systems development life cycle

3
J OURNAL O NLINE 1 Copyright © 2007 ISACA. All rights reserved. www.isaca.org. Systems Development Life Cycle and IT Audits 1 In systems development, the temptation to skip certain prescribed tasks associated with documentation, combined with the fast- paced life of IT professionals, can create an environment that is not able to properly employ the best practices of systems development. However, the employment of best practices has proven over the years to provide returns in both efficiencies and effectiveness. In all types of audit, the employment of any set of “best practices” is generally seen by auditors as a positive impact on the quality of the information, systems or operations being audited. In the case of the systems development life cycle (SDLC), some practices provide additional benefits in terms of IT audits. Specifically, throughout the steps in the SDLC, documentation is being created that provides valuable potential sources of evidence for IT auditors. In other words, employing SDLC as it is prescribed in the industry is a control. In this article, the conventional phases of the SDLC—and how each one can provide this potential evidence—will be discussed. Different groups use different lists of steps in the SDLC, but almost all agree on the same elements. Herein, a list of eight phases is used to demonstrate this process of analyzing an entity’s SDLC. A summary of six of the eight phases and examples of related documentation are depicted in figure 1. Other documentation should exist; those contained in the figure are for illustrative purposes. Phase One: Systems Planning In phase one, systems are planned using a strategic approach. Executives and others evaluate the effectiveness of systems in terms of meeting the entity’s mission and objectives. This process includes general guidelines for system selection and systems budgeting. Management develops a written long-term plan for systems that is strategic in nature. The plan will change in a few months, but much evidence exists that such planning pays dividends in terms of effective IT solutions over the long term. This phase is similar to IT governance, and the two are quite compatible. Thus, the first thing an IT auditor would like to see is the implementation of IT governance activities. During this phase, several documents will be generated. They include the long-term plan, policies for selection of IT projects, and a long-term and short-term IT budget, as well as preliminary feasibility studies and project authorizations. Project proposals should have been documented when submitted to management, and a project schedule should exist that contains the approved projects (see figure 1). The presence of these documents illustrates a structured, formal approach to systems development and, as such, illustrates an effective planning system for IT projects and systems. It also demonstrates a formal manner of approving IT projects. IT auditors will want to verify the presence of a systems planning phase (or IT governance activities) and take a sample of the documents to verify the effectiveness of that system. The same audit procedure will be true for all of the other seven phases and, therefore, will not be repeated in the narratives of phases two through eight. Phase Two: Systems Analysis In the systems analysis phase, IT professionals gather information requirements for the IT project. Facts and samples to be used in the IT project are gathered primarily from end users. A systems analyst or developer then processes the requirements, producing a document that summarizes the analysis of the IT project. The result is some kind of documentation, such as a systems analysis report (see figure 1). Other documentation should exist. In effect, systems analysis illustrates the entity’s ability to be thorough with its systems development. Phase Three: Conceptual Design Next comes the conceptual design phase. In phase two, systems analysis, the requirements have been gathered and analyzed. Up to this point, the project is on paper and each user group has a slightly different view of what it should be. At this point, a conceptual design view is developed that encompasses all of the individual views. A variety of possible documents could be the output of this phase. Figure 1 uses a data flow diagram (DFD), developed to a general level at this point, as an example. The point is that one or more of these documents should exist if the entity is following the SDLC thoroughly. Phase Four: Systems Evaluation and Selection During the systems evaluation and selection, managers and IT professionals choose among alternatives that satisfy the requirements developed in phases two and three, and meet the general guidelines and strategic policies of phase one. Part of the analysis of alternatives is to do a more exhaustive and detailed feasibility study—actually, several types of feasibility studies. A technical feasibility study examines whether the current IT infrastructure makes it feasible to implement a specific alternative. A legal feasibility study examines any legal ramifications of each alternative. An operational feasibility study determines if the current business

Upload: bianca-jane-maaliw

Post on 21-Jul-2016

9 views

Category:

Documents


1 download

DESCRIPTION

SDLC stages by ISACA, internal auditing

TRANSCRIPT

Page 1: Systems Development Life Cycle

J O U R N A L O N L I N E 1

Copyright © 2007 ISACA. All rights reserved. www.isaca.org.

Systems Development Life Cycle and IT Audits1

In systems development, the temptation to skip certain prescribed tasks associated with documentation, combined with the fast-paced life of IT professionals, can create an environment that is not able to properly employ the best practices of systems

development. However, the employment of best practices hasproven over the years to provide returns in both efficienciesand effectiveness.

In all types of audit, the employment of any set of “bestpractices” is generally seen by auditors as a positive impact onthe quality of the information, systems or operations beingaudited. In the case of the systems development life cycle(SDLC), some practices provide additional benefits in terms ofIT audits. Specifically, throughout the steps in the SDLC,documentation is being created that provides valuable potentialsources of evidence for IT auditors. In other words, employingSDLC as it is prescribed in the industry is a control.

In this article, the conventional phases of the SDLC—andhow each one can provide this potential evidence—will bediscussed. Different groups use different lists of steps in theSDLC, but almost all agree on the same elements. Herein, alist of eight phases isused to demonstrate this process of analyzing an entity’sSDLC. A summary of six of the eight phases and examples ofrelated documentation are depicted in figure 1. Otherdocumentation should exist; those contained in the figure arefor illustrative purposes.

Phase One: Systems PlanningIn phase one, systems are planned using a strategic

approach. Executives and others evaluate the effectiveness ofsystems in terms of meeting the entity’s mission andobjectives. This process includes general guidelines for systemselection and systems budgeting. Management develops awritten long-term plan for systems that is strategic in nature.The plan will change in a few months, but much evidenceexists that such planning pays dividends in terms of effectiveIT solutions over the long term.

This phase is similar to IT governance, and the two arequite compatible. Thus, the first thing an IT auditor would liketo see is the implementation of IT governance activities.

During this phase, several documents will be generated.They include the long-term plan, policies for selection of ITprojects, and a long-term and short-term IT budget, as well aspreliminary feasibility studies and project authorizations.Project proposals should have been documented whensubmitted to management, and a project schedule should existthat contains the approved projects (see figure 1).

The presence of these documents illustrates a structured,formal approach to systems development and, as such,illustrates an effective planning system for IT projects andsystems. It also demonstrates a formal manner of approving IT

projects. IT auditors will want to verify the presence of a systems

planning phase (or IT governance activities) and take a sampleof the documents to verify the effectiveness of that system.The same audit procedure will be true for all of the other sevenphases and, therefore, will not be repeated in the narratives ofphases two through eight.

Phase Two: Systems AnalysisIn the systems analysis phase, IT professionals gather

information requirements for the IT project. Facts and samplesto be used in the IT project are gathered primarily from endusers. A systems analyst or developer then processes therequirements, producing a document that summarizes theanalysis of the IT project.

The result is some kind of documentation, such as asystems analysis report (seefigure 1). Other documentation should exist. In effect, systemsanalysis illustrates the entity’s ability to be thorough with itssystems development.

Phase Three: Conceptual DesignNext comes the conceptual design phase. In phase two,

systems analysis, the requirements have been gathered andanalyzed. Up to this point, the project is on paper and eachuser group has a slightly different view of what it should be.At this point, a conceptual design view is developed thatencompasses all of the individual views.

A variety of possible documents could be the output of thisphase. Figure 1 uses a data flow diagram (DFD), developed toa general level at this point, as an example. The point is thatone or more of these documents should exist if the entity isfollowing the SDLC thoroughly.

Phase Four: Systems Evaluation and Selection

During the systems evaluation and selection, managers andIT professionals choose among alternatives that satisfy therequirements developed in phases two and three, and meet thegeneral guidelines and strategic policies of phase one.

Part of the analysis of alternatives is to do a moreexhaustive and detailed feasibility study—actually, severaltypes of feasibility studies. A technical feasibility studyexamines whether the current IT infrastructure makes itfeasible to implement a specific alternative. A legal feasibilitystudy examines any legal ramifications of each alternative. Anoperational feasibility study determines if the current business

Page 2: Systems Development Life Cycle

I N F O R M A T I O N S Y S T E M S C O N T R O L J O U R N A L , V O L U M E 3 , 2 0 0 4

processes, procedures and skills of employees are adequate tosuccessfully implement the specific alternative. Last, ascheduled feasibility study relates to the firm’s ability to meetthe proposed schedule for each alternative. Each of theseshould lead to a written feasibility report.

Another aspect of this phase is a cost-benefit analysis.Quantifying tangible and intangible costs and benefits, anaccountant should be able to determine the value of eachalternative. This phase is associated with how to assess thevalue of IT.

Finally, since a definitive choice among alternatives is beingmade, a selection report should be written to explain thereasons behind the choice and, possibly, include the cost-benefit and feasibility studies.

Phase Five: Detailed DesignAt this point, IT professionals have chosen the IT solution.

The DFD design created in phase three is “fleshed out”; that is,details are developed and (hopefully) documented. Examplesof the types of documentation created include use cases,Unified Modeling Language (UML) diagrams, entityrelationship diagrams (ERDs), relational models andnormalized data diagrams. Other systems design documentscould also exist. IT professionals often do a walk-through ofthe software or system to see if any defects in the system canbe detected during development. That walk-through shouldalso be documented.

To summarize this phase, a detailed design report should bewritten to explain the steps and procedures taken. It would alsoinclude the design documents referred to previously.

Phase Six: Programming and TestingSystems

For in-house development of applications, current bestpractices include the use of object-oriented (OO) programs andprocedures. IT auditors should be interested in the ITprogramming shop’s choice of tools and procedures. Somebusinesses are locked into legacy systems and applications and,thus, would not be expected to use OO (e.g., banks). ITauditors would also be interested in programming flow chartsas documentation.

No element of SDLC is more important than systemstesting. Perhaps none of the phases has been more criticizedthan testing for being absent or performed at a substandardlevel. Sometimes management will try to reduce the costs of anIT project by cutting out or reducing the testing.

Sound testing includes several key factors. The testingshould be done offline before being implemented online.Individual modules should be tested, but even if a modulepasses the test, it should be tested in the enterprise systemoffline before being employed. That is, the modules should betested as stand-alone and then, in conjunction with otherapplications, tested systemwide. Test data and results should bekept, and end users should be involved in the testing.

Figure 1 does not include this phase, but clearly the testresults should be documented. The IT auditor will want to gainsome assurance that proper testing of applications and systemshas occurred before they are being put into operations.

2

PreliminaryFeasibility

DetailedDesignReport

Data FlowDiagram(detail)

ERDiagram

PostimplementationReview

ProgramFlowcharts Documentation

UserAcceptance

Report

RelationalModel

NormalizedData

ProjectAuthorization

FeasibilityStudy

Cost-benefitAnalysis

SystemSelectionReport

SystemAnalysis Report

Data FlowDiagram(general)

ProjectProposal

ProjectSchedule

SystemsPlanning

SystemsAnalysis

ConceptualDesign

SystemsSelection

DetailedDesign

SystemsImplementation

Figure 1—SDLC Phases and Associated Documentation

Page 3: Systems Development Life Cycle

J O U R N A L O N L I N E3

Information Systems Control Journal is published by ISACA. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscription tothe Information Systems Control Journal.

Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the ITGovernance Institute® and their committees, and from opinions endorsed by authors’ employers, or the editors of this Journal. Information Systems Control Journal does not attest to the originality ofauthors' content.

© Copyright 2007 by ISACA. All rights reserved.

Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from theassociation. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articlesowned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article.Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expresslyprohibited.

www.isaca.org

Phase Seven: Systems ImplementationAt this point, the system should be ready to deploy. The last

step before deployment is a user acceptance sign-off. Nosystem should be deployed without this acceptance. The useracceptance report should be included in the documentation ofthis phase.

After deployment, however, the SDLC processes are notfinished. One key step after implementation is to conduct apostimplementation review. This reviews the cost-benefitreport, traces actual costs and benefits, and sees how accuratethe projections were and if the project is able to produce anadequate return. The systems design is also reviewed andcompared to the performance of the system to see if theinformation requirements processes (phases two and three)were performed adequately. In general, the time, costs andrequirements are the three main elements of any IT project,and those elements should be benchmarked somehow.

This step also reviews all of the system documentation todetermine if it is adequate for the next phase: maintenance. Ifit is developed properly and according to SDLC best practices,it will be adequate.

At a minimum, a user acceptance report and apostimplementation report should be documented during this phase.

Phase Eight: Systems MaintenanceIT professionals and IT auditors know that 80 percent of the

costs and time spent on a software system, over its life cycle,occur after implementation. It is precisely for this reason thatall of the previously mentioned SDLC documentation shouldbe required. Obviously, the entity can leverage the 80 percentcost by providing excellent documentation. That is the placefor the largest cost savings over the life of the system. It is alsothe argument against cutting corners during development bynot documenting steps and the system.

As changes occur, there should be change authorizations,change implementation and testing documents created duringthose changes. Testing during the maintenance phase should beable to use most of the original test data and test results,significantly reducing the time and effort necessary toadequately test the changes.

ConclusionEmploying the best practices of SDLC is not just a good

idea in the IT industry; it serves as a control over systemsdevelopment for IT auditors and provides documentation thatthe IT auditor can use to gain assurance over the adequacy andeffectiveness of the entity’s SDLC procedures.

IT auditors are able to verify that SDLC best practices areoperating effectively by examining documentation that shouldhave been created during the various phases. Of course, ITauditors would use other means of verification, such as inquiryand checklists, but the presence of proper SDLCdocumentation illustrates the level of application of the bestpractices in SDLC. A review of a sample of the documentswill provide evidence that the entity is using SDLC bestpractices, which provides some assurance that systems arebeing developed efficiently and effectively.

Endnotes1 The majority of the content from this article is taken from:

Hall, James; Tommie Singleton; IT Audit and Assurance, 2nd Edition, Thomson-Southwestern Publishing, 2005.

Tommie W. Singleton, Ph.D., CISA, CMA, CPA, CITPis an assistant professor of information systems at the Universityof Alabama at Birmingham (USA), Marshall IS Scholar, anddirector of the Forensic Accounting Program. Prior to obtaininghis doctorate in accountancy from the University of Mississippi(USA) in 1995, Singleton was president of a small, value-addeddealer of accounting information systems usingmicrocomputers. In 1999, the Alabama Society of CPAsawarded Singleton the 1998-1999 Innovative User of Technology Award. Singleton isthe ISACA academic advocate at the University of Alabama atBirmingham. His publications on fraud, IT/IS, IT auditing andIT governance have appeared in numerous journals, includingthe Information Systems Control Journal.