IT General Control Checklist V1.1
IT General Control Checklist V1.1
Audit scope:
The review aims to assess the general IT controls to ensure that their design is in place and operating
effectively. The audit scope will cover the following domains:
Objectives:
To understand IT general controls and assess their effectiveness while identifying any weaknesses, the
IT auditor will conclude the evaluation through meetings with key IT personnel and a review of
supporting policies and procedures
Audit checklist
organization?
11. If applicable, is there a procedure for user
proxy requests?
12. Does the system automatically revert to the
proxy permission?
13. Is user termination from the system required
to include detailed user information and be
sent to IT personnel through a paper form,
system, or email?
14. Do the IT personnel notify management or
requestor that access has been removed from
system as requested?
15. Does the system allow to check the timeliness
of user last login into the system?
16. Is there an access rights matrix approval
document in place?
17. Does the access right matrix require approval
by the system owner/IT management?
18. Is the access right matrix periodically
reviewed? if yes how often (monthly/
quarterly/ annually)?
19. In the case of access right matrix
modification after review, is it required to
complete a request approval form before
making changes in system?
20. Does the manager of each department that
uses the system periodically review current
user access rights (including superuser,
administrative access, and/or generic IDs) to
ensure that access remains appropriate to job
responsibilities?
21. If IT personnel perform the user access
review, how do they confirm the
appropriateness of access rights? Is the
review based on the approved access rights
matrix?
22. Do IT personnel provide the user access
rights report, generated from the system or
manually, to the relevant management for
review?
23. If there is any modification of a user's access
within the system, is a request approval form
required before making the change?
General department of internal audit
Super user/Administrator
24. What controls are in place for high-privilege
users (super-users/admin)? Are the user ID
and password sealed, under dual control, or
held only by IT personnel?
25. If the user IDs and passwords of high-
privilege users are kept in a sealed envelope,
is access to the envelope restricted to
authorized personnel?
26. In case, high privilege user ids and password
are dual password controlled, who is handling
those passwords Are they authorized
personnel?
27. Does the procedure to request high privilege
user ids and password ensure only authorized
officers are able login to the system?
28. Is the system able to record the audit trail or
high privilege user’s activity log?
29. Does the system enable an audit trail or
activity log for high-privilege users?
30. Does the authorised independent person
periodically perform a review of high
privilege user’s activity log?
31. Does the review cover all high privilege user
(super-user/admin user)?
32. Is all significant activity, such as system
security and financial-related transactions,
defined to facilitate the review?
33. Is there any procedure for identification,
investigation and resolution of exception or
variances from the expectations for high
privilege user activity?
Password security
34. Is there any approval policy for password
configuration?
35. Is the password configuration set to
individual passwords or centralized password
settings?
36. If centralized password settings are used, can
individual settings override the central
configuration?
37. Have the following password settings been
configured?
General department of internal audit
maintained?
62. Are periodic reviews conducted to ensure that
access to data centre is restricted to
authorized individuals only If yes, what is the
frequency of the same?
63. Is access of terminated / transferred
employees revoked?
64. Is it mandatory for employees, vendors,
contractors, visitors, and service providers to
always display their ID cards?
65. Are there any key locks to all server racks
within server room?
66. If any, who responsible to hold the key Are
they authorised responsible staff?
Server room environmental
67. Do all perimeter entry points (including
emergency exit) have CCTV coverage If yes,
are CCTV cameras equipped with Night
Vision feature?
68. Are administrative offices physically
separated from other areas of data centre?
69. Is Very early warning smoke detection
System installed in all critical areas of server
room?
70. Are emergency numbers displayed at each
floor and all working areas?
71. Are user instructions for usage clearly marked
on each fire extinguisher (Check on Sample
basis)
72. Are fire extinguishers placed hanging on wall
with proper signage Are fire extinguishers
easily approachable?
73. Is fire suppression system installed in
automatic mode If no, are all criteria
mentioned in control description available?
74. Are temperature measurements taken at
several locations inside the server room If
yes, what is the frequency of same (Review
the temperature measurement records for
sample period)?
75. Are uninterrupted power supply (UPS) and
cooling systems installed in the server room?
Disaster recovery plan
General department of internal audit