iiaic08 power point cs2-3_track_regulatory session v3

67
GAIT Approach to Regulatory Compliance Edward L. Hill Managing Director Protiviti Jay R. Taylor, CIA, CFE, CISA General Director of Audit General Motors Corporation

Upload: gene-kim

Post on 13-May-2015

1.668 views

Category:

Documents


0 download

DESCRIPTION

GAIT-R framework, extending beyond SOX-404 to any COSO objectivePresented by Jay Taylor and Ed Hill at 2008 Institute of Internal Auditors Internal Conference

TRANSCRIPT

Page 1: Iiaic08 power point cs2-3_track_regulatory session v3

GAIT Approach to Regulatory Compliance

Edward L. HillManaging Director

ProtivitiJay R. Taylor, CIA, CFE, CISA

General Director of Audit General Motors Corporation

Page 2: Iiaic08 power point cs2-3_track_regulatory session v3

Today’s Agenda

►The Who, What, and Why of GAIT►GAIT Evolution, Principles and Methodology►GAIT for SOX IT Scoping►GAIT Deficiency Evaluation►GAIT- for IT and Business Risks

►Applying GAIT to an Environmental Audit

►Lessons Learned

►Conclusion

Page 3: Iiaic08 power point cs2-3_track_regulatory session v3

What is GAIT?

Guide to the Assessment of IT General Controls Scope Based on Risk

A series of principles and methodologies for top-down, risk-based scoping of IT general controls

Page 4: Iiaic08 power point cs2-3_track_regulatory session v3

Why Was GAIT Formed?

►Lack of established guidance (inconsistency and subjectivity, reliance on checklists, etc.)

►Originally Generally Applied IT Principles►Most pressing need was rationalization of

SOX practices- so the first GAIT addressed SOX compliance

►Significant compliance and audit costs►Need for better overall scoping

frameworks

Page 5: Iiaic08 power point cs2-3_track_regulatory session v3

Survey on ITGC Sox Scoping

IIA January, 2007, survey: inefficiencies exist in scoping ITGC costs are too high guidance would be highly valuable

Page 6: Iiaic08 power point cs2-3_track_regulatory session v3

Need for Guidance?

More than three-quarters felt guidance would be of high value

Yes - 77%

Page 7: Iiaic08 power point cs2-3_track_regulatory session v3

Who Developed GAIT for SOX scoping?

Core Team►Ed Hill, Protiviti

►Gene Kim, Tripwire

►Steve Mar, Microsoft

►Norman Marks, Business Objects

►Heriot Prentice, The IIA

►Fawn Weaver, Intel

Page 8: Iiaic08 power point cs2-3_track_regulatory session v3

Who Helped with GAIT for SOX scoping?

Advisory Board► CPA Firms – Big Four, Mid-sized Firms► SEC Registrants► Regulators

Page 9: Iiaic08 power point cs2-3_track_regulatory session v3

What is GAIT for SOX scoping?

►GAIT is a reasoned thinking process that continues the top-down and risk-based approach in AS/5 to assess risk in ITGC

►It helps identify risk in IT processes that could affect critical functionality needed to prevent/detect material errors

►Control objectives are identified in GAIT, but not specific key controls

Page 10: Iiaic08 power point cs2-3_track_regulatory session v3

How Does GAIT for SOX Scoping Work?

►The GAIT document has two main parts►The Four Principles►Methodology for GAIT implementation

►Overall theory►Practical Approach

Page 11: Iiaic08 power point cs2-3_track_regulatory session v3

Top-DownRisk-Based

I dentify, understand, and evaluatethe eff ectiveness of company- level controls

Identify significant accounts and locations,and relevant assertions

Identify significant business processesand major classes of transactions

Identify the points at which errors or fraudcould occur in the process

Identify controls to test that prevent or detecterrors or fraud on a timely basis

Identify/validate critical I T functionality

Identify I TGC process risks andrelated control objectives

Identify [significant] applications whereITGC need to be tested

Identify I TGC to test that meet control objectives

Perform a “reasonable person” review

AS/ 5

GAI T

Page 12: Iiaic08 power point cs2-3_track_regulatory session v3

Overall GAIT Scoping

Significant accounts

Business processes

Business controls

Applications

General Controls

RISK of material misstatement/fraud to financial statements & disclosures

Scope according to RISK of material misstatement/fraud.

Page 13: Iiaic08 power point cs2-3_track_regulatory session v3

IT Risk Assessment and Scoping

► Significant accountsBusiness processes

Business controls Applications

STEP 1: validate understanding

STEP 2: perform risk assessmentat each layer

STEP 3: Conclude: is it REASONABLY POSSIBLE a failure in this IT Process area could impact application controls & result in a material misstatement?

Risk is not eliminated; is it reduced to a REASONABLE level.

IT Process Controls:Change Mgt, Operations, SecurityApplicationDatabaseOperating SystemNetwork

Page 14: Iiaic08 power point cs2-3_track_regulatory session v3

The identification of risks and related controls in IT business processes should be a continuation of the top-down and risk-based approach used to identify significant accounts, risks to those accounts, and key controls in the business processes.

GAIT Principle 1

Page 15: Iiaic08 power point cs2-3_track_regulatory session v3

The IT general control process risks that need to be identified are those that affect critical IT functionality in financially significant applications and related data.

GAIT Principle 2

Page 16: Iiaic08 power point cs2-3_track_regulatory session v3

Financially Significant- Definition

► Application: contains functionality relied upon to assure the integrity of the financial reporting process. ► Should that functionality not function consistently and

correctly, there is at least a reasonable possibility of a material misstatement that would not be prevented or detected.

► Data: data that, if affected by unauthorized change that bypasses normal application controls (i.e., as a result of an ITGC failure), is at least reasonably likely to result in a material misstatement that would not be prevented or detected.

Page 17: Iiaic08 power point cs2-3_track_regulatory session v3

The IT general control process risks that need to be identified exist in processes and at various IT layers: application program code, databases, operating systems, and network.

GAIT Principle 3

Page 18: Iiaic08 power point cs2-3_track_regulatory session v3

Risks in IT general control processes are mitigated by the achievement of IT control objectives, not individual controls.

GAIT Principle 4

Page 19: Iiaic08 power point cs2-3_track_regulatory session v3

. . . guides you by asking

three questions:

The GAIT Methodology

Page 20: Iiaic08 power point cs2-3_track_regulatory session v3

1. What IT functionality in the financially significant applications is critical to the proper operation of the business process key controls that prevent/detect material misstatement?

The GAIT Methodology

Page 21: Iiaic08 power point cs2-3_track_regulatory session v3

2. For each IT process at each layer in the stack, is there a reasonable possibility that a process failure would cause the critical functionality to fail — indirectly representing a risk of material misstatement?

The GAIT Methodology

Page 22: Iiaic08 power point cs2-3_track_regulatory session v3

3. If such IT business process risks exist, what are the relevant IT control objectives?

The GAIT Methodology

Page 23: Iiaic08 power point cs2-3_track_regulatory session v3

© 2007 Protiviti Inc. All Rights Reserved. This document is for your company’s internal use only and may not be distributed to any other third party.

The Next GAIT is GAIT

for Deficiency Evaluation and Conclusions

Page 24: Iiaic08 power point cs2-3_track_regulatory session v3

Background for GAIT for Deficiency Evaluations

► 2004: Framework by CPA firms► 2007: Revised definitions of material weakness and significant

deficiency► 2007: Original GAIT published: Methodology for defining

Sarbanes-Oxley Section 404 ITGC scope based on risk► 2008: GAIT for ITGC Deficiency Evaluations published

Page 25: Iiaic08 power point cs2-3_track_regulatory session v3

Principles

1. In order to assess ITGC deficiencies, it is necessary to understand the ‘reliance chain’ between the financial statements and the ITGC key controls that have failed.

► Indirect relationship between financial statement risk and ITGC key controls

Page 26: Iiaic08 power point cs2-3_track_regulatory session v3

Indirect Relationship

Financial Statement Risk

Manual Key

Control

Automated Key

Control

Semi-Automated

Key Control

ITGC Key Control

ITGC Key Control

ITGC Key Control

Page 27: Iiaic08 power point cs2-3_track_regulatory session v3

Financial Statement Risk

Manual Key

Control

Automated Key

Control

Semi-Automated

Key Control

ITGC Key Control

ITGC Key Control

ITGC Key Control

ITGC Control

Objective

Reliance Chain

Page 28: Iiaic08 power point cs2-3_track_regulatory session v3

Principles

2. In order for there to be a material weakness, two tests have to be met: (a) likelihood and (b) impact (the potential misstatement of

the financial statements). 3. Because an ITGC deficiency does not directly affect the financial

statements, the assessment is similarly not direct. The assessment is in stages or steps, and the likelihood and impact tests are applied across the combination of the steps

4. All ITGC deficiencies that relate to the same ITGC control

objective should be assessed as a group

Page 29: Iiaic08 power point cs2-3_track_regulatory session v3

Principles

5. All ITGC control objectives that are not achieved and relate to the same key automated controls, key reports, or other critical functionality should be assessed as a group

6. The principle of aggregation requires that control deficiencies of all types — including manual and automated control deficiencies relating to the same significant account or disclosure — be

considered as a group

Page 30: Iiaic08 power point cs2-3_track_regulatory session v3

Assessment Steps

Confirm

Identify

3. Determine whether the ITGC control objective(s) were achieved.

1. Confirm that any testing exceptions represent a failure of the control and not an isolated exception.

2. Identify the ITGC control objective(s) for which the control was tested.

Determine

3

2

1

Page 31: Iiaic08 power point cs2-3_track_regulatory session v3

Assessment Steps

Identify

Decision

Identify

CD onlyGo to Step

10

4. Identify which financially significant applications rely on achievement of these control objectives.

5. Is there at least a reasonable possibility that the failure of the ITGC control objective would be detected by normal operations?

Yes

6. For the failing ITGC control objectives, identify which critical IT functionality is at risk

4

5

6

No

Page 32: Iiaic08 power point cs2-3_track_regulatory session v3

Assessment Steps

Decision

Decision

Decision

CD only Go to Step

10

MWGo to Step

10

CD only Go to Step

10

Yes

Yes

No

No

No

Yes

7. For each critical IT functionality at risk, is there a reasonable possibility that the ITGC control objective failure(s) would cause an undetected failure of the functionality?

8. Is there a reasonable possibility, considering the operation of both critical IT functionality and other business controls, that a failure could lead to a material misstatement of the financial statements?

9. Is the risk less than that represented by a material weakness but still sufficient to warrant disclosure to the Audit Committee of the Board as a significant deficiency?

7

8

9

Assess as SD

Page 33: Iiaic08 power point cs2-3_track_regulatory session v3

Assessment Steps

Review & Conclude

10. Step back and perform a reasonable person review, including confirming that any aggregation of control risk to the financial statements has been considered.

10

Page 34: Iiaic08 power point cs2-3_track_regulatory session v3

Closing Summary

► Assess ITGC deficiencies based on the risk to critical functionality, and the risk of that failing and leading to a material misstatement

► Consider whether the failure is at least reasonably likely to have such an effect

► Use common sense, grounded in reality

Page 35: Iiaic08 power point cs2-3_track_regulatory session v3

GAIT for IT and Business Risk

Edward Hill, CIAManaging Director

Protiviti

Page 36: Iiaic08 power point cs2-3_track_regulatory session v3

GAIT for IT and Business Risk- What it is meant to be

►Methodology for identifying all the key controls critical to achieving business goals and objectives

►Identifies the critical aspects of information technology essential to the management and mitigation of business risk

►The critical IT functionalities and the risks to them should be considered when planning audit work.

Page 37: Iiaic08 power point cs2-3_track_regulatory session v3

Who should use this guidance?

Primarily for internal auditing practitioners:

► Those who run such functions within organizations (Chief Audit Executives, or “CAE’s”) or leaders of internal audit service providers, and

► Those who are responsible specifically for the auditing of information technology (IT auditors)

► Also used by IT governance and security managers, or those who are charged with designing and managing information technology risks within their organizations.

Page 38: Iiaic08 power point cs2-3_track_regulatory session v3

Principles

► Principle 1: The failure of technology is only a risk that needs to be assessed, managed, and audited if it represents a risk to the business.

► Principle 2: Key controls should be identified as the result of a top-down assessment of business risk, risk tolerance, and the controls- including automated controls and IT general controls- required to manage or mitigate business risk

Page 39: Iiaic08 power point cs2-3_track_regulatory session v3

Principles

► Principle 3: Business risks are mitigated by a combination of manual and automated key controls. To assess the system of internal control to manage or mitigate business risks, key automated controls need to be assessed.

► Principle 4: IT general controls may be relied upon to provide assurance of the continued and proper operation of automated key controls.

Page 40: Iiaic08 power point cs2-3_track_regulatory session v3

Sub Principles-identification of key ITGC’s

► Principle 4a: The IT general control process risks that need to be identified are those that affect critical IT functionality in significant applications and related data.

► Principle 4b: The IT general control process risks that need to be identified exist in processes and at various IT layers: the application program code, databases, operating systems, and network.

► Principle 4c: Risks in IT general control processes are mitigated by the achievement of IT control objectives, not individual controls.

Page 41: Iiaic08 power point cs2-3_track_regulatory session v3

Key control types:

► Manual controls (e.g., the performance of a physical inventory)► Fully automated controls (e.g., matching or updating accounts in

the general ledger)► Partly automated, or “hybrid controls”, where an otherwise

manual control relies on application functionality. ► If an error in that functionality would not be detected, the

entire control would be ineffective.

Page 42: Iiaic08 power point cs2-3_track_regulatory session v3

TOP-DOWN METHODOLOGY

1. Identify the business objectives for which the controls are to be assessed

2. Identify the key controls within business processes required to provide reasonable assurance that the business objectives will be achieved

Page 43: Iiaic08 power point cs2-3_track_regulatory session v3

TOP-DOWN METHODOLOGY

3. Identify the critical IT functionality relied upon, from among the key business controls

4. Identify the [significant] applications where ITGC need to be tested.

Page 44: Iiaic08 power point cs2-3_track_regulatory session v3

TOP-DOWN METHODOLOGY

5. Identify ITGC process risks and related control objectives

6. Identify the ITGC to test that meet control objectives

Page 45: Iiaic08 power point cs2-3_track_regulatory session v3

Step 7- Perform a “reasonable person,” holistic review of all the key controls identified

Business Risks &Business Objectives

Entity-Level Controls

Business Process Controls

Individual Entity-Level controls

Manual controlsAutomated and Hybrid controls

Individual Manual controls

Individual Critical IT Functionality

Reliance on ITGC

Individual ITGC controls

Page 46: Iiaic08 power point cs2-3_track_regulatory session v3

Step 8. Determine the scope of the review

► A complete business audit (some might consider this an ‘integrated’ audit) of all the risks

► The auditor should decide whether to perform the assessment in a single project, or split among multiple projects that may be performed at different times

► If the assessment will be split among multiple projects, the auditor should determine how the combined assessment will be made and reported, as well as how the results of individual projects will be assessed and reported

Page 47: Iiaic08 power point cs2-3_track_regulatory session v3

Step 8. Determine the scope of the review

► An audit that is limited in scope to only selected key controls► The limited scope should be clearly identified and communicated both

prior to work starting and also in the audit report► Keep in mind that the assessment of any control deficiencies may be

more difficult without understanding the effectiveness of all related controls, and whether the impact of any deficiencies may be mitigated by other key controls that were not assessed

► A consulting project, rather than an assurance project, designed to add value by improving the effectiveness of the system of internal control

Page 48: Iiaic08 power point cs2-3_track_regulatory session v3

Closing Summary

► GAIT for IT and Business Risk addresses how IT risk and controls should be addressed in consideration of the overall business use of technology

► There is a top-down approach to determining what technology risks and controls are important to the achievement of business goals and objectives

► Technology risks only matter when viewed in the broader business risk context

Page 49: Iiaic08 power point cs2-3_track_regulatory session v3

Case StudyAudit of Environmental Compliance

Management ProcessUsing GAIT

Jay R. Taylor

Page 50: Iiaic08 power point cs2-3_track_regulatory session v3

1. Business Objectives

► Business Process: Manage Environmental Legal Compliance (e.g., the production of required federal and state governmental reporting for manufacturing facilities)

► Business Objective: File complete and accurate annual reports required under the U.S. Superfund Amendment Reauthorization Act (SARA) Title III, Section 313 and 40 CFR 370/372

► COSO Objective: Manage Regulatory / Legal Risk

Page 51: Iiaic08 power point cs2-3_track_regulatory session v3

Business Risks

►Key Business Risk: Under-reporting releases of hazardous chemicals and emissions

• Fines and penalties ranging up to $37,000 per incident, per day

►Other Risks:• Failure to comply with laws and regulations• Access to information may not be based on business

need• Reputation risk / negative media exposure• 3rd party risk – relying on vendor for maintaining and

hosting IT system

Page 52: Iiaic08 power point cs2-3_track_regulatory session v3

Process Overview for theEnvironmental Management Process (EMP)

Data Acquisition and Validation

Report Development and

Review

Project Completion

File Reports

• Flowcharted the EMP

• EMP includes 13 distinct steps

• System supporting the process is called “Ops Environmental System” or OES

• Collect, calculate and analyze purchases and uses of hazardous chemicals

• Prepare and submit reports in compliance with U.S. and state regulations

• OES hosted by 3rd party provider (called Trusty Tech or “TT”) but owned by company

Page 53: Iiaic08 power point cs2-3_track_regulatory session v3

So … we only have a certain number of audit hours …

What is critical to review?

Why??

Page 54: Iiaic08 power point cs2-3_track_regulatory session v3

2. Key Controls in the Business Process to Achieve Business Objectives

Key Controls A B C

1. Calendar-based reminders to users prompting input of critical data (automated)

X X

2. Entry and edit of chemical purchases, usages, losses, releases, etc. (hybrid)

X

3. Comparison of current results (post-calculation) to previous results (automated)

X X

4. Final review of reports including support data (hybrid – heavy dependence) (note: “precision”)

X X

5. e-Filing of regulatory reports X

A = Timeliness

B = Completeness

C = AccuracyObj

ectiv

es

Page 55: Iiaic08 power point cs2-3_track_regulatory session v3

3. Critical IT Functionality Relied Upon from Among the Key Business Controls

Key Controls Related IT Functionality

1. Calendar reminders to users (automated)

Programmed routine including user notification

2. Entry and edit of chemical purchases (hybrid)

Programmed edits against tables (range check; chemical types; etc.)

3. Comparison of current results to previous results (automated)

Calculate quantities not accounted for, and compare to thresholds and priors

4. Final review of report including support (hybrid)

Select transactions, format, and print user reports

5. e-Filing of regulatory reports Select, format, & transmit

Page 56: Iiaic08 power point cs2-3_track_regulatory session v3

4. The Applications Where IT General Controls Need to be Tested

► “Ops Environmental System” or OES► Hosted and operated by Trusty Tech Co. on our behalf

► Desire to audit may result in “push back” by TT to internal auditors

• Contractual terms and conditions; SLAs• Consideration of SAS-70s

► Out of Scope for Planning (will revisit this decision later in the process):► Purchasing system – reviewed separately w/Dept. audit► Material receiving system – reviewed separately in plants► Excel spreadsheets (accumulate purchases) – minor role

Page 57: Iiaic08 power point cs2-3_track_regulatory session v3

5. IT General Control Process Risks and Related Control Objectives

Key Controls Related Risks Control Objectives

1. Calendar reminders ►Overdue tasks not flagged or referred to users for follow-up

►Controls ensure that all tasks have assigned due dates and users

2. Entry/edit of purchases, receipts, etc.

►Incorrect quantities, chemical types, etc. entered by users

►Controls ensure that data entered conforms to business rules (e.g. format); errors are rejected

3. Comparison of results (period to period; similar facilities; threshold comparisons, etc.)

►Calculated results may be out of line but not identified; regulatory thresholds may be inaccurate for comparison purposes

►Controls ensure calculations & transaction summarization is performed accurately and results appropriately displayed to users for review

Page 58: Iiaic08 power point cs2-3_track_regulatory session v3

5. IT General Control Process Risks and Related Control Objectives, Continued

Key Controls Related Risks Control Objectives

4. Final review of report ►Reports produced by OES system may contain calculation errors or other inaccuracies

►Controls ensure that transactions are summarized, and calculations are performed accurately and consistently

5. e-Filing of reports ►Reports may be transmitted using wrong template (federal, state); may be transmitted late; may not identify missing delivery acknowledgements

►Controls ensure that proper template is selected and used►Controls ensure report delivery is timely and evidence of receipt is obtained from regulator

Page 59: Iiaic08 power point cs2-3_track_regulatory session v3

6. IT General Controls to Test, That Meet the Control Objectives

Control Objectives IT General Controls(Examples)

►Controls ensure that all tasks have assigned due dates and users

►Application and Database security – table update functionality►Change control – application code

►Controls ensure that data entered conforms to business rules (e.g. format); errors are rejected

►Application and Database security – input transactions►Change control – application code – edit rules and error identification

►Controls ensure calculations and summarizations are correctly performed and results appropriately displayed to users for review

►Change control – application code – critical calculations and report format►Application, Database & OS security – display and modify results

Page 60: Iiaic08 power point cs2-3_track_regulatory session v3

7. Perform a “reasonable person,” holistic review of all the key controls identified

Business Risks &Business Objectives

Entity-Level Controls

Business Process Controls

Individual Entity-Level controls

Manual controlsAutomated and Hybrid controls

Individual Manual controls

Individual Critical IT Functionality

Reliance on ITGC

Individual ITGC controls

COSO Categories:• Control Environment• Risk Assessment• Control Activities• Monitoring• Information and Communication

Q: Extremely good or bad?? Impact the audit plan?

Page 61: Iiaic08 power point cs2-3_track_regulatory session v3

8. Scope of the Review – Integrated Audit – Coverage of All Business Risks

Now that the detailed scoping for this project is finished ….► Am I covering each of the business risks? ► Do I need to reference and rely upon something that is

out of scope, so management understands what I did NOT do?► Example: Purchasing system covered in another audit

► Am I planning to rely on the IT general controls?► Would a reasonable person with this same information

come to the same conclusions?► Can I really conclude the way I did?

Page 62: Iiaic08 power point cs2-3_track_regulatory session v3

Scope Change Needed

► What if some plants may not have migrated to the new OES system?► Continuing to operate on spreadsheets► Much higher risk of error in this environment► Complex calculations and logic require explanation and

documentation► Change control and security needed

► Must decide: expand the scope, or exclude from scope and explain in final audit report► Impact on assurance I can give?

Page 63: Iiaic08 power point cs2-3_track_regulatory session v3

Conclusions and Lessons Learned

► GAIT useful for scoping SOX 404 and any IT audit work

► GAIT results in the ability to do less test work overall

► However, the work that is completed is clearly targeted to

cover the key business risks

Now, let’s look at how to write up our findings …..

Page 64: Iiaic08 power point cs2-3_track_regulatory session v3

Conclusions and Lessons Learned, Continued

► Improved audit comment wording helps to connect to things management cares about:

• “We noted poor change control procedures and were unable to obtain comfort that all changes were authorized and tested as required”

-- vs. -- • “Poor change control practices introduced the risk of

unauthorized or untested changes to key data such as annual threshold amounts for toxic chemical releases. Given the level of precision applied to reviewing the final report downstream, it is unlikely management would detect such errors. Our testing disclosed numerous “break/fix” changes had been made to code or data without supervisory review and approval or notifying the users.”

Page 65: Iiaic08 power point cs2-3_track_regulatory session v3

Conclusions and Lessons Learned, Continued

► Linking finding to business risk makes it real:• “We noted that system edits did not ensure user input was in

the proper format or that unallowed materials were rejected from further processing”

-- vs. -- • “Edit routines for user input were not properly designed to

ensure only designated chemical types could be entered into the “Product_Type_User” table in the Oracle database. We noted eight products had been entered incorrectly, which resulted in the OES system adding the related transaction quantities to the “Miscellaneous” default category in error. Because the final report review process was being conducted at a very high level, these errors were not detected and the final report contained a minor level of misstatement”

Page 66: Iiaic08 power point cs2-3_track_regulatory session v3

More Information . . .

► GAIT Resourceswww.theiia.org

► Questions? Ask Dr. [email protected]

Page 67: Iiaic08 power point cs2-3_track_regulatory session v3

Thank you!