It Audit Guide Part 1
It Audit Guide Part 1
IT Audit Guides
Establishing a Framework for
Executing IT Audits
JOHN KYRIAZOGLOU
IT AUDIT GUIDE
ESTABLISHING A FRAMEWORK
FOR EXECUTING IT AUDITS
2
IT Audit Guide: Establishing a framework for executing IT Audits
1st edition
© 2021 John Kyriazoglou & bookboon.com
ISBN 978-87-403-3876-8
3
IT AUDIT GUIDE Contents
CONTENTS
Dedication 6
Preface 8
1 Introduction to IT Auditing 9
1.1 Information Technology, Communications and Business 9
1.2 Basic management functions 10
1.3 Reasons for auditing companies and IT 11
1.4 What is IT Auditing 12
1.5 IT Controls 13
1.6 Importance of IT controls to the IT auditor 14
2 IT Audit Framework 15
2.1 Definitions 15
2.2 Internal Audit Procedure 16
2.3 International Auditing Standards 16
2.4 IT Auditing Standards 17
2.5 Types of Internal Audit 17
2.6 IT Audit Areas 18
2.7 IT Audit General Approach 19
3 IT Audit Plan 21
3.1 Purpose of the IT Audit Plan 21
3.2 Preparation of the IT Audit Plan 21
3.3 Description of Phases to prepare the IT Audit Plan 21
4 IT Auditing Methodology 29
4.1 Description of the IT Audit Methodology 29
4.2 Phases of the IT Audit Methodology 29
4
IT AUDIT GUIDE Contents
End Notes 57
Bibliography 58
Disclaimer 59
5
IT AUDIT GUIDE Dedication
DEDICATION
This book is dedicated to my closest family members that support me with all their hearts
and souls: Sandy, Miranda, Chris and Dimitri and above all, Melina, our most precious
gem and princess of our life on this planet.
6
IT AUDIT GUIDE Overview and Contents
7
IT AUDIT GUIDE Preface
PREFACE
There are usually four distinct types of assets of value in the 21st century world, we all live in.
Type1. Assets of a physical nature (e.g., machines, equipment, plant, land, buildings,
computer or other hardware, etc.).
Type 2. Assets of a financial nature (e.g., money, funds, financial credits, etc.).
Type 3. Information Technology and Communications (ITC) assets, such as: ITC hardware
(e.g., servers, printers, personal computers, digital media and devices, etc.), and computer
and communications software (e.g., operating systems software, application systems, database
management software, utilities, network software, etc.).
Type 4. Knowledge, ideas and concepts existing in the brains of human beings, working in
the universities, laboratories, corporations and society at large.
The most critical assets, in terms of value, for organizations, enterprises, corporations,
companies (large, medium small, etc.), for society and the economy (local, global) in general,
in the 21st Century, are deemed to be not physical or financial or ITC related assets but
knowledge, ideas and concepts.
This body of knowledge, ideas and concepts, when collected in a timely and accurate way,
organized appropriately, managed and distributed effectively by Information Technology
(IT) systems and communications networks (ITC systems) can provide added value and
benefits to all stakeholders in a socio-economic milieu.
The implementation of ITC systems, as industrial, corporate and public experience has
shown, can result in misappropriation of resources (funds, personnel, etc.) and operational
disasters, if they are not properly managed and controlled. The complete or partial lack of
this function (i.e., control) is, therefore, the basic reason for the large and costly failures of
implementations of ITC systems (and projects) in a variety of public and corporate settings.
It also provides the rationale for writing these 5 books on IT Auditing.
8
IT AUDIT GUIDE Introduction to IT Auditing
1 INTRODUCTION TO IT AUDITING
Overview: This chapter describes the key role of information in the operation of businesses
as well as the causes, risks, objectives and benefits of implementing IT auditing and related
control procedures.
These are available to all, and within companies and organizations, with all the necessary
complementary information and details for the operation of the specific business entity
(private company, public organization, etc.), immediately, with validity and with relative
security (usually).
This technology and its consequent Information Systems have immediate results:
1. the sharing and distribution of faster and more efficient information, and
2. the governing of modern businesses and all their activities in a more
competitive, more productive and better quality and service-oriented way to
their customers and the wider society as a whole.
Given the rapid growth of information and computing technology, a rate unknown in human
history, is now even easier for businesses and organizations to transfer (almost) all their
business transactions and operations2 to be performed by integrated information systems.
These systems are like pharmaceutical drugs (medicines). They strengthen the specific
organization (or business) and make it easier for it to cure or solve a specific problem or
functional failure.
Based on this example (i.e., drugs), if these systems are not used with discipline, they can
create chaotic situations and often not the expected results. They may even have a consequence
a partial or total destruction.
9
IT AUDIT GUIDE Introduction to IT Auditing
These integrated information systems must therefore operate within a business environment
governed by rules, policies and procedures and a risk management system. Together, these
form the framework of corporate governance, which, in the case of information systems, is
complemented by an IT governance framework.
Also, information is and is considered as the modern and strategic weapon of every
organization, and it is now a strategic asset of the organization.
The cost of collecting, processing and disseminating information through information systems
requires enormous amounts of money, resources and effort.
1. Planning: Studying future issues and designing goals and how they will be
accomplished.
2. Organizing: Designing the structure for the use of human and other resources
to achieve the business goals.
3. Staffing: Coordinating all activities and confirming that all means and resources
will be available to achieve the objectives.
4. Directing: Articulating a vision, energizing employees, inspiring and motivating
people using vision, influence, persuasion, and effective communication skills.
5. Controlling: Confirming that all actions and activities are carried out in
accordance with the approved plans and objectives.
The last function, control, is not achieved completely or at all, and is one of the main
causes of IT project implementation failures4.
Therefore, for the optimal protection, reliability and use of these critical entities (information
systems), the full operation of an effective IT Auditing system and well-proven techniques
and methods are required. This IT Auditing system will improve both the operation of the
entire IT framework and the relevant systems for the modern company and organization.
10
IT AUDIT GUIDE Introduction to IT Auditing
For successful accomplishment of these objectives the following usual risks (Corporate and
IT) must be assessed and mitigated effectively.
IT risks (example)
1. Computer fraud,
2. Theft of electronic information and data,
3. Theft of ‘physical’ information, media, equipment, software, etc.,
4. Non-compliance with the provisions of the privacy framework (GDPR),
5. Damage to equipment, peripherals, software, data, technical files (audit trail,
logging), electronic data transfer, etc.,
6. Interference in telecommunications and unauthorized access (interception of
communications, user illegal access, legal user but illegal transaction, etc.),
7. Illegal recording of electromagnetic signals,
11
IT AUDIT GUIDE Introduction to IT Auditing
Description
IT Auditing is the process of deriving best assurance on whether the design, development,
implementation, operation and maintenance of IT systems meets business goals, safeguards
information assets and maintains data integrity, among other things. In other words, IT
Auditing is a review and examination of the implementation of IT systems and IT controls
to ensure that the systems meet the organization’s business requirements, needs and objectives,
without compromising security, privacy, cost, and other critical business issues and factors.
IT Audit Objectives
The objective of IT Audits is to ensure that the IT resources allow corporate goals and
objectives to be achieved effectively and use resources efficiently. IT audits may cover IT
Security, System Development, Business Continuity and IT Disaster Recovery, etc. See
Appendix 2 for more details.
Scope of IT Auditing
The internal audit function of the company or an external entity may perform IT audits in
conjunction with a financial statements audit, a review of internal controls, or other audit
(e.g., GDPR compliance audit).
12
IT AUDIT GUIDE Introduction to IT Auditing
Irrespective of the type of audit, the IT auditor would be required to assess the policies
and procedures that guide the overall IT environment of the audited entity, ensuring that
the corresponding controls and enforcement mechanisms are in place.
The scoping of the IT Audit would involve deciding the extent of audit scrutiny, the coverage
of IT systems and their functionalities, IT processes to be audited, locations of IT systems
to be covered, and the time period to be covered, etc.
1.5 IT CONTROLS
A control is the combination of mechanisms6, methods, rules, policies, and procedures
that ensure protection of the company’s assets, accuracy and reliability of its records, and
operational adherence to management standards.
In an IT context, controls are divided into two categories: IT general controls and application
controls.
The IT General Controls are the foundation of the IT Control structure. These are
concerned with the general environment in which the IT systems are developed, operated,
managed, maintained and monitored. General IT controls establish a framework of overall
control for the IT activities and operations and provide assurance that the overall control
objectives are satisfied.
IT General controls are implemented using a number of tools such as policies, procedures,
agreements, guidelines, and practices as well as putting in place an appropriate management
structure, including that for management of the company’s IT systems.
Application Controls are specific controls unique to each computerized application (e.g.,
payroll processing, accounting system, warehouse inventory control, etc.) used by the
specific company. Application controls include data input validation, encryption of data to
be transmitted, processing controls, output controls, etc.
For example, in an online payment application, one input control could be that the employees’
personal data are encrypted, another control could be that the employee’s birth date should
not be greater than today’s date, etc.
13
IT AUDIT GUIDE Introduction to IT Auditing
For more details, see book ‘IT Governance Controls’ (second in this book series).
As more and more companies and public organizations rely on IT to automate their
operations, the line dividing the role of an IT and a non-IT auditor is also fast reducing. As
a minimum, all auditors are required to understand the control environment of the audited
entity so as to deliver assurance on internal controls operating in an entity.
Every control area is based on a set of control objectives that a company or organization
puts in place in order to mitigate a control risk.
The role of the auditor is to understand the potential business and IT risks facing the
specific company (audited entity), and in turn to assess whether the deployed controls are
adequate to meet the control objective.
In the case of IT general controls, it is important for the auditor to understand the broad
categories and extent of general controls in operation, evaluate the management oversight
and staff awareness in the organization for the same, and find out how effective the controls
are in order to deliver assurance.
Even in SMEs, where information systems and business processes relevant to financial
reporting are less sophisticated, their role is significant.
If general controls are weak, they severely diminish the reliability of controls associated with
individual IT applications, and vice versa.
In subsequent chapters and in the other 4 books of this series, some of the key areas of IT
General Controls and Applications Controls as well as other critical aspects of IT Auditing
(e.g., IT Auditing Organization, IT Audit Manual, etc.) are discussed in more detail.
Suggested audit matrices for each of the control areas are provided in the Appendices.
14
IT AUDIT GUIDE IT Audit Framework
2 IT AUDIT FRAMEWORK
Overview: This chapter describes the frameworks of internal and IT auditing, the types of
IT auditing and an IT Audit Approach.
2.1 DEFINITIONS
In general, an audit is an independent review and investigation of an existing system, activity,
report, or entity. It may be conducted by either an internal or external party, depending
on the situation. There are many types of audits that can be conducted, as noted below.
For more terms see Appendix 9.
Download now
15
IT AUDIT GUIDE IT Audit Framework
While internal audits focus on business practices and risks, external audits focus on
determining the accuracy and thoroughness of an organization’s financial records and issuing
an opinion.
Step 1. Discuss with the management of the corporate function that will be audited about
the objectives of the audit, the schedule, the form and the distribution of the audit report.
Step 2. Execute the audit program and assess the soundness of internal controls and business
systems and operations.
Step 3. Perform tests of internal measures and controls to ensure their proper operation.
Step 4. Discuss with the management of the audited function the findings of the audit and
the recommendations of the internal audit team.
Step 5. Review the audit report with the management of the audited function and their
responses, if any, prior to the release of the final audit report.
Step 6. Review the critical issues raised in the audit reports to see if they have been
successfully resolved, after a specific period of time.
16
IT AUDIT GUIDE IT Audit Framework
The International Standards on Auditing are issued by the International Auditing and
Assurance Standards Board (IASB) and are primarily intended to achieve the uniform
performance of all audit work internationally.
This is based on the following five key principles for governance and management of
enterprise IT: Meeting Stakeholder Needs; Covering the Enterprise End-to- End; Applying
a Single, Integrated Framework; Enabling a Holistic Approach; and Separating Governance
from Management.
Type 1. Financial Audit. The purpose of this audit is to determine the extent to which
the correct presentation, accuracy and reliability of the financial statements are ensured.
Type 2. Production Audit. The purpose of this audit is to determine whether and to what
extent the manufacturing procedures are followed throughout the production phase, the
quantities produced are in accordance with the production program approved by management,
the mechanical equipment is used correctly, the product specifications are observed and the
staff are trained, etc.
Type 3. Management Audit. The purpose of this audit is to determine the extent to which
the corporate departments are properly managed. The effectiveness of the design and the
strategy of the company in terms of achieving the objectives, the management of human
resources and in general all its activities related to the issues of management are examined
and evaluated.
17
IT AUDIT GUIDE IT Audit Framework
Type 4. IT Audit. The purpose of this audit is to determine the extent to which the
reliability, confidentiality and integrity of the available information is ensured, the information
systems are effective, the IT and other resources are properly used, the IT infrastructure and
information systems are secure, and the transactions and data processed and maintained are
accurate, complete and current. More details, later.
Type 5. Data Protection Audit. The purpose of this audit is to ensure the protection of the
privacy of personal data collected, processed and maintained by companies and organizations
according to the requirements of the privacy regime under which the particular company
operates (e.g., GDPR for companies doing business in the E U). For more details, see my
books in the Bibliography.
These relate to auditing various issues in the category of IT General Controls as well in the
category of Application Controls for a specific application (e.g., payroll processing).
For example, in the category of IT General Controls, an IT Audit assignment will include
a review and assessment of the General IT Controls that govern the IT management issues
of a company, such as:
For an example of IT Audit Areas and issues to be audited in each area, see: Appendix 2.
Examples of the controls related to managing the above IT issues are outlined in book 2
of this series.
18
IT AUDIT GUIDE IT Audit Framework
Component 1: Internal Audit Plan. The Internal Audit Plan sets the corporate framework
for guiding IT Audits. See example in Appendix 4.
Component 2: IT Audit Plan. The IT Audit Plan sets the pace and drives the execution
of all IT Audits. See example in Appendix 6.
Component 4: Auditing around/through the computer. This entails: (a) Auditing around
the computer, and (b) Auditing through the computer.
4.1. Auditing around the computer. Without knowing any aspects of the computer
technology, the IT auditor develops the procedures to review input documents and output
reports only. It involves picking source documents at random and verifying the corresponding
outputs with the inputs. For example, the accounting system’s reports that cash book balance
reconciles with bank balance as per bank statement. The IT auditor may conduct his (or
her) own reconciliation to confirm whether it is true.
4.2. Auditing through the computer. When auditing through the computer, IT auditors
follow the audit trail through the internal computer operations in order to verify that the
processing controls that are incorporated in the application programs are functioning properly.
The IT auditor assumes that the main computer system (CPU, additional hardware, etc.)
is functioning properly. The techniques used in auditing through the computer include;
developing and using a set of ‘test data and transactions’ to run through the specific
application system audited and testing the results, using an integrated test facility, Parallel
Simulation and CAATs, auditing application and system logs, trying various passwords to
test password strength, using embedded audit modules to achieve continuous auditing, etc.
Component 5: IT Audit Execution and Support Tools. The IT Audit Execution and
Support Tools include audit programs, checklists, questionnaires and software to perform the
audit actions in the selected area (e.g., IT Security) or system (e.g., Payroll) to be audited.
See examples in Books 3, 4 and 5.
19
IT AUDIT GUIDE IT Audit Framework
Component 6: IT Audit Report. The IT Audit Report documents the audit findings and
recommendations and is submitted to management for further action. See example in Book 2.
The audit work (review and assessment, etc.) will be carried out by IT Auditors on the
basis of this IT Audit Approach and its components (methodology, specific audit programs
and audit questionnaires, etc.) as detailed in the following chapters of this books and the
other books in this series.
20
IT AUDIT GUIDE IT Audit Plan
3 IT AUDIT PLAN
Overview: This chapter describes the steps required to develop an IT Audit Plan (the second
component of the IT Audit Approach) and presents an example of such a plan.
a. The scope and the areas of the specific IT audits carried out during a year or
other predetermined period, and
b. The context and other conditions and participants involved.
21
IT AUDIT GUIDE IT Audit Plan
This can be done by identifying the risks found in the technologies used and how each risk
might prevent the organization from achieving a business objective. Doing so will result in
more meaningful and useful assessments for management.
Auditors can use different internal resources to identify and understand the organization’s
goals and objectives, including:
22
IT AUDIT GUIDE IT Audit Plan
1. Management’s vision and goals for the company’s IT systems vis-à-vis the
services IT offers to the end users;
2. Management’s strategic goals and their correspondence to deployed IT systems,
processes and personnel;
3. Company’s IT application systems, strategy, policies, standards and procedures
as they are currently designed and implemented; and
4. Management’s view on inherent corporate strategic risks, including their views
on respective significance and potentiality of existence for the IT area.
As an indication, some of the information which will be collected are the following:
Products of Phase A
The products of Phase A include the working notes of the IT auditors and the minutes of the
various meetings carried out on discussing and reviewing above IT issues with management
and stakeholders. Management as well as key end-users will also have a general idea of what
entails an IT audit.
23
IT AUDIT GUIDE IT Audit Plan
Defining the IT audit universe and the areas to audit, in a particular year, may be done
independently from the risk assessment process. Defining the IT audit universe requires
in-depth knowledge of the organization’s objectives, business model, and the IT service
support model.
For an example of an IT audit universe and the areas and issues that comprise it, see: ‘Appendix
2: IT Audit Areas’.
This approach enables and facilitates the quicker, more objective and more efficient assessment
and classification of identified inherent risks facing the company’s IT systems according to
their relative significance for the organization.
24
IT AUDIT GUIDE IT Audit Plan
1. Select IT areas to be audited (see Appendix 2 for a full list) on the basis of an
IT Audit Preparation Questionnaire (see Appendix 5), and
2. Define IT audit project scope and objectives.
Products of Phase B
The products of Phase B include the working notes of the IT auditors, a risk assessment
report of the identified risks to the IT audit and a set of IT audit areas to be included in
the IT Audit Plan. Management as well as key end-users will also have a better idea of what
entails a very specific IT audit for their systems.
25
IT AUDIT GUIDE IT Audit Plan
The multiyear plan, usually specifies what audits (e.g., IT Security, Application 1, Application
2, etc.) will be performed and when, ensure adequate audit coverage is provided over
this period of time, and identify audits that may require specialized external resources or
additional internal resources, etc.
The best approach is to create a one-year IT audit plan, as a derivative of the multiyear
plan that outlines planned IT audit activities for the upcoming year.
1. The availability of IT auditors and other resources (IT, legal for auditing
outsourcing contracts, end-users for business systems audited, external technical
consultants for security penetration testing, etc.),
2. The skills and dexterities required for IT auditors, and whether some specific
training must be carried out for a new topic (e.g., auditing cloud operations, etc.),
3. Whether new audit tools need to be installed (e.g., CATTs, etc.). and
4. Whether IT audits need to synchronized with external audits.
26
IT AUDIT GUIDE IT Audit Plan
Step 5. Integrate the IT Audit Plan with the Internal Audit Plan
One key aspect of the planning process is to determine the integration level of the IT audit
plan with non-IT audit activities in the Internal Audit Department.
Should the IT audit plan be executed on a stand-alone basis or will IT audit subjects be
integrated with other business areas (e.g., auditing financial systems the same time)?
Answers to these questions should be based on the internal audit department’s function as
well as its mandate, strategy, staff, size, geographical distribution, and audit management
approach.
In any case, IT audits should be integrated well into the overall Internal Audit Plan, regardless
of how they will be carried out.
Often, as consulting practice has shown, and depending on each unique case, IT audit
activities are planned and executed under the responsibility of a multidisciplinary team that
has a balanced skill set, including IT audit expertise. IT staff participation, legal support, etc.
27
IT AUDIT GUIDE IT Audit Plan
Product of Phase C
The product of Phase C includes issuing and distributing the final, formal IT Audit Plan
(the second component of the IT Audit Approach), as per example in Appendix 6.
Conclusion
The IT Audit Plan and the audit work (review and assessment, etc.) will be carried out on
the basis of the IT Audit Methodology, specific audit programs and audit questionnaires,
as detailed in the following chapters of this books and the other books in this series.
Download now
28
IT AUDIT GUIDE IT Auditing Methodology
4 IT AUDITING METHODOLOGY
Overview: This chapter describes the 4 phases and 22 steps of the proposed IT Auditing
Methodology (the third component of the IT Audit Approach).
An example follows:
Audit Objective # 1: Evaluate the physical security and environmental aspects of the facilities
(physical, technical, etc.) that house the main data center.
The end result of this step is to design and define the objectives of this audit.
29
IT AUDIT GUIDE IT Auditing Methodology
IT Auditors must behave in a professional manner and ensure that the auditees behave in
a professional manner towards them, as well.
The end result of this step is the agreement with the management of the audited function
for the audit and the creation of the technical test information environment that will be
used for the tests by the auditors in the next phase.
The end result of this step is the review, analysis and understanding of IT risks (IT risk
assessment) to perform this particular IT audit.
30
IT AUDIT GUIDE IT Auditing Methodology
For example, the audit issues or points for the IT Audit Area ‘IT SECURITY’, includes
the following:
The end result of this step is to compile a list of audit issues (or control points) for the
IT Audit Area to be audited.
The end result of this step is the preparation of an audit sample for the audit area to be
audited.
31
IT AUDIT GUIDE IT Auditing Methodology
Only in this way IT Auditing can become an objective process in which standards are
compared to what is being done or has been done.
Based on all the above, the audit programs of the specific audit are created (see examples
of IT audit programs and IT audit questionnaires in Books 4 and 5).
The final result of this step is the preparation of an audit program and audit questionnaires
for the IT audit area to be audited.
1. Audit tests include: Compliance tests; Weakness tests; and Substantive tests.
2. Testing techniques include: Interviews; Questionnaires; Numerical operations on
transactions; Walkthroughs; Flow charts; Data capture and analysis; Confirmation
of movements / documents (vouching); Observation; Sampling checks (spot
cheeks); Analytical review; and Use of special software (audit software).
3. IT prepares and creates the computerized test environment for carrying out
tests by IT Auditors.
The end result of this step is the selection of audit test types and techniques for the IT
audit area to be tested and a unique computerized test environment for IT Auditors.
32
IT AUDIT GUIDE IT Auditing Methodology
Set 1. Weakness testing. IT Auditors may, in many cases, conduct a preliminary assessment
of IT Controls in the system or the area under audit to derive an understanding of assurance
that existing IT controls (General IT Controls and Application Controls) are reliable and
operate under a suitable IT Governance framework. The assessment of controls at this level
would include assessment of effective and suitable: IT Governance mechanisms; Development
of application systems; Procuring of IT solutions; Operation of computerized application
systems; Information Security; Business Continuity and IT Disaster Recovery, etc.
Examples of weakness tests are: Lack of physical and logical security; Inadequate
documentation / records; Inexistent security policy; Ineffective or informal password policy
and controls; Lack of proper oversight for making application changes, etc.
Set 2. Compliance testing. A detailed examination and evaluation of controls is carried out,
through the review of IT policies, procedures and systems documentation. The IT auditor
performs test in order to verify that the IT control policies, practices and procedures set by
IT management work as planned. The auditor also examines documents such as descriptions,
diagrams, and source program code. In the case of desk checking, the auditor processes false
or true data through the logic of the program.
Set 3. Substantive testing. In substantive testing, the IT auditor gathers evidence to evaluate
the integrity of data, transactions or other controls. Substantive testing checks the integrity
of contents.
33
IT AUDIT GUIDE IT Auditing Methodology
1. Set up a test data base with fictious test data and test an application system
(e.g., payroll processing) or the encryption process and results of the personal
data stored.
2. Use of the actual production environment with fictitious (test) transactions.
3. Integrate special code specified by IT Auditors (Embedded Audit Routines) in the
production programs and recording of the processing in special files (audit files).
4. Use of special software (Audit Software) that collects the movements, examines
the results in the production files, and analyzes the possible wrong processing
or events.
5. Test the backup policy and procedures to ensure that all applications and
software are recovered as per policy.
All tests, findings, results, etc., shall be documented in the audit working notes and related forms.
The final result of this step is the examination of the audit tests conducted and results for
the IT audit area tested.
The end result of this step is the evaluation and documentation of the findings for the IT
Audit area that has been tested.
34
IT AUDIT GUIDE IT Auditing Methodology
Step 2. Overview of the initial ‘draft’ IT audit report with the auditees
The initial ‘draft’ IT audit report is reviewed with all those directly audited and their
comments and observations are recorded.
35
IT AUDIT GUIDE IT Auditing Methodology
This includes the initial findings of the audit, with all relevant comments and observations
collected from those directly audited and the management of the audited entity, and a set
of IT Audit recommendations to improve the errors, gaps and omissions found in the area
audited by the IT Auditors.
This final version is transmitted to all the competent and approved levels of management
of the audited unit as well as to senior management levels (e.g., CEO, audit committee,
chairman, managing director, etc.).
36
IT AUDIT GUIDE Appendix 1. Corporate and IT Documentation
APPENDIX 1. CORPORATE
AND IT DOCUMENTATION
37
IT AUDIT GUIDE Appendix 1. Corporate and IT Documentation
38
IT AUDIT GUIDE Appendix 2. IT Audit Areas
For more examples of Audit Issues, see: ‘IT Governance Audit Program’, ‘IT Administration Audit
Program’, ‘IT Personnel Management Audit Program’ and ‘IT Procurement Audit Program’, in
Book 4 of this series.
Area 2. IT STRATEGY
Issues: Strategy Process; Strategic Management; Electronic Data Interchange Strategy, etc.
For more examples of Audit Issues, see: ‘IT Strategy Audit Program’ in Book 4 of this series.
For more examples of Audit Issues, see: ‘Systems Development, Acquisition and Implementation
Audit Program’ in in Book 4 of this series.
Area 4. IT SECURITY
Issues: Management of Information Security; Information Security Policy; Hardware Security;
Physical Access Security; Personnel Security; Operating System, Network, Data Base
Management and Application Systems Security, etc.
For more examples of Audit Issues, see: ‘IT Security Audit Program’ in in Book 4 of this series.
39
IT AUDIT GUIDE Appendix 2. IT Audit Areas
For more examples of Audit Issues, see: ‘IT Compliance Audit Program’ in in Book 4 of this series.
For more examples of Audit Issues, see: ‘Data Center Operations Audit Program’ and ‘Outsourcing
and Cloud Operations Audit Program’ in in Book 4 of this series.
For more examples of Audit Issues, see: ‘Systems Software Audit Program’ in in Book 4 of this series.
For more examples of Audit Issues, see: ‘Systems Software Audit Program’ in in Book 4 of this series.
For more examples of Audit Issues, see: ‘Applications and End-Users Audit Program’ in in Book
4 of this series.
40
IT AUDIT GUIDE Appendix 2. IT Audit Areas
For more examples of Audit Issues, see: ‘Applications and End-Users Audit Program’ in in Book
4 of this series.
For more examples of Audit Issues, see: ‘Systems Software Audit Program’ in in Book 4 of this series.
For more examples of Audit Issues, see: ‘Applications and End-Users Audit Program’ in in Book
4 of this series.
41
APPENDIX 3. DOCUMENTATION TO
IT AUDIT GUIDE UNDERSTAND AN IT SYSTEM
APPENDIX 3. DOCUMENTATION
TO UNDERSTAND AN IT SYSTEM
Introduction: In order to execute an IT audit in a particular IT application system or the
IT function and its general controls, it is good practice to collect and review the following
documentation, in addition to the documentation included in Appendix 1.
List of documents
1. Brief background of the IT unit.
2. IT organization chart.
3. IT department’s job descriptions.
4. IT department’s responsibilities with reference to the specific applications.
5. IT personnel policy.List of IT applications and their details.
6. Network and application architecture, including client server architecture
7. IT budget.
8. IT asset inventory.
9. IT Project management reports.
10. Details of major server hardware and personal computers.
11. Details of software (including whether developed in-house, cloud operations,
etc.).
12. Database details.
13. Data Flow Diagrams.
14. Data Dictionary.
15. Details of interfaces with other systems.
16. Systems manual, User manuals and Operations manual.
17. List of users with permissions.
18. List of major vendors.
19. Regulations and laws that affect the organization (for example: GDPR, etc.)
42
IT AUDIT GUIDE Appendix 4. Internal Audit Plan
Strategic objective # 1. To increase the added value in the structures, systems and processes
of the company in order to improve its operational efficiency and effectiveness.
Strategic objective # 2. To strengthen the risk assessment and annual planning process
focusing on existing and emerging high-risk areas, such as strategic issues, information
technology and research of new services and products, and business risks in new markets.
Strategic objective # 3. To improve the alignment of audit work plans and other oversight
activities with the business objectives and plans of the company.
The effectiveness of Internal Audit in delivering the strategy through the annual audit plan
will be monitored by the Audit Committee. This Committee will receive reports from the
Manager of Internal Audit detailing key issues and the status of significant audit findings
and recommendations. The percentage of audit recommendations implemented by each
corporate function will be reviewed by the Audit Committee.
43
IT AUDIT GUIDE Appendix 4. Internal Audit Plan
3. Key Risks
The following key risks identified by the company and listed in the risk register are addressed
by the internal audit plan. These are:
No Assurance: Controls are very weak or non-existent, leaving the system open to significant
errors, abuse, and fraud, etc.
Limited Assurance: Some controls operate effectively. There are also several critical controls
that may put the company at risk.
Satisfactory Assurance: Most controls operate effectively. There are, however, a small number
of controls which are not very effective.
Substantial Assurance: There is a sound system of control designed to achieve the business
objectives. No errors or weaknesses were found.
44
IT AUDIT GUIDE Appendix 4. Internal Audit Plan
45
IT AUDIT GUIDE Appendix 5. IT Audit Preparation Questionnaire
APPENDIX 5. IT AUDIT
PREPARATION QUESTIONNAIRE
1. Staff Changes
Q1. Were there any changes in critical staff (redundancies, recruitment, transfers, etc.) that
have significantly affected the operation of the unit you manage or service you offer?
2. Internal Environment
Q2. Were there significant changes in business policies and procedures that significantly
affected the operation of the department you run?
Q3. Have there been any breakdowns, damage, security incidents, fraud, theft, destruction,
malfunctions, etc., in the facilities, IT equipment, systems, and infrastructure you use in
the last 2 years that have significantly affected the operation of the department you run or
service you offer?
3. External environment
Q4. Have there been urgent and significant changes in the compliance rules imposed by
external entities in the last 2 years, which have significantly and substantially affected the
operation of the unit or service you manage?
Q5. Have there been urgent and significant changes imposed by external auditors in the
last 2 years, which have significantly and substantially affected the operation of the unit or
service you manage?
Q6. What and how critical are the reports of your unit or service submitted to external
audit or other regulatory and governmental entities?
46
IT AUDIT GUIDE Appendix 5. IT Audit Preparation Questionnaire
4. IT Environment
Q7. Has there been any damage, damage, security incidents, fraud, theft, disaster, malfunction,
etc., to the information and IT systems you use in the last 2 years, which have significantly
affected the operation of the unit or service you run?
Q8. How critical are the computer systems you use in the last 2 years, how much have
they significantly affected the operation of the unit or service you run?
Q9.2. Audit of IT Security, etc.? (please add your thoughts and ideas).
Q10. What changes and improvements should or are expected to be made to the computer
systems you use?
47
IT AUDIT GUIDE Appendix 6. IT Audit Plan
A2. Audit Purpose: A description of the audit purpose that has been pre-agreed with the audit
committee or other senior management body of the company. For example: ‘Examination
of the operation of the General IT controls of company ‘ABCDX SA’).
A4. Prior Audit Details: A description of the findings, results and proposals of the previous
IT audit and what has been improved from the proposals made.
A5. Details of Stakeholders: List of all the details of the company’s executives or external
collaborators that the auditors will contact, such as: Name, Service, Telephones, Postal
Address, Email Address, etc.
A6. Responsibilities of Staff: Definition of the responsibilities of auditors and those involved
in this audit.
48
IT AUDIT GUIDE Appendix 6. IT Audit Plan
C2. IT Audit Programs: A brief description of the techniques, methods, audit programs
and audit questionnaires to be used.
C3. IT Audit Schedule: A detailed report of the specific IT audit schedule (time period,
duration, etc.).
C4. IT Test Products: A summary of the products of the specific IT test, such as the IT
audit report, test results, etc.
D2. Operating Conditions: A brief description of the operating conditions and risks of
the business unit that govern the conduct of the specific IT audit.
D4. Audit Cancellation: A brief description of the possible causes and conditions for
auditing cancellation.
D5. Denial of Agreement: Indication of the procedure and mechanism for resolving disputes
between auditors and auditees regarding the findings, results and proposals of the IT audit.
49
IT AUDIT GUIDE Appendix 6. IT Audit Plan
1. IT Applications
The company (‘XYZ Corporation’) stores the data it processes by the use of the following
IT Systems:
1. E-Mail server,
2. Personnel Management System,
3. Crew Management System,
4. Vendor Management System,
5. Customer Management System,
6. Financial Management System and
7. Fleet Management System.
2. Web site
The basic site of the Company (www.company.com) is supported by an external partner.
3. Service Providers
The following external entities process personal data on behalf of the company: ‘ABC’
External Payroll Services Company, ‘AXX’ Insurance Services Company, Manning Agencies,
Travel Agents, Local Agents, Port Agents, etc.
50
IT AUDIT GUIDE Appendix 7. Audit Sampling Methods
APPENDIX 7. AUDIT
SAMPLING METHODS
If the number 7 is randomly selected from the top ten in the list, the sample will continue
based on the list by selecting the 7th item from each group of ten items.
1. The first step is to divide the population into subgroups (layers) based on
mutually exclusive criteria.
2. Random or systematic samples are then taken from each subgroup. The
sampling fraction for each subgroup can be taken in the same proportion as the
subgroup of the population.
3. For example, if 40 samples are to be selected, and 10% of the clients
are managers, 60% are users, 25% are operators and 5% are database
administrators, then 4 executives, 24 users, 10 operators and 2 database
administrators will be selected at random.
51
IT AUDIT GUIDE Appendix 7. Audit Sampling Methods
5. Judgmental Sampling
In critical sampling, the person making the sample uses his or her knowledge or experience
to select the items to be sampled. For example, the IT Auditor may choose to test the most
complex or critical functions, or most commonly used parts of the software.
52
IT AUDIT GUIDE Appendix 8. IT Audit Findings Assessment Criteria
AC2. Compliance with policies, standard operating procedures, and other requirements
(i.e., legal, regulatory, accounting, contractual).
AC3. Quality of the data and information provided by management and related IT systems.
High risk indicates: There are weaknesses in the IT Controls process that present significant
risk exposure to the IT system, area, project or unit under review. The significance of these
weaknesses makes it imperative to correct them, as soon as possible (1 to 2 months). Senior
management attention is required.
Medium risk indicates: There are weaknesses in the IT Controls process that present
moderate risk exposure to the IT system, area, project or unit under review. The significance
of these weaknesses makes it important to correct them. Senior management attention is
recommended, and operating management action is required.
53
IT AUDIT GUIDE Appendix 8. IT Audit Findings Assessment Criteria
Low risk indicates: There are weaknesses in the process that present minor risk exposure to
the IT system, area, project or unit under review. It is a good idea to correct these weaknesses
in the 6 to 12 months. Operating management attention is required.
Follow-up actions in the Internal Audit Follow-up Plan are not required.
54
IT AUDIT GUIDE Appendix 9. IT Audit Glossary
Auditing: Auditing is the process of information gathering, review and analysis of assets,
activities, transactions, policies, procedures, systems, reports, files, books, records, data,
information, action plans, legal contracts, other documents, etc., to ensure such things as
policy and procedural compliance, safety and security from vulnerabilities, avoidance and
prevention of fraud, mismanagement, and errors.
Business process: A set of connected business activities that are linked with each other for
the purpose of achieving a business objective.
Compliance: Conformity and adherence to applicable laws and regulations, which also includes
conformity and adherence to policies, plans, procedures, contracts, or other requirements.
Control environment: Board and management attitudes and actions regarding the significance
of organization-wide controls. The control environment provides the structure for the
achievement of the internal control system’s primary objectives.
Database systems: A system of programs that enable data storage, modification, and extraction.
Networks: Physical devices, such as switches, routers, firewalls, wiring, and programs, which
control the routing of data packets to link computers and enable them to communicate
with each other.
Operating systems: Software that performs a computer’s basic tasks, such as handling
operator input, managing internal computer memory, and providing disk drive, display
and peripheral device functions.
55
IT AUDIT GUIDE Appendix 9. IT Audit Glossary
Procedure: A continuous and regular action or succession of actions, taking place or being
carried out in a definite manner, and leading to the accomplishment of some results.
Risk: The possibility of an event occurring that will have an impact on the achievement of
objectives. Risk is measured in terms of impact and likelihood.
Risk assessment: A methodology for determining the likelihood of an event that could
hinder the organization from attaining its business goals and objectives in an effective,
efficient, and controlled manner.
Risk management: The management process used to understand and deal with uncertainties
that could affect the organization’s ability to achieve its objectives.
System of internal controls: A system comprising the five components of internal control —
the control environment, risk assessment, control activities, information and communication,
and monitoring — to ensure risk is managed.
https://www.researchgate.net/publication/354248857_IT_GLOSSARY
56
IT AUDIT GUIDE End Notes
END NOTES
https://networkencyclopedia.com/backbone-in-networking/
https://www.networkworld.com/article/3532318/what-is-the-internet-backbone-and-how-
it-works.html
Note 2. Business operations refer to activities (accounting, marketing, manufacturing, etc.) that
businesses engage in on a daily basis to increase the value of the enterprise and earn a profit.
https://corporatefinanceinstitute.com/resources/knowledge/strategy/business-operations/
https://faculty.mercer.edu/jackson_r/Ownership/chap02.pdf
https://www.uagc.edu/blog/5-principles-of-great-management
https://www.managementstudyhq.com/functions-of-management.html
https://www.mindtools.com/pages/article/henri-fayol.htm
Note 4. There are many reasons why IT project implementations can go wrong: Lack of
planning and management participation, underestimating resources, failing to manage user
expectations, too much customization and tweaking at the end of the project, and insufficient
testing, to name a few.
https://www.techrepublic.com/article/6-reasons-why-your-it-project-will-fail/
Note 5. For more details, see ‘COSO IN THE CYBER AGE’, at:
https://www.coso.org/Pages/guidance.aspx
https://www.investopedia.com/terms/i/internalcontrols.asp
57
IT AUDIT GUIDE Bibliography
BIBLIOGRAPHY
The Audit Process: Principles, Practice and Cases 6th Edition 2015 Gray, Manson and
Crawford, Cengage Learning.
External Auditing and Assurance, An Irish Textbook 2nd Edition 2013, Nolan and Nangle,
Chartered Accountants Ireland.
58
IT AUDIT GUIDE Disclaimer
DISCLAIMER
The material, concepts, ideas, plans, policies, procedures, forms, methods, tools, etc. presented,
described and analyzed in all chapters and appendices, are for educational and training
purposes only. These may be used only, possibly, as an indicative base set, and should be
customized by each organization, after careful and considerable thought as to the needs and
requirements of each organization, taking into effect the implications and aspects of the
legal, national, religious, philosophical, cultural and social environments, and expectations,
within which each organization operates and exists.
Every possible effort has been made to ensure that the information contained in this book
is accurate at the time of going to press, and the publishers and the author cannot accept
responsibility for any errors or omissions, however caused. No responsibility for loss or
damage occasioned to any person acting, or refraining from action, as a result of the material
in this publication can be accepted by the publisher or the author.
59