integrity is performed
for service level agreements and related contracts with third-party service
providers.
MANAGE THIRD PARTY SERVICES
J A Y E S H D A G A
• An information security policy exists and has been approved by an appropriate
level of executive management.
• A framework of security standards has been developed that supports the
objectives of the security policy.
• An IT security plan exists that is aligned with overall IT strategic plans.
• The IT security plan is updated to reflect changes in the IT environment as well
as security requirements of specific systems.
• Procedures exist and are followed to authenticate all users to the system and to
support the validity of transaction access.
ENSURE SYSTEM SECURITY
J A Y E S H D A G A
• Procedures exist and are followed to maintain the effectiveness of authentication and
access mechanisms (e.g., regular password changes).
• Procedures exist and are followed to ensure timely action relating to requesting,
establishing, issuing, suspending and closing user accounts.
• A control process exists and is followed to periodically review and confirm access rights.
• Where appropriate, controls exist to ensure that neither party can deny transactions, and
controls are implemented to provide nonrepudiation of origin or receipt, proof of
submission and receipt of transactions.
• Where network connectivity is used, appropriate controls, including firewalls, intrusion
detection and vulnerability assessments exist and are used to prevent unauthorized
access.
ENSURE SYSTEM SECURITY CONTD…
J A Y E S H D A G A
• IT security administration monitors and logs security activity, logs are
reviewed, and identified security violations are reported to senior
management.
• Controls relating to appropriate segregation of duties over requesting and
granting access to systems and data exist and are followed.
• Access to facilities is restricted to authorized personnel and requires
appropriate identification and authentication.
ENSURE SYSTEM SECURITY CONTD…
J A Y E S H D A G A
• IT management has defined and implemented a problem management system to ensure
that operational events that are not part of standard operation (incidents, problems and
errors) are recorded, analyzed and resolved in a timely manner.
• The problem management system provides for adequate audit trail facilities, which allow
tracing from incident to underlying cause.
• A security incident response process exists to support timely response and investigation
of unauthorized activities.
MANAGE PROBLEMS AND INCIDENTS
J A Y E S H D A G A
• Policies and procedures exist for the handling, distribution and retention of data and reporting output.
• Management protects sensitive information, logically and physically, during transmission and in storage against
unauthorized access or modification.
• Retention periods and storage terms are defined for documents, data, programs, reports and messages (incoming
and outgoing), as well as the data (keys, certificates) used for their encryption and authentication.
• Management has implemented a strategy for cyclical backup of data and programs. A Disaster Recovery Plan is in
place.
• Procedures exist and are followed to periodically test the effectiveness of the restoration process and the quality
of backup media.
• Changes to data structures are authorized, made in accordance with design specifications and implemented in a
timely manner.
MANAGE DATA
J A Y E S H D A G A
• Management has established and documented standard procedures for IT operations,
including scheduling, managing, monitoring and responding to security, availability and
processing integrity events.
• System event data are sufficiently retained to provide chronological information and logs
to enable the review, examination and reconstruction of system and data processing.
• System event data are designed to provide reasonable assurance as to the completeness
and timeliness of system and data processing.
• End-user computing policies and procedures concerning security, availability and
processing integrity exist and are followed.
• End-user computing, including spreadsheets and other user-developed programs, are
documented and regularly reviewed for processing integrity, including their ability to
sort, summarize and report accurately.
MANAGE OPERATIONS
J A Y E S H D A G A
JAYESH DAGA
https://www.linkedin.com/in/jayeshdaga
J A Y E S H D A G A

Weitere ähnliche Inhalte

Was ist angesagt?

CISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationInfosecTrain
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologiesSalih Islam
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
audit_it_250759.pdf
audit_it_250759.pdfaudit_it_250759.pdf
audit_it_250759.pdfmabkhoutaliwi1
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveSayyed Zakir Ali Rizwe
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know➲ Stella Bridges
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITShivamSharma909
 
Cobit itil and iso 27001 mapping
Cobit itil and iso 27001 mappingCobit itil and iso 27001 mapping
Cobit itil and iso 27001 mappingMuhammad Aslam
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationS L
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Hendri Eka Saputra
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 

Was ist angesagt? (20)

CISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
ITGCs.pdf
ITGCs.pdfITGCs.pdf
ITGCs.pdf
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
audit_it_250759.pdf
audit_it_250759.pdfaudit_it_250759.pdf
audit_it_250759.pdf
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
SOC 2 and You
SOC 2 and YouSOC 2 and You
SOC 2 and You
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
Cobit itil and iso 27001 mapping
Cobit itil and iso 27001 mappingCobit itil and iso 27001 mapping
Cobit itil and iso 27001 mapping
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentation
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
It governance & cobit 5
It governance & cobit 5It governance & cobit 5
It governance & cobit 5
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 

Andere mochten auch

The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.
The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.
The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.African Virtual University
 
OER in non-English speaking countries: сhallenges and opportunities for suppo...
OER in non-English speaking countries: сhallenges and opportunities for suppo...OER in non-English speaking countries: сhallenges and opportunities for suppo...
OER in non-English speaking countries: сhallenges and opportunities for suppo...African Virtual University
 
Some Thoughts On Starting Your Own Company
Some Thoughts On Starting Your Own CompanySome Thoughts On Starting Your Own Company
Some Thoughts On Starting Your Own CompanyBrad Gillespie
 
The greek-new-testament-sbl-edition
The greek-new-testament-sbl-editionThe greek-new-testament-sbl-edition
The greek-new-testament-sbl-editionCristobal Avalos Rojas
 
Ensayo de los temas trabajos en taller de medios
Ensayo de los temas trabajos en taller de medios Ensayo de los temas trabajos en taller de medios
Ensayo de los temas trabajos en taller de medios Yeli Herrera
 
O reino de deus na pregação de jesus (correcao) (1)
O reino de deus na pregação de jesus (correcao) (1)O reino de deus na pregação de jesus (correcao) (1)
O reino de deus na pregação de jesus (correcao) (1)Cristobal Avalos Rojas
 
Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...
Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...
Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...Association of University Administrators
 
Epistolary interviews
Epistolary interviewsEpistolary interviews
Epistolary interviewsRebecca Ferguson
 
ĂŞTre autonome au cdi 2015
ĂŞTre autonome au cdi 2015ĂŞTre autonome au cdi 2015
ĂŞTre autonome au cdi 2015cdijeanjoly
 
Jisc learning analytics MASHEIN Jan 2017
Jisc learning analytics MASHEIN Jan 2017Jisc learning analytics MASHEIN Jan 2017
Jisc learning analytics MASHEIN Jan 2017Paul Bailey
 
Ecosistema de innovacion propuesta para Santa Cruz 2061
Ecosistema de innovacion propuesta para Santa Cruz 2061Ecosistema de innovacion propuesta para Santa Cruz 2061
Ecosistema de innovacion propuesta para Santa Cruz 2061Karem Esther Infantas Soto
 
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...Bart Rienties
 
The power of learning analytics for UCL: lessons learned from the Open Univer...
The power of learning analytics for UCL: lessons learned from the Open Univer...The power of learning analytics for UCL: lessons learned from the Open Univer...
The power of learning analytics for UCL: lessons learned from the Open Univer...Bart Rienties
 
Wireless Broadband Network Project : BTCL
Wireless Broadband Network Project : BTCLWireless Broadband Network Project : BTCL
Wireless Broadband Network Project : BTCLMd Aminul Hassan
 
Biomedical Application of Magnetic Nanomaterials
Biomedical Application of Magnetic NanomaterialsBiomedical Application of Magnetic Nanomaterials
Biomedical Application of Magnetic NanomaterialsMahmudun Nabi
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 

Andere mochten auch (20)

The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.
The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.
The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.
 
Comercios BiciAmigos
Comercios BiciAmigosComercios BiciAmigos
Comercios BiciAmigos
 
OER in non-English speaking countries: сhallenges and opportunities for suppo...
OER in non-English speaking countries: сhallenges and opportunities for suppo...OER in non-English speaking countries: сhallenges and opportunities for suppo...
OER in non-English speaking countries: сhallenges and opportunities for suppo...
 
Some Thoughts On Starting Your Own Company
Some Thoughts On Starting Your Own CompanySome Thoughts On Starting Your Own Company
Some Thoughts On Starting Your Own Company
 
The greek-new-testament-sbl-edition
The greek-new-testament-sbl-editionThe greek-new-testament-sbl-edition
The greek-new-testament-sbl-edition
 
Ensayo de los temas trabajos en taller de medios
Ensayo de los temas trabajos en taller de medios Ensayo de los temas trabajos en taller de medios
Ensayo de los temas trabajos en taller de medios
 
O reino de deus na pregação de jesus (correcao) (1)
O reino de deus na pregação de jesus (correcao) (1)O reino de deus na pregação de jesus (correcao) (1)
O reino de deus na pregação de jesus (correcao) (1)
 
Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...
Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...
Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...
 
El si de_maria
El si de_mariaEl si de_maria
El si de_maria
 
4. Presentation
4. Presentation4. Presentation
4. Presentation
 
Epistolary interviews
Epistolary interviewsEpistolary interviews
Epistolary interviews
 
ĂŞTre autonome au cdi 2015
ĂŞTre autonome au cdi 2015ĂŞTre autonome au cdi 2015
ĂŞTre autonome au cdi 2015
 
Jisc learning analytics MASHEIN Jan 2017
Jisc learning analytics MASHEIN Jan 2017Jisc learning analytics MASHEIN Jan 2017
Jisc learning analytics MASHEIN Jan 2017
 
Ecosistema de innovacion propuesta para Santa Cruz 2061
Ecosistema de innovacion propuesta para Santa Cruz 2061Ecosistema de innovacion propuesta para Santa Cruz 2061
Ecosistema de innovacion propuesta para Santa Cruz 2061
 
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
 
The power of learning analytics for UCL: lessons learned from the Open Univer...
The power of learning analytics for UCL: lessons learned from the Open Univer...The power of learning analytics for UCL: lessons learned from the Open Univer...
The power of learning analytics for UCL: lessons learned from the Open Univer...
 
Wireless Broadband Network Project : BTCL
Wireless Broadband Network Project : BTCLWireless Broadband Network Project : BTCL
Wireless Broadband Network Project : BTCL
 
Biomedical Application of Magnetic Nanomaterials
Biomedical Application of Magnetic NanomaterialsBiomedical Application of Magnetic Nanomaterials
Biomedical Application of Magnetic Nanomaterials
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Aloha
AlohaAloha
Aloha
 

Ähnlich wie ITGC audit of ERPs

CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptxdotco
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk AssessmentsPriyank Hada
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2 Jayant Dalvi
 
2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Ydemikaelyde
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptxdotco
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]n|u - The Open Security Community
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptxHardikKundra
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...Hernan Huwyler, MBA CPA
 
CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptxdotco
 
Securitymetrics
SecuritymetricsSecuritymetrics
SecuritymetricsManish Kumar
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptxdotco
 
Information system audit
Information system audit Information system audit
Information system audit Jayant Dalvi
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
Preparing a data migration plan: A practical guide
Preparing a data migration plan: A practical guidePreparing a data migration plan: A practical guide
Preparing a data migration plan: A practical guideETLSolutions
 
HIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesHIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesCole Libby
 
ServiceNow ITAM Best practices.pdf
ServiceNow ITAM Best practices.pdfServiceNow ITAM Best practices.pdf
ServiceNow ITAM Best practices.pdfAelum Consulting
 

Ähnlich wie ITGC audit of ERPs (20)

CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
Compliance
ComplianceCompliance
Compliance
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
 
Securitymetrics
SecuritymetricsSecuritymetrics
Securitymetrics
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptx
 
Information system audit
Information system audit Information system audit
Information system audit
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Preparing a data migration plan: A practical guide
Preparing a data migration plan: A practical guidePreparing a data migration plan: A practical guide
Preparing a data migration plan: A practical guide
 
HIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesHIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician Practices
 
ServiceNow ITAM Best practices.pdf
ServiceNow ITAM Best practices.pdfServiceNow ITAM Best practices.pdf
ServiceNow ITAM Best practices.pdf
 

KĂźrzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 

KĂźrzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

ITGC audit of ERPs

  • 1. Key Areas ITGC AUDIT OF ERP SYSTEMS J A Y E S H D A G A
  • 2. • DEVELOP AND MAINTAIN POLICIES AND PROCEDURES • INSTALL AND TEST APPLICATION SOFTWARE AND TECHNOLOGY INFRASTRUCTURE • MANAGE CHANGES • DEFINE AND MANAGE SERVICE LEVELS • MANAGE THIRD PARTY SERVICES • ENSURE SYSTEM SECURITY • MANAGE PROBLEMS AND INCIDENTS • MANAGE DATA • MANAGE OPERATIONS KEY AREAS J A Y E S H D A G A
  • 3. • The organization’s System Development Life Cycle (SDLC) methodology and associated policies and procedures are regularly reviewed, updated and approved by management. • The organization ensures that its systems and applications are developed in accordance with its supported, documented policies and procedures. DEVELOP AND MAINTAIN POLICIES AND PROCEDURES J A Y E S H D A G A
  • 4. • A testing strategy is developed and followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user acceptance level testing to help ensure that deployed systems operate as intended. • Load and stress testing is performed according to a test plan and established testing standards. • Interfaces with other systems are tested to confirm that data transmissions are complete, accurate and valid. • The conversion of data is tested between its origin and its destination to confirm that it is complete, accurate and valid. INSTALL AND TEST APPLICATION SOFTWARE AND TECHNOLOGY INFRASTRUCTURE J A Y E S H D A G A
  • 5. • Requests for program changes, system changes and maintenance (including changes to system software) are standardized documented and subject to formal change management procedures. • Emergency change requests are documented and subject to formal change management procedures. • Controls are in place to restrict migration of programs to production only by authorized individuals. • Configuration change (e.g., tolerances, pricing, number ranges) process is documented and the process includes evidencing of authorization and approval of the changes. MANAGE CHANGES J A Y E S H D A G A
  • 6. • Service levels are defined and managed to support financial reporting system requirements. • A framework is defined to establish key performance indicators to manage service level agreements, both internally and externally. DEFINE AND MANAGE SERVICE LEVELS J A Y E S H D A G A
  • 7. • Selection of vendors for outsourced services is performed in accordance with the organization’s vendor management policy. • Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contract between the parties. • Procedures exist and are followed to ensure that a formal contract is defined and agreed upon for all Third party services before work is initiated, including definition of internal control requirements and acceptance of the organization’s policies and procedures. • A regular review of security, availability and processing integrity is performed for service level agreements and related contracts with third-party service providers. MANAGE THIRD PARTY SERVICES J A Y E S H D A G A
  • 8. • An information security policy exists and has been approved by an appropriate level of executive management. • A framework of security standards has been developed that supports the objectives of the security policy. • An IT security plan exists that is aligned with overall IT strategic plans. • The IT security plan is updated to reflect changes in the IT environment as well as security requirements of specific systems. • Procedures exist and are followed to authenticate all users to the system and to support the validity of transaction access. ENSURE SYSTEM SECURITY J A Y E S H D A G A
  • 9. • Procedures exist and are followed to maintain the effectiveness of authentication and access mechanisms (e.g., regular password changes). • Procedures exist and are followed to ensure timely action relating to requesting, establishing, issuing, suspending and closing user accounts. • A control process exists and is followed to periodically review and confirm access rights. • Where appropriate, controls exist to ensure that neither party can deny transactions, and controls are implemented to provide nonrepudiation of origin or receipt, proof of submission and receipt of transactions. • Where network connectivity is used, appropriate controls, including firewalls, intrusion detection and vulnerability assessments exist and are used to prevent unauthorized access. ENSURE SYSTEM SECURITY CONTD… J A Y E S H D A G A
  • 10. • IT security administration monitors and logs security activity, logs are reviewed, and identified security violations are reported to senior management. • Controls relating to appropriate segregation of duties over requesting and granting access to systems and data exist and are followed. • Access to facilities is restricted to authorized personnel and requires appropriate identification and authentication. ENSURE SYSTEM SECURITY CONTD… J A Y E S H D A G A
  • 11. • IT management has defined and implemented a problem management system to ensure that operational events that are not part of standard operation (incidents, problems and errors) are recorded, analyzed and resolved in a timely manner. • The problem management system provides for adequate audit trail facilities, which allow tracing from incident to underlying cause. • A security incident response process exists to support timely response and investigation of unauthorized activities. MANAGE PROBLEMS AND INCIDENTS J A Y E S H D A G A
  • 12. • Policies and procedures exist for the handling, distribution and retention of data and reporting output. • Management protects sensitive information, logically and physically, during transmission and in storage against unauthorized access or modification. • Retention periods and storage terms are defined for documents, data, programs, reports and messages (incoming and outgoing), as well as the data (keys, certificates) used for their encryption and authentication. • Management has implemented a strategy for cyclical backup of data and programs. A Disaster Recovery Plan is in place. • Procedures exist and are followed to periodically test the effectiveness of the restoration process and the quality of backup media. • Changes to data structures are authorized, made in accordance with design specifications and implemented in a timely manner. MANAGE DATA J A Y E S H D A G A
  • 13. • Management has established and documented standard procedures for IT operations, including scheduling, managing, monitoring and responding to security, availability and processing integrity events. • System event data are sufficiently retained to provide chronological information and logs to enable the review, examination and reconstruction of system and data processing. • System event data are designed to provide reasonable assurance as to the completeness and timeliness of system and data processing. • End-user computing policies and procedures concerning security, availability and processing integrity exist and are followed. • End-user computing, including spreadsheets and other user-developed programs, are documented and regularly reviewed for processing integrity, including their ability to sort, summarize and report accurately. MANAGE OPERATIONS J A Y E S H D A G A