Access Controls Audit Program
Access Controls Audit Program
Access Controls Audit Program
18. For employees that have requested that their addresses and
phone numbers not be disclosed, determine if this
information is adequately protected from disclosure.
19. Discuss any audit findings with the Audit Supervisor,
Deputy Director and Audit Director. After receiving their
approval discuss audit findings with Client management.
20. Summarize and conclude.
Objective 6: Access to Data Bases
34. Review logs that record accesses. Compare the logs to the
list of authorized persons. Determine if access violations are
being investigated in accordance with procedures.
35. Discuss any audit findings with the Audit Supervisor,
Deputy Director and Audit Director. After receiving their
approval discuss audit findings with Client management.
36. Summarize and conclude.
Effects of Weaknesses
Access controls are designed to limit access to documentation, files, and
programs. A weaknesses in or lack of such controls increases the
opportunity for unauthorized modification to files and programs, as well
as misuse of the computer hardware. Weaknesses in documentation
and/or controls over machine use may be compensated by other strong IS
controls. However, weaknesses in systems software, program, and data
security significantly decrease the integrity of the system. Weaknesses in
this area must be considered in the evaluation of application controls.
Notes:
Budget Done W/P
Hours Audit Procedures By Ref.
Written policies for security over access to automated resources typically
address guidelines and responsibilities in the following areas:
access to program documentation
access to system software
access to program and job control instructions
access to data files
access to applications
passwords
investigation of access violations
To review access controls, the reviewer may need to obtain copies of the
automated logs or journals that record/monitor access to the following:
program documentation
systems software
production programs and job control language
production data files
critical application systems
password tables