IT Governance and Strategy: It Audit Checklist Series
IT Governance and Strategy: It Audit Checklist Series
IT Governance and Strategy: It Audit Checklist Series
IT Governance
and Strategy
Practical guidance
for managers on
how to prepare for
successful audits
www.ITCinstitute.com
Research Sponsors
Symantec
Tripwire
√I T AUDIT CHECKLIS T SERIES
IT Governance and Strategy
About the IT Compliance Institute
The IT Compliance Institute (ITCi) strives to be a Table of Contents
global authority on the role of technology in business
governance and regulatory compliance. Through 2 Executive Overview
comprehensive education, research, and analysis
3 Introduction to IT Governance and Strategy
related to emerging government statutes and affected
business and technology practices, we help organizations 4 What Is IT Governance?
overcome the challenges posed by today’s regulatory
6 What Are the Benefits of Sound IT Governance?
environment and find new ways to turn compliance
efforts into capital opportunities. 7 The Auditor’s Perspective on IT Governance
and Strategy
ITCi’s primary goal is to be a useful and trusted resource
for Information Technology professionals seeking to 7 Why Audit?
help businesses meet privacy, security, financial account-
7 Who Is Responsible for IT Governance?
ability, and other regulatory requirements. Targeted at
CIOs, CTOs, compliance managers, and information 10 Management’s Role in the Audit Process
technology professionals, ITCi focuses on regional- and
vertical-specific information that promotes awareness 11 What Auditors Want to See
and propagates best practices within the IT community. 12 Auditors Like...
14 Audit Planning
All design elements, front matter, and content are copyright © 2007 IT Compliance
Institute, a division of 1105 Media, Inc., unless otherwise noted. All rights are 14 Audit Testing
reserved for all copyright holders.
Limit of Liability/Disclaimer of Warranty: While the copyright holders, publishers, 16 Controls for IT Governance and Strategy
and authors have used their best efforts in preparing this work, they make no
representations or warranties with respect to the accuracy or completeness of
the contents of this book and specifically disclaim any implied warranties of
19 Audit Reporting
merchantability or fitness for a particular purpose. No warranty may be created
or extended by sales representatives or written sales materials. The advice and 20 Preparing for an Audit
strategies contained herein may not be usable for your situation. You should consult
with a professional where appropriate. Neither the publishers nor authors shall be
liable for any loss of profit or any other commercial damages, including, but not 21 Communicating with Auditors
limited to, special, incidental, consequential, or other damages.
All trademarks cited herein are the property of their respective owners. 22 Appendix—Other Resources
www.ITCinstitute.com 1
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
Executive Overview
www.ITCinstitute.com 2
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
Introduction to IT
Governance and Strategy
IT has always played an ambiguous role in business SOX in particular has revolutionized IT auditing. In pre-
success. Is it a mechanism or driving force? Does it paring for their initial audits, corporate executives found
define or merely facilitate business processes? Does it they couldn’t certify the integrity of financial information
warrant top-level consideration at all? The answers to without understanding the applications and systems that
these questions have traditionally depended on corporate stored financial data. SOX’s auditing oversight board,
philosophy and how well IT was integrated into business the PCAOB, explicitly recognized this dependency with
goals and strategies. more than 20 references to information technology in its
primary guidance, “Auditing Standard No. 2.”2 Auditors
But if IT’s role in business gain is ill defined, its culpa- questioned. Few companies could adequately answer. By
bility in business loss is well recognized. Information 2003, it was apparent that almost everyone—from CFOs
systems and processes represent to regulators and even financial
the beating heart of corporate auditors—had underestimated
communications, accounting, Corporate executives how much financial management
manufacturing, supply chain relied on IT underpinnings. In
management, and other critical
cannot certify the integrity 2004, it became clear that finan-
business processes. In many com- of financial information cial auditors lacked the technical
panies, management has learned knowledge necessary to perform
the hard way that failure of IT is
without understanding the effective IT audits. In 2005,
tantamount to business failure; applications and systems the Information Systems Audit
thus, IT has earned its own audit Control Association (ISACA)
discipline. In a business climate
that store financial data. reported that the number of
where risk commands almost as people applying to take its
much managerial mindshare as profit and growth did Certified Information Systems Auditor (CISA) exam
just five years ago, internal audits cannot ignore —and, doubled from the previous year.
in fact, must constantly strive to better understand—IT’s
business role and risk factors. But, as companies and auditors continue to learn,
the challenges of IT auditing go beyond technical
Prior to the spectacular collapse of Enron, WorldCom, competency. Misalignment of communications between
Tyco, and other corporations between 2001 and 2003, auditing, business management, and IT management
financial auditing was relatively perfunctory. Before the plagues many companies. Definition of internal systems
2001 terrorist attacks in the US, customer recognition and controls continues to be a substantial capital and
was merely good business practice. And prior to the resource cost. And appropriate scoping of audits accord-
ChoicePoint security breach in 2004, privacy laws were ing to control impact and risk relevance is an issue
relatively scarce. But these and other corporate scandals endemic to both financial and IT audits, but particularly
and catastrophes loosed a deluge of preventive laws, acute for IT management, which often oversees several
including Sarbanes-Oxley (SOX), US-state and to inter- thousand (or more) policies and processes.
national data protection acts, and the USA Patriot Act
2
(USAPA). Collectively, these new rules have changed Auditing Standard No. 2—An Audit of Internal Control over Financial Reporting
Performed in Conjunction with an Audit of Financial Statements (2004). Public
risk management from a by-product of compliance to Company Accounting Oversight Board (PCAOB). http://www.pcaobus.org/Rules/
a core requirement. Rules_of_the_Board/Auditing_Standard_4.pdf
www.ITCinstitute.com 3
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
As companies have recognized their reliance on IT and With this big picture in mind, IT governance and strat-
the need for appropriate IT oversight, the internal audit egy encompasses the core definitions, structures, and
function has increased the frequency and comprehensive- processes that shape all IT efforts and systems. Auditable
ness of its assessments. Regulatory guidance to improve functions of IT governance include:
the risk relevance of audits has also helped to align audit-
management communications. Neither auditing nor IT 1. Definition of what the IT organization is and does,
can afford to operate as a black box. Both must cooper- including values and goals
ate to recognize their common goals of identifying and
reducing risk, improving processes, and supporting 2. IT risk definition and management
ethical, profitable corporate performance.
3. Definition of roles and responsibilities, including
Successful IT governance audits require definition and leadership structures
balance. Auditors must help management understand
compliance scope, but management is responsible for 4. Strategic planning, monitoring, and
defining the risks and risk materiality that ultimately continual improvement
determine audit scope. Management must work with
auditors to identify risk existence, materiality, and poten- 5. Oversight of standards, policies, and procedures
tial remediation. Auditors should also help management
understand how to demonstrate seemingly intangible 6. Oversight of technical foundations, such as IT
concepts such as leadership and responsibility in terms infrastructure, architectures, a semantic baseline or
of concrete policies and processes. And management glossary, and data management,
must help auditors understand controls and assess
their effectiveness. 7. Asset management, including staff, systems, media,
networks, and content
What Is IT Governance?
8. Resource planning
According to the IT Governance Institute (ITGI), “IT
governance is the responsibility of the Board of Directors
9. Investment management
and Executive Management. It is an integral part of
enterprise governance and consists of the leadership
Every IT practice, program, and procedure is guided
and organizational structures and processes that ensure
by these functions. Information security, business
that the organization’s IT sustains and extends the
continuity, records management, and all other strategic
organization’s strategy and objectives.” 3
initiatives live and die by their effectiveness.
www.ITCinstitute.com 4
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
principles. Over the past five years, governance research objectives, comprising 215 control objectives in four
groups and standards bodies have increasingly updated domains: planning and organization, acquisition and
their guidance with deference to IT. And IT-specific implementation, delivery and support, and monitor-
frameworks and guidance have been developed ing and evaluation. ISACA also publishes correlative
independently and as a complement to existing corporate audit guidelines, management guidelines, and an
governance documents. implementation toolset.
• “The Principles of Corporate Governance,” issued CobiT is perhaps the most widely used IT control
by the Organisation for Economic Co-operation framework, since it spans the gamut of IT; offers map-
and Development (OECD)4 . Although designed pings to other governance standards; and is supported
for public-company oversight, the principles can be by many published materials, education, and a vast
broadly applied to non-public companies and internal user community.
organizations. In December 2006, the OECD also
issued an audit guide, “Methodology for Assessing Adoption of CobiT as a primary best-practices standard
the Implementation of the OECD Principles on is also facilitated by several mapping documents that
Corporate Governance,” an assessment framework can help IT managers align their processes, governance,
with governance principles. and regulatory response. ISACA’s supporting document
IT Control Objectives for Sarbanes-Oxley, 2nd Edition
• The UK Financial Reporting Council’s “Internal contains a general map of CobiT processes to PCAOB
Control: Revised Guidance for Directors on the Auditing Standard No. 2. In May 2006, ISACA issued
Combined Code,” conventionally called the Turnbull CobiT Mapping, Overview of International IT Guidance,
Guidance, offers a more specific approach to main- 2nd Edition, which provides a general comparison of
taining and reviewing a system of internal control. COSO and CobiT frameworks.
• “Enterprise Risk Management—Integrated In January 2007 ISACA also published a map of CobiT
Framework,” commonly called “COSO,” after its pub- and the IT Infrastructure Library (ITIL) from the UK
lisher, the Committee of Sponsoring Organizations Office of Government Commerce. By aligning the two
of the Treadway Commission (COSO) 5 is similar in UK documents, it is possible to map COSO to ITIL at a
outlook and focus to the Turnbull Guidance, but high level, and therewith compile a framework that aligns
includes a more robust and explicit internal control enterprise risk management principles with IT controls
framework. COSO is recognized by the US SEC and and, finally, fairly narrowly defined IT services. Links to
PCAOB as an approved control framework for SOX. each of these documents is included in the appendix of
this paper.
• “Organizational Governance: Guidance for Internal
Auditors,” a position paper from the Institute for
Internal Auditors (IIA), ties corporate governance
4
principles to audit goals and roles. Much of the Citations and links for the resources mentioned in this section are included in
Appendix A
content can be used as a model for IT governance
5
Since the passage of SOX, Turnbull and COSO have emerged as the major pillars of
and auditing.
compliance and risk management. From an IT perspective, COSO is more accessible
than Turnbull, since it is more widely documented and has been approximately
• CobiT, published by the Information Systems mapped to a an IT control framework, Control Objectives for Information and
related Technology (CobiT), published by the Information Systems Audit and Control
Audit and Control Association (ISACA), is Association (ISACA).
widely considered the leading framework for 6
Although COSO is officially endorsed for SOX compliance, CobiT has received no
IT controls.6 CobiT 4.0 covers 34 high-level official endorsement.
www.ITCinstitute.com 5
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
While most companies had IT governance processes and 5. Lower risk of non-compliance with
some controls in place long before they were required by regulatory requirements
SOX and other regulations, the adoption of frameworks
to organize and round out governance and control 6. Lower risk of serious business disruption from events
efforts is a governance best practice. Frameworks such
as CobiT provide a comprehensive overview of control 7. More healthy organizational relationships and
objectives against which to standardize and align IT reputation with directors, business staff, customers,
governance and auditing efforts. and partner organizations
What Are the Benefits of Sound Recognizing the ROI of IT governance is an important
step in meeting governance goals. Many governance con-
IT Governance? trols such as network mapping, master data management,
Sound IT governance addresses the growing complex- and asset inventories, have substantial costs. While good
ity and threat that are the hallmarks of IT operations. IT governance might be touted as its own reward, the
Compared to just a few years ago, business processes ability to tie its concrete costs to equally concrete returns
are more complicated; technology is more powerful, is itself a good IT governance practice.
functional, and ubiquitous; and attacks on corporate
systems, from within and without, are more frequent
and sophisticated.
www.ITCinstitute.com 6
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
Why Audit?
Audits are opportunities for companies to improve, based from project to project, depending on auditor’s focus (for
on auditor analysis and advice. To preserve the integrity example, on various business processes, management
and authority of audits, auditors maintain a delicate dis- controls, and technical controls). Ensuring appropriate
tinction between offering advice and making decisions. audit focus is another reason management should com-
municate with auditors, and vice versa, early and often in
For each organization, the scope of auditor responsibility every audit cycle.
should be documented in the company’s internal audit
charter and be approved by the audit committee. Because Internal auditors should help management assess organi-
every organization has different goals and objectives— zational risks. They must evaluate the audit universe and
and certainly different issues and challenges—there is supporting audit plans at least annually and sometimes
no one-size-fits-all audit process, nor one audit approach, more frequently.7 At the micro level, an audit risk assess-
that fits all situations. ment of the various entities being audited is completed to
support the audit project (sometimes also referred to as
Historically, corporate governance has focused primarily the audit “terms of reference”). Planning for each audit
on broad topics of leadership, management, ethics, and requires serious consideration of the organization’s many
reporting. IT governance audits encompass many of the risks and opportunities. Finally, in many companies,
same issues and can include business plans, documenta- continuous auditing (ongoing audit evaluations) is being
tion and measurement of objectives, organizational implemented for key systems and/or key transactions.
reporting structures, contract management, and indus-
trial and regulatory monitoring. It also has a significant Who Is Responsible for
technology component. For example:
IT Governance?
• Does the organization have an information The board of directors, IT executives, business execu-
architecture model? tives, and internal auditors all have significant roles in IT
• Do hardware and software acquisition plans exist? governance assurance and the auditing of IT governance
and strategies. The big question for many companies is
• How is e-content (including intranets, Web sites, how these stakeholders should work together to ensure
blogs, and wikis) managed? that everything that should be done to protect sensitive
• How are investments and development projects information is being done—and that the company’s
evaluated and do they meet business requirements? information assets are protected appropriately.
• How does the IT organization ensure system 1. The board of directors must provide oversight at a
continuity in case of disruptive contingencies? level above IT executives. The directors’ role in IT
governance is to ask executives the right questions
The size and complexity of various organizations’ audit
efforts differ due to variations in operating environ-
7
For more information, refer to Swanson, Dan. “Ask the Auditor: Business Risk
ments, risk priorities and thresholds, and business and vs. Audit Risk.” IT Compliance Institute (May 2, 2006). http://www.itcinstitute.
audit objectives. In addition, the scope of audits can vary com/display.aspx?id=1673
www.ITCinstitute.com 7
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
and encourage the right results. Directors must set 3. IT managers marshal many of the requirements of
an appropriate tone at the top, making executive IT governance, ensuring internal compliance with
management aware of their oversight and ensuring leadership mandates and drafting policies and pro-
they have adequate information to make intelligent cedures that support strategic goals. IT managers are
decisions about IT strategy and direction. To this also the eyes and ears of the IT organization. They
end, many boards establish IT committees, which are responsible for reporting up to executive man-
include representatives from both IT and business agement. And, when controls fail, IT managers are
organizations. The board also has a role in setting the generally responsible for drafting remediation plans
IT governance culture, which includes organizational that meet governance requirements.
values and attitudes.
4. Business executives must have some insight into and
According to ITGI, boards should guide IT manage- influence on IT governance and programs, since
ment to deliver measurable value by: 1) delivering business managers are ultimately accountable for
solutions and services with the appropriate quality, the results of the business processes enabled by IT
on time and on budget, 2) enhancing reputation, systems. Managers should review IT strategy to ensure
product leadership and cost-efficiency, and 3) provid- it is appropriate, despite ever-changing risks and busi-
ing customer trust and competitive time-to-market.8 ness requirements. This is, in fact, a form of auditing
IT governance. And managers who own business-unit
2. IT executives work with the board to define IT information must also help define their IT require-
identity characteristics. These can include the ments based on business objectives, the significance
IT organization’s business plan and/or model, of the information involved, legal requirements, and
expectations and commitments, and vision. Chief the seriousness of risks associated with data integrity
information officers (CIOs) and chief security officers and security. Especially if the IT organization reports
(CSOs) should understand the business organization to the CEO or other business leader, that office is
well enough to bridge the gap between IT and senior responsible for providing resources and organiza-
business managers or the board. tional structure to support IT strategy.
IT executives look both into and outward from their 5. Internal auditors provide strategic, operational, and
organization to assess the impact on IT of industry tactical value to IT leaders. For example, the internal
norms and trends, regulatory changes, contractual auditing function:
obligations, even environmental threats. Internally,
executives ensure that objectives and strategies are • Informs the board and IT executives as to
supported and understood across the organization. whether business and IT staff understand the
Finally, by subjecting IT processes, resources, and importance of governance objectives and strat-
leadership to audit and board review, IT executives egy. Auditors can tell IT leaders whether staff
advance the goal of corporate oversight and promote is adhering to IT policies, whether key informa-
its continuous improvement and success. tion assets and systems are sufficiently secure,
whether business continuity programs are suf-
ficient, whether governance efforts continually
strengthen IT performance, whether resources
8
Board briefing on IT Governance, p 17 (2003). IT Governance Institute. http://www.
isaca.org/Content/ContentGroups/ITGI3/Resources1/Board_Briefing_on_
are sufficient, and whether policies are reason-
IT_Governance/26904_Board_Briefing_final.pdf able. In brief, internal audits assess the state
www.ITCinstitute.com 8
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
BUSINESS EXECUTIVES
INTERNAL AUDITORS
www.ITCinstitute.com 9
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
During planning, management should first focus The audit team leader and senior executives of the
on the audit plan (the auditor’s “road map”) and areas being audited should meet regularly throughout
ensure that managers understand and are in general the audit process—usually weekly and at least once
agreement with the audit purpose, focus, and a month—to discuss audit progress, identified issues,
approach. An open, positive discussion with the and potential actions.
audit team regarding these defining factors helps
management and the audit team communicate An open, transparent dialogue between senior
their expectations up front. Audit planning should members of both management and the audit team
focus on critical or sensitive risks, but all risks should can avert many misunderstandings and resolve
be considered. To this end, active involvement by disputed findings before they find their way into an
management in audit planning is vital to the overall audit report. The audit team should communicate
success of an internal audit. critical findings to management as early as possible,
even outside of the established meeting schedule.
Management should also discuss the evaluation These findings may also be reviewed during regular
criteria auditors will use in assessing IT governance. meetings, but prompt notice is necessary and
Finally, managers and auditors should broadly usually appreciated.
discuss audit testing, although auditors must have
the authority and discretion to select tests they During reporting, management receives and reviews
deem appropriate. the findings of auditors, plans and develops corrective
actions, and implements change.
During testing, management facilitates auditors’
access to relevant people and systems. Management
Although most internal audits begin with this cycle,
confirms the audit results, not re-performing the
auditing is often an ongoing, non-linear process. As
actual tests, but verifying processes and data in
PCAOB Auditing Standard No. 4 9 indicates, the discovery
order to gain confidence in the audit findings.
of a material weakness is just the first step in many com-
Where management has deployed alternative or
munications that auditors and management might have
compensating controls, it should show how the
about a particular control. In addition, many companies
controls are adequate to satisfy control objectives.
are moving towards continuous audits through which
Auditors should assess compensating controls
automated control monitoring and reporting test control
according to whether they address identified
effectiveness on an ongoing basis.
risk. Adhering too rigidly to a control “checklist”
or prefabricated audit framework can introduce
9
unnecessary cost and delay into the audit process Auditing Standard No. 4–Reporting on Whether a Previously Reported Material
Weakness Continues to Exist (February 6, 2006). Public Company Accounting
and ultimately undermine the audit’s goals. Oversight Board (PCAOB). http://pcaobus.com/Standards/Standards_and_Related_
Rules/AS4/2006-04-27_2006-003_AS4_Summary.pdf
www.ITCinstitute.com 10
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
M Management
remits comments Accordingly, auditors and managers should work to
help each other reach common goals—auditors striving
to earnestly, honestly, and completely assess program
A Audit team issues final report effectiveness, and management working to help auditors
make valid assessments. In that vein, there are some
Management reviews
typical program characteristics and managerial processes
findings and
REPORTING M begins planning that auditors do and don’t like to see. As in all aspects of
PHASE
corrective actions audit and risk management programs, auditor likes and
dislikes vary by company; however, the following list item-
Managers and auditors should work together throughout the audit izes typical indicators of good and bad audits.
process to ensure that auditors pursue appropriate goals and have
proper insight into IT and business processes. Good communication
throughout the audit process helps ensure that audit findings are
relevant and can be used to benefit the company.
www.ITCinstitute.com 11
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
Documentation of the chain of command and roles (Not) having administrative support when it’s needed
and responsibilities, such as up-to-date organization
charts and the related job descriptions (Not) forecasting audit requirements and (not)
responding dispassionately to auditor requests
Timely investigation and clearance of reconciliation
items within key accounts (Not) providing accurate documentation
Supervisory review of critical performance reports (Not) informing relevant staff about the audit
and its goals
Consistent understanding and use of policy and
procedures, from senior management through (Not) having an audit charter for the internal
frontline staff, with no substantial misunderstandings audit function
www.ITCinstitute.com 12
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
10
The audit team is always expected to ensure all their interactions (with all staff) are
professional and result in a minimal disruption.
www.ITCinstitute.com 13
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
IT Governance and
Strategy Audit Checklist
www.ITCinstitute.com 14
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
Managers and auditors complete a “kick-off” meeting Auditors evaluate information on information security
processes and procedures
Managers support auditors’ high-level assessment of
the information security program with interviews and Managers assist auditors with walkthroughs of
documentation of: selected processes and control documentation
__ Scope and strategy, including how thoroughly the Auditors evaluate the quality of information
program addresses potential risks and compares generated by the information security program;
with industry best practices the ease, reliability, and timeliness of access to
such information by key decision makers; and the
__ Structure and resources, reflecting managerial operational consistency with which such information
commitment to effective information security is generated
management and the program’s robustness
relative to the potential impact of adverse events Auditors assess information security performance
metrics: existence, usefulness, application, monitoring,
__ Management of policies and related procedural and responses to deviation
documentation
Auditors evaluate whether risk management controls
__ Communication of program policies and are sufficiently preventive, as well as detective
expectations to stakeholders
Auditors define tests to confirm the operational
__ Impact of program efforts on effectiveness of information security activities. Tests
organizational culture might include management and staff interviews,
documentation and report review, data analysis, and
__ Internal enforcement processes and consistency
result sampling for recent initiatives.
__ Ongoing improvement efforts
Managers provide requested data, documentation,
and observations
Managers support more detailed audit analysis of
the information security program
Auditors identify and recommend opportunities for
improvement of information security activities
Auditors evaluate design adequacy
www.ITCinstitute.com 15
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
section (and potentially others, depending on the audit’s C-level officers (CIO, CTO, CSO, etc.), executives,
purpose and focus). and management are defined, documented,
communicated, and understood
The actual IT governance and strategy controls to be
__ Roles and responsibilities are aligned with the
audited are determined during the audit planning
execution and continuous improvement of short-
phase. Controls are assessed during the audit testing
and long-term plans
phase. Management should determine which controls
are appropriate for each organizational environment, __ An IT organization chart exists and includes
based on the corporate risk profile, and compare the list
management and reporting structures
to the controls in this section, which reflect audit best
practices and government guidance on IT governance __ Accountability for policies and procedures is
and strategy. In the following section, controls reflect documented and acknowledged by management
COSO, Turnbull Guidance, “Enhancing Corporate and staff
Governance in Banking Organisations” from The Bank
for International Settlements (BIS), and other referents External influences
noted in this paper.
__ IT leaders understand and monitor regulatory
definitions and requirements
Management Controls
Management controls to ensure well-run and effective __ IT leaders track industry processes and norms
IT governance:
Planning
__ Management sets an appropriate “tone at the __ Plans state objectives and performance metrics
top” for IT activities, policies, and processes
__ Plans indicate appropriate budget, timelines, and
__ IT’s organizational commitments and expectations
staff allocations
are documented and communicated
__ Plans are evaluated by stakeholders for
__ The IT organization adheres to corporate values
appropriateness and execution
__ The IT organization enforces a code of conduct __ Strategic plans and changes to long-range plans
are communicated to stakeholders
www.ITCinstitute.com 16
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
__ IT management tracks assets associated with __ Appropriate staff, systems, and processes are
new projects dedicated to the IT governance effort
__ IT performs investment reviews and analysis to __ Management reviews short- and long-terms
assess project performance versus expectations plans compared to performance
__ IT documents project selection criteria __ Reporting policies and mechanisms are well
defined and understood
__ IT documents authority and alignment of
managers responsible for project selection __ Management receives and reviews project
and oversight standards
__ IT performs post-implementation reviews and __ IT executives review key IT controls for financial
evaluates stakeholder feedback reporting, transaction processing, electronic
messaging, data and database management,
__ IT management annually reviews project portfolios information protection, and e-content
and identifies opportunities for improvement management
__ IT plans and documents system and __ Contingency and failure reporting policies exist,
technology succession escalation processes are documented, and policies
and processes are communicated and understood
__ IT benchmarks the investment process
__ Performance metrics are established and regularly
__ IT uses investment benchmarking to reduce risk
measured against objectives
associated with strategic business change
__ Staff performance appraisals are
completed regularly
11
Information Technology Investment Management: A Framework for Assessing and
Improving Process Maturity; US Government Accountability Office, Exposure Draft
(GAO/AIMD-10.1.23)(May 2000). http://www.gao.gov/special.pubs/10_1_23.pdf
www.ITCinstitute.com 17
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
of training programs
An enterprise architecture model exists and
is enforced
Operational controls
Management ensures that appropriate technical
Operational controls to ensure the effective perfor-
controls exist and are effective for major compliance
mance of the IT governance program:
practice areas, including data protection, content
management and e-discovery, and electronic
Controls exist to meet compliance requirements12
messaging (e-mail, instant messaging, blogs, etc.)
__ Management sets levels and assurance metrics for
Management sets and enforces strategic data-
information security
management best practices, including policies for
__ Management is rapidly notified of security breaches data dictionaries, master data management, and
data integrity and quality controls
Management tracks contractual definitions and
IT automates controls in order to reduce resource
requirements
requirements and ensure consistency and quality
IT maintains an inventory of technology assets, of results
including functions and relation to business processes.
Assets include hardware, software, storage media,
networks, and electronic content.
12
For a control-by-control comparison of regulatory indications for IT leadership,
see the ITCi Unified Compliance Project, Leadership and High Level Objectives
IT Impact Matrix. http://www.itcinstitute.com/ucp/lhlo
www.ITCinstitute.com 18
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
Audit reporting
During the reporting phase, management and the board
of directors receive formal feedback from the audit team. Auditors debrief management, formally discussing
This knowledge transfer should be an open and transpar- significant audit findings and conclusions before they
ent process. issue the final audit report
www.ITCinstitute.com 19
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
A well-managed IT governance program includes robust In selecting documentation, management should not
plans, procedures, goals, objectives, trained staff, perfor- overload the audit team with information, but provide
mance reporting, and ongoing improvement efforts. The genuine insight into how IT governance works and how
internal audit team looks for evidence that the business well it performs.
unit and governance program is well organized and well
managed. The security program must also specifically Other steps management should take prior to the audit:
and traceably mitigate risks related to key business objec-
tives. Managerial preparation should mainly be routine, Learn early and contribute often to the internal audit
day-to-day practices. goals, objectives, purpose, approach, and procedures
(audit tests). In particular, setting an appropriate
Management’s ultimate goal in the audit process is not purpose and the audit approach are the two most
to make auditors happy, but rather to demonstrate that important elements of every successful audit.
IT governance meets the demands of the CEO, board of
directors, regulators, and investors. Likewise, auditors’ Discuss with audit management the evaluation criteria
requests should align with these overarching needs; that and standards and how the audit will actually be
is, to support responsible program performance within a conducted, in order to ensure that you’ll receive a
sound, ethical business environment. quality audit. Ask whether they audit in accordance
with international standards for the professional
While the audit is in the planning phase, management practice of internal auditing.
should proactively work with the audit team to “educate”
Learn who is on the audit team and their
the auditors. As a rule, managers should provide con-
qualifications, talents, and motivations. The audit
structive input on the evaluation methodology before
team exists to help make your operations more
audit management approves it. Expectations are a
efficient and effective, but they are also individuals
two-way street: management must help auditors ensure
with strengths and weaknesses common to many
that audit expectations are aligned and that participants
employees. It pays to know the experience of your
understand each other.
auditors, whether they’re rookies or veterans (and
perhaps to push for the latter). Showing an interest
Prior to the audit, managers should collect the informa-
in their work can also influence and increase the
tion and documentation necessary to demonstrate how
benefits from the audit—within reason. At the end
well they manage their operations in concert with the
of the day, auditors still need to be independent
overall organizational business objectives. They should
and objective.
be prepared to provide auditors with evidence of well-
managed security efforts and results. This might include
documentation of security plans, supporting budgets, Throughout its discussion with the audit team prior to the
policy and procedure manuals, assignments of respon- audit, management should try to strike a balance between
sibilities (such as up-to-date job descriptions), results influence and deference. Managers should neither yield
reporting and other trending information, and finally, any entirely to the audit team nor micromanage its efforts.
other relevant guidance (to management and staff) that
demonstrates a “well-run” and well-performing program.
www.ITCinstitute.com 20
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
Communicating
with Auditors
www.ITCinstitute.com 21
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
APPENDIX:
IT Governance, Strategy, and
Audit Resources
1. Institute of Internal Auditors (IIA) Performance 7. CobiT Mapping: Overview of International IT
Standard 2130 for the Professional Practice of Guidance, 2nd Edition (2006). ISACA. http://www.
Internal Auditing, http://www.theiia.org/index. isaca.org/AMTemplate.cfm?Section=Deliverables&
cfm?doc_id=124 Template=/ContentManagement/ContentDisplay.
cfm&ContentID=24759 (PDF)
2. “The Role of Auditing in Public Sector Governance”
(2006). Institute of Internal Auditors (IIA). http:// 8. CobiT Mapping: Mapping of ITIL With COBIT 4.0
www.theiia.org/download.cfm?file=3512 (PDF) (2007). ISACA. http://www.isaca.org/Template.
cfm?Section=COBIT_Mapping1&Template=/
3. Internal Control: Revised Guidance for Directors on MembersOnly.cfm&ContentFileID=12791 (PDF)
the Combined Code (“Turnbull Guidance”) (2006).
Financial Reporting Council. http://www.frc.org. 9. Global Technology Audit Guide (GTAG): Continuous
uk/documents/pagemanager/frc/Revised%20Turnb Auditing: Implications for Assurance, Monitoring,
ull%20Guidance%20October%202005.pdf (PDF) and Risk Assessment (2005). Information Systems
Security Association (ISSA). http://www.issa.org/
4. COSO Enterprise Risk Management - publications/GTAG3Brochure11.pdf (PDF)
Integrated Framework, COSO (authored by
PricewaterhouseCoopers). http://www.coso.org/ 10. Information Security Management and Assurance:
A Call to Action for Corporate Governance (2001).
5. CobiT 4.0 (2005). ISACA. http://www.isaca. Institute of Internal Auditors (IIA). http://www.
org/AMTemplate.cfm?Section=Overview&Tem theiia.org/index.cfm?doc_id=3061 (PDF)
plate=/ContentManagement/ContentDisplay.
cfm&ContentID=22940 (PDF)
www.ITCinstitute.com 22
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
Research Sponsors
Symantec Tripwire
Define, Control, and Govern is Symantec’s approach to Tripwire is the leading provider of configuration audit and
IT policy governance. Our approach reduces the cost and control solutions to over 5,500 enterprises worldwide, enabling
complexity of achieving and sustaining compliance with IT IT to control risk and increase operational efficiency. Tripwire’s
governance frameworks, best practices, and corporate and advanced configuration control solutions detect and analyze
regulatory mandates. Only Symantec can help you simplify all change activity across the IT infrastructure to identify
compliance management and ensure ongoing enforcement of and resolve unauthorized changes, policy discrepancies,
IT policies across your organization through a single view of configuration drift, and security violations. Leading global
multiple standards, comprehensive IT controls coverage, and enterprises rely on Tripwire to strengthen their compliance,
real-time intelligence. security and governance, to reduce unplanned work, increase
availability, and accelerate success with CMDB initiatives.
For more information please visit
www.symantec.com/compliance For more information please visit
www.tripwire.com
www.ITCinstitute.com 23
I T AU D I T C H E C K L I S T : I T G O V E R N A N C E A N D S T R AT E G Y
If you have ideas for improving ITCi’s IT Audit Checklists, please write editor@itcinstitute.com.
Legal Disclaimer
When assessing any legal matter, do not rely solely on materials published by third parties, including the content in this paper, without additionally seeking legal
counsel familiar with your situation and requirements. The information contained in this IT Audit Checklist is provided for informational and educational purposes and
does not constitute legal or other professional advice. Furthermore, any applicability of any legal principles discussed in this paper will depend on factors specific to
your company, situation, and location. Consult your corporate legal staff or other appropriate professionals for specific questions or concerns related to your corporate
governance and compliance obligations.
ITCi makes every effort to ensure the correctness of the information we provide, to continually update our publications, and to emend errors and outdated facts as
they come to our attention. We cannot, however, guarantee the accuracy of the content in this paper, since laws change rapidly and applicability varies by reader.
The information in this publication is provided on an “as is” basis without warranties of any kind, either expressed or implied. The IT Compliance Institute disclaims
any and all liability that could arise directly or indirectly from the reference, use, or application of information contained in this publication. ITCi specifically disclaims
any liability, whether based in contract, tort, strict liability, or otherwise, for any direct, indirect, incidental, consequential, punitive or special damages arising out of
or in any way connected with access to or use of the information in this paper.
ITCi does not undertake continuous reviews of the Web sites and other resources referenced in this paper. We are not responsible for the content published by other
organizations. Such references are for your convenience only.
www.ITCinstitute.com 24
IT Compliance Conference
WASHINGTON, DC, MAY 2– 4, 2007
www.ITCinstitute.com/dc07
• Data management principles for • The impact of SEC and PCAOB • IT directors and managers
efficient enterprise compliance guidance on SOX compliance
• Compliance managers
• How to benefit from difficult • Case studies on enterprise content
• CFOs/financial officers
conversations with IT auditors management and securing mobile
devices