it audit presentation 2-26-2006

Upload: sushant-shetty

Post on 08-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 IT Audit Presentation 2-26-2006

    1/34

    The Role of IT AuditAt Cornell University

    Presented by:

    Craig Adams, CISA, CISM

    Clayton Dow, CPA, CISA, CIA

    Geoffrey Yearwood, CISA

  • 8/7/2019 IT Audit Presentation 2-26-2006

    2/34

    February 14, 2007 2

    Agenda

    Stakeholders

    Auditing in General

    University Audit Office

    Information Technology Audit

    IT Policies

    The Changing Face of IT Audit

    IT Controls

  • 8/7/2019 IT Audit Presentation 2-26-2006

    3/34

    February 14, 2007 3

    Stakeholders

    Board of Directors

    Audit Committee

    Senior Management

    External Audit

    Internal Audit

    Audit Clients

  • 8/7/2019 IT Audit Presentation 2-26-2006

    4/34

    February 14, 2007 4

    Stakeholder Roles

    Joint effort: Board of Directors determines and approves strategies, sets

    objectives and ensures the objectives are being met.

    Audit Committee responsible for overseeing the internal controlstructure (operations, compliance, and financial reporting)

    Senior Management defines, develops, implements, anddocuments the internal control structure

    External Audit attests to the fair statement of financial results

    Internal Audit- validate the internal control structure by

    analyzing the effectiveness of internal controls

  • 8/7/2019 IT Audit Presentation 2-26-2006

    5/34

    February 14, 2007 5

    Definition of Internal Audit

    Institute of Internal Auditors (IIA) Standardeffective January 2002

    Internal auditing is an independent, objectiveassurance and consulting activity designed to addvalue and improve an organizations operations. Ithelps an organization accomplish its objectives bybringing a systematic, disciplined approach to

    evaluate and improve the effectiveness ofriskmanagement, control, and governance processes.

  • 8/7/2019 IT Audit Presentation 2-26-2006

    6/34

    February 14, 2007 6

    University Audit Office

  • 8/7/2019 IT Audit Presentation 2-26-2006

    7/34

    February 14, 2007 7

    University Audit Office CharterThe University Audit Office exists to assist university management and the Audit Committee

    of the Board of Trustees in the effective discharge of their responsibilities. The UniversityAudit Office is responsible for examining and evaluating the adequacy and effectiveness of

    (1) the systems of internal control and their related accounting, financial, computer, and

    operational policies and (2) the procedures for financial and compliance monitoring and

    reporting and to make recommendations forthe improvement thereof.

    The scope ofthe University Audit Office's responsibilities includes examining and evaluating

    the policies, procedures, and systems which are in place to ensure:

    reliability and integrity of information;

    compliance with policies, plans, procedures, laws, and regulations;

    safeguarding of assets; and

    economical and efficient use of resources.

    The University Audit Office shall have direct access to all university books and recordsnecessary for the effective discharge of its responsibilities. The reporting relationships

    duties, and responsibilities of the University Auditor (Audit Director) are contained in the

    University Bylaws Article XI.

  • 8/7/2019 IT Audit Presentation 2-26-2006

    8/34

    February 14, 2007 8

    University Audit Office Mission

    The Audit Office supports the mission oftheuniversity by helping protect its assets and

    reputation.

    We provide objective assurance and advice

    on behalf oftheB

    oard of Trustees andCornell University.

    We review operations and controls, provide

    relevant analyses, recommend

    improvements, and promote ethical behavior

    and compliance with policies and

    regulations.

  • 8/7/2019 IT Audit Presentation 2-26-2006

    9/34

    February 14, 2007 9

    University Audit Office Responsibilities

    The scope ofthe University Audit Offices responsibilitiesincludes examining and evaluating the policies,procedures, and systems to ensure:

    Reliability and integrity of information;

    Compliance with policies, plans, procedures, laws,and regulations;

    Safeguarding of assets; and

    Economical and efficient use of resources.

  • 8/7/2019 IT Audit Presentation 2-26-2006

    10/34

    February 14, 2007 10

    Cornell University Audit Office

  • 8/7/2019 IT Audit Presentation 2-26-2006

    11/34

    February 14, 2007 11

    Cyclical Process of Auditing

    Risk Assessment

    Audit Schedule

    Audit Program

    Audit Tests

    Analysis

    Audit Results

    Reporting

    Budget

    2 Year

    Cycle

  • 8/7/2019 IT Audit Presentation 2-26-2006

    12/34

    February 14, 2007 12

    Information TechnologyRisk Ranking Results

    RANK UNIT RANKING RANK UNIT RANKING

    1 WMC-EPIC st 394.6 17 Syst , Us r Pr cti c t ti 3 0.4

    Acc ss Sec rityAut entic ti n/Aut riz ti n 391.3 18 VeterinaryMedicine 3 0.3

    3 WMC-Office fAcademicComputing 384.9 19 ataMarts 316.0

    4 SponsoredPrograms 375.1 20 ComputerScience 312.0

    5 Systems evelopment Met odology 368.1 21 Net orkandServerEnvironment 310.6

    6 OIT-Business InformationSystems 364.5 22 Net orkOperations Center 308.17 OIT-Net orkandCommunications Services 359.1 23 JohnsonSchool ofManagement-ParkerCenter 304.3

    8 Wireless Net ork 353.2 24 University Library 304.1

    9 PeopleSoft ApplicationandSecurity 347.8 25 Cornell Nanoscale Facility 293.1

    10 Program, ata, & TransactionSecurity 343.8 26 Soft arePiracy 288.4

    11 OIT-Distributed LearningServices andATA 338.1 27 MainframeSecurity 281.8

    12 Computing & InfoScience 336.0 28 Gannett HealthCenter 277.0

    13 ChangeControl &ChangeManagement 333.4 29 Adabas Database 277.014 OIT-Systems andOperations 333.2 30 OIT-CustomerServiceandMarketing 269.4

    15 OIT-IntegrationandDelivery 328.9 31 CUPolice 229.9

    16 OracleDatabase 322.7 32 GenevaAgricultural Experiment Station 226.4

    Legend: Bold = Business Process

    Blue = Institutional Concerns

    Red = SeniorStaffConcerns

  • 8/7/2019 IT Audit Presentation 2-26-2006

    13/34

    February 14, 2007 13

    Information Technology Audit

  • 8/7/2019 IT Audit Presentation 2-26-2006

    14/34

    February 14, 2007 14

    IT Audit Role

    Advising the Audit Committee and seniormanagement on IT internal control issues

    Performing IT Risk Assessments

    Performing:

    Institutional Risk Area Audits

    General Controls Audits

    Application Controls Audits

    Technical IT Controls Audits Internal Controls advisors during systems

    development and analysis activities.

  • 8/7/2019 IT Audit Presentation 2-26-2006

    15/34

    February 14, 2007 15

    IT Audit Process Words that come to mind when you hear Audit

    Proctology

    Chinese Water Torture Root Canal

    You may be wondering "why me?"

    Understanding the reasons for an audit and the processinvolved can help alleviate your fears

    The audit process is generally a ten-step procedure:1. Notification & Request for Preliminary Information

    2. Planning

    3. Opening Meeting

    4. Fieldwork

    5. Communication

    6. DraftReport

    7. ManagementResponses

    8. Closing Meeting

    9. Report Distribution

    10. Follow-up

  • 8/7/2019 IT Audit Presentation 2-26-2006

    16/34

    February 14, 2007 16

    IT General Controls

    IT ControlsIT ControlsIT ControlsIT Controls

    GeneralGeneral

    ControlsControls

    GeneralGeneral

    ControlsControls

    IT Concerns and Issues

    DisasterRecovery

    Business Resumption Plans BRP Testing

    Alternate Processing

    Physical Security Physical Access

    HVAC

    Fire Protection

    UPS

    Backup/Contingency Planning Data Backups

    Restore Procedures

    Offsite Storage

    Change Management

    Program Change Controls

    Tracking

    Change Approvals

  • 8/7/2019 IT Audit Presentation 2-26-2006

    17/34

    February 14, 2007 17

    IT Application Controls

    IT ControlsIT ControlsIT ControlsIT Controls

    ApplicationApplication

    ControlsControls

    ApplicationApplication

    ControlsControls

    IT Concerns and Issues

    Output Controls

    Reconciliation

    Distribution

    Access

    Processing Controls

    Audit Trails

    Interface Controls

    Control Totals

    Access Controls

    User-IDs/Passwords

    Data Security

    NetworkSecurity

    Security Administration

    Access Authorization

    GeneralGeneral

    ControlsControls

    GeneralGeneral

    ControlsControls

    Input Controls

    Data Entry Controls

    System Edits

    Segregation of Duties

    Transaction Authorization

  • 8/7/2019 IT Audit Presentation 2-26-2006

    18/34

    February 14, 2007 18

    IT Policies

  • 8/7/2019 IT Audit Presentation 2-26-2006

    19/34

    February 14, 2007 19

    Cornell University IT Policies Interim Policies:

    Authentication ofIT Resources Privacy of the Network

    Established Policies: In the University Library of Policies, informationtechnologies occupies Volume 5.

    Abuse of Computers and Network Systems, June 1990

    Policy 5.1 Responsible Use ofElectronic Communications, October 1995

    Policy 5.2 Mass Electronic Mailing, January 2003

    Policy 5.3 Use ofEscrowed Encryption Keys, January 2003

    Policy 5.4.1 Security ofInformationTechnology Resources, June 2004

    Policy 5.4.2 ReportingElectronic Security Incidents, June 2004

    Policy 5.5 Stewardship and Custodianship ofElectronic Mail, Feb. 2005

    Policy 5.6 Recording and Registration of Domain Names, April 2004 Policy 5.7 Network Registry, June 2004

    Related Policy:

    Policy 4.12 Data Stewardship and Custodianship, May 2003

  • 8/7/2019 IT Audit Presentation 2-26-2006

    20/34

    February 14, 2007 20

    The Changing Face

    of IT Audit

  • 8/7/2019 IT Audit Presentation 2-26-2006

    21/34

    February 14, 2007 21

    The Changing Role of the IT Auditor

    IT Audit plays a major role in development of ITGovernance framework

    Moving away from policing role into a specialist role inthe areas of risks and control

    Adding value at strategic and operational levels throughthe provision of business risk-focused advice andassurance

    Legislation is having a profound impact on IT Auditing

    (SOx, GLBA, HIPAA, FERPA, Privacy NotificationRegulations )

    The continuously changing technology environment bringsnew risks (i.e. Cyber security, wireless )

  • 8/7/2019 IT Audit Presentation 2-26-2006

    22/34

    February 14, 2007 22

    Emerging & Prevalent IT Audit Issues

    Inadequate or Lack of Management Oversight

    PoorSegregation of Duties

    Inadequate or Lack ofSupporting Documentation

    No Business Continuity/DisasterRecovery Plan

    Change Management

    Data Security

    Data Loss Incidents

  • 8/7/2019 IT Audit Presentation 2-26-2006

    23/34

    February 14, 2007 23

    What you can do to preparefor an IT Audit?

    Read all relevant University IT Policies

    Perform a risk assessment

    Know your IT vulnerabilities

    Identify the internal controls that wouldmitigate inherent risk

    Document your business processes, systems,policies and procedures

    Keep Current on the Laws and Regulations

    Call the Audit Office for advice

  • 8/7/2019 IT Audit Presentation 2-26-2006

    24/34

    February 14, 2007 24

    IT Controls

  • 8/7/2019 IT Audit Presentation 2-26-2006

    25/34

    February 14, 2007 25

    Understanding IT Controls

    A top-down approach -

    used when considering

    IT controls.

  • 8/7/2019 IT Audit Presentation 2-26-2006

    26/34

    February 14, 2007 26

    IT control is a process thatprovides assurance for

    information and information

    services, and help to mitigate

    risks associated with use oftechnology.

    Understanding IT Controls

  • 8/7/2019 IT Audit Presentation 2-26-2006

    27/34

    February 14, 2007 27

    Importance of IT Controls

    Needs for IT controls, such as

    controlling cost

    protecting information assets

    complying with laws and

    regulations Implementing effective IT

    controls will improve efficiency,

    reliability, and flexibility.

  • 8/7/2019 IT Audit Presentation 2-26-2006

    28/34

    February 14, 2007 28

    Roles and Responsibilities

    Board of Directors /Governing

    Body

    Management define, approve,

    implement IT controls

    Auditor

  • 8/7/2019 IT Audit Presentation 2-26-2006

    29/34

    February 14, 2007 29

    Based On Risk

    Analyzing Risk Identify and prioritize risks

    Consider risk indetermining the adequacyof IT controls

    Define risk mitigationstrategy accept/mitigate/share

  • 8/7/2019 IT Audit Presentation 2-26-2006

    30/34

    February 14, 2007 30

    Monitoring

    Monitoring IT Controls

    Ongoing monitoring/special

    review/automated

    continuous auditing

  • 8/7/2019 IT Audit Presentation 2-26-2006

    31/34

    February 14, 2007 31

    Assessment

    Assessing IT controls is an

    ongoing process

    Technology continues to

    advance New vulnerabilities emerge

  • 8/7/2019 IT Audit Presentation 2-26-2006

    32/34

    February 14, 2007 32

    How can I determine if the InternalControls in my area are adequate?

    The central theme of internal control is (1) to identifyrisks to the achievement ofthe organizationsobjectives, and (2) to do what is necessary to managethese risks.

    1. Identify the business objectives of your area.2. Identify the risks that could prevent your department

    from achieving these objectives.

    3. Identify the controls that will manage the risksidentified above.

    4.Implement the controls that were identified whichminimize risk in a cost effective manner.

    5. Periodic review of objectives and controls to determineif they still apply

  • 8/7/2019 IT Audit Presentation 2-26-2006

    33/34

    February 14, 2007 33

    A car has brakes

    to allow it to go faster

  • 8/7/2019 IT Audit Presentation 2-26-2006

    34/34

    February 14, 2007 34

    University Audit Office

    Contact Information

    Phone: 255-9300

    email: [email protected] Page: http://audit.cornell.edu/