CISA Training - Chapter 1 - 2016

Hafiz Sheikh Adnan Ahmed
Hafiz Sheikh Adnan AhmedCGEIT, Lean Six Sigma Green Belt (LSSGB), ISACA COBIT 5 Certified Assessor, ISO 27032 Lead Cybersecurity Manager um wasl group
2016 CISA ® Review Course
Hafiz Sheikh Adnan Ahmed – CISA, COBIT 5, ISO 27001 LA
[PECB Certified Trainer]
Quick Reference Review
• IS Auditor Roles and associated Responsibilities
• Assurance Assignment vs Consulting Assignment
• Internal Audit Environment vs External Context
• Minimum audit planning requirements for an IS audit assignment
• ISACA Standards and ISACA guidelines for IS auditing
• Audit risk vs Business risk
• Role of audit evidence
• Compliance testing vs Substantive testing
1.2 Management of the IS Audit Function
• Ensures that diverse audit tasks fulfill audit function objectives
• Preserve audit independence and competence
1.2.1 Organization of the IS Audit Function
• IS audit services can be provided externally or internally
• IS audit can be part of internal audit, function as independent group, or be integrated
with other management audits
• Role of IS internal audit function should be established by and audit charter approved by
senior management
• Clearly state management responsibility
• Objectives and delegation of authority
• Scope and responsibilities of audit functions
1.2.2 IS Audit Resource Management
• IS auditors to maintain their competency and proficiency
1.2.3 Audit Planning
Annual Planning:
• Both short term and long term planning
Audit Universe
• Lists all the processes that may be considered for the audit
• Subject to risk assessment
• Analysis of short and long-term issues should occur at least annually
Individual Audit Assignments
• Each individual audit must be planned
• Must consider system implementation / deadlines; current and future
technologies
CISA Training - Chapter 1 - 2016
1.2.4 Effect of laws & Regulations on Audit Planning
• Regardless of size and complexity of the business, every organization need to
comply with laws and regulations
1.3 ISACA IS Audit & Assurance Standards
& Guidelines
1.3.2 ISACA IS Audit & Assurance Standards
Framework
General
1001 Audit Charter 1002 Organizational Independence
1003 Professional Independence 1004 Reasonable Expectation
1005 Due Professional Care 1006 Proficiency
1007 Assertions 1008 Criteria
Performance
1201 Engagement Planning 1202 Risk Assessment in Planning
1203 Performance and Supervision 1204 Materiality
1205 Evidence 1206 Using the Work of Other Experts
1207 Irregularity and Illegal acts
Reporting
1401 Reporting 1402 Follow-up activities
1.3.3 ISACA IS Audit and Assurance Guidelines
• The objective of the ISACA IS Audit and Assurance Guidelines is to provide further
information on how to comply with ISACA IS Audit and Assurance Standards.
• The IS auditor should:
• Consider them in determining how to implement the above standards
• Use professional judgment in applying them to specific audits
• Be able to justify any difference
1.3.4 ISACA IS Audit & Assurance
Tools &Techniques
• Provide information on how to meet the standards when performing IS auditing
work, but DO NOT set requirements
1.3.5 Relationship Among Standards, Guidelines,
&Tools &Techniques
• Standards defined by ISACA are TO BE followed by the IS auditor
• Guidelines provide assistance on how the auditor can implement standards in
various audit assignments
• Tools and techniques provide examples of steps the auditor may follow in specific
audit assignments
1.3.6 InformationTechnology Assurance Framework
(ITAF)
• A comprehensive & good-practice-setting model:
• Provides guidance on the design, conduct and reporting of IS audit and assurance
assignments
• Defines terms and concepts specific to IS assurance
• Establishes standards that address IS audit and assurance professional R&R,
knowledge and skills, and diligence, conduct and reporting requirements
• Includes three categories of standards – General, Performance and Reporting – as well as
Guidelines, Tools and Techniques
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
1.4 Risk Analysis
• Part of audit planning, and helps identify risks and vulnerabilities so the IS auditor
can determine the controls needed to mitigate those risks
• IS auditors must be able to identify and differentiate risk types and the controls
used to mitigate risks
• Risk = Combination of probability of an event and its consequence
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
1.5 Internal Controls
• Composed of policies, procedures, practices and organizational structures which
are implemented to reduce risks
• Provide reasonable assurance to management that business objectives be
achieved and risk events will be prevented, detected and corrected
• Operate at all levels to mitigate its exposures to risks
CISA Training - Chapter 1 - 2016
1.5.1 IS Control Objectives
• Control objectives are statements of the desired result or purpose to be achieved by
implementing control activities
• Provide a complete set of high-level requirements to be considered by management for
effective control of each IT process
• IS control objectives are:
• Statements of the desired result or purpose to be achieved
• Comprised of policies, procedures, practices and organizational structures
• Designed to provide reasonable assurance that business objectives will be achieved
1.5.2 COBIT 5
• A comprehensive framework that assists in achieving the objectives for the
Governance and Management of enterprise IT
• Helps enterprises create optimal value from IT by maintaining a balance between
realizing benefits and optimizing risk levels and resource use
CISA Training - Chapter 1 - 2016
• Governance:
• Governance ensures that stakeholder needs, conditions and options are evaluated to
determine balanced, agreed-on-enterprise objectives to be achieved; setting direction
through prioritization and decision making; and monitoring performance and
compliance against agreed-on direction and objectives
• Management:
• Management plans, builds, runs and monitors activities in alignment with the
direction set by the governance body to achieve the enterprise objectives
1.5.3 General Controls
• Controls include policies, procedures, and practices established by management to
provide reasonable assurance that specific objectives will be achieved
• Internal accounting controls
• Operational controls
• Administrative controls
• Physical and logical security controls
1.5.4 IS Controls
• General controls to be translated into IS-specific controls
• Access to IT resources, including data and programs
• Operations procedures
• Systems programming and technical support functions
• QA procedures
• Physical access controls
• BCP/DRP
• Database Administration
• Networks and communications
1.6 Performing and IS Audit
• Plan the audit engagement
• Build the audit plan
• Execute the plan
• Monitor project activity
1.6.1 Classification of Audits
Compliance Audits Financial Audits
Operational Audits Integrated Audits
Administrative Audits IS Audits
Specialized Audits Forensic Audits
1.6.2 Audit Programs
• A step-by-step set of audit procedures and instructions that should be performed
to complete an audit
• It is the audit strategy and plan of audit
• Based on scope and objective of each assignment
• IS auditors evaluate based on Security (C,I,A), Quality (E,E), Fiduciary (C,R), service
and capacity
1.6.3 Audit Methodology
• A set of documented audit procedures designed to achieve planned audit
objectives
• Components include:
• Statement of Scope
• Statement of audit objectives
• Statement of audit programs
• Set up and approved by audit management
CISA Training - Chapter 1 - 2016
1.6.4 Fraud Detection
• IS auditors should be aware of the possibility and means of perpetrating fraud
• Should have knowledge and experience of fraud and fraud indicators
• Evaluate and communicate to appropriate authorities
• In case of major fraud or major high risk, audit management MUST communicate
to audit committee
1.6.5 Risk-Based Auditing
• Effective risk-based auditing is driven by two processes:
• The risk assessment that drives the audit schedule
• The risk assessment that minimizes the audit risk during the execution of an
audit
• This approach is adapted to develop and improve the continuous audit process
• Assist IS auditor in deciding to perform compliance testing or substantive testing
CISA Training - Chapter 1 - 2016
1.6.6 Audit Risk and Materiality
Audit Risk:
• The risk that information may contain a material error that may go undetected
during the course of the audit
• IS auditor to have sound understanding of these audit risks when planning an audit
CISA Training - Chapter 1 - 2016
1.6.7 Risk Assessment andTreatment
• Risk Assessment identify, quantify, and prioritize risks against criteria for risk
acceptance and objectives relevant to the organization
1.6.8 Risk AssessmentTechniques
• One technique is scoring system based on priority
• Other is simple classification. i.e. High, Medium, Low
• Another technique is judgmental based on business knowledge, executive
management directives, historical perspectives, business goals etc.
• A combination of all these is usually used
1.6.9 Audit Objectives
• It refers to specific goals that must be accomplished by the audit
• Focus on substantiating that internal controls exist to minimize risks and they function as
expected
• A key element in planning an IS audit is to translate basic audit objective into specific IS
audit objectives
• Basic purpose of any IS audit is to identify “control objectives” and the related controls
that address that objective
• “Control objective” refers to how an internal control should function
CISA Training - Chapter 1 - 2016
1.6.10 Compliance vs. SubstantiveTesting
• Direct correlation between levels of internal controls and the amount of substantive testing
required
• If compliance tests reveal the presence of adequate internal controls, minimize the substantive
procedures
Compliance Testing Substantive Testing
Testing an organization’s compliance with control
procedures
Evaluate the integrity of individual transactions, data
or other information
Determines if controls are being applied that complies
with management policies and procedures
Substantiates the integrity of actual processing
Provide IS auditors with reasonable assurance that
particular control is operating as expected
Normally used to test for monetary errors directly
affecting financial statement balances
Used to test the existence and effectiveness of a
defined process
CISA Training - Chapter 1 - 2016
1.6.11 Evidence
• Any information used by the IS auditor to determine whether the entity or data
being audited follows the established criteria or objectives
• May include auditor’s observations, notes taken from the interviews, results of
independent confirmations, documentation, results of audit test procedures etc.
• The “quality” and “quantity” of evidence must be accessed by the IS auditor
• Referred to as “competent (quality)” and “sufficient (quantity)”
• Evidence is “competent” when it is both valid and relevant
• Techniques for gathering evidence:
• Reviewing IS organizational structures
• Reviewing IS policies and procedures
• Reviewing IS standards
• Reviewing IS documentation
• Interviewing appropriate personnel
• Observing processes and employee performance
• Walkthroughs
1.6.12 Interviewing & Observing personnel in
performance of their duties
• Assists IS auditors in identifying:
• Actual functions
• Actual processes/procedures
• Security awareness
• Reporting relationships
• Observation drawbacks
1.6.13 Sampling
• Used when time and cost preclude a total verification of all transactions or events
in a pre-defined population
• Two general approaches:
• Statistical Sampling
• Objective method of determining the sample size and selection criteria
• Uses the mathematical laws of probability to:
• Calculate the sampling size
• Select the sample items
• Evaluate the sample results and make the inference
• Quantitatively decides how closely the sample should represent the
population
• Represented as a percentage
• Non-statistical Sampling
• Uses auditor judgment to determine the method of sampling, the number of
items that will be examined from a population and which items to select
• Based on subjective judgment
• Two primary methods of sampling:
• Attribute sampling
• Generally applied in compliance tests
• Variable sampling
• Generally applied in substantive tests
CISA Training - Chapter 1 - 2016
1.6.14 Using the services of other auditors & experts
• The following should be considered with regards to using the services of other
auditors and experts:
• Restrictions on outsourcing of audit/security services provided by laws and
regulations
• Audit charter
• Impact on overall and specific IS audit objectives
• Impact on IS audit risk and professional liability
• Independence and objectivity of other auditors and experts
• Professional competence
• Scope of work
• Supervisory and audit management controls
• Compliance with applicable laws, regulations and standards
1.6.15 Computer-Assisted AuditTechniques (CAAT)
• An important tool in gathering evidence from different auditing environments
• Enable IS auditors to gather information independently
• Include many types of tool and techniques such as:
• GAS (Generalized audit software)
• Utility software
• Debugging and scanning software
• Test data
• Application software tracing and mapping
1.6.16 Evaluation of Strengths &Weaknesses
• IS auditors should access the strengths and weaknesses of the controls evaluated
• A control matrix is utilized in accessing the level of controls
• One strong control may compensate for a weak control in another area
• A control objective is achieved NORMALLY by multiple controls
1.6.17 Communicating Audit Results
• Exit Interviews
• Executive Summary
• Audit Report
• Visual Presentation
• Before communicating the results to the senior management, the IS auditor should
discuss the findings with the management/staff of the audited entity
• IS auditor should make final decision about what to include/exclude from the audit report
• Usually a balanced report BUT must exercise independence
1.6.18 Management Implementation of
Recommendations
• A follow-up program to determine if findings and corrective actions implemented
• Management to develop firm program for corrective actions
1.6.19 Audit Documentation
1.7 Control Self-Assessment (CSA)
• An assessment of controls made by the staff and management of the unit/units
involved
• A methodology used to review key business objectives, risks involved in achieving
the business objectives and internal controls designed to manage these business
risks
• Ranging from questionnaires to workshops
1.7.1 Objectives of CSA
• Primary objective is to leverage the internal audit function by shifting some of the
control monitoring responsibilities to the functional areas
• NOT intended to replace audit activities BUT to enhance them
1.7.1 Objectives of CSA
1.7.2 Benefits of CSA
1.7.3 Disadvantages of CSA
1.7.4 Auditor role in CSA
• Auditors become internal control professionals and facilitators
• Lead and guide the auditees in assessing their environment by providing insight
about the objectives of controls based on risk assessment
1.7.5Technology Drivers for CSA
• Combination of Hardware and Software to support CSA selection
1.7.6Traditional vs. CSA Approach
1.8The Evolving IS Audit Process
• This includes:
• Integrated auditing
• Continuous auditing
1.8.1 Integrated Auditing
• A process whereby appropriate audit disciplines are combined to
assess key internal controls over an operation, process, or entity
• Focuses on risk
• Aims to understand and identify risks arising from the entity & its
environment, including relevant internal controls
CISA Training - Chapter 1 - 2016
1.8.2 Continuous Auditing
• Continuous Auditing:
• A methodology that enables independent auditors to provide written assurance on a
subject matter using a series of auditors’ reports issued simultaneously with, or a
short period of time after, the occurrence of events underlying the subject matter
• Continuous Monitoring:
• Based on automated procedures to meet fiduciary responsibilities. E.g. real-time AV
or IDS
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
Self-Assessment Questions
1. Which of the following outlines the overall authority to perform an
IS audit?
a) The audit scope, with goals and objectives
b) A request from management to perform the audit
c) The approved audit charter
d) The approved audit schedule
Self-Assessment Questions
2. While developing a risk-based audit program, on which of the
following would the IS auditor MOST likely focus?
a) Business processes
b) Critical IT applications
c) Operational controls
d) Business strategies
Self-Assessment Questions
3. Which of the following is the MOST important reason why an audit
planning process should be reviewed at periodic intervals?
a) To plan for deployment of available audit resources
b) To consider changes to the risk environment
c) To provide inputs for documentation of the audit charter
d) To identify the applicable IS audit standards
Self-Assessment Questions
4. The FIRST step in planning an audit is to:
a) Define audit deliverables
b) Finalize the audit scope and audit objectives
c) Gain an understanding of the business’ objectives
d) Develop the audit approach or audit strategy
Answers
1. (c) The approved audit charter
2. (a) Business Processes
3. (b) To consider changes to the risk environment
4. (c) Gain an understanding of the business’ objectives
CISA Training - Chapter 1 - 2016
1 von 76

Recomendados

CISA Training - Chapter 2 - 2016 von
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016Hafiz Sheikh Adnan Ahmed
6.7K views87 Folien
CISA Training - Chapter 3 - 2016 von
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016Hafiz Sheikh Adnan Ahmed
4.7K views117 Folien
CISA Domain 3 - Information Systems Acquisition, Development and Implementation von
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationInfosecTrain
365 views36 Folien
CISA Training - Chapter 5 - 2016 von
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016Hafiz Sheikh Adnan Ahmed
5.9K views70 Folien
CISA Domain 1 - IS Auditing (day 1) von
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)Cyril Soeri
5.1K views46 Folien
Best Practices in Auditing ISO/IEC 27001 von
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
3.6K views56 Folien

Más contenido relacionado

Was ist angesagt?

Cisa domain 3 von
Cisa domain 3Cisa domain 3
Cisa domain 3ShivamSharma909
528 views36 Folien
Cisa domain 1 von
Cisa domain 1 Cisa domain 1
Cisa domain 1 Ismail aboulezz
2.8K views58 Folien
Introduction to it auditing von
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
364 views19 Folien
IT Audit methodologies von
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
6.6K views65 Folien
CISA Domain 4 Information Systems Operation | Infosectrain von
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainInfosecTrain
341 views34 Folien

Was ist angesagt?(20)

IT Audit methodologies von genetics
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics6.6K views
CISA Domain 4 Information Systems Operation | Infosectrain von InfosecTrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | Infosectrain
InfosecTrain341 views
ISO27001: Implementation & Certification Process Overview von Shankar Subramaniyan
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
Shankar Subramaniyan14.2K views
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS von ShivamSharma909
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
ShivamSharma909524 views
ISO/IEC 27001:2022 – What are the changes? von PECB
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB 5.4K views
Project plan for ISO 27001 von technakama
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
technakama4.5K views
CISA Domain- 1 - InfosecTrain von InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
InfosecTrain443 views
CISA DOMAIN 2 Governance & Management of IT von ShivamSharma909
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
ShivamSharma909777 views
Auditing SOX ITGC Compliance von seanpizzy
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
seanpizzy480 views
ISMS Part I von khushboo
ISMS Part IISMS Part I
ISMS Part I
khushboo2.7K views
NQA ISO 27001 Implementation Guide von NQA
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
NQA 460 views

Similar a CISA Training - Chapter 1 - 2016

COSO Internal Control - Integrated Framework von
COSO Internal Control - Integrated FrameworkCOSO Internal Control - Integrated Framework
COSO Internal Control - Integrated FrameworkAziz Fataliyev, Internal Audit Practitioner
3.3K views36 Folien
Intro to ISO von
Intro to ISOIntro to ISO
Intro to ISOAdrian Hall
2.1K views33 Folien
Module_1_Acctg440.pptx von
Module_1_Acctg440.pptxModule_1_Acctg440.pptx
Module_1_Acctg440.pptxLeahMaeNolasco
1.2K views26 Folien
Internal-Audit-Methodology-VV.pdf von
Internal-Audit-Methodology-VV.pdfInternal-Audit-Methodology-VV.pdf
Internal-Audit-Methodology-VV.pdfrobinverma31
32 views36 Folien
The EISA Audit Presentation von
The EISA Audit  PresentationThe EISA Audit  Presentation
The EISA Audit PresentationSenthil Kumar Manian (Amirtham)
836 views34 Folien
Iso 9001:2015 internal auditor Course von
Iso 9001:2015  internal auditor Course Iso 9001:2015  internal auditor Course
Iso 9001:2015 internal auditor Course Atif Alhaj
3.6K views74 Folien

Similar a CISA Training - Chapter 1 - 2016(20)

Internal-Audit-Methodology-VV.pdf von robinverma31
Internal-Audit-Methodology-VV.pdfInternal-Audit-Methodology-VV.pdf
Internal-Audit-Methodology-VV.pdf
robinverma3132 views
Iso 9001:2015 internal auditor Course von Atif Alhaj
Iso 9001:2015  internal auditor Course Iso 9001:2015  internal auditor Course
Iso 9001:2015 internal auditor Course
Atif Alhaj3.6K views
Iso 9001 internal audit tips von Baptist Molai
Iso 9001 internal audit tipsIso 9001 internal audit tips
Iso 9001 internal audit tips
Baptist Molai562 views
Internal Audit Best Practices for Safety, Environment, and Quality Audits von Nimonik
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Nimonik6.4K views
How to Perform a Successful Internal Quality Audit von Greenlight Guru
How to Perform a Successful Internal Quality AuditHow to Perform a Successful Internal Quality Audit
How to Perform a Successful Internal Quality Audit
Greenlight Guru3.7K views
Internal audit RBIA and Lifecyle approach von subbusai82
Internal audit RBIA and Lifecyle approachInternal audit RBIA and Lifecyle approach
Internal audit RBIA and Lifecyle approach
subbusai82103 views
ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا... von Egyptian Engineers Association
ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...
ISO 45001 018 . 2018 م.71-مبادرة#تواصل_تطوير-د.محمد عبدالمجيد-التعريف بمتطلبا...
ISO 9001: 2015 QUALITY MANAGEMENT SYSTEMS von Subhendu Datta
ISO 9001: 2015 QUALITY MANAGEMENT SYSTEMSISO 9001: 2015 QUALITY MANAGEMENT SYSTEMS
ISO 9001: 2015 QUALITY MANAGEMENT SYSTEMS
Subhendu Datta4.4K views
UNCCInternalControls.pptx von Aral20101
UNCCInternalControls.pptxUNCCInternalControls.pptx
UNCCInternalControls.pptx
Aral201012 views

Último

TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
21 views15 Folien
The Research Portal of Catalonia: Growing more (information) & more (services) von
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
80 views25 Folien
"Running students' code in isolation. The hard way", Yurii Holiuk von
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk Fwdays
17 views34 Folien
virtual reality.pptx von
virtual reality.pptxvirtual reality.pptx
virtual reality.pptxG036GaikwadSnehal
14 views15 Folien
Five Things You SHOULD Know About Postman von
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About PostmanPostman
36 views43 Folien
Serverless computing with Google Cloud (2023-24) von
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)wesley chun
11 views33 Folien

Último(20)

TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab21 views
"Running students' code in isolation. The hard way", Yurii Holiuk von Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays17 views
Five Things You SHOULD Know About Postman von Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman36 views
Serverless computing with Google Cloud (2023-24) von wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
Future of AR - Facebook Presentation von ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56115 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... von Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf von Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Voice Logger - Telephony Integration Solution at Aegis von Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
Piloting & Scaling Successfully With Microsoft Viva von Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva

CISA Training - Chapter 1 - 2016

  • 1. 2016 CISA ® Review Course Hafiz Sheikh Adnan Ahmed – CISA, COBIT 5, ISO 27001 LA [PECB Certified Trainer]
  • 2. Quick Reference Review • IS Auditor Roles and associated Responsibilities • Assurance Assignment vs Consulting Assignment • Internal Audit Environment vs External Context • Minimum audit planning requirements for an IS audit assignment • ISACA Standards and ISACA guidelines for IS auditing • Audit risk vs Business risk • Role of audit evidence • Compliance testing vs Substantive testing
  • 3. 1.2 Management of the IS Audit Function • Ensures that diverse audit tasks fulfill audit function objectives • Preserve audit independence and competence
  • 4. 1.2.1 Organization of the IS Audit Function • IS audit services can be provided externally or internally • IS audit can be part of internal audit, function as independent group, or be integrated with other management audits • Role of IS internal audit function should be established by and audit charter approved by senior management • Clearly state management responsibility • Objectives and delegation of authority • Scope and responsibilities of audit functions
  • 5. 1.2.2 IS Audit Resource Management • IS auditors to maintain their competency and proficiency
  • 6. 1.2.3 Audit Planning Annual Planning: • Both short term and long term planning Audit Universe • Lists all the processes that may be considered for the audit • Subject to risk assessment • Analysis of short and long-term issues should occur at least annually
  • 7. Individual Audit Assignments • Each individual audit must be planned • Must consider system implementation / deadlines; current and future technologies
  • 9. 1.2.4 Effect of laws & Regulations on Audit Planning • Regardless of size and complexity of the business, every organization need to comply with laws and regulations
  • 10. 1.3 ISACA IS Audit & Assurance Standards & Guidelines
  • 11. 1.3.2 ISACA IS Audit & Assurance Standards Framework General 1001 Audit Charter 1002 Organizational Independence 1003 Professional Independence 1004 Reasonable Expectation 1005 Due Professional Care 1006 Proficiency 1007 Assertions 1008 Criteria Performance 1201 Engagement Planning 1202 Risk Assessment in Planning 1203 Performance and Supervision 1204 Materiality 1205 Evidence 1206 Using the Work of Other Experts 1207 Irregularity and Illegal acts Reporting 1401 Reporting 1402 Follow-up activities
  • 12. 1.3.3 ISACA IS Audit and Assurance Guidelines • The objective of the ISACA IS Audit and Assurance Guidelines is to provide further information on how to comply with ISACA IS Audit and Assurance Standards. • The IS auditor should: • Consider them in determining how to implement the above standards • Use professional judgment in applying them to specific audits • Be able to justify any difference
  • 13. 1.3.4 ISACA IS Audit & Assurance Tools &Techniques • Provide information on how to meet the standards when performing IS auditing work, but DO NOT set requirements
  • 14. 1.3.5 Relationship Among Standards, Guidelines, &Tools &Techniques • Standards defined by ISACA are TO BE followed by the IS auditor • Guidelines provide assistance on how the auditor can implement standards in various audit assignments • Tools and techniques provide examples of steps the auditor may follow in specific audit assignments
  • 15. 1.3.6 InformationTechnology Assurance Framework (ITAF) • A comprehensive & good-practice-setting model: • Provides guidance on the design, conduct and reporting of IS audit and assurance assignments • Defines terms and concepts specific to IS assurance • Establishes standards that address IS audit and assurance professional R&R, knowledge and skills, and diligence, conduct and reporting requirements • Includes three categories of standards – General, Performance and Reporting – as well as Guidelines, Tools and Techniques
  • 18. 1.4 Risk Analysis • Part of audit planning, and helps identify risks and vulnerabilities so the IS auditor can determine the controls needed to mitigate those risks • IS auditors must be able to identify and differentiate risk types and the controls used to mitigate risks • Risk = Combination of probability of an event and its consequence
  • 21. 1.5 Internal Controls • Composed of policies, procedures, practices and organizational structures which are implemented to reduce risks • Provide reasonable assurance to management that business objectives be achieved and risk events will be prevented, detected and corrected • Operate at all levels to mitigate its exposures to risks
  • 23. 1.5.1 IS Control Objectives • Control objectives are statements of the desired result or purpose to be achieved by implementing control activities • Provide a complete set of high-level requirements to be considered by management for effective control of each IT process • IS control objectives are: • Statements of the desired result or purpose to be achieved • Comprised of policies, procedures, practices and organizational structures • Designed to provide reasonable assurance that business objectives will be achieved
  • 24. 1.5.2 COBIT 5 • A comprehensive framework that assists in achieving the objectives for the Governance and Management of enterprise IT • Helps enterprises create optimal value from IT by maintaining a balance between realizing benefits and optimizing risk levels and resource use
  • 26. • Governance: • Governance ensures that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-on-enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance against agreed-on direction and objectives • Management: • Management plans, builds, runs and monitors activities in alignment with the direction set by the governance body to achieve the enterprise objectives
  • 27. 1.5.3 General Controls • Controls include policies, procedures, and practices established by management to provide reasonable assurance that specific objectives will be achieved • Internal accounting controls • Operational controls • Administrative controls • Physical and logical security controls
  • 28. 1.5.4 IS Controls • General controls to be translated into IS-specific controls • Access to IT resources, including data and programs • Operations procedures • Systems programming and technical support functions • QA procedures • Physical access controls • BCP/DRP • Database Administration • Networks and communications
  • 29. 1.6 Performing and IS Audit • Plan the audit engagement • Build the audit plan • Execute the plan • Monitor project activity
  • 30. 1.6.1 Classification of Audits Compliance Audits Financial Audits Operational Audits Integrated Audits Administrative Audits IS Audits Specialized Audits Forensic Audits
  • 31. 1.6.2 Audit Programs • A step-by-step set of audit procedures and instructions that should be performed to complete an audit • It is the audit strategy and plan of audit • Based on scope and objective of each assignment • IS auditors evaluate based on Security (C,I,A), Quality (E,E), Fiduciary (C,R), service and capacity
  • 32. 1.6.3 Audit Methodology • A set of documented audit procedures designed to achieve planned audit objectives • Components include: • Statement of Scope • Statement of audit objectives • Statement of audit programs • Set up and approved by audit management
  • 34. 1.6.4 Fraud Detection • IS auditors should be aware of the possibility and means of perpetrating fraud • Should have knowledge and experience of fraud and fraud indicators • Evaluate and communicate to appropriate authorities • In case of major fraud or major high risk, audit management MUST communicate to audit committee
  • 35. 1.6.5 Risk-Based Auditing • Effective risk-based auditing is driven by two processes: • The risk assessment that drives the audit schedule • The risk assessment that minimizes the audit risk during the execution of an audit • This approach is adapted to develop and improve the continuous audit process • Assist IS auditor in deciding to perform compliance testing or substantive testing
  • 37. 1.6.6 Audit Risk and Materiality Audit Risk: • The risk that information may contain a material error that may go undetected during the course of the audit • IS auditor to have sound understanding of these audit risks when planning an audit
  • 39. 1.6.7 Risk Assessment andTreatment • Risk Assessment identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization
  • 40. 1.6.8 Risk AssessmentTechniques • One technique is scoring system based on priority • Other is simple classification. i.e. High, Medium, Low • Another technique is judgmental based on business knowledge, executive management directives, historical perspectives, business goals etc. • A combination of all these is usually used
  • 41. 1.6.9 Audit Objectives • It refers to specific goals that must be accomplished by the audit • Focus on substantiating that internal controls exist to minimize risks and they function as expected • A key element in planning an IS audit is to translate basic audit objective into specific IS audit objectives • Basic purpose of any IS audit is to identify “control objectives” and the related controls that address that objective • “Control objective” refers to how an internal control should function
  • 43. 1.6.10 Compliance vs. SubstantiveTesting • Direct correlation between levels of internal controls and the amount of substantive testing required • If compliance tests reveal the presence of adequate internal controls, minimize the substantive procedures Compliance Testing Substantive Testing Testing an organization’s compliance with control procedures Evaluate the integrity of individual transactions, data or other information Determines if controls are being applied that complies with management policies and procedures Substantiates the integrity of actual processing Provide IS auditors with reasonable assurance that particular control is operating as expected Normally used to test for monetary errors directly affecting financial statement balances Used to test the existence and effectiveness of a defined process
  • 45. 1.6.11 Evidence • Any information used by the IS auditor to determine whether the entity or data being audited follows the established criteria or objectives • May include auditor’s observations, notes taken from the interviews, results of independent confirmations, documentation, results of audit test procedures etc. • The “quality” and “quantity” of evidence must be accessed by the IS auditor • Referred to as “competent (quality)” and “sufficient (quantity)”
  • 46. • Evidence is “competent” when it is both valid and relevant • Techniques for gathering evidence: • Reviewing IS organizational structures • Reviewing IS policies and procedures • Reviewing IS standards • Reviewing IS documentation • Interviewing appropriate personnel • Observing processes and employee performance • Walkthroughs
  • 47. 1.6.12 Interviewing & Observing personnel in performance of their duties • Assists IS auditors in identifying: • Actual functions • Actual processes/procedures • Security awareness • Reporting relationships • Observation drawbacks
  • 48. 1.6.13 Sampling • Used when time and cost preclude a total verification of all transactions or events in a pre-defined population • Two general approaches: • Statistical Sampling • Objective method of determining the sample size and selection criteria • Uses the mathematical laws of probability to: • Calculate the sampling size • Select the sample items • Evaluate the sample results and make the inference • Quantitatively decides how closely the sample should represent the population • Represented as a percentage
  • 49. • Non-statistical Sampling • Uses auditor judgment to determine the method of sampling, the number of items that will be examined from a population and which items to select • Based on subjective judgment • Two primary methods of sampling: • Attribute sampling • Generally applied in compliance tests • Variable sampling • Generally applied in substantive tests
  • 51. 1.6.14 Using the services of other auditors & experts • The following should be considered with regards to using the services of other auditors and experts: • Restrictions on outsourcing of audit/security services provided by laws and regulations • Audit charter • Impact on overall and specific IS audit objectives • Impact on IS audit risk and professional liability • Independence and objectivity of other auditors and experts • Professional competence • Scope of work • Supervisory and audit management controls • Compliance with applicable laws, regulations and standards
  • 52. 1.6.15 Computer-Assisted AuditTechniques (CAAT) • An important tool in gathering evidence from different auditing environments • Enable IS auditors to gather information independently • Include many types of tool and techniques such as: • GAS (Generalized audit software) • Utility software • Debugging and scanning software • Test data • Application software tracing and mapping
  • 53. 1.6.16 Evaluation of Strengths &Weaknesses • IS auditors should access the strengths and weaknesses of the controls evaluated • A control matrix is utilized in accessing the level of controls • One strong control may compensate for a weak control in another area • A control objective is achieved NORMALLY by multiple controls
  • 54. 1.6.17 Communicating Audit Results • Exit Interviews • Executive Summary • Audit Report • Visual Presentation • Before communicating the results to the senior management, the IS auditor should discuss the findings with the management/staff of the audited entity • IS auditor should make final decision about what to include/exclude from the audit report • Usually a balanced report BUT must exercise independence
  • 55. 1.6.18 Management Implementation of Recommendations • A follow-up program to determine if findings and corrective actions implemented • Management to develop firm program for corrective actions
  • 57. 1.7 Control Self-Assessment (CSA) • An assessment of controls made by the staff and management of the unit/units involved • A methodology used to review key business objectives, risks involved in achieving the business objectives and internal controls designed to manage these business risks • Ranging from questionnaires to workshops
  • 58. 1.7.1 Objectives of CSA • Primary objective is to leverage the internal audit function by shifting some of the control monitoring responsibilities to the functional areas • NOT intended to replace audit activities BUT to enhance them
  • 62. 1.7.4 Auditor role in CSA • Auditors become internal control professionals and facilitators • Lead and guide the auditees in assessing their environment by providing insight about the objectives of controls based on risk assessment
  • 63. 1.7.5Technology Drivers for CSA • Combination of Hardware and Software to support CSA selection
  • 65. 1.8The Evolving IS Audit Process • This includes: • Integrated auditing • Continuous auditing
  • 66. 1.8.1 Integrated Auditing • A process whereby appropriate audit disciplines are combined to assess key internal controls over an operation, process, or entity • Focuses on risk • Aims to understand and identify risks arising from the entity & its environment, including relevant internal controls
  • 68. 1.8.2 Continuous Auditing • Continuous Auditing: • A methodology that enables independent auditors to provide written assurance on a subject matter using a series of auditors’ reports issued simultaneously with, or a short period of time after, the occurrence of events underlying the subject matter • Continuous Monitoring: • Based on automated procedures to meet fiduciary responsibilities. E.g. real-time AV or IDS
  • 71. Self-Assessment Questions 1. Which of the following outlines the overall authority to perform an IS audit? a) The audit scope, with goals and objectives b) A request from management to perform the audit c) The approved audit charter d) The approved audit schedule
  • 72. Self-Assessment Questions 2. While developing a risk-based audit program, on which of the following would the IS auditor MOST likely focus? a) Business processes b) Critical IT applications c) Operational controls d) Business strategies
  • 73. Self-Assessment Questions 3. Which of the following is the MOST important reason why an audit planning process should be reviewed at periodic intervals? a) To plan for deployment of available audit resources b) To consider changes to the risk environment c) To provide inputs for documentation of the audit charter d) To identify the applicable IS audit standards
  • 74. Self-Assessment Questions 4. The FIRST step in planning an audit is to: a) Define audit deliverables b) Finalize the audit scope and audit objectives c) Gain an understanding of the business’ objectives d) Develop the audit approach or audit strategy
  • 75. Answers 1. (c) The approved audit charter 2. (a) Business Processes 3. (b) To consider changes to the risk environment 4. (c) Gain an understanding of the business’ objectives