ASI - IT Risk and Controls
ASI - IT Risk and Controls
September 2018
Risk management
• Risk is the chance of negative outcomes.
• “No risk, no reward.”
• Risk needs to be balanced.
1. IDENTIFYING IT RISKS
Risks
Business risk
• Not achieving business goals and objectives
Audit risk
• External auditor making a mistake when issuing an opinion
Security risk
• Failing to maintain data access and integrity
Continuity risk
• Failing to maintain information system availability and backup and recovery
Business risk
“Business risk is the likelihood that an organization will not
achieve its business goals and objectives”
• Auditors should be familiar with enterprise’s strategic plan to identify
business risks
• Can result from external and internal factors
External Internal
• New competitor in market • Labor disputes
• Poor economy • Management fraud
2. ASSESSING IT RISKS
Threats and Vulnerabilities
Approach to IT Risk Assessment
Identify Assess vulnerabilities Determine acceptable
threats/exposures to threats/exposures risk levels and assess
the probability of
Examples: Examples:
• Data confidentiality • Data confidentiality
vulnerabilities
• Data availability • Remote access by
Examples:
• Data integrity unauthorized peers
• Chance of remote access
• Data timeliness • On-site access by
by unauthorized users is
• Data accuracy unauthorized
.05 percent
• IT infrastructure personnel
Recommendations:
• Usage of weighted approach
Identify Assess Identify Document
IT Risks IT Risks IT Controls IT Controls
3. IDENTIFYING IT CONTROLS
Control Standards
• Internal control models around the world
– US – Committee of Sponsoring Organizations of the
Treadway Commission (COSO)
– UK – Cadbury Commission
– Canada – Canadian Criteria of Control Committee (CoCo)
• Quality
– ISO 9000 – Provides broad quality standards for products,
processes and management
– Six Sigma – Represents a standardized approach to process
improvement
Statements on Auditing
Standards
• Issued by Auditing Standards Board (ASB) of the
American Institute of Certified Public Accountants
(AICPA)
• Provides guidelines for external auditors in conducting
the financial statement audit.
• Continuously revised and improved to conform to
standards and provide greater understanding of
enterprise and its environment, particularly in internal
control.
CobiT
• Control of Business Information Technology (CobiT) integrates
internal control with information and information technology.
• CobiT categorizes IT processes in four domains:
– PO - Planning and Organization
– AI - Acquisition and Implementation
– DS - Delivery and Support
– M - Monitoring
• For example: One process in PO is to identify a strategic plan.
CobiT describes the control objective over that process in terms
of how it satisfies business requirements, what characteristics of
the process enable it, and factors it considers.
• Embraced by IT auditors and managers as a framework for
designing and implementing control over their information
technology.
Identify Assess Identify Document
IT Risks IT Risks IT Controls IT Controls
4. DOCUMENTING IT CONTROLS
Documentation tools