SlideShare uma empresa Scribd logo
1 de 14
Key Areas
ITGC AUDIT OF ERP
SYSTEMS
J A Y E S H D A G A
• DEVELOP AND MAINTAIN POLICIES AND PROCEDURES
• INSTALL AND TEST APPLICATION SOFTWARE AND TECHNOLOGY
INFRASTRUCTURE
• MANAGE CHANGES
• DEFINE AND MANAGE SERVICE LEVELS
• MANAGE THIRD PARTY SERVICES
• ENSURE SYSTEM SECURITY
• MANAGE PROBLEMS AND INCIDENTS
• MANAGE DATA
• MANAGE OPERATIONS
KEY AREAS
J A Y E S H D A G A
• The organization’s System Development Life Cycle (SDLC) methodology
and associated policies and procedures are regularly reviewed, updated and
approved by management.
• The organization ensures that its systems and applications are developed in
accordance with its supported, documented policies and procedures.
DEVELOP AND MAINTAIN POLICIES AND
PROCEDURES
J A Y E S H D A G A
• A testing strategy is developed and followed for all significant changes in
applications and infrastructure technology, which addresses unit, system,
integration and user acceptance level testing to help ensure that deployed
systems operate as intended.
• Load and stress testing is performed according to a test plan and established
testing standards.
• Interfaces with other systems are tested to confirm that data transmissions are
complete, accurate and valid.
• The conversion of data is tested between its origin and its destination to
confirm that it is complete, accurate and valid.
INSTALL AND TEST APPLICATION SOFTWARE
AND TECHNOLOGY INFRASTRUCTURE
J A Y E S H D A G A
• Requests for program changes, system changes and maintenance (including
changes to system software) are standardized documented and subject to
formal change management procedures.
• Emergency change requests are documented and subject to formal change
management procedures.
• Controls are in place to restrict migration of programs to production only by
authorized individuals.
• Configuration change (e.g., tolerances, pricing, number ranges) process is
documented and the process includes evidencing of authorization and approval
of the changes.
MANAGE CHANGES
J A Y E S H D A G A
• Service levels are defined and managed to support financial reporting
system requirements.
• A framework is defined to establish key performance indicators to manage
service level agreements, both internally and externally.
DEFINE AND MANAGE SERVICE LEVELS
J A Y E S H D A G A
• Selection of vendors for outsourced services is performed in accordance with
the organization’s vendor management policy.
• Third-party service contracts address the risks, security controls and procedures
for information systems and networks in the contract between the parties.
• Procedures exist and are followed to ensure that a formal contract is defined
and agreed upon for all Third party services before work is initiated, including
definition of internal control requirements and acceptance of the
organization’s policies and procedures.
• A regular review of security, availability and processing integrity is performed
for service level agreements and related contracts with third-party service
providers.
MANAGE THIRD PARTY SERVICES
J A Y E S H D A G A
• An information security policy exists and has been approved by an appropriate
level of executive management.
• A framework of security standards has been developed that supports the
objectives of the security policy.
• An IT security plan exists that is aligned with overall IT strategic plans.
• The IT security plan is updated to reflect changes in the IT environment as well
as security requirements of specific systems.
• Procedures exist and are followed to authenticate all users to the system and to
support the validity of transaction access.
ENSURE SYSTEM SECURITY
J A Y E S H D A G A
• Procedures exist and are followed to maintain the effectiveness of authentication and
access mechanisms (e.g., regular password changes).
• Procedures exist and are followed to ensure timely action relating to requesting,
establishing, issuing, suspending and closing user accounts.
• A control process exists and is followed to periodically review and confirm access rights.
• Where appropriate, controls exist to ensure that neither party can deny transactions, and
controls are implemented to provide nonrepudiation of origin or receipt, proof of
submission and receipt of transactions.
• Where network connectivity is used, appropriate controls, including firewalls, intrusion
detection and vulnerability assessments exist and are used to prevent unauthorized
access.
ENSURE SYSTEM SECURITY CONTD…
J A Y E S H D A G A
• IT security administration monitors and logs security activity, logs are
reviewed, and identified security violations are reported to senior
management.
• Controls relating to appropriate segregation of duties over requesting and
granting access to systems and data exist and are followed.
• Access to facilities is restricted to authorized personnel and requires
appropriate identification and authentication.
ENSURE SYSTEM SECURITY CONTD…
J A Y E S H D A G A
• IT management has defined and implemented a problem management system to ensure
that operational events that are not part of standard operation (incidents, problems and
errors) are recorded, analyzed and resolved in a timely manner.
• The problem management system provides for adequate audit trail facilities, which allow
tracing from incident to underlying cause.
• A security incident response process exists to support timely response and investigation
of unauthorized activities.
MANAGE PROBLEMS AND INCIDENTS
J A Y E S H D A G A
• Policies and procedures exist for the handling, distribution and retention of data and reporting output.
• Management protects sensitive information, logically and physically, during transmission and in storage against
unauthorized access or modification.
• Retention periods and storage terms are defined for documents, data, programs, reports and messages (incoming
and outgoing), as well as the data (keys, certificates) used for their encryption and authentication.
• Management has implemented a strategy for cyclical backup of data and programs. A Disaster Recovery Plan is in
place.
• Procedures exist and are followed to periodically test the effectiveness of the restoration process and the quality
of backup media.
• Changes to data structures are authorized, made in accordance with design specifications and implemented in a
timely manner.
MANAGE DATA
J A Y E S H D A G A
• Management has established and documented standard procedures for IT operations,
including scheduling, managing, monitoring and responding to security, availability and
processing integrity events.
• System event data are sufficiently retained to provide chronological information and logs
to enable the review, examination and reconstruction of system and data processing.
• System event data are designed to provide reasonable assurance as to the completeness
and timeliness of system and data processing.
• End-user computing policies and procedures concerning security, availability and
processing integrity exist and are followed.
• End-user computing, including spreadsheets and other user-developed programs, are
documented and regularly reviewed for processing integrity, including their ability to
sort, summarize and report accurately.
MANAGE OPERATIONS
J A Y E S H D A G A
JAYESH DAGA
https://www.linkedin.com/in/jayeshdaga
J A Y E S H D A G A

Mais conteúdo relacionado

Mais procurados

Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
Desmond Devendran
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 

Mais procurados (20)

CISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
ITGCs.pdf
ITGCs.pdfITGCs.pdf
ITGCs.pdf
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
audit_it_250759.pdf
audit_it_250759.pdfaudit_it_250759.pdf
audit_it_250759.pdf
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
SOC 2 and You
SOC 2 and YouSOC 2 and You
SOC 2 and You
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
Cobit itil and iso 27001 mapping
Cobit itil and iso 27001 mappingCobit itil and iso 27001 mapping
Cobit itil and iso 27001 mapping
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentation
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
It governance & cobit 5
It governance & cobit 5It governance & cobit 5
It governance & cobit 5
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 

Destaque

Some Thoughts On Starting Your Own Company
Some Thoughts On Starting Your Own CompanySome Thoughts On Starting Your Own Company
Some Thoughts On Starting Your Own Company
Brad Gillespie
 
Ensayo de los temas trabajos en taller de medios
Ensayo de los temas trabajos en taller de medios Ensayo de los temas trabajos en taller de medios
Ensayo de los temas trabajos en taller de medios
Yeli Herrera
 
O reino de deus na pregação de jesus (correcao) (1)
O reino de deus na pregação de jesus (correcao) (1)O reino de deus na pregação de jesus (correcao) (1)
O reino de deus na pregação de jesus (correcao) (1)
Cristobal Avalos Rojas
 
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
Bart Rienties
 
Biomedical Application of Magnetic Nanomaterials
Biomedical Application of Magnetic NanomaterialsBiomedical Application of Magnetic Nanomaterials
Biomedical Application of Magnetic Nanomaterials
Mahmudun Nabi
 

Destaque (20)

The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.
The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.
The Case for VLE in Life-Long Learning, Capacity building and poverty reduction.
 
Comercios BiciAmigos
Comercios BiciAmigosComercios BiciAmigos
Comercios BiciAmigos
 
OER in non-English speaking countries: сhallenges and opportunities for suppo...
OER in non-English speaking countries: сhallenges and opportunities for suppo...OER in non-English speaking countries: сhallenges and opportunities for suppo...
OER in non-English speaking countries: сhallenges and opportunities for suppo...
 
Some Thoughts On Starting Your Own Company
Some Thoughts On Starting Your Own CompanySome Thoughts On Starting Your Own Company
Some Thoughts On Starting Your Own Company
 
The greek-new-testament-sbl-edition
The greek-new-testament-sbl-editionThe greek-new-testament-sbl-edition
The greek-new-testament-sbl-edition
 
Ensayo de los temas trabajos en taller de medios
Ensayo de los temas trabajos en taller de medios Ensayo de los temas trabajos en taller de medios
Ensayo de los temas trabajos en taller de medios
 
O reino de deus na pregação de jesus (correcao) (1)
O reino de deus na pregação de jesus (correcao) (1)O reino de deus na pregação de jesus (correcao) (1)
O reino de deus na pregação de jesus (correcao) (1)
 
Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...
Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...
Delivering ‘Strategy 2020: Building Success’ - Anita Ogilvie and Brent Hurley...
 
El si de_maria
El si de_mariaEl si de_maria
El si de_maria
 
4. Presentation
4. Presentation4. Presentation
4. Presentation
 
Epistolary interviews
Epistolary interviewsEpistolary interviews
Epistolary interviews
 
êTre autonome au cdi 2015
êTre autonome au cdi 2015êTre autonome au cdi 2015
êTre autonome au cdi 2015
 
Jisc learning analytics MASHEIN Jan 2017
Jisc learning analytics MASHEIN Jan 2017Jisc learning analytics MASHEIN Jan 2017
Jisc learning analytics MASHEIN Jan 2017
 
Ecosistema de innovacion propuesta para Santa Cruz 2061
Ecosistema de innovacion propuesta para Santa Cruz 2061Ecosistema de innovacion propuesta para Santa Cruz 2061
Ecosistema de innovacion propuesta para Santa Cruz 2061
 
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
Keynote EARLI SIG17 The power of learning analytics: a need to move towards n...
 
The power of learning analytics for UCL: lessons learned from the Open Univer...
The power of learning analytics for UCL: lessons learned from the Open Univer...The power of learning analytics for UCL: lessons learned from the Open Univer...
The power of learning analytics for UCL: lessons learned from the Open Univer...
 
Wireless Broadband Network Project : BTCL
Wireless Broadband Network Project : BTCLWireless Broadband Network Project : BTCL
Wireless Broadband Network Project : BTCL
 
Biomedical Application of Magnetic Nanomaterials
Biomedical Application of Magnetic NanomaterialsBiomedical Application of Magnetic Nanomaterials
Biomedical Application of Magnetic Nanomaterials
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Aloha
AlohaAloha
Aloha
 

Semelhante a ITGC audit of ERPs

Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
Priyank Hada
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
Priyank Hada
 
2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde
mikaelyde
 

Semelhante a ITGC audit of ERPs (20)

CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
Compliance
ComplianceCompliance
Compliance
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde2016-06-08 FDA Inspection Readiness - Mikael Yde
2016-06-08 FDA Inspection Readiness - Mikael Yde
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
 
Securitymetrics
SecuritymetricsSecuritymetrics
Securitymetrics
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptx
 
Information system audit
Information system audit Information system audit
Information system audit
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Preparing a data migration plan: A practical guide
Preparing a data migration plan: A practical guidePreparing a data migration plan: A practical guide
Preparing a data migration plan: A practical guide
 
HIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician PracticesHIPAA and Security Management for Physician Practices
HIPAA and Security Management for Physician Practices
 
ServiceNow ITAM Best practices.pdf
ServiceNow ITAM Best practices.pdfServiceNow ITAM Best practices.pdf
ServiceNow ITAM Best practices.pdf
 

Último

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

ITGC audit of ERPs

  • 1. Key Areas ITGC AUDIT OF ERP SYSTEMS J A Y E S H D A G A
  • 2. • DEVELOP AND MAINTAIN POLICIES AND PROCEDURES • INSTALL AND TEST APPLICATION SOFTWARE AND TECHNOLOGY INFRASTRUCTURE • MANAGE CHANGES • DEFINE AND MANAGE SERVICE LEVELS • MANAGE THIRD PARTY SERVICES • ENSURE SYSTEM SECURITY • MANAGE PROBLEMS AND INCIDENTS • MANAGE DATA • MANAGE OPERATIONS KEY AREAS J A Y E S H D A G A
  • 3. • The organization’s System Development Life Cycle (SDLC) methodology and associated policies and procedures are regularly reviewed, updated and approved by management. • The organization ensures that its systems and applications are developed in accordance with its supported, documented policies and procedures. DEVELOP AND MAINTAIN POLICIES AND PROCEDURES J A Y E S H D A G A
  • 4. • A testing strategy is developed and followed for all significant changes in applications and infrastructure technology, which addresses unit, system, integration and user acceptance level testing to help ensure that deployed systems operate as intended. • Load and stress testing is performed according to a test plan and established testing standards. • Interfaces with other systems are tested to confirm that data transmissions are complete, accurate and valid. • The conversion of data is tested between its origin and its destination to confirm that it is complete, accurate and valid. INSTALL AND TEST APPLICATION SOFTWARE AND TECHNOLOGY INFRASTRUCTURE J A Y E S H D A G A
  • 5. • Requests for program changes, system changes and maintenance (including changes to system software) are standardized documented and subject to formal change management procedures. • Emergency change requests are documented and subject to formal change management procedures. • Controls are in place to restrict migration of programs to production only by authorized individuals. • Configuration change (e.g., tolerances, pricing, number ranges) process is documented and the process includes evidencing of authorization and approval of the changes. MANAGE CHANGES J A Y E S H D A G A
  • 6. • Service levels are defined and managed to support financial reporting system requirements. • A framework is defined to establish key performance indicators to manage service level agreements, both internally and externally. DEFINE AND MANAGE SERVICE LEVELS J A Y E S H D A G A
  • 7. • Selection of vendors for outsourced services is performed in accordance with the organization’s vendor management policy. • Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contract between the parties. • Procedures exist and are followed to ensure that a formal contract is defined and agreed upon for all Third party services before work is initiated, including definition of internal control requirements and acceptance of the organization’s policies and procedures. • A regular review of security, availability and processing integrity is performed for service level agreements and related contracts with third-party service providers. MANAGE THIRD PARTY SERVICES J A Y E S H D A G A
  • 8. • An information security policy exists and has been approved by an appropriate level of executive management. • A framework of security standards has been developed that supports the objectives of the security policy. • An IT security plan exists that is aligned with overall IT strategic plans. • The IT security plan is updated to reflect changes in the IT environment as well as security requirements of specific systems. • Procedures exist and are followed to authenticate all users to the system and to support the validity of transaction access. ENSURE SYSTEM SECURITY J A Y E S H D A G A
  • 9. • Procedures exist and are followed to maintain the effectiveness of authentication and access mechanisms (e.g., regular password changes). • Procedures exist and are followed to ensure timely action relating to requesting, establishing, issuing, suspending and closing user accounts. • A control process exists and is followed to periodically review and confirm access rights. • Where appropriate, controls exist to ensure that neither party can deny transactions, and controls are implemented to provide nonrepudiation of origin or receipt, proof of submission and receipt of transactions. • Where network connectivity is used, appropriate controls, including firewalls, intrusion detection and vulnerability assessments exist and are used to prevent unauthorized access. ENSURE SYSTEM SECURITY CONTD… J A Y E S H D A G A
  • 10. • IT security administration monitors and logs security activity, logs are reviewed, and identified security violations are reported to senior management. • Controls relating to appropriate segregation of duties over requesting and granting access to systems and data exist and are followed. • Access to facilities is restricted to authorized personnel and requires appropriate identification and authentication. ENSURE SYSTEM SECURITY CONTD… J A Y E S H D A G A
  • 11. • IT management has defined and implemented a problem management system to ensure that operational events that are not part of standard operation (incidents, problems and errors) are recorded, analyzed and resolved in a timely manner. • The problem management system provides for adequate audit trail facilities, which allow tracing from incident to underlying cause. • A security incident response process exists to support timely response and investigation of unauthorized activities. MANAGE PROBLEMS AND INCIDENTS J A Y E S H D A G A
  • 12. • Policies and procedures exist for the handling, distribution and retention of data and reporting output. • Management protects sensitive information, logically and physically, during transmission and in storage against unauthorized access or modification. • Retention periods and storage terms are defined for documents, data, programs, reports and messages (incoming and outgoing), as well as the data (keys, certificates) used for their encryption and authentication. • Management has implemented a strategy for cyclical backup of data and programs. A Disaster Recovery Plan is in place. • Procedures exist and are followed to periodically test the effectiveness of the restoration process and the quality of backup media. • Changes to data structures are authorized, made in accordance with design specifications and implemented in a timely manner. MANAGE DATA J A Y E S H D A G A
  • 13. • Management has established and documented standard procedures for IT operations, including scheduling, managing, monitoring and responding to security, availability and processing integrity events. • System event data are sufficiently retained to provide chronological information and logs to enable the review, examination and reconstruction of system and data processing. • System event data are designed to provide reasonable assurance as to the completeness and timeliness of system and data processing. • End-user computing policies and procedures concerning security, availability and processing integrity exist and are followed. • End-user computing, including spreadsheets and other user-developed programs, are documented and regularly reviewed for processing integrity, including their ability to sort, summarize and report accurately. MANAGE OPERATIONS J A Y E S H D A G A