Prévia do material em texto
License Agreement for The IIA’s CIA Challenge Exam Study Guide STUDENT MATERIALS By opening and using The IIA’s CIA Challenge Exam Study Guide student materials (the “Materials”), the user (“User”) hereby agrees as follows: (i) That The Institute of Internal Auditors is the exclusive copyright owner of the Materials. (ii) Provided that the required fee for use of the Materials by User has been paid to The IIA or its agent, User has the right, by this License, to use the Materials solely for his/her own educational use. (iii) User has no right to print or make any copies, in any media, of the materials, or to sell, or sublicense, loan, or otherwise convey or distribute these materials or any copies thereof in any media. ® ® The IIA’s CIA Challenge Exam Study Guide The IIA’s CIA Challenge Exam Study Guide is based on select portions of the Certified Internal Auditor (CIA ) syllabus developed by The IIA. However, program developers do not have access to the exam questions. Therefore, while the study guide is a good tool for study, reading the text does not guarantee a passing score on the CIA exam. Every effort has been made to ensure that all information is current and correct. However, laws and regulations change, and these materials are not intended to offer legal or professional services or advice. This material is consistent with the revised Standards of the International Professional Practices Framework (IPPF) introduced in July 2015, effective in 2017. Copyright These materials are copyrighted; it is unlawful to copy all or any portion. Sharing your materials with someone else will limit the program’s usefulness. The IIA invests significant resources to create quality professional opportunities for its members. Please do not violate the copyright. Acknowledgments The IIA would like to thank the following dedicated subject matter experts who shared their time, experience, and insights during development and subsequent updates. ® ® ® ® Subject matter experts Farah George Araj, CPA, CIA, CFE, QIAL, Australia Scott Blankenship, CIA, CRMA, CPA, CFE, United States Melissa Clawson, CIA, CRMA, United States Christy Decker-Weber, CIA, CRMA, CPA, CFE, CHIAP Jayson Walter Kwasnik, CIA, CPA, CA, Canada Jessica Minshew, CIA, United States Joanne F. Prakapas, CIA, CRMA, CFE, CPA, CFF, United States James M. Reinhard, CIA, United States Elizabeth Sandwith, CFIIA, United Kingdom Past subject matter experts Pat Adams, CIA Terry Bingham, CIA, CISA, CCSA Raven Catlin, CIA, CPA, CFSA Patrick Copeland, CIA, CRMA, CISA, CPA Don Espersen, CIA Michael J. Fucilli, CIA, QIAL, CRMA, CGAP, CFE James D. Hallinan, CIA, CPA, CFSA, CBA Larry Hubbard, CIA, CCSA, CPA, CISA Al Marcella, PhD, CISA, CCSA Markus Mayer, CIA Vicki A. McIntyre, CIA, CFSA, CRMA, CPA Gary Mitten, CIA, CCSA Lynn Morley, CIA, CGA Lyndon Remias, CIA James Roth, PhD, CIA, CCSA Brad Schwieger, CPA, DBA Doug Ziegenfuss, PhD, CIA, CCSA, CPA, CMA, CFE, CISA, CGFM, CR.FA., CIT Jim Key, CIA David Mancina, CIA, CPA Part 3: Business Knowledge for Internal Auditing This part of The IIA’s CIA Challenge Exam Study Guide focuses on key areas of knowledge that can help internal auditors with audit engagements. Some subjects will be directly applicable to any internal audit activity, such as examining risk and control implications of different organizational structures or project management. Knowledge in subjects such as strategic planning, global business environments, or information security can also help the internal auditor to demonstrate to stakeholders that he or she has a firm understanding of the organization’s business practices and industry environment. Internal auditors who are perceived as having business savvy and organizational familiarity will be in a position to deliver value and insight. Decision makers may place more weight on recommendations that are sensitive to the organization’s strategy and the complexities of its global challenges. In brief, the sections in Part 3 are as follows: Section A: Business Acumen. Strategic planning process, organizational structure, business processes, and project management. Section B: Data Analytics. Data analytics types, governance methods, frameworks, processes, and use in internal auditing. Section C: Information Technology and Security. Information security controls, data privacy laws and their potential impact, emerging technology practices, existing and emerging cybersecurity risks, security-related policies, the systems development life cycle (SDLC) and delivery, change controls, and IT control frameworks. Section A: Business Acumen This section is designed to help you: Describe the strategic planning process and key activities. Define objective setting. Identify globalization and competitive considerations. Explain the process of aligning strategic planning to the organization’s mission and values. Appraise the risk and control implications of different organizational structures and common business processes. Identify project management techniques. According to The IIA The IIA’s guidance referenced in the Challenge Exam Study Guide may be accessed using the links below. Access to specific pages and documents varies for the public and The IIA members. Attribute Standards: www.theiia.org/Attribute-standards Performance Standards: www.theiia.org/Performance- standards Standards and Guidance: www.theiia.org/Guidance Position Papers: www.theiia.org/Position-papers Implementation Guidance: www.theiia.org/Practiceadvisories Practice Guides and GTAGs: www.theiia.org/Practiceguides In a tightly competitive market, customers demand more for less and have access to multiple sources of quality goods and services at https://na.theiia.org/standards-guidance/attribute-standards/Pages/Attribute-Standards.aspx https://na.theiia.org/standards-guidance/performance-standards/Pages/Performance-Standards.aspx https://na.theiia.org/standards-guidance/Pages/Standards-and-Guidance-IPPF.aspx https://na.theiia.org/about-us/about-ia/Pages/Position-Papers.aspx https://na.theiia.org/standards-guidance/recommended-guidance/Pages/Practice-Advisories.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Practice-Guides.aspx competitive prices. Organizations are examining every business process to improve quality and performance to address these rising customer expectations. Also, a key long-term benefit of investing in quality is that organizations have a strong potential to improve their revenue/profit due to repeat business from loyal customers. This section will examine a number of different techniques and concepts that organizations can use to help them analyze business process performance and be more competitive. Topic 1: Strategy, Globalization, and Audit Alignment This topic addresses an organization’s strategic planning process and setting strategic objectives, globalization and competitive considerations, and aligning audit subjects to the organization’s mission and values. Objective and Strategy Setting An organization’s objectives define what the organization wants to achieve, and its ongoing success depends on the accomplishment of its objectives. For most organizations, a primary blanket objective is to enhance stakeholder value. Objectives also indicate what is expected from a governance, risk management, and internal control perspective. At the highest level, these objectives are reflected in the organization’s mission and vision statements. To get buy-in, a best practice is to get input from people at all organizational levels when developing or updating these statements. The mission statement is a broad expression of what the organization wants to achieve in the present. The mission statement: Needs to clearly indicate the organization’s purpose—its reason for being and how it proposes to add value for its customers and other stakeholders. Serves as a day-to-day charge to thethe end result is supposed to be or accomplish. In addition, defining what is “out of scope” helps limit unwanted work. These constraints often compete with each other. Increased scope or quality typically means increased time and cost. A tight time constraint might mean increased costs and reduced scope. A tight budget can mean increased time and reduced scope. Quality project management is about providing the tools and techniques that enable the entire project team to organize their work and meet these constraints. If the project manager determines that project changes or issues make meeting any of these constraints infeasible, he or she will need to promptly discuss the issue with management or possibly a change control board. Time, Resources, and Cost The following project elements are interrelated, so planning for one area impacts the others. Project Teams Project plans and their execution are only as successful as the manager and the team who implement them. Building effective teams is critical to the success of any project. Projects commonly include the following roles and team members: Project stakeholders are internal and external individuals and organizations who are actively involved in the project or whose interests may be affected as a result of project execution or completion. Key stakeholders include the project manager, the customer or end user (e.g., the board for internal audit projects), and the project team. The project sponsor is the person or group who wants the project to occur, who champions support for the project, and who commits the necessary resources. The project manager is the project leader. He or she is responsible for coordinating and integrating activities and is accountable for project success. A project manager is often a client representative who determines and implements the client’s needs. The project team is the custom team for a specific project. The team members disband when the project is over. The quality level of team members may impact cost and time. Project Time, Cost, and Resources Project managers and their team members can use a variety of tools and techniques to plan, schedule, and manage their projects. Tools commonly associated with project management include Gantt charts and network analysis tools. The concept behind these tools is that during a project, some activities, known as sequential or linear activities, need to be completed in a particular sequence, with each stage being completed before the next activity or task can begin. Other activities are not dependent on the completion of any other tasks and can be completed at any stage during the time line. These are nondependent or parallel tasks that can be scheduled based on resource availability. Other essential project management techniques include the project budget for cost planning and control and change management to control the scope of the project. The project budget is used as a baseline against which variances from intended costs are measured. Gantt Chart The Gantt chart (also known as a horizontal bar chart, a milestone chart, or an activity chart) is a project scheduling technique that divides each project into sequential activities with estimated start and completion times. It allows the decision maker to visually review a schematic presentation of the project time budget and compare it with the actual times. To create a Gantt chart, the project manager plots the steps of the project and their sequence and duration. The list includes the earliest start date for each task, the estimated length of time it will take, and whether it is parallel or sequential. This forms the basis of the scheduling chart shown in Exhibit 3-16. A Gantt chart’s simplicity allows for easy schedule modifications. Exhibit 3-16: Gantt Chart A Gantt chart: Helps plan tasks that need to be completed. Provides a basis for scheduling when tasks will be executed. Helps plan the allocation of resources necessary to complete the project. Helps determine the critical path for a project with a hard deadline. Is appropriate for internal audit scheduling because the audit process does not often require sequence revisions. Network Analysis (PERT/CPM) A project network is the graphical representation of a project’s tasks and schedule. Network analysis involves evaluating the network of tasks and functions that contribute to a project in order to determine the most efficient path for reaching the project goals. Network analysis software can help complete project scheduling, including tracking resource costs and usage. Network analysis can help: Project managers schedule activities in projects with many separate jobs or tasks performed by many departments and individuals. Project managers identify possible ways to revise or shorten the sequence of activities to expedite the project and/or lower costs. Internal auditors understand the risk and control implications of projects, especially in complex industries like construction and aircraft manufacturing. Two common types of network analysis are the program evaluation review technique (PERT) and the critical path method (CPM). Due to their similarity, this type of network analysis is now often referred to as PERT/CPM. These methods are used to schedule, organize, and coordinate tasks, generally for large, complex projects with a high degree of inter-task dependency. Internal auditors may use these tools in evaluating efficiency or may verify their proper use. A PERT/CPM chart illustrates a project flow graphically. Circles or rectangles represent project milestones that are linked by arrows that indicate the sequence of tasks. Constructing a PERT/CPM network requires three inputs: Tasks necessary to complete the project Time required to complete these tasks Task sequence—including which tasks must be sequential and which can be parallel The goal of the PERT/CPM chart is to identify the critical path. The critical path is the sequence of activities that have no slack and will collectively take the longest to complete, which defines the shortest possible total project duration. Slack time is the amount of additional time that an activity start can be delayed or an activity can take to complete without delaying the overall project. Activities on the critical path by definition have no slack, meaning that their start times and durations need to be on schedule or the whole project will be delayed. Tasks that are not on the critical path may have slack and so could be started later or have duration delays without affecting the overall schedule (until their slack is used up). Exhibit 3-17 shows an example of a PERT/CPM chart. Exhibit 3-17: PERT/CPM Chart Source: Sawyer’s Internal Auditing, fifth edition, by Lawrence B. Sawyer, et al. Used with permission. In Exhibit 3-17, there are five possible paths to reach the project endpoint (7) and the longest one is the critical path: 1-2-4-7 (98 days) 1-2-3-5-7 (100 days) 1-2-4-5-7 (108 days)—the critical path because it takes the longest to complete 1-3-5-7 (102 days) 1-6-7 (92 days) The following are benefits and disadvantages of PERT/CPM: They identify and prioritize tasks that must be completed on time for the whole project to be completed on time. They identify sequential and parallel tasks. They identify which tasks can be delayed or accelerated without jeopardizing the project. They form the basis for all planning and predicting. They help in scheduling and managing complex projects. They show the best use of resources to achieve the goal within time and cost limitations. Unknowns can still impact a schedule, such as delays in resource availability. Gantt charts are easier to interpret and are usually still needed. Project Manager Schedule Adjustment or Correction Tools Unexpected delays or resource conflicts can occur, so a project manager needs to be able to shorten or adjusta project’s time line. The project manager can do the following: Use “fast tracking” or add lead time. Lead time or “fast tracking” are methods to begin a scheduled task before its predecessor task is completed (if feasible), which means the tasks are performed simultaneously to some degree. For example, the original time line for an advertising brochure may call for the graphics to be completed after the writer finishes the first draft. If the illustrator gets the list of graphics two weeks earlier, there are two weeks’ lead time to finish the graphics, which can help if the illustrator would otherwise be double-booked. Fast tracking creates the risk of rework if the predecessor task impacts how the successor task should have been done. Use slack time. Activities not in the critical path often have slack. In our brochure example, if marketing activities are not on the critical path, there may be slack in the start date for these activities. Assign additional resources (“crashing”). It may be possible to increase the resources committed to a task on the critical path, which is called “crashing.” Assigning two people to write the first draft of the advertising brochure could cut the writing time in half (assuming no learning curve). Risks include budget overruns, inefficiency (e.g., learning curves), and diminishing returns for each additional resource. Schedule overtime. Tasks may be shortened by scheduling project members for overtime. If the critical path is shortened, a different sequence of tasks could become the new critical path. Change Management (Scope Control) While schedules and budgets can be used as baselines against which to measure variances, another tool is needed to ensure that the project remains on scope. Problems such as scope creep or gold plating not only consume staff time and other resources; they confuse schedules and plans because people are working on things that are not even in the schedule. A disciplined change management process can prevent scope creep/gold plating. All stakeholders need to be informed in advance of the required process for requesting changes to the scope as agreed upon and proven by the signatures on the project charter. Project team members need training on avoiding doing more work than is in the plan and need to keep in mind that: The client may not even appreciate this work. The organization will not appreciate the project going off schedule/budget for unnecessary or avoidable reasons. A formal change management process (also called change control) involves these steps: A project stakeholder submits a change order request, which is a request for a significant project change. Significant change is a change that would impact the scope, schedule, or budget. (The project manager has discretion for changes below this threshold.) The project manager or a change control board for the project perform a change impact assessment, which is a two step-process that reviews: The technical merits of the change (including how it impacts interrelated components). The impact of the change on the schedule, budget, or other constraints such as quality. Approved changes are reflected in budget, schedule, and plan updates, and the new plan version is provided and communicated to the team. Rejected changes and the rationale are communicated. Project managers might create a list or “parking lot” for changes to be considered later or in a future project. Key Point If a change is deemed to have technical merit, the project manager must insist on the project sponsor approving additional resources as needed to make the change. If the additional resources are not provided, the project manager should reject the change. Section B: Data Analytics This section is designed to help you: Describe data analytics, data types, data governance, and the value of using data analytics in internal auditing. Explain the data analytics process (define questions, obtain relevant data, clean/normalize data, analyze data, communicate results). Recognize the application of data analytics methods in internal auditing (anomaly detection, diagnostic analysis, predictive analysis, network analysis, text analysis, etc.). According to The IIA The IIA’s guidance referenced in the Challenge Exam Study Guide may be accessed using the links below. Access to specific pages and documents varies for the public and The IIA members. Attribute Standards: www.theiia.org/Attribute-standards Performance Standards: www.theiia.org/Performance- standards Standards and Guidance: www.theiia.org/Guidance Position Papers: www.theiia.org/Position-papers Implementation Guidance: www.theiia.org/Practiceadvisories Practice Guides and GTAGs: www.theiia.org/Practiceguides This section discusses the importance of data analytics to modern internal auditing. It addresses big data, the data analytics process, https://na.theiia.org/standards-guidance/attribute-standards/Pages/Attribute-Standards.aspx https://na.theiia.org/standards-guidance/performance-standards/Pages/Performance-Standards.aspx https://na.theiia.org/standards-guidance/Pages/Standards-and-Guidance-IPPF.aspx https://na.theiia.org/about-us/about-ia/Pages/Position-Papers.aspx https://na.theiia.org/standards-guidance/recommended-guidance/Pages/Practice-Advisories.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Practice-Guides.aspx and the application of data analytics methods. Topic 1: Data Analytics, Types, and Governance This topic starts by defining data analytics, data types, and the Vs of data—the qualities of data such as volume and velocity that need to be understood for data to be made into useful information. This discussion will help internal auditors understand why data analytics is becoming increasingly necessary for internal auditing. The topic also addresses the definition and importance of data governance and information security governance. According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Global Technology Audit Guide (GTAG) 16, “Data Analysis Technologies” Global Technology Audit Guide (GTAG), “Understanding and Auditing Big Data” Global Technology Audit Guide (GTAG) 15, “Information Security Governance” Data Analytics https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG16.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG-Understanding-and-Auditing-Big-Data.aspx https://bookstore.theiia.org/global-technology-audit-guide-gtag-15-information-security-governance Data analytics is the process of gathering and analyzing data and then using that data and the results gathered to provide business information for making better organizational decisions and implementing more relevant policies and procedures. It can also refer to data mining—gathering information from multiple sources to acquire results that management can use to make better-informed decisions. A definition relevant to CAEs is that data analytics is the process of using analytical techniques and repeatable automated processes (e.g., using scripts) to search for patterns and anomalies and to quantify and highlight potential risks and opportunities using operational, financial, and other data. Developing competency in data analytics starts by understanding the value of data analytics in internal auditing and learning about the qualities and types of data. Value of Using Data Analytics in Internal Auditing Key Point Data analytics is very important to the internal audit activity. For example, Standard 2240, “Engagement Work Program,” indicates that “work programs must include the procedures for identifying, analyzing, evaluating, and documenting information during the engagement.” Similarly, Standard 2320, “Analysis and Evaluation,” states that “internal auditors must base conclusions and engagement resultson appropriate analyses and evaluations.” These procedures and analyses often make significant use of data analytics. Implementation Guidance for Standard 2320 includes the following information related to analytical procedures. Analytical procedures are used to compare information against expectations, based on an independent (i.e., unbiased) source and the premise that certain relationships between information can be reasonably expected in the absence of conditions to the contrary. Analytical procedures may also be used during engagement planning (2200 series of standards). Examples of analytical procedures include: Ratio, trend, or regression analysis. Reasonableness tests. Period-to-period comparisons. Forecasts. Benchmarking information against similar industries or organizational units. https://na.theiia.org/standards-guidance/performance-standards/Pages/Performance-Standards.aspx https://na.theiia.org/standards-guidance/performance-standards/Pages/Performance-Standards.aspx https://na.theiia.org/standards-guidance/recommended-guidance/Pages/Practice-Advisories.aspx https://na.theiia.org/standards-guidance/performance-standards/Pages/Performance-Standards.aspx Internal auditors may further investigate any significant deviations from expectations to determine the cause and/or reasonableness of the variance (e.g., fraud, error, or a change in conditions). Unexplainable results may indicate a need for additional follow-up and may suggest the presence of a significant problem that should be communicated to senior management and the board... Each functional area in an organization needs to justify its own existence by showing that it adds more value than it costs to maintain. This is as true for internal auditing as it is for production, sales, or finance. Ways to add value include: Finding ways to operate more efficiently, or doing more with less. Operating more effectively, or doing the right things in the first place. Identifying cost-saving or revenue-generating opportunities for the organization, or adding consulting value. Data analytics has the potential to assist an audit review by transforming what otherwise might be a surplus of data into useful and actionable information in a timely fashion. Because internal audit has access to data from multiple areas of the organization, the function is uniquely positioned to transform data into information valuable to the organization. Data analytics will only become more common in the future in internal audit activities. The CAE may want to be proactive and sell the organization on making these strategic investments proactively. After all, identifying even a single major area for cost savings could pay for the investment in software and training. Here are some other specific benefits: Spend less time on data preparation, formatting, or calculating and more time on value-added analysis. Fully or partly automate previously manual audit tests and perform them on more (or all) of the items in a population, reducing the need to rely on random or judgmental sampling. Better filter out false positives or false negatives from results. Set rules such as a threshold for an invoice amount. Plan better audits by using analytics to better understand which areas or processes would receive the most benefit from an audit. Identify, categorize, prioritize, monitor, and manage risk more efficiently and effectively. Better detect fraud, errors, inefficiencies, red flags, and anomalies. Better assess the operating effectiveness of internal controls. Rely less on IT or general data analytics staff if internal auditors can run queries or scripts themselves. Key Point Internal audit activities that leverage data analytics better fulfill their responsibilities to evaluate and improve the organization’s governance, risk management, and control processes. They do this by freeing up internal auditor time due to fewer manual, time- consuming procedures. The internal audit activity can broaden the scope of its services when it uses less staff per engagement. The Vs of Data Analytics As stated in Data Analytics: Elevating Internal Audit’s Value, the four Vs of data are volume, velocity, variety, and veracity. The IIA’s Global Technology Audit Guide (GTAG), “Understanding and Auditing Big Data” discusses these and some additional Vs: variability, visualization, and value. Exhibit 3-18 addresses each of these Vs from the perspectives of data analytics or big data. While big data will be defined and discussed shortly, note that it is both a description of the massive amounts of data organizations may need to process and analyze as well as systems capable of making such data into actionable information. Exhibit 3-18: Vs of Data Analytics and Big Data V Why It Is Relevant to Data Analytics or Big Data https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG-Understanding-and-Auditing-Big-Data.aspx V Why It Is Relevant to Data Analytics or Big Data Volume Volume is the vast amount of data, which is significantly greater than it has ever been due to our ever-increasing abilities to capture data from the point of sale, surveys, Internet sources, and so on. This may mean that analysis needs to take place on servers (which could also improve security). Volume also means that internal auditors and other analysts can now test entire sets of data rather than sampling. This can reduce audit risk, save time, and allow unprecedented insight into operations. Velocity Velocity is the increased number of devices online and the large amount of collected data from around the world. Information can be rapidly gathered from anywhere. Variety Variety is the numerous types of data being identified, captured, and stored. This can include categorizations such as data formatted for particular software or for a functional area such as finance. V Why It Is Relevant to Data Analytics or Big Data Veracity Veracity is the truth of the data. Veracity is key, as data analytics is only as good as the underlying data. The adage “garbage in, garbage out” is never more true than in data analytics, yet veracity is often its most overlooked aspect. For example, an erroneous outlier in the source data could skew results and create a false positive or false negative result. In other words, without veracity, organizations risk faulty decisions and auditors risk material errors and erroneous recommendations. Controls can reduce risks of duplicate or incomplete records, entry errors, logic/formula errors, data that violates entry field rules, or otherwise inconsistent data. Investigating outliers is an example of an audit step for data preparation. Variability Variability is the wide range of data results and constant change of data. Variability is especially prevalent in big data. Visualization Visualization is the difficulty in providing easy-to- interpret yet accurate and useful visualizations of data or analytic results, such as in graphics and charts. This is also an issue for big data. Value Value is the opportunity of data analytics or big data to create new insights and translate the insights into actions that create positive outcomes that benefit organizations, consumers, and society. Data Types While there are many data types at the detail level (this speaks to the V for variety of data), a broad way to categorize data types is structured versus unstructured. Structured data is data formatted for ease of use for automated or semi-automated analysis, such as into columns and rows, much like a well-ordered spreadsheet. This will include data from databases such as functional area modules in an enterprise resource planning (ERP) system or an audit software package. The organization of structured data enables analysts to run repeatable queries that can be customized to specific objectives. However, data in different structured formats is often not compatible without being converted, which can be straightforwardor can require additional steps and custom software. Unstructured data is data that has not been formatted for ease of use for automated or semi-automated analysis (i.e., data that is not easy to sort or tabulate). Organizations are storing a vast amount of this type of data from social media, emails, word-processing documents, court proceedings, etc. Big Data Big data describes the exponential growth and availability of data created by people, applications, and smart machines as well as large, complex data sets or unstructured data that is beyond the capabilities of traditional data-processing applications. Organizations that invest in the required data collection, storage, processing power, and analytic tools can leverage big data for competitive advantage if they also bolster their data governance and information security governance (including privacy protection). Here are some examples of sources of big data: Internal systems (e.g., transaction data, customer complaints, email, messaging) Industry sources (e.g., customer adoption rates per product) Society data (e.g., traffic cameras, economic data, social media) Nature and weather (e.g., weather trends, earthquake data) Data available from external sources (e.g., data sets available for free use, data sets for purchase or lease such as market research) Mobile devices, Internet-connected devices, radio frequency ID (RFID) tags, etc. Web searches Key Point The internal audit activity may be able to leverage the acquired, consolidated, and integrated data in the organization’s big data system for use in data analytic efforts for audit projects. Key stakeholders in big data are discussed next, followed by audits of big data systems. Big Data Key Stakeholders Key stakeholders in big data initiatives at organizations include those listed in Exhibit 3-19. Exhibit 3-19: Big Data Key Stakeholders Project sponsor Executive-level resource who drives support and funding for the program Business/data owners Data owners who support data consolidation and integration into one solution that supports organizational goals Business analysts Specialists who maintain knowledge of business needs and technology capabilities to transform business requirements into big data solutions Consumers (e.g., marketing) Any function within the organization that consumes data and/or uses the analytic results, possibly including internal auditing Chief information officer Executive resource responsible for delivering the technology solution or partnering with external vendors when big data is outsourced Chief privacy officer/chief information security officer Executive resources to be consulted on controls related to the security, protection, and use of the data and resulting analytics Chief data officer Executive resource who directs enterprise-level data governance Technical data analytics resources/data analysts Can include database administrators, software developers, technical tools administrators, and script writers Data scientists Advanced analytics professionals who understand the technology and business processes and can develop and support innovative analytics to drive business value (e.g., predictive analytics) Audits of Big Data The internal audit activity’s role in big data involves considering big data as an audit universe element during risk assessment and audit planning and educating the board on the organization’s big data risks, challenges, opportunities, benefits, and initiatives. Internal audit activity coverage of big data is typically addressed using multiple audits rather than a single large audit. A key part of this role is assessing the audit risks for big data. Key Audit Risks for Big Data The primary risk areas impacting big data include: Program governance risks. Technological availability and performance risks. Security and privacy risks. Data quality, management, and reporting risks. Program governance risks relate to lack of appropriate management support, funding, and/or governance over the big data program that can expose the organization to undue risk or failure to meet strategic goals. Controls auditors could suggest may include: Reviewing the program’s strategy and objectives for appropriateness. Measuring performance versus expectations. Requiring a proof of concept before full rollout. Ensuring adequate funding and resources (with clear roles and responsibilities). Overseeing internal and third-party systems. Technological availability and performance risks relate to poor, untimely, or unavailable systems that could create a negative customer experience or fail to realize benefits. Internal auditors may suggest controls such as: Structuring IT operations to support big data service level expectations, including following a maintenance and patch management strategy. Ensuring that systems are flexible and scalable and have measurable performance objectives and a regular method to test actual performance. Ensuring that systems are procured, built, and/or configured in alignment with the complexity and demands documented in the business case. Security and privacy risks relate to the protection of the data from unauthorized access, modification, or theft and noncompliance with regulations such as for privacy. Privacy is especially important in such systems because the data is being compiled from multiple sources. Ensuring that only authorized individuals can view sensitive data is vital. Internal auditors ensure that: Big data systems include data, information security management, and privacy strategies. Third-party access is properly managed. Data quality, management, and reporting risks relate to poor information leading to poor decisions or inaccurate management reporting. Internal auditors can suggest controls such as: Verifying that policies and procedures exist related to internal data quality, third-party data quality, reporting accuracy, role-based access, and vendor business alignment. Ensuring that report controls allow for flexibility, ad hoc reporting, and utility (such as by training report users periodically). Data and Information Security Governance Management and oversight of data and information security are part of the control environment and impact the effectiveness of related risk management and control activities. Data Governance Data governance involves the organization’s policies and procedures, controls, and related information technologies regarding the collection, use, storage, usability (e.g., formatting for ease of use), analysis, deletion, and safeguarding of data. A shorter definition of data governance is that it is a way of ensuring and continually improving data quality. Safeguarding of data includes ensuring: Availability (protection from loss). Integrity (protection from corruption). Access (role-restricted access to sensitive organizational or customer data). Compliance with relevant laws and regulations, such as for data privacy. Management will develop, authorize, direct, manage, and monitor the organization’s data governance policies, procedures, controls, and information systems to ensure alignment with the organization’s strategy, objectives, mission, vision, and ethics statements. Management may be concerned about ensuring that data analytics enables confident and timely decision making, that staff work efficiently and effectively, and data is leveraged to maximize profit potential. As with all types of governance, the board and its relevant committees provide oversight over the organization’s data governance plans and activities. The board has a fiduciary responsibility to the organization’s stakeholders and so must understand their data governance needs. However, data governance is management’s day- to-day responsibility. Internal auditors assess the effectiveness of data governance activities. For big data, data governance activities include: Identifying dataowners and consumers and ensuring that owners take responsibility for the quality and security of their data. Designating critical data elements and special handling requirements. Managing metadata (data about data, such as source information), master data, and authoritative data sources. Ensuring that control processes are at the appropriate level for the sensitivity of the data, include data defect identification and data loss prevention measures. Ensuring that systems maintain agility throughout their life cycles. Information Security Governance According to The IIA Implementation Standard 2110.A2 (Assurance Engagements) The internal audit activity must assess whether the information technology governance of the organization sustains and supports the organization’s strategies and objectives. Information security governance is a component of overall IT governance that relates to both IT operations and IT projects. Information security governance requires that: Management promotes good information security practices with clear direction and understanding at all levels, controls information security risks, and creates an information security activity to manage the related objectives and risk appetite. The board establishes security policy, defines the corporate security culture, communicates the business imperative, and provides oversight over information security activities. Staff and line management help design and implement information security frameworks and activities, define security requirements, and monitor security controls. The internal audit activity may provide assurance or other support (in line with its board-approved charter) in the following areas: Assessing the degree to which governance activities and standards are consistent with the internal audit activity’s understanding of the https://na.theiia.org/standards-guidance/mandatory-guidance/Pages/Standards.aspx organization’s risk appetite Assurance or consulting work that focuses primarily on assurance over and continuous improvement of information security governance practices, policies, roles, responsibilities, risk appetite alignment, effective communication, tone at the top, and accountability Ongoing dialogue with the information security governance activity to ensure that risks are being addressed in a timely manner Auditing information security governance starts with planning to understand the structure, objectives, communications, risk appetite, integration within the organization, and external influences. Audit testing includes evaluating stakeholder concerns, reporting lines, KPIs supporting documents, and risk appetite alignment. Analyzing includes assessments of accountability, design effectiveness, program effectiveness and efficiency, resource levels, the clarity of roles, added value, and continuous improvement. Topic 2: Data Analytics Framework and Process This topic addresses establishing a data analytics framework. It also looks at the steps in the data analytics process—defining the questions, obtaining relevant data, cleaning and normalizing the data, analyzing the data, and communicating the results. According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Global Technology Audit Guide (GTAG) 16, “Data Analysis Technologies” Data Analytics Framework An effective data analytics framework should answer questions such as “What are the top issues facing the organization?” or “How can the audit add more value?” Answering these questions allows for developing a framework that is achievable, aspirational, and identified by smaller milestones that show the progress to achieving the long- term objective. When building a data analytics framework, an entity: Develops its vision. Determines how to progress in building data analytics capabilities, including what steps should be taken to elevate performance. Evaluates current capabilities and identifies people, processes, and technologies to enhance those capabilities. This can include spending money in two critical areas: Talent, such as training and staffing Technology, such as hardware and software https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG16.aspx Once the data analytics framework is established, the entity should progress to implementing and monitoring this new plan. Implementation should be addressed in stages so as not to overwhelm current resources. Monitoring has a two-part role: to gauge the level of adoption from each impacted department and to act as an independent party to assist other areas in improving their data analytics. As an organization’s data analytics framework matures, the organization’s strategies should also advance to meet those changes. Exhibit 3-20 lists some recommendations for establishing a reliable data analytics framework. Exhibit 3-20: Data Analytics Framework Recommendations Aligning Align data analytics strategy with long-term audit goals and objectives, current audit plans, and the risk management process. Keeping end in mind Manage data analytics as a program, focusing on the desired end state of maturity. Ensuring uniformity Develop a uniform set of analytics practices and procedures across assessment functions. Assigning responsibility Assign responsibility for data management, quality assurance, and other key roles. Annotating Document and/or comment scripted analytics to record the intent and context of the analysis being automated. Testing Review and test analytics being used to ensure that the results being generated are accurate and appropriate for the audit step being run. Reviewing Establish a peer review or supervisory review process to safeguard against the reliance on results generated using incorrect logic or formulas. Standardizing Standardize procedures and tests in a central and secure repository. Safeguarding Safeguard source data from modification or corruption using technology or by analyzing backup or mirrored data for audit purposes. Minimizing impact Address the potential impact of the analysis on production systems, either by scheduling analysis at off-peak times or by using backup or mirrored data. Educating Educate staff on how to interpret the results of the analysis performed. Continuously learning Treat training as a continuous process, measured by ongoing growth and continuous development of capabilities. Evolving Aim for constant improvement with leveraged use of data analysis as it matures. Source: Global Technology Audit Guide (GTAG) 16, “Data Analysis Technologies.” Data Analytics Process Data analytics lets internal auditors focus efforts on areas identified as needing a higher level of assurance due to higher risk. A proven process for data analytics uses the following steps. Define the questions. The first step is to define the potential achievements and the anticipated value the data analyst is trying to attain. One approach to do this is to develop a question that needs to be answered. For example, asking “How can we identify where potential fraud is occurring and what parties are involved?” helps establish a basis from which multiple sources of data can be pulled. The internal audit activity should also consider the use of data analytics for audit planning risk assessment. Obtain the data. The next step is information discovery or obtaining access to the data needed to perform the analysis. It is important that the auditor gain an understanding of the data being analyzed to help avoid making faulty conclusions. For example, data on revenue by division or product line and/or revenue backlogs by value and age can be gathered to identify red flags for revenue- related risks. Getting access to and making the data usable can be difficult and expensive. CAEs have identified obtaining data as the greatest challenge in building data analytics into internal audit activities.An effective data analytics technology solution could take one or more of the following forms: A pull system involves making ad hoc queries and/or writing reusable query scripts. The goal is to narrow or broaden the focus of an analysis to suit the question being asked. Ideally, these tools should be user-friendly to limit the learning curve and enable broad participation or at least limit needing to use IT resources. A push system sends predetermined data (basically reports formatted for computer use) out to a repository for use in queries, scripts, or continuous auditing software. Manually maintained data may exist and need to be gathered. This is the least reliable source of data because it may lack integrity due to ineffective change controls, gaps, or errors. If a manually maintained source of data needs to be used, any automated data that also exists should form the primary basis for the analysis. Cleanse and normalize data. Data cleansing is identifying and removing duplicate data and identifying whether identically named data fields from different systems have identical or different meanings. This is an especially important step when the data is being compiled from more than one source. Data normalization is the process of organizing data in order to reduce the potential for redundancy and to facilitate the use of the data for specific purposes. Normalization also allows for the identification of anomalies, which might represent actual problems or potential opportunities. If IT must be relied upon to do this step, there often can be significant delays before the work is done and, if there are errors, it could require multiple rounds of effort. Having an auditor on the team who is skilled in doing data integrity and validity checks can streamline this process. Analyze the data. After the data has been cleansed and normalized, it should be analyzed. The analysis process used may differ depending on the type of data being analyzed. A preliminary analysis can provide initial results and assist in determining if anomalies reflect errors, violations of company policies, or red flags for fraud. Targeted, detailed analysis can follow. Once analyzed, all data should be interpreted: Have patterns emerged? Are identified anomalies errors in the feature or system or process? Is senior management aware of the feature and its consequence? Communicate the results. The final step is to communicate the results to the board and senior management. Because data analytics results are often heavy in numeric and data tables, providing data visualization and graphical representations are excellent ways to inform leadership and enhance the decision- making processes. Topic 3: Data Analytics in Internal Auditing This topic addresses the application of data analytics methods in internal auditing, including diagnostic, predictive, network, and text analysis, anomaly detection, and other methods. It also addresses internal audit maturity levels for data analytics and some specialized team roles. According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Global Technology Audit Guide (GTAG) 16, “Data Analysis Technologies” Data Analytics in Internal Auditing Internal audit activities can use data analytics to meet their auditing objectives. By analyzing data in key organizational processes, the internal audit activity can detect changes or vulnerabilities in organizational processes and potential weaknesses that could expose the organization to undue or unplanned risk. The internal audit activity can then target resources to safeguard the organization from excessive risk and improve audit coverage. The discovery power of https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG16.aspx data analytics also helps ensure that the internal audit activity is auditing today’s risks rather than yesterday’s. Internal auditors analyze data from multiple sources against control parameters, business rules, and policies to provide fact-based assessments of how well automated controls are operating. Indicators in the data can also provide evidence of how well semi- automated or manual controls are being followed. Analysis of 100% of relevant transactions can identify fraud, errors, inefficiencies, or noncompliance. Audit-Specific Data Analytics Techniques Three basic techniques of data analytics that internal audit activities can use are shown in Exhibit 3-21. Exhibit 3-21: Data Analytics Techniques Ad Hoc Repetitive Continuous Exploratory and investigative in nature Seeking documented conclusions and recommendations Specific analytic queries performed at a point in time for the Periodic analysis of processes from multiple data sources Seeking to improve the efficiency, consistency, and quality of audits “Always on” scripted auditing and monitoring of key processes Seeking timely notification of trends, patterns, and exceptions Ad Hoc Repetitive Continuouspurpose of generating audit report findings Example—search for suspicious vendors or phantom employees by comparing vendors to employees Managed analytics (scripts) created by specialists and deployed from a centralized, secure environment, accessible to appropriate staff Example—quarterly journal entry analysis of manual and automated control effectiveness looking for invalid users or account postings, duplicate or frequently reversed entries, or journal entries pre- and post-period close Supporting risk assessment and enabling audit efficiency Continual execution of automated audit tests to identify errors, anomalies, patterns, and exceptions as they occur Example—pay cycle review with exceptions and gaps reported automatically to a third-party recovery partner Source: Global Technology Audit Guide (GTAG) 16, “Data Analysis Technologies.” Levels of Maturity in Data Analytics Exhibit 3-22 shows a maturity model for data analytics. Internal auditors can assess where the internal audit activity is currently at versus where it wants to get to, taking care to set realistic goals based in part on available funding and resources. Exhibit 3-22: Maturity Model for Data Analytics Maturity Description 1. Basic Auditors do (usually ad hoc) queries and analyze data to support a specific audit objective. Analysis includes statistical analysis, classifications, and data summarization. Few audit staff have this capability. Use is not fully integrated in the audit cycle. 2. Applied Data analytics are fully integrated into targeted audit processes and the audit cycle, including in planning and audit program design. Auditors develop comprehensive suites of quality-controlled repetitive tests. Analytics starts to add real value to efficiency, assurance, and audit findings. The process is still decentralized. 3. Managed Data analytics is centrally organized and controlled in approach and data security. Data, audit tests, results, audit procedures, and documentation are in a centralized, structured repository subject to audit management review. Even nontechnical audit staff can access test results. Sharing of data, repeatable tests, and results reduces duplication of effort and enables sustainable maturity even if specialists leave. Maturity Description 4. Automated Internal audit activities increase automation of audit tests and use some continuous auditing. Audit processes start to shift to concurrent, ongoing monitoring of multiple areas. Data access protocols exist to authorize automated analytic tests. Findings from continuous auditing may not always be translated into action. 5. Continuous A continuous auditing program is fully established across multiple areas, and the internal audit activity regularly produces reports on control problems and the potential for fraud, error, and noncompliance. Risk management processes gain a clearer picture of risk issues and trends. Management may also sharemonitoring responsibilities. Advancing to higher levels of data analytics maturity often requires investments in software, but it is equally important to invest in training and recruitment. CAEs may want to establish specialist roles in their audit teams to ensure that any tools will be fully leveraged. Specialist roles may include the following: Data specialist. Internal auditor with a detailed understanding of the organization’s information systems and how to access data from disparate systems, prepare the data, and make it available to the team. Data analytics specialist. Internal auditor who is a power user of the data analytics software the organization has provided. Internal audit leadership and staff auditors need training. Leaders need to have visibility into what audit steps have been automated or are dependent on the use of data analytics software to enable their oversight role. They also need to have enough skill to review analytics findings across the team and against audit plan objectives. Staff auditors need a general understanding of data analytics software and sufficient competency to: Interpret the results of automatic analytics routines. Perform simple analyses (sorting, filtering, grouping, and profiling). Document and report on analytical findings. Types of Data Analytics Data analytics exists on a continuum from the most straightforward to the most complex and probabilistic. Descriptive analysis. A descriptive analysis gathers information and uses hindsight to identify “what happened.” This makes it the analysis type with the least information value, but it is still quite useful for internal auditing. Uses include: Data visualization—preparing charts or graphs to ease understanding or visually presenting two or more data files in relationship to one another. Anomaly detection or numeric analysis—identifying the outliers, exceptions, duplicates, or gaps in a set of data that require further review. For example, internal auditors for a utility company used data analytics to generate automated reports on drivers’ fuel use, and an exception report was automatically emailed to the drivers’ managers. This dramatically reduced the number of weekly exceptions. Diagnostic analysis. Diagnostic analysis also uses hindsight and examines specific data or content to uncover the answer to the question “Why did this happen?” It commonly uses techniques such as drill-down, data discovery, data mining, and correlations. Predictive analysis. Predictive analysis uses insight to assess “what will happen?”—the probability of an event or outcome occurring. Prescriptive analysis. Prescriptive analysis involves the highest level of difficulty and results in the greatest value. It uses foresight and optimization to build and test scenarios around different policies, combining data, business rules, and mathematical models to determine what course of action would lead to potential outcomes. Detecting Anomalies with Data Analytics Anomaly detection is a powerful tool that can be leveraged to find areas of control weaknesses or failures. An anomaly is a result that deviates enough from expectations that it warrants further analysis. It can take the form of a result that is not expected or the absence of an expected result. An anomaly could be a red flag for fraud; a sign of an input, processing, or output error; a control failure; or a valid result that could be studied to provide valuable business information. Data analytics uses for anomaly detection included detection and investigation, operational performance, and internal controls. Other types of data analytics include network and text analysis. These data analytics methods are discussed next. Analytical Techniques for Internal Auditors Here are some examples of analytical techniques for audit purposes. Classification and calculation of statistical parameters (e.g., averages, standard deviations, highest and lowest values) to find outliers, patterns, and associations Stratification to find unusually high or low values Benford’s Law (see below) Joining different data sources to identify inappropriately matching values such as names, addresses, and account numbers in disparate systems Duplicate testing to identify simple and/or complex duplications of payments, payroll, claims, expense report items, etc. Gap testing to identify missing numbers in sequential data Summing values to check control totals Validating data entry dates and times to identify inappropriate or suspicious postings Note that Benford’s Law is an observation that the lower numerals, such as 1, 2, and 3, in the leading digit of a set of values occur exponentially more often than the higher numerals, assuming a few things, including that the numbers are not part of an identification system. One use is as a fraud test, such as reviewing payments for an unusually high number starting with 7, 8, or 9. Categories of Internal Audit Uses for Data Analytics Internal audit most commonly uses data analytics to detect anomalies in assessments of compliance and operational performance, fraud detection and investigation, and internal control analysis. Compliance uses. Data analytics helps in assessing whether the data used to determine compliance is sound or contains quality or integrity issues. Another use is when evaluating expense reports, purchasing cards, or vendor invoice line items for trends or anomalies. Data analytics can also be used to assess regulatory requirements such as by doing keyword searches. Fraud detection and investigation uses. Data analytics can detect “ghost” employees by looking for gaps in the various records that should exist. The same can be done to detect fake suppliers or service providers. Data analytics can create exception reports that are prioritized by those most likely to result in financial or reputation risk to the organization. Such systems can also do root cause analysis after fraud has been detected, answering questions or providing short lists related to who, what, where, and when. Operational performance uses. Data analytics may aid in the identification of the following types of errors and/or inefficiencies: Duplicate payments Foregone payment discounts or failure to assess late collection penalties Slow-moving inventory or inventory held in quantities that are too high Cost escalation that is unusual or is not allowed in contract Data analytics could also highlight better KPIs or help areas converge on the best KPIs. Internal control analysis uses. Data analytics can be used to analyze proper user access privileges or proper segregation of duties or whether control performance is effective. Data analytics can be applied to specialty applications such as network and text analysis. Network analysis. Network analysis refers to the mathematical analysis of complex work activities in terms of a network of related activities. This can pertain to the components and dependencies of all factors within the network. Text analysis. Text analysis involves extracting machine-readable facts from the text of various sources and creating sets of structured data out of large compilations of unstructured data. This process dissects the data into small, manageable data pieces. Corporations can use text analysis as a starting point for managing content from a data-driven approach. This assists in automating processes such as decision making, product development, marketing optimization, business intelligence, and more. Data Analysis Software Here are some capabilities that data analysis software should enable for internal auditing: Ability to import, access, join, relate, and compare the organization’s data sources while preserving data integrity Ability to analyze entire populations of data Support for centralized access, processing, and management of data analysis with controls for information security Ability to create comprehensiveaudit trails: Creating context for audit findings by recording all of the commands run by the application, command execution status messages, and results generated Enabling peer or supervisory quality review and capture of forensic evidence by documenting all intermediate steps used to uncover exceptions so the actions can be explained, substantiated, and defended Enabling recall of previous results to see if recommendations were acted upon Ability to create scripts: Enabling intuitive generation of scripts such as by using a macro or task recorder Allowing saving and categorizing of prior scripts of audit tests so the tests can be run again and to ensure comprehensive coverage Ability to perform continuous auditing Ability to scale up to enable specialist use or more mature internal audit analytical procedures In addition to these capabilities, a good system will be user-friendly enough to enable the majority of internal audit staff to use some functions with a reasonable amount of training. It should also require minimal IT support for data access or analysis to ensure auditor independence and to keep custom interface development and maintenance cost reasonable. Section C: Information Technology and Security This section is designed to help you: Understand the goals of information security. Understand the importance and components of IT general controls. Explain the purpose of various information security controls. Define the use of information security controls. Recognize data privacy laws. Define the potential impact data privacy laws have on data security policies and procedures. Identify emerging technology practices. Define the potential impact emerging technology practices have on security. Describe existing and emerging cybersecurity risks. Describe cyber- and information security-related policies. Describe the basic process and considerations for IT auditing. Recognize the core activities in the systems development life cycle and its delivery. Recognize the importance of change and patch management controls. Describe the basic purpose of and tools used in common IT control frameworks. Recognize the purpose and application of IT control frameworks. According to The IIA The IIA’s guidance referenced in the Challenge Exam Study Guide may be accessed using the links below. Access to specific pages and documents varies for the public and The IIA members. Attribute Standards: www.theiia.org/Attribute-standards Performance Standards: www.theiia.org/Performance- standards Standards and Guidance: www.theiia.org/Guidance Position Papers: www.theiia.org/Position-papers Implementation Guidance: www.theiia.org/Practiceadvisories Practice Guides and GTAGs: www.theiia.org/Practiceguides This section addresses establishing a comprehensive set of controls to secure the organization’s information systems, the information within them (including data privacy for customers and other stakeholders), and the physical spaces and resources of the organization. This section also addresses the importance of information technology for today’s organizations in meeting their objectives. It covers the reasons internal auditors need to know, at least at a conceptual level, how systems are developed and maintained and the role of IT control frameworks. Topic 1: Information Security Controls This topic covers information security and explains the purpose and use of various information security controls. https://na.theiia.org/standards-guidance/attribute-standards/Pages/Attribute-Standards.aspx https://na.theiia.org/standards-guidance/performance-standards/Pages/Performance-Standards.aspx https://na.theiia.org/standards-guidance/Pages/Standards-and-Guidance-IPPF.aspx https://na.theiia.org/about-us/about-ia/Pages/Position-Papers.aspx https://na.theiia.org/standards-guidance/recommended-guidance/Pages/Practice-Advisories.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Practice-Guides.aspx Information Security Information security is the set of policies, processes, and procedures used to protect the organization’s intellectual property by ensuring the confidentiality, integrity, and availability of the organization’s data and information in any format (electronic, print, or other media). Confidentiality is enabling only authorized persons to access or view the information. Integrity is assurance that the data has not been improperly altered, is correct, and is reliable. Availability is ensuring that authorized roles and individuals have access to the information and information systems required to perform their duties without unreasonable outages. In addition to establishing preventive and detective controls, information security involves continuously monitoring and responding to security threats. Information security extends to the data in storage, processing, and transit. Information Security Risk Management Practices It is not possible to mitigate all information security risks. A risk management process is needed to manage exposure to potential information losses. Information security risk management encompasses the processes an organization puts into place so that security controls and expenditures are appropriate and effective at mitigating risk exposures. The security risk management process should be appropriate for the organization and its security objectives and can follow a typical enterprise risk management format such as is described in Part 1 of these materials. The internal audit activity may assess information security risks using the following techniques and tools: Analysis of reported incidents. Records can provide valuable information about potential and actual losses. Review of exposure statistics. Statistics from insurance carriers, industry associations, and regulatory agencies can provide guidance about potential risk exposures. Mapping key processes. Developing process maps and identifying potential risk points provide helpful insights. Periodic inspections. Health and safety inspections can surface compliance lapses and also uncover opportunities to decrease risks. Periodic process and product audits. Such internal audits can incorporate specific questions to identify potential risks. Assessments of management system effectiveness. Beyond internal audits conducted to verify conformance to one or more standards or to assess continual improvement, this technique can identify gaps in management systems that expose the organization to potential losses. Scenario analysis. Tools such as brainstorming and mind mapping are effective to identify all the consequences that could occur in a worst-case scenario. This list could go on. The point is to do whatever is necessary to identify and prioritize risks. Special Information Security Considerations While the primary monitoring role over information security (and other areas) is with management rather than internal audit, internal audit’s role is to periodically monitor the effectiveness of information security management. This includes assessing the organization’s information confidentiality, integrity, and availability practices and recommending, as appropriate, enhancements to, or implementation of, new controls and safeguards. Such assessments can be either conducted as separate stand-alone engagements or integrated into other audits or engagements conducted as part of the annual audit plan. The nature of the engagement will determine the most appropriate process for reporting to senior management and the board. Assessments of information security should start with an overall assessment of the control environment and any control frameworks in use. Implementation Guide 2130 notes that: [The CAE] should first consider the risk appetite, risk tolerance, and risk culture of the organization. It is important for internal auditors to understand the critical risks that could inhibit the organization’s abilityto achieve its objectives, and the controls that have been implemented to mitigate risks to an acceptable level. The CAE determines whether the internal audit activity possesses or has access to competent audit resources to evaluate information security and associated risk exposures. This includes both internal and external risk exposures and exposures relating to the organization’s relationships with outside entities. If specialized knowledge and skills are required, the organization may need to secure external service providers. Guidance recommended by The IIA includes specific responsibilities for the internal audit activity. As Implementation Guide 2130 further states: It is important for internal auditors to obtain a thorough understanding of the control framework(s) adopted either formally or informally by the organization and to become familiar with globally recognized, comprehensive control frameworks. To fulfill this standard, the CAE determines whether information integrity breaches and conditions that might represent a threat to the organization will promptly be made known to senior management, the board, and the internal audit activity. Internal auditors assess the effectiveness of preventive, detective, and mitigation measures against past attacks, as appropriate, and future attempts or incidents deemed likely to occur. They determine whether the board has been appropriately informed of threats, incidents, vulnerabilities exploited, and corrective measures. Determine Disposition of Security Violations It is reasonable to expect that the internal audit activity will monitor whether and how well information security violations are corrected when they are discovered (similar to corrective action plans in response to internal audits). In doing so, the focus of the internal auditor should be to ensure that the root causes of the security violations are addressed. Report on Compliance The internal audit activity can report to management and the board on the level of compliance with security rules, significant violations, and their disposition. With regard to information security, high-level compliance can be achieved through the implementation of codes of practice for information security compliance. An example is ISO/IEC 27002:2013, which: Focuses on information security controls and establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security management in an organization. Contains best practices for control objectives and controls that can be applied by any organization, regardless of size or industry. Organizations adopt ISO/IEC 27002 to develop organizational security standards and effective security management practices, address legal and regulatory concerns, and better manage compliance. IT General Controls In addition to the application-specific controls discussed later in these materials, information security relies on having a comprehensive set of IT general controls. IT general controls (ITGC) are those IT controls that form the basis of the IT control environment (a framework for ensuring comprehensive information security) and apply to all systems, components, processes, and data for a given organization or systems environment. The other broad category of IT controls is application controls, which relate to a specific application and so are not general. Some ITGCs are business-related, such as segregation of duties, and others are technical and relate to the underlying IT infrastructure. Information security needs to be a holistic endeavor so that a strong protection in one area is not simply bypassed in some other way, such as: An outside person bypassing external access security by accessing the network through someone’s computer with weak protections (or stealing a laptop with sensitive data). An unscrupulous programmer adding a backdoor into a computer system during systems development or a system update. To help internal auditors understand the context for ITGCs, Exhibit 3- 23 shows how IT general controls as well as application controls exist to support overall business functions. Note how ITGCs relate to both applications and the IT infrastructure services while application controls relate only to applications. Exhibit 3-23: Understanding the IT Environment in a Business Context The effectiveness of ITGCs is measured by the number of: Incidents that damage the enterprise’s public reputation. Systems that do not meet security criteria. Violations in segregation of duties. ITGCs are classified in the Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition, as follows: https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG1.aspx Logical access controls Systems development life cycle controls Program change management controls Physical security controls Systems data backup and recovery controls IT operational controls Of these ITGCs, logical access controls and physical security controls are not addressed further for The IIA’s Challenge Exam. Systems development life cycle controls and program change management controls are addressed elsewhere. IT operational controls are addressed more next. IT Operational Controls IT operational controls are part of ITGCs and include: IT organizational structure. Segregation of IT duties. Financial and budgetary IT controls. Operational change management. Operational data security controls. Security level management. IT Organizational Structure Examples of controls that can be built into IT organizational structure include: Minimizing the number of users with administrative privileges. Using software tools and direct observation by supervisors to monitor the activities of users with administrative privileges. Setting policy guidelines for all employees to take a certain minimum number of consecutive days off at least annually, with special emphasis and/or required job rotations for persons with sensitive roles or access privileges such as systems controllers. Segregation of IT Duties Segregation of IT duties can occur at the ITGC level or the application level. Segregation of duties at the ITGC level relates primarily to restrictions to the roles of individuals, while application- level segregations are primarily automated controls within systems. Segregation of duties at the ITGC level includes: Following the identity and access management (IAM) principle of allowing access only if the job function requires it. Ensuring that initiation, authorization, input, processing, and validation of data are all done by different individuals and possibly by different departments. Ensuring that employees with physical custody of assets do not have access to the related computer records or have any other related authorization rights or privileges. Separating systems development and operations: Programming and change deployment should be organizationally and physically separate from users with access to production systems, and neither should be able to do the others’ tasks. Neither should have access to file libraries (a function of a system librarian) or input/output controls (a function of the systems controller). Other segregations include systems analysis and data entry. Smaller organizations may not have the luxury of this level of segregation of duties. If this is the case, combined roles require greater scrutiny. Inadequate segregation of duties could heighten the potential for fraud, including misappropriation of assets and fraudulent financial reporting or statements. It could also result in data tampering and loss of data privacy. Financial and Budgetary IT Controls Management needs to ensure that the sizable investments in IT development and support are effective in helping meet organizational objectives and are efficient from a cost-benefit perspective. Relatedcontrols include: Ensuring that there is a process to justify and approve software projects or ongoing operations using measurable metrics such as projected return on investment or savings. Monitoring and controlling software projects and operations against baselines. Evaluating completed software projects or operational results against their projected results or baselines to determine the accuracy of those projections, and reporting on results. Operational Change Management While program change management controls are discussed elsewhere, some IT organization-level change management controls are discussed here. Change management controls at the operations level include: Reviewing exception reporting and transaction logs. Separating testing and production environments by formal data migration processes. Ensuring that adequate audit trails exist. Audit trails log the functions performed and the changes made in a system, including who made the change and when, for example: An audit log could show repeated incorrect password entries to investigate. Comparisons of users to their activities can highlight unusual activities. Use of sensitive or powerful command codes can be reviewed. The audit trail is either kept in a separate file or sent to the system activity log file. It must be secure from as many users as possible, and access restrictions should be reviewed. Preventive maintenance should be performed on hardware and software systems and on their controls, because doing so is almost always less expensive than dealing with problems arising from poor maintenance. An operations control group should also be formed to monitor the results of production, including record keeping and balances of input and output. Operational Data Security Controls In addition to controls for the backup of data, organizations need controls over data as it is being used. In general, data security must be maintained: Data policies are enforced through data standards, which define how things need to be done to meet policy objectives. Enforced standards keep systems functioning efficiently and smoothly. Standards should be set for systems development processes, software configuration, application controls, data structures, and documentation. Some controls over data security have already been mentioned. The following are a few others: End-user training in the proper use of email and the Internet is important. Logical controls should prevent end users from installing new software. Applications should be safeguarded by keeping them in computer program libraries, which should be restricted by physical and logical access controls. There should be a secure process for removing of old IT hardware due to the possibility of sensitive data being on the drives. This basically means ensuring that deleted files are really deleted by using special file deletion software or by physical electromagnetic wiping. This should be done on hard drives or backup tapes being resold or discarded. Security Level Management Not every system needs the highest level of security. The cost of the security measures should be commensurate with the level of risk mitigation required, so this requires customization for the organization. To determine appropriate network security levels, the organization assesses its data repositories and physical security requirements and assigns security risk levels: The highest-security physical area or data in a database defines the area’s security level, for example, key projects such as R&D data would have elevated security. The availability, integrity, and confidentiality requirements for each area are assessed. Once the security level is known, a multi-tiered security system can be designed, including provisions for physical, software, program library, and application security. Information Security Controls An organization’s data can be one of its most important assets. As such, information security is critical. Information security is a management responsibility. This responsibility includes all the important information of the organization, regardless of how the information is stored. The internal audit activity should ensure that: Management recognizes this responsibility. The information security function cannot be breached. Management is aware of any faulty security provisions. Corrective measures are taken to resolve all information security problems. Risk-based and cost-benefit-based preventive, detective, and corrective controls are in place to ensure information security. IT general controls and application controls such as passwords and privileges are the basis for information security. Information security needs to focus on both data and infrastructure. Data security should ensure that only authorized users can access a system, their access is restricted by user role, unauthorized access is denied, and all changes to computer systems are logged to provide an audit trail. Security infrastructure can be part of end-user applications, and/or it can be integral to servers and mainframes, called security software. When the focus on security is primarily at the application level, such as for small environments, user and role-based access controls are generally strong but controls over expert programmers often tend to be weak. Security software resides at the server, client, or mainframe level and provides enhanced security for key applications, such as wire transfer software. Errors introduced into a computer system can be just as costly as malicious attacks. One key control that will help is setting a clear policy on the use of hardware and software and training personnel to address the most common errors. The policy should also address ethics, such as computers being used for personal activities or illegal acts. Encryption Encryption uses a mathematical algorithm to scramble data. The data cannot be unscrambled without a numeric key code, which can be designated as a public key (able to encrypt but not decrypt messages) or a private key (able to both encrypt and decrypt messages). Public keys add a layer of security because the private key does not need to be distributed. Encryption is used on stored data, physically transmitted data (e.g., on a flash drive), and electronically transmitted data. Server access control is the use of internally encrypted passwords to keep technical persons from browsing password files. Wireless data can also be encrypted to prevent compromise if it is intercepted. Key Point While there are various forms and levels of encryption, the key point is that organizations wishing to maintain good encryption may need to avoid the “easy” routes and commit to a level of investment and effort sufficient for the targeted level of security. The relative security of a key is determined by its bit length. When passwords are used to create keys, effective password creation rules must be applied. External aids include cryptographic module testing (CMT) labs and validation programs for cryptographic modules and their algorithms. Digital signatures verify the authenticity of a public key user (including non-repudiation) and the integrity of the message itself. A server certificate can establish the authenticity of a site. Auditing Issues Evaluating encryption includes evaluating physical controls over computers that have password keys, testing policies to see if they are being followed, and implementing and monitoring logic controls. Protection of private keys from disclosure to outside parties is paramount. Each security domain should be able to share its local identity and security data without compromising its internal directories. Firewalls Perpetually available broadband connections need constant monitoring. A firewall is a hardware/software combination through which all communications to or from the outside world are routed. The firewall compares accesspeople in the organization to achieve this purpose. The vision statement conveys what the organization aspires to achieve or become in the future. It represents the highest aspirational view and goals of an organization in the context of serving and adding value to its stakeholders. Mission and vision statements are used to guide the development of strategic objectives and to perform strategic planning, which results in strategic plans. Strategic Objectives, Strategic Planning, and Strategic Plans Because strategic objectives and strategic planning are so critical to an organization’s success and growth, this is a key area to consider as part of the audit universe. Strategic objectives are desired outcomes set by management that specifically relate to stakeholder value enhancement, especially over the long term. They help define how the organization intends to create a competitive advantage. (Examples of competitive advantage are addressed below.) Strategic objectives could relate to innovation, growth, cost control, investment in the organization’s people, social responsibility, and so on. Strategic objectives are reflected in the organization’s strategic planning process and plans. Strategic planning is a disciplined upper management and board- level future-oriented process that determines the direction the organization will take to achieve strategic objectives over the long term given the changing business environment. Strategic planning helps the organization determine what type it wants to be, who it serves, and why. Strategic planning involves: Evaluating changes in the environment, such as the economy or competitor actions, and then determining how to create a competitive advantage in this environment. Gathering input from multiple stakeholders. Innovating and brainstorming, followed by feasibility analysis of ideas. Coming to agreement on priorities and initiatives for the best use of limited resources. Ensuring alignment of strategic objectives with the organization’s mission and vision. Determining the desired end result, how to get there (in broad terms), and how to determine if the strategy is successful (defining specific and measurable results). Documenting the results of this process in the organization’s strategic plans. Strategic plans are high-level, long-term plans for multiple years into the future: They are a valuable communications tool and set the tone for proper governance. They are an important input or subject for many assurance and consulting engagements: Understanding of the strategy, key business objectives, associated risks, and risk management processes is vital for setting the context for most engagements. Assurance engagements often check that plans and objectives for the audit area align with and integrate into top-level plans. Assurance engagements may verify that the organization’s strategy aligns with its risk appetite. Assurance engagements related to strategic plans may need to verify that the plan is effectively communicated. Consulting engagements related to improving the strategy or strategic planning may assess whether the organization has a sound strategy and/or strategic planning process. The chief audit executive (CAE) must consult with the entity’s board and senior management to obtain an understanding of the organization’s strategy and must revise the risk-based annual audit plan as needed to reflect changes in the organization’s business. An organization’s strategic plans need to reflect global and competitive considerations in order to create a competitive advantage. This is discussed more next. Global and Competitive Considerations An organization sets a strategy to determine not only what type of organization it wants to be but also how such an organization will be likely to thrive in its environment. It might, for example, want to be an agile organization that adapts well to changes or a large organization that can offer economies of scale and low prices. The organization’s success in its strategy depends not only on the successful execution of the strategy but also on the opportunities and risks that exist in the organization’s environment. Globalization has expanded most organizations’ environments to include access to larger potential customer bases at relatively low costs (opportunities), but this also results in more potential competitors from around the world (risks). The organization will likely have some competitive advantages, which are relative advantages one organization (or nation) has over its competitors. Here are some potential sources of competitive advantage: Labor market. Access to low-cost labor, high-skill labor, a wide labor pool. Suppliers and raw materials. Access to materials at favorable prices, good or long-term relationships with suppliers, some degree of ownership or control of (or independence from) suppliers, supplier proximity. Customer base. Established customer base/market share, loyal and satisfied customers. Process and methodology maturity. Risk, control, quality, change management, manufacturing, or other frameworks; maturity level and difficulty in achieving that level of maturity. Supply chain and transportation. Relative cost and speed of supply chain, number of options for and level of convenience to customers. Competitor maturity and ease of market entry. Relative number of competitors, competitor sophistication, capital investment needed to become a viable competitor. Technology. Labor-saving or insight-generating technology, proprietary technology. Regional economy and politics; culture, legal, and regulatory environment. Regional economic prosperity, favorable politics and taxation, culture that promotes good values such as hard work or innovation, favorable laws and regulations. Successful strategies leverage the organization’s competitive advantages relative to its competitors. However, competitors’ strategies will likely rely on their own competitive advantages. The organization’s strategy seeks to: Leverage relative strengths and mitigate relative weaknesses in order to access opportunities (e.g., online, locally, or globally). Minimize the likelihood or impact of risks, including competitors taking market share. Internal auditors may be in a position to evaluate if the organization is accurately assessing the current state of its strengths and weaknesses relative to changes in globalization and the competition. This may include assessing whether the organization is altering its strategy fast enough to survive and thrive when such factors are changing quickly. Mission and Value Alignment Part of the organization’s mission will be to provide and add value to stakeholders; another part will be to state and live up to the organization’s values. Organizations may align their mission with their values and ethics by creating corporate social responsibility (CSR) or sustainability programs. The basic concept is that organizations are not responsible for just short-term financial results; they are also responsible to their workers, to communities, and to the environment. Internal auditors may audit sustainability programs. For more information on CSR, review The IIA’s Practice Guide “Evaluating Corporate Social Responsibility/Sustainable Development.” Operations, Reporting, and Compliance Objectives https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Evaluating-Corporate-Social-Responsibility-and-Sustainable-Development-Practice-Guide.aspx Beneath the level of strategic objectives are many more detailed tactical and operational objectives that enable the strategy to succeed. COSO’s Internal Control—Integrated Framework, which is used by organizations to evaluate internal controls, identifies three categories of such objectives: operations, reporting, and compliance. The framework depicts the relationship between these objectives,rules (controlled by network administrators) against the IP addresses, names, files, and applications attempting to enter the system and blocks unauthorized traffic. Firewalls can: Improve security by blocking access from certain servers or applications. Reduce vulnerability to external attacks (e.g., through viruses) and ensure IT system efficiency by limiting user access to certain sites. Provide a means of monitoring communication and detecting external intrusions (through intrusion detection systems, described below) and internal sabotage. Provide encryption internally (within an enterprise). Corporate firewalls are often multi-tiered: A firewall is placed before the web server and any other public access servers. A firewall is placed between the public access servers and the private network areas. Additional firewalls can be used to protect sensitive data such as payroll. An organization’s firewalls should be installed on dedicated hardware that has no unnecessary software. Internal auditors verify that firewalls are located in front of critical systems and are configured to restrict workstation connection to only those authorized. The location of a firewall can create a DMZ. DMZs (from military jargon for “demilitarized zones”) are portions of a network that are not part of either the Internet or the internal network, such as between the Internet access router and the host. If the access router has an access control list, it creates a DMZ that allows only recognized traffic to contact the host. Auditors need to determine if firewalls can be bypassed or the controls overridden by alternative transactions. User prompts for allow/deny communications can be the most risky. Auditors should work with the network administrator to determine the efficacy of a firewall, how specific its rules are, and whether the lists of acceptable users, IP addresses, and applications are kept up-to-date such as by promptly removing terminated employees. Because a firewall is a chokepoint, it can be used to audit controls or trace the source of an incoming attack. Firewall logs could be used as legal audit evidence if the data was collected, processed, and retained properly. A firewall has limitations, for example: Data can still be stolen via USB flash drive or use of a persona modem on a voice line. Employees or visitors could have a conflict of interest (industrial espionage), or they could simply be gullible and “help” someone by providing access. Firewalls can be configured incorrectly. Auditors should assume that firewalls are always being probed for weaknesses and that they cannot prevent all attacks. Intrusion Detection/Prevention Systems Browsers process so much data that firewalls alone may not be sufficient. Intrusion detection/prevention systems monitor systems for intrusions from browsers. Types of these systems include the following: An intrusion detection system (IDS) combined with a firewall is called an intrusion prevention system (IPS). Host IPS (HIPS) software can detect and block abnormal application behavior before it executes by assuming that abnormal behavior is an unknown form of attack. Network IPS (NIPS) are hardware and software systems on a network that analyze incoming packet content, dropping malicious packets. These systems usually are more conservative than other types of firewalls and provide more detailed reports. Antivirus Software Antivirus software exists to block known cybersecurity threats. This type of preventive control is effective only if it is regularly updated to address emerging threats. Topic 2: Data Privacy and Security This topic helps internal auditors recognize the potential impact of data privacy laws on data security policies, practices, and controls. The topic also addresses auditing privacy risks. According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Practice Guide, “Auditing Privacy Risks,” 2nd Edition Data Privacy https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Auditing-Privacy-Risks-Practice-Guide.aspx Privacy is essentially the right to be left alone and to be free from surveillance by individuals, organizations, or the government. Data privacy is the individual’s right to have a voice in how his or her personally identifiable information is collected, handled, and used, to control who has access to that information, and to amend, change, or delete the information. The “Auditing Smart Devices” Global Technology Audit Guide cites the following U.S. Department of Labor definition of personally identifiable information (PII): Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements (e.g., indirect information). These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors. Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. This information can be maintained in either paper, electronic, or other media. Photographs and biometric identifiers are other examples of PII, as is behavioral information, for example, in a customer relationship management system. Adherence to data privacy laws and regulations requires having robust data security policies and practices, because such laws specify the need to properly secure all end-user and customer data. Also, many laws and regulations have specific provisions related to “sensitive information,” and they may define what is meant by this term in different ways. Exhibit 3-24 shows examples of various types of sensitive information. (These are just examples; a review of applicable regulations is needed to determine what each given regulation considers sensitive.) Exhibit 3-24: Sensitive Information Sensitive health information Medical records Health plan beneficiary information Physical or mental health information Provided health services or information collected during visits Sensitive financial information Account numbers (e.g., bank accounts, credit card numbers) Financial history Salary information Other sensitive Racial or ethnic origin Religious or philosophical beliefs information Political opinions Trade union membership Legal proceedings and civil actions Combinations of certain information IT can make invasions of privacy easy and inexpensive. Any transaction entered into an information system, from simple purchases to medical records, can be stored indefinitely and potentially used for marketing or crime fighting as well as for illegal activities such as blackmail. Privacy is an issue for corporate data, employees, and customers. Corporate data must be safeguarded for a business to stay viable. Employees and their employers are in conflict on privacy, because organizations want to both protect their interests and guard against improper activity, while employees want to feel that they have a measure of privacy at work. Software can log websites visited and track every keystroke a user makes. Higher levels of monitoring can provide control but at the possible price of lower morale. Clear communication of the privacy policy will help with morale. The policy should inform employees what is and isn’t monitored as well as what is expected of them, such as using the Internet only for specific activities. Logical controls over possible sites that can be visited can reduce the need to monitor employee activities. Data PrivacyLaws and Frameworks The privacy laws in Europe and in the United States, Canada, and other countries are based in part on fair information practices (FIPs). FIPs acknowledge that the parties in a transaction have obligations to each other. Individuals have rights to privacy but need to prove their identity; organizations have responsibilities over the collection and use of information. FIPs include: Notice. Prior to collecting data, websites must disclose who is collecting the data, its uses, other recipients, what is voluntary, and what will be done to protect the data. Choice. Consumers should be able to choose how the information is used outside of support for the current transaction. Access. Consumers should be able to access and modify their personal information without great expense or hardship. Security. Data collectors must ensure that they have adequate data controls. Enforcement. FIPs must be enforced via self-regulation, legislation giving recourse rights to consumers, and other laws. A number of laws exist to protect privacy against government intrusion, such as the Canadian Privacy Act, which sets rules for the government’s ability to collect and use information about its citizens. Fewer regulations apply to the private sector, and self-regulation is the general tendency. Because many nations have privacy laws that may differ considerably, the Organisation for Economic Cooperation and Development (OECD) and similar organizations are working to create consistency in privacy laws and laws on the transborder flow of information. Key Point While many countries (and even some regions, such as California in the United States) have privacy laws or regulations, the best way to study for the exam is to learn the principles behind these laws since they share many principles. In the European Union (EU), the General Data Protection Regulation (GDPR) is a binding regulation. The GDPR obliges EU member states to protect the fundamental rights and freedoms of persons, in particular their right to personal data privacy. Much like the FIPs described above, the GDPR gives individuals the right to: Be informed of how organizations are using their personal data (i.e., a privacy policy). Access their personal data. Rectify incorrect information. Be forgotten. (Individuals can request deletion of their personal information.) Have data portability. (Individuals can request a copy of their personal information.) Object or opt out of future data collection at any time. While this is an EU regulation, any organization in any part of the world that collects or holds the personal data of persons residing in the EU will need to have policies, procedures, and IT systems in place as appropriate. Many organizations who do business globally have welcomed the GDPR as a gold standard for privacy that may prevent needing to instead comply with a patchwork of national regulations. Organizations should seek advice from legal counsel when developing or adopting a privacy framework. Key Point Organizations with a global footprint often use the most stringent data privacy regulation as a base standard for their operations in all countries to limit risk. Many organizations use the GDPR as this standard because noncompliance could put them out of business. There may be nuances to data privacy depending on the organization’s business sector. Public sector. Governments collect PII in a vast number of areas, for example, real estate, voter registration, taxation, welfare, and law enforcement. Compliance requirements may be specific to different levels of public entities. The risk of files being misused, lost, or stolen is high. There may be rules or laws that prevent (or permit, given an approval process) one agency from comparing PII with others, called data matching (e.g., law enforcement reviewing driver databases). Social services. Government agencies are subject to specific compliance requirements, but other institutions such as churches may be exempt from general legal frameworks, which could lead to lax privacy controls. Financial services. Many regulations and active supervisory bodies exist due to the sensitivity of PII such as credit history. Marketing, retail, and social media. PII includes address lists, consumer profiles, financial information, purchase history, personal preferences, and so on. Such information may be bought or sold. Sector associations offer codes of conduct. Utilities, transportation, and travel. PII is collected at tollways and parking areas and in traffic systems. Health care and research. Sensitive patient information is highly regulated. One example of a private-sector law is the U.S. Health Insurance Portability and Accountability Act (HIPAA), which governs the disclosure of medical records. It applies to health plans, health- care clearinghouses, health-care providers, and employers. International business. Many laws and regulations require that PII not leave the regulated zone of a country. These rules address the concern of loss of control when PII is transferred to another jurisdiction (which may not respect other nations’ laws). Data Privacy Controls Data privacy controls can mitigate the risks of potential misuse, leaks, or loss of PII. Benefits of good data privacy controls include: Public image and brand protection. Customer, employee, donor, and business partner PII protection. Credibility, confidence, and goodwill leading to competitive advantage. Compliance. Fundamental controls for data security include ensuring adequate governance and oversight by the board and management. Another general control example is benchmarking the organization’s privacy compliance and data-handling practices and weaknesses against international policies, laws, regulations, and best practices. Here are some additional elements of an effective privacy program: Clear roles and responsibilities Privacy statement/notice Written policies and procedures for the collection, use, disclosure, retention, and disposal of PII Information security practices, incident response plans, and corrective action plans Training and education of employees Privacy risk assessments and maturity models Monitoring, auditing, and compliance with privacy laws and regulations Inventory of the types and uses of PII Controls over service providers (outsourcing) Ethics in Data Storage Data storage can become an ethical issue. Data needs to be safeguarded per data privacy policies, regulations, etc. However, it may also need to be protected from deletion for audits or evidence of compliance. Electronic data such as emails are considered legal evidence (in the United States, this is covered under the Federal Rules of Evidence), and some companies have received large fines for denying access to or deleting such evidence. Internal auditors need to develop an awareness of these and other ethical implications when providing assurance or consulting on data storage or deletion policies. Data Security Practices Sustaining privacy practices can be challenging. IT advancements and outsourcing trends are making it difficult to determine where data is stored, how it is protected, who has access to it, and whether it is disposed securely. This evolution has outpaced legal frameworks and industry standards. Such inconsistency and uncertainty creates assurance risk. CAEs can ask questions such as the following related to data security practices: Does a board committee exist to consider risk appetite related to privacy risk? What is management’s privacy risk appetite? What are the current or likely forthcoming applicable privacy laws and regulations? What PII does the organization collect, who defines what is private, and are the definitions consistent or appropriate? Does the organization have privacy procedures and programs with defined responsibilities and accountabilities and sufficient resources to be effective?Does the organization know where all personal information is stored and who has access? How is PII protected at the database, network, system platform, application, and business process layers? Is any PII disclosed to or processed by third parties? Do employees receive privacy awareness training specific to their responsibilities? Does management periodically assess program effectiveness and need for meeting new requirements? Auditing Data Privacy Data privacy audits can help with compliance, including measuring and improving compliance with the organization’s data protection system. Audits can also identify potential inconsistencies between policies and actual practices, which can help provide assurance over reputation risks or help ensure that privacy response procedures are effective. An audit can be used as a tool to raise the level of data protection awareness among management and staff. Internal auditors look for data privacy risks in three basic categories, as shown in Exhibit 3-25. Exhibit 3-25: Threats to Organizations, Stakeholders, and Individuals Threats to organizations Privacy breaches can get significant attention from the press, supervisory authorities, and privacy watchdogs. An organization could fail to achieve its objectives and could experience operational disruptions, inefficiency, or reputation damage, with severe financial impacts. Specific control weaknesses when processing PII include: Excessive collection. Incomplete or outdated information. Damaged data. Inadequate access controls. Excessive sharing. Incorrect processing. Inadequate use. Undue disclosure. Undue retention. Threats to stakeholders While excessive privacy practices can hinder efficiency and thus investor returns, risks of damaged reputation and litigation usually outweigh this consideration. Threats to individuals Individuals may be victims of identity theft, bear extra cost, experience discrimination, or have limited control over their PII. For example, data submitted for a job application could be used for intrusive, unfair, unreliable, or adverse purposes. Evaluating the Organization’s Data Privacy Framework Internal audit determines whether a data privacy framework exists and evaluates the framework to ensure that the board has set a risk appetite related to privacy risks and that the framework is effective in identifying and addressing significant risks. Internal auditors may need to work with other parties to understand the context of security policies and guidelines for both internal use and those communicated to customers, including: Legal counsel, to identify other steps that should be performed. Privacy professionals, to help internal auditors develop an understanding of data privacy framework maturity. IT specialists, to help create a process map of information flows, system controls, and the PII life cycle, including incident response programs. Internal auditors also need to determine how the framework and related policies classify organizational data and evaluate whether the levels of classification and related controls are appropriate. Classifications are usually based on the level of harm a data breach or misuse could cause and/or the regulatory penalties for noncompliance. Another area of review is whether the framework has a privacy incident response plan and related templates. Assessing Risk Categories of privacy risk include the following: Legal and organizational risk. Internal auditors ensure that relevant privacy laws and other regulations are communicated to clearly designated responsible parties. Personnel are told what is expected of them and what the individual and organizational penalties are for noncompliance. Auditors assess personnel competency levels and whether they have a process to keep current with new laws, regulations, and technologies (e.g., cloud computing). Proof of compliance is required, not just compliance, so documentation must be addressed. Auditors determine if management is spending too much on privacy controls (e.g., expensive encryption for routine data). Infrastructure risk. PII processing steps may include paper or online forms, data entry, or fully automated steps. Each time PII moves and changes format, new vulnerabilities to confidentiality, integrity, and availability of data occur. Internal auditors should trace PII in operations as well as in backup storage, such as by reviewing encryption in storage and in transit. Controls include: Paper shredders, locked files, or other physical controls. IT general controls and application controls. Each platform or technology should have a data map and inventory of all PII, including transfers to third parties. Application risk. Evaluating software involves reviewing privacy risk assessments and whether there is “privacy by design,” such as use of data classification standards, defaults to least privileges to user access, or external interface authorization limits. Business process risk. PII needs to be used for its legitimate business process purposes, and this creates a risk that it will be at risk at person’s desks in printed form and so on. Discretion should be used in areas open to the public, and basic controls should exist, such as clean desks or timed locking of computers not in use. Topic 3: Emerging Technology This topic helps internal auditors recognize emerging technology practices and their impact on security. Such practices include bring your own device (BYOD), smart devices, and the Internet of things (IoT). According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Global Technology Audit Guide (GTAG), “Auditing Smart Devices: An Internal Auditor’s Guide to Understanding and Auditing Smart Devices” Emerging Technology Technology is constantly advancing, as is the rate and variety of malicious attacks. How to keep up with new technology and get ahead of threats? A good place to start is to provide assurance regarding IT general controls including physical security, logical access controls, and operational controls. https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG-Auditing-Smart-Devices-An-Internal-Auditors-Guide-to-Understanding-and-Auditing-Smart-Devices.aspx But what other practices can be used? The Internet of things (IoT) refers to a system of interrelated physical devices around the world connected to the Internet, collecting and sharing data. It allows for the transfer of data over a network independently without human action. IoT has emerged to allow machine-generated data to be analyzed for insights to drive improvements. The benefits of IoT to businesses are that it allows more access to data about an organization’s products and internal systems and a greater ability to make changes as a result, such as pushing out new security updates. However, this raises new concerns about data privacy and security. The increase in connected devices gives cybercriminals more entry points and leaves sensitive information vulnerable. Establishing a standardized security protocol to address the scope and diversity of devices is a central challenge. Hardware authentication incorporates authentication into a user’s hardware. An end user may be required to enter a code sent to their mobile device in order to achieve authentication. This can be combined with other forms of authentication. User-behavior analytics operates on the premise that by identifying activity that does not fit within the normal routine of an employee, IT can identify a malicious attacker posing as an employee. Data loss prevention ensures that end users do not send sensitive or critical data outside their corporate network. The key to successful data loss prevention is technology such as encryption and tokenization, which can provide data protection down to a subfield level. Machine learning and artificialintelligence can be used to automate certain protocols or detect trends in big data. Rather than looking at the end user only, these systems can also distinguish between good and bad software and provide an advanced threat detection and elimination solution. Cloud computing security refers to controls, technologies, and policies in place to protect data, applications, and the infrastructure of cloud computing. Cloud security architecture can use numerous controls, such as deterrents, prevention, and detective and corrective controls to safeguard potential system weaknesses. In addition, cloud access security brokers (CASBs) provide software that aligns itself between end users and the cloud applications to monitor activity and enforce security policies. ISO 27017 focuses on the protection of information in cloud-based services. Smart Devices Smart devices enable working in a truly mobile way. Examples include cell phones, tablets, wearable devices (e.g., watches, glasses), and specialized devices such as for warehouse picking. Smart devices have operating systems, data storage, and security mechanisms, and they connect to cellular and/or Wi-Fi networks for data, voice, and/or video. They may include GPS or specialized sensors such as for radio frequency identification (RFID). Internal auditors may need to audit the security impact of smart devices as well as related systems that may be under the control of third parties. Understanding the business context will help internal auditors determine the real business needs for smart devices, which could highlight opportunities for business advantage or a lack of real need (i.e., too much risk, too little reward). A risk assessment will help determine the engagement’s objectives and scope and required resources as well as the relevant risk and controls that the internal audit activity should recommend. A key issue around the security impact of smart devices is a bring- your-own-device (BYOD) policy. A BYOD policy relates to whether or not an employee or contractor can (or is required to) bring their own laptop or mobile device to the workplace and use it for work purposes. Note that prohibitions on laptops or tablets might be enforceable so long as a suitable device is provided to the employee or contractor, but prohibitions on mobile phones would be feasible only in very high security environments. Smart Device Risks Smart devices face risks in a number of categories. Compliance risks. The variety and number of smart devices creates a risk of organizational smart devices failing to be regularly updated per policies and procedures. BYOD update risks are even higher, since the organization may not control updates. For example, a person could avoid updates due to performance concerns. Privacy risks. Personally identifiable information (PII) is stored on smart devices. Also, the organization could use smart devices to monitor its employees. BYOD practices and devices of vendors, guests, or visitors increase the risks to PII compromise. Physical security risks. Small devices are at risk of loss, breakage, or theft. Information security risks. Data on smart devices could be accessed if left unencrypted. Backups may not be performed. Controls built into operating systems (OS) could be bypassed to enable prohibited software to be installed that could contain malware; this is called “jailbreaking” for the Apple OS and “rooting” for the Android OS. Note that either practice can prevent remote wiping of the memory (a control). Persons on organizational or BYOD devices could join untrusted networks and their devices could be hijacked. GPS could be used for tracking or nefarious uses. Smart Device Controls A general smart device control is an acceptable use policy with a clear indication of penalties for noncompliance. This can include a mandate for all organizational and BYOD devices to have up-to-date anti-malware software installed, to keep the OS updated, to use only official app stores, and to not do jailbreaking/rooting. End users need to be educated on weak versus strong passwords or other forms of authentication. Basic security training for organizational or BYOD devices can be provided, such as promptly reporting thefts or ensuring that user devices have user authentication turned on in case the device is stolen. BYOD policies should require an employee signature and may include: What devices are allowed and the individual’s maintenance responsibilities. Policies on downloading, use, and transmission of organizational data, with specific prohibitions for sensitive data. Minimum security requirements. Backup policies, including if home backups are allowed. (Home backups could be prohibited to maintain U.S. HIPAA compliance.) Enabling remote wiping (for stolen devices) or possibly mobile device management (MDM) for remote software updating, monitoring, etc. Selling, discarding, or sending in for maintenance policy (e.g., proper wiping of memory). Requirements to use a virtual private network (VPN) and not use Wi-Fi networks if a VPN exists. Controls also exist at the hardware and software levels. Authentication controls need to be in place. Devices that have hardware encryption (which encrypts all data and apps when not in use) can be selected. Software encryption is a must. Some devices also support encryption in transit. Topic 4: Cybersecurity Risks This topic helps internal auditors recognize existing and emerging cybersecurity risks, including hacking, piracy, tampering, ransomware attacks, phishing attacks, and more. According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Global Technology Audit Guide (GTAG), “Assessing Cybersecurity Risk: Roles of the Three Lines of Defense” Global Technology Audit Guide, “Auditing Insider Threat Programs” Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition Cybersecurity Risks Cybersecurity, also referred to as computer or IT security, is the protection of computers, networks, programs, and data from attack, unauthorized access, damage, change, or destruction. Cyber risks (or cyber threats) involve persons or entities that seek unauthorized access to a system, network, or device, either remotely or via inside access. A hacker is a person who accesses systems and information, often illegally and without authorization. Unethical organizations employ hackers to perform industrial espionage. Hackers could harm the organization’s employees, contractors, customers, and other stakeholders and its competitive advantage. They could cause direct monetary loss as well as reputation damage if certain information were made public. https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG-Assessing-Cybersecurity-Risk-Roles-of-the-Three-Lines-of-Defense.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG-Auditing-Insider-Threat-Programs.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG1.aspx Cybercrime is a growing area of organized crime. Profit is the motive. Organized crime organizations may have large-scale operations in certain nations that suffer from poor enforcement or graft and corruption. There are generally three main types of computer crime: Those where the computer is the target of a crime Those where the computer is used as an instrument of a crime Those where the computer is not necessary to commit the crime, but it is used to make committing the crime faster, to process more information, or make the crime more difficult to identify and trace Two other sources of cybersecurity risks are insiders and service providers, especially service providers who develop substandard offerings that have security vulnerabilities or who do not promptly patch known vulnerabilities.Aside from negligence, insiders and service providers could use their inside knowledge and access to take advantage of inside information to perpetrate or conceal fraud. Malware Malware is malicious software designed to gain access to a computer system without the owner’s permission for the purpose of controlling or damaging the system or stealing data. The types of attacks that are increasing are ransomware (see below), attacks that gain unrestricted access to user systems and data, and attacks that gather network passwords and financial data. Zero-day attacks use malware that is not yet known by the anti-malware software companies. The number and frequency of network attacks is increasing, sometimes with several versions of the same type of malware appearing in one day. Antivirus vendors have resorted to hourly updates. The antivirus industry rapid response system is challenged by criminals who have their own structure to develop new threats and to scan for and infect vulnerable systems. Types of malware include the following: VirWare. VirWare includes viruses, worms, and ransomware. A virus attaches itself to storage media, documents, or executable files and is spread when the files are shared with others. One type is a macro virus, which uses the macro function of software such as Microsoft Word to create executable code. In response, Microsoft created file extensions (e.g., .xlsx—no macros, .xlsm—macros allowed). Worms are self-replicating malware that can disrupt networks or computers. Unlike a virus, a worm does not attach itself to an existing program or to code. It spreads by sending copies of itself throughout a network. Worms may act to open holes in ® network security or trigger a denial-of-service attack (see below). With ransomware, software encrypts all files on a computer or network and the criminal sends the user a demand indicating that the encryption key won’t be released unless a payment is made quickly, usually through a cryptocurrency. Avenues of attack include links or attachments in unsolicited emails as well as malvertising, or malicious advertising on websites that can direct users to criminal servers even if the user never clicks on an ad. Ad-blocking software is a partial defense. Instant message (IM) worms, worms for mobile devices, and net- worms have been increasing because they don’t need to rely on users opening email. Email worms have been decreasing, partly due to the rapid response system and improved antivirus software. Cybercriminals have shifted to using more Trojan horses. Trojan horses. Trojan horses are malicious programs disguised to be innocuous or useful using social engineering. Social engineering is a set of rhetorical techniques used to make fraudulent messages seem inviting; it is initiated through deceptive emails, instant messages, or phone contact. A key control is to educate users to initiate all contact themselves (i.e., don’t click on an email link; go to the site directly). Once installed, Trojan horses can install more harmful software, such as spyware. Spyware is malware installed without the user’s knowledge to surreptitiously transmit data to an unauthorized third party. Trojan horses are smaller and easier to transmit and cheaper to develop because they do not need to be capable of self-delivery. Trojan horses include the following. Trojan-clickers require clicking on a hyperlink. Banker programs steal bank account data. Root kits are tools installed at the root (administrator) level. Trojan-proxies use an infected computer as a proxy. Other malware. Adware is malware intended to provide undesired marketing and advertising, including pop-ups and banners on a user’s screen. A key logger records keystrokes to steal passwords, etc. A dialer automatically dials a 900 number (a high-fee line) to generate huge debts. Other external threats. Phishing is creating a website that appears identical to an organization’s site and then luring the organization’s users to that site through social engineering to capture IDs, passwords, government IDs, etc. An evil twin is a Wi-Fi network operated by a cybercriminal that mirrors a legitimate network. Identity theft is the illegal use of sensitive information to impersonate an individual over computer networks in order to defraud the person or commit a crime without the perpetrator’s true identity being known. The human-to-browser phase of transactions is where most identity theft occurs, not in the space between browser and web server. Most of the problem is due to poor password controls and social engineering. Piggybacking is either physically following someone through a secure door or using someone’s legitimate password to access a network. A denial-of-service attack is designed to take up so much of a shared resource that none of the resource is left for other users. Internal threats: illegal program alterations. Hackers, or more likely, malicious insiders with programming privileges, can alter the code of programs, usually to perpetrate fraud or theft. The following are examples of such data manipulation techniques: Asynchronous attacks cause an initial system action and then a subsequent system reaction. For example, after a system has been shut down and before it restarts automatically, changes may be made to the restart parameters to weaken security. Data diddling is intentionally manipulating data in a system. Data hiding is manipulation of file names or extensions or other tricks to hide a file so that it can be manipulated (e.g., hiding an audit log). Backdoors can bypass normal authentication and be installed by direct code manipulation (or by Trojan horses). Server/mainframe malware. Attacks on mainframes are rare because of the specific knowledge needed for a particular mainframe. Nevertheless, publicly available servers connected to the web are assumed to be under a constant barrage of attacks. Server attacks start by attempting to gain low-security access followed by an attempt to elevate the security level. Once inside, changes include hiding tracks, stealing data, and breaking or taking control of the system. Microsoft servers have security issues that are regularly patched and publicly announced, but hackers will exploit systems that aren’t updated. In addition to system attacks, publicly available servers can be attacked through their applications. For example, an intranet server might use a distributed application to allow employees to check customer data. Hackers find flaws in such applications. Exhibit 3-26 provides a summary of the types of malware just discussed. Exhibit 3-26: Malware Summary Virware Viruses Worms Ransomware Trojan horses Trojan-clickers Banker programs Root kits Trojan-proxies Other malware Adware Key loggers Dialers Other external threats Phishing Evil twins Identity theft Piggybacking Denial-of-service attacks Internal threats: illegal program alterations Asynchronous attacks Data diddling Data hiding Backdoors Server/mainframe malware Protecting Systems from Malicious Software and Computer Crime All operating systems contain bugs that create vulnerabilities and affect overall system performance. The use of homogenous operating systems allows wide-scale exploitation of bugs. Controls include: Frequent updates and patches to operating systems. Running systems with administrative privileges turned off. Operating systems that restrict rights given to code, such as use of a virtual area or sandbox, which fixes a security flaw of over- privileged code (when systems allow any code executed on a system to receive all rights of the system user). Antivirus software maintains lists of known viruses and prevents them from being installed or helps recover a computer once a virus is removed. Such software scans both incoming and outgoing data. Automated downloads and regularly scheduled scans are important controls to keepsuch systems up to date. Some antivirus programs use nature-based models that look for any unusual code and can detect new viruses. Policies can also help, such as allowing downloads only from reputable locations with security seals. Other tools include blockers for spyware, spam, macros, and pop-ups. One method of self-protection from malware in general is to follow a minimum set of agreed-upon controls, called baseline controls. One example is the VISA Cardholder Information Security Program (CISP), which has made a set of security guidance rules available to credit card network users. This advice, called the “Digital Dozen,” can be found in the Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition. Other controls include taking sensitive information offline and performing background checks on new employees and users with security clearance. Browsers contain phishing filters, which send data to the browser manufacturer for validation. ® https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG1.aspx Controls associated with proper user identification and authentication of identity are critical. Authentication mechanisms must be secured and assessed. Users must be aware of the dangers of sharing or not securing passwords or creating weak passwords. Externally Stored Data and Third-Party Cybersecurity Risk When data is stored external to the organization, such as in a third- party cloud, it is vital for the organization to ensure that vendors are properly managing relevant risks. Critical steps for management to take include due diligence and strong contracts that require: Service organization control (SOC) reports. Right-to-audit clauses, including use of cybersecurity engagements. Service level agreements (SLAs), including reporting requirements related to information security protections. Oversight and data and information security governance include monitoring the vendors and the key metrics they report to ensure conformance with the SLAs. Remedies for deficiencies include asking for timely resolution of concerns, enforcing penalties, and enforcing the right to audit. Vendors who do not remediate issues in a timely manner may need to be replaced. Piracy and Device Tampering Software piracy is the illegal copying of software or distribution of software access to more users than is allowed in the organization’s contract. Software organizations may be able to detect illegal use of software remotely or have their own right-to-audit clauses with the purchasing or leasing organization. Financial penalties for noncompliance can be severe. A policy prohibiting piracy is an important control. Risk-based internal audits may be needed to provide assurance that software is not being pirated. Device tampering includes jailbreaking/rooting of smart devices or other hardware manipulations. It may enable piracy or installation of apps that contain malware. Device tampering is dangerous and should also be prohibited by policy. Insider Threat Programs The primary purpose of an insider threat program is to protect critical assets, which include valuable data, people, facilities, and systems. Insider threats cannot be completely eliminated, and trying to do so can be prohibitively expensive. Programs to monitor and control insider threats may be part of the risk universe for internal auditors. Given a risk assessment, the internal audit activity may plan assurance engagements to assess the effectiveness of these programs or consulting engagements to assess insider risks. An important step is to assess the control environment, since poor authentication controls and so on can create a pervasive impact on opportunities for insider threats. Usually audits will focus on a specific subset of insider threats, such as hiring practices or management’s methods to monitor the external and internal environment, rather than having a full scope. The steps related to understanding the engagement context, gathering information, performing a risk assessment, and communicating results to the board are discussed next. These steps will be used to establish the scope, allocate resources (the CAE needs to obtain competent assistance and advice per Standard 1210.A1), and plan the engagement. Understanding the Engagement Context and Gathering Information Understanding the engagement context and purpose may involve determining if changes in the operating environment, such as mergers or acquisitions, have introduced new risks to the environment. Information gathering can include discovery about past fraud allegations, occurrences, and investigations involving insiders. It is also important to review related regulatory compliance requirements. Internal auditors may need to prepare by studying established security frameworks, programs, and recommendations. This culminates in a risk assessment. An insider threat program should have a process map that can be reviewed. Components of the program to review include: Stakeholders involved and their requirements. Senior management and board buy-in and oversight, including governance structure and policy. Management’s insider threat planning process. Management’s insider threat risk management process: How it identifies critical assets. How it identifies threats. How it assesses vulnerabilities. Management’s insider threat operations: Communications, training, and awareness programs (which should be improved using feedback loops from issue resolutions to improve these processes). Preventive and detective controls. Data and tool requirements. Analysis and incident management: Initial and internal investigations. Referrals and reporting. External criminal investigation decisions. Final actions, management reporting, and feedback and lessons learned. Subprocesses may also be reviewed, such as the employee application, screening, hiring, onboarding, reaccreditation (changing access privileges when employees shift to new positions), and termination process for employees. Each step in such a process will have its own risks and a potential set of controls. For example, the employee application process has a risk of hiring employees who are secretly working for major competitors. Employment history evaluation and additional screening for sensitive positions are potential controls. Risk Assessment Exhibit 3-27 reviews common insider threats that are generally based on the use of IT to commit the crimes. Exhibit 3-27: Insider Threats Threat Risk Potential Impact Fraud Identity theft or illegal use of data for personal gain Financial misstatements or reputation damage IT sabotage Use of IT to harm organization or specific individual Denial of service or productivity loss Threat Risk Potential Impact Theft of intellectual property Industrial espionage involving insiders Loss of competitive advantage or revenue Theft or disclosure of sensitive data Theft of confidential, proprietary, or private data for financial gain Restitution payments to customers or loss of customer trust Theft of personal data Theft or disclosure of personally identifiable information Legal expenses, restitution, or loss of trust; data privacy noncompliance penalties Illegal activities Use of digital assets to send spam, gamble, or do other prohibited activities Financial losses and reputation damage Insider Threat Reports and Recommendations To effectively communicate the risks related to insider threats to the board, internal auditors must translate audit findings into terms of financial loss, reputation damage, operational disruption, and other organizational performance indicators. Best practices include referring to existing industry reports and educating the board that only reasonable assurance of security is possible. The Global Technology Audit Guide, “Auditing Insider Threat Programs” cites the CERT InsiderThreat Center’s “Common Sense® https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG-Auditing-Insider-Threat-Programs.aspx Guide to Mitigating Insider Threats, Fifth Edition,” for a set of best practices or control objectives. Internal audit activity recommendations may include one or more of these best practices, as reproduced below, depending on the results of the engagement: Know and protect your critical assets. Develop a formalized insider threat program. Clearly document and consistently enforce policies and controls. Starting at the hiring process, monitor and respond to suspicious or disruptive behavior. Anticipate and manage negative issues in the work environment. Consider threats from insiders and business partners in enterprise- wide risk assessments. Be especially vigilant regarding social media. Structure management and tasks to minimize unintentional insider stress and mistakes. Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees. Implement strict password and account management policies and practices. Institute stringent access controls and monitoring policies for privileged users. Deploy solutions for monitoring employee actions and correlating information from multiple data sources. Monitor and control remote access from all end points, including mobile devices. Establish a baseline of normal behavior for both networks and employees. Enforce separation of duties and least privilege. Define explicit security agreements for any cloud servers, especially access restrictions and monitoring capabilities. Institutionalize system change controls. Implement security backup and recovery processes. Close the doors to unauthorized data exfiltration. Develop a comprehensive employee termination procedure. Topic 5: Cybersecurity Policies This topic describes organizational policies related to cybersecurity, information security, and information security governance. According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Global Technology Audit Guide (GTAG), “Assessing Cybersecurity Risk: Roles of the Three Lines of Defense” Cybersecurity Policies https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG-Assessing-Cybersecurity-Risk-Roles-of-the-Three-Lines-of-Defense.aspx Cybersecurity policies and related training and testing are designed by IT risk management and IT compliance functions (second line roles) and administered by IT operations management roles (first line roles). Internal audit (third line roles) provides independent ongoing evaluations of cybersecurity policy effectiveness. Since many cybersecurity policies are based on cybersecurity frameworks, a common cybersecurity framework is presented next. NIST Cybersecurity Framework The U.S. National Institute of Standards and Technology (NIST) Cybersecurity Framework, or CSF, provides a risk-based iterative approach to the adoption of a vigilant cybersecurity stance for public and private organizations. It also includes guidance on self- assessment. The NIST CSF Framework Core, shown in Exhibit 3-28, includes cybersecurity activities, desired outcomes, and references from industry standards, guidelines, and practices. The Framework Core has five functions, which are further divided into 23 categories. Exhibit 3-28: NIST CSF Framework Core Function Description Categories Function Description Categories Identify Identify and communicate cybersecurity objectives and goals. Develop organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Asset management Business environment Governance Risk assessment Risk management strategy Supply chain risk management Protect Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Identity management and access control Awareness and training Data security Information protection processes and procedures Maintenance Protective technology Detect Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Anomalies and events Security continuous monitoring Detection processes Respond Develop and implement the appropriate activities to take action regarding a cybersecurity event. Response planning Communications Analysis Mitigation Improvements Function Description Categories Recover Maintain plans for resistance and to restore capabilities or services that were impaired due to a cybersecurity event. Recovery planning Improvements Communications Source: “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0. NIST (National Institute of Standards and Technology), 2014. Information Security Policies An effective information security policy should provide guidelines for preventive and detective controls to address a variety of information risks. Such risks can include unauthorized access, disclosure, duplication, modification, misappropriation, destruction, loss, misuse, and denial of use. Information security policies guide management, users, and system designers in making information security decisions. The International Organization for Standardization, or ISO, the world’s largest developer and provider of international standards, has established guidelines and general principles for initiating, implementing, maintaining, and improving information security management within organizations. ISO provides the 27000 family of standards for the development of organizational security standards and effective security management practices and to help build confidence in interorganizational activities. The ISO 27001 certification means that the organization will be able to: Improve enterprise security. Plan and manage security effectively. Secure partnerships and e-commerce. Enhance customer confidence. Perform accurate and reliable security audits. Reduce liability. For internal auditors, a key resource is The IIA’s Global Technology Audit Guide (GTAG), “Assessing Cybersecurity Risk: Roles of the Three Lines of Defense.” To design an information security policy, the organization should assess its security needs to gain an understanding of its business needs and security objectives. Common questions that this assessment should ask include: What information is considered business-critical? Who creates that critical information? Who uses that information? What would happen if the critical data were to be lost, stolen, or corrupted? How long can our business operate without access to this critical data? https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG-Assessing-Cybersecurity-Risk-Roles-of-the-Three-Lines-of-Defense.aspx As information crosses multiple lines in an organization, so too does information security. Therefore, an information security policy should be coordinated with multiple departments—including systems development, change control, disaster recovery, compliance, and human resources—to ensure consistency. Additionally, an information security policy should state Internet and email ethics and access limitations and define the confidentiality policy. Good policies also need to provide precise instructions on how to handle security events and escalation procedures (e.g., how to escalate situations where a risk is likely exceeding the organization’s risk appetite). One essential information security policy is to ensure that the organization’s Three Lines roles also cover information security roles and responsibilities, as is discussed more next. Information Security Objectives Auditors not only need to understand information security principles and controls in general; they should also understand the security needs of the particular facet of the business where the controls and informationsecurity systems reside. Both are needed to gain a full appreciation of information security risks and controls. The overall goal of information security is to maintain the integrity of information assets and processing and mitigate and remediate vulnerabilities. COBIT, formerly known as Control Objectives for Information and Related Technology, is an internationally accepted framework created by ISACA that helps enterprises to achieve their objectives for the governance and management of information technology. COBIT systems security objectives reflect the breadth and complexity of the systems security environment: Manage IT security, as aligned with business requirements. Implement an IT security plan that balances organizational goals and risks and compliance requirements with the organization’s IT infrastructure and security culture. Implement identity management processes to ensure that all users are identified and have appropriate access rights. Manage user accounts through appropriate policies and processes for establishing, modifying, and closing them. Ensure security testing, surveillance, and monitoring to achieve a baseline level of system security and to prevent, identify, and report unusual activity. Provide sufficient security incident definition to allow problems to be classified and treated. Protect security technology by preventing tampering and ensuring the confidential nature of security system documentation. Manage cryptographic keys to ensure their protection against modification and unauthorized disclosure. Prevent, detect, and correct malicious software across the organization in both information systems and technology. Implement network security to ensure authorized access and flow of information into and from the enterprise. Ensure that sensitive data is exchanged only over trusted paths or through reliable media with adequate controls to ensure authenticity of content, proof of submission, proof of receipt, and proof of nonrepudiation of origin. Systems security is made up of controls general to the organization and specific to IT and physical security systems. Because a system is only as strong as its weakest link, systems security must start with use of a control framework such as COSO’s Internal Control— Integrated Framework. Other controls such as proper segregation of duties are a prerequisite for IT systems security. Pointing out a deficiency in general or application controls needs to be put in context by explaining to management the risk exposure the deficiency is causing. The auditor should recommend the best system that can address the control given the particulars of the organization. Continual monitoring is required for controls to be effective. For example, a review of a software application for controls should include the security administration procedures, password controls, and user role provisioning methods. When auditing for computer-related fraud, auditors trained in computer controls should try to think like a thief or a hacker in determining areas of greatest vulnerability. While this is not an easy task, it is important to determine what fraud would “look like” in the particular area under review so as to design the audit for maximum impact. This involves considering: How a system could be exploited. How the audit trail might be covered up. What level of authority would be needed to enact the cover-up. What explanations could be used if the issue were detected. Role of the Three Lines Model in Cybersecurity In the Three Lines Model, the first and second line roles for an organization are management (including its support functions) and the third is the internal audit activity. First line management roles deliver products and services to customers and are responsible for managing risk. Second line roles provide complementary expertise, support, monitoring, and challenge to first line roles. Proper board governance is also vital to the model and forms two of its six principles: Governance Governing body roles Management and first and second line roles Third line roles Third line independence Creating and protecting value In terms of cybersecurity, management is accountable for developing, funding, monitoring, and controlling data administration, data processes, data risk management, and data controls. They usually delegate to qualified systems administrators who recruit and train certified and qualified staff. Systems administrators need to: Implement cybersecurity procedures, including training and testing of these procedures. Keep all systems up to date and securely configured, including restriction to least-privilege access roles (i.e., not overprivileged). Use intrusion detection systems. Conduct penetration testing (simulated attacks such as a denial-of- service attack) and internal and external scans for vulnerability management. Manage and protect network traffic and flow. Employ data and loss prevention programs, including encrypting data when feasible. The first and second line roles that include risk, control, and compliance functions help assess whether the controls are functioning adequately and whether they are complete. First and second line roles need qualified, talented, and certified individuals who can conduct cyber risk assessments and gather intelligence on cyber threats. The roles need adequate policies, including for ongoing training. They may be involved in helping to: Design roles to have least-privilege access. Assess external business relationships. Plan and test business continuity and disaster recovery. Internal audit maintains its independence and objectivity in part so that it can properly function as the third line role. In the event that the first two lines fail to provide adequate protection, have an incomplete strategy, or fail to implement recommended remediation, internal auditors will be in a position to make these observations to senior management and/or the board. This might entail evaluating: Cybersecurity preventive and detective controls for adequacy and completeness. The IT assets of privileged users to ensure that they have standard security configurations and are free from malware. External business relationships by conducting cyber risk assessments. The following cybersecurity risk assessment framework can help the internal audit activity ensure that the board and management are fulfilling their roles with regard to cybersecurity. Cybersecurity Risk Assessment Framework The “Assessing Cybersecurity Risk” Practice Guide presents a cybersecurity risk assessment framework, as shown in Exhibit 3-29. Each of the framework’s components are inderdependent and depend on the effectiveness of the other components to enable the organization to be fully prepared to address cybersecurity. Each component is discussed more next. Exhibit 3-29: Cybersecurity Risk Assessment Framework Cybersecurity Governance Cybersecurity governance is evidenced by clearly defined policies, relevant tools, sufficient staffing, and insightful training. Red flags of lack of governance include fragmented governance structures, incomplete strategy, unnecessary delays, budget cuts, attrition, or lack of accountability enforcement. A cybersecurity governance committee with representatives from the board, management, and internal audit can be formed to help: Establish a culture of cybersecurity risk awareness. Set a related risk appetite. Develop cybersecurity business continuity and disaster recovery plans. Collect cybersecurity risk intelligence. Collaborate and share expertise. Such a committee would also oversee prompt management responses to security breaches, including root cause analysis. This committee can help avoid a common pitfall of management in that emerging threats or vulnerabilities are not considered proactively. The committee enlists the right types of expertise, does ongoingresearch, creates metrics, and reviews security defense tests. Inventory of Information Assets Management is responsible for creating an inventory of information assets, technology devices, and related software. This priority- ranked list of information assets can help determine where to apply stronger controls and where IT general controls and periodic evaluations should suffice. The most valuable assets will need preventive and detective controls that are continually monitored for ongoing effectiveness. This inventory will be enhanced if a process map is used or created to show how the information assets interact. A key benefit of having an inventory is that it will enable detection when unknown devices have accessed a network. If these are the employees’ own devices (used under a bring-your-own-device policy), they can be authenticated and inventoried. An inventory will consider data by type (e.g., transactional, unstructured), classification (e.g., health data), and storage environment. A comprehensive inventory will include: A physical inventory of servers and network, storage, and end-user devices. A comprehensive list of all applications. All third-party-hosted environments and data shared with external organizations, including regulatory agencies and vendors. Standard Security Configurations Centralized, automated configuration management software can establish baselines for devices, operating systems, and software. Standardized configurations are more effective and easier to use for global updates than a patchwork. Risk assessments can determine where higher-security configurations are needed. Information Access Management An internal audit activity review of user access can determine if preventive controls, such as review and approval of privileges based on a new or transferred job role, are appropriate and working. An emphasis is placed on preventive controls for privileged administrative access because this is a leading indicator of cybersecurity program effectiveness. Prompt Response and Remediation Mature programs continuously shorten the time to management response. The second line roles communicate important risks to management, enact remediation, track issues to resolution, and create trend reports on resolutions. Ongoing Monitoring The second line role is expected to implement a monitoring strategy designed to generate behavioral change. Successful behavior change can include the following results. Users who do critical processes or access sensitive data are monitored at the access level. A systematic process to find IT vulnerabilities and remediate them is developed, including by regularly scanning systems. For external-facing systems, first and second line roles help define and agree on service level agreements (SLAs), service organization controls (SOCs), and other risk assessment and oversight programs such as technical architecture evaluations and compliance monitoring. The second line roles do announced and unannounced penetration testing. A method of ongoing monitoring and remote updating of smart devices for malware security should be in place. Topic 6: IT Auditing, SDLC, and Change Management This topic starts with an overview of IT objectives. It then looks at IT auditing and reviews its risks. The topic also addresses the core activities in the systems development life cycle (SDLC): requirements definition, design, developing, testing, debugging, deployment (and delivery), and maintenance. The topic also helps internal auditors understand the importance of change controls throughout the SDLC. According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Global Technology Audit Guide (GTAG) 4, “Management of IT Auditing,” 2nd Edition Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition Global Technology Audit Guide (GTAG) 8, “Auditing Application Controls” Global Technology Audit Guide, “IT Change Management: Critical for Organizational Success,” 3rd Edition Goals of IT Access to relevant and reliable information is key to business decision making. Relevance includes timeliness of information and an appropriate level of detail. Successfully applied information technology speeds the availability of information, automates aggregation and sorting of data, and ensures information accuracy. IT is successfully applied when the organization is able to use it to: Fulfill business objectives. Measure and address risks appropriately. Grow and adapt fluidly. Communicate effectively internally and externally. React quickly to business opportunities as they arise. Management of IT Auditing https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG4.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG1.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG8.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/na-Technology-Audit-Guide-IT-Change-Management-Critical-for-Organizational-Success.aspx The IIA’s Global Technology Audit Guide (GTAG) 4, “Management of IT Auditing,” 2nd Edition is summarized in brief here. Internal audits of IT use the same basic process as any audit, per Standard 2200 and the steps in the “Engagement Planning: Establishing Objectives and Scope” Practice Guide (understand context, gather information, assess risks, form objectives, establish scope, allocate resources, and document the plan). Considerations for each step are provided next. Understand Context and Gather Information According to The IIA Implementation Standard 2110.A2 (Assurance Engagements) The internal audit activity must assess whether the information technology governance of the organization supports the organization’s strategies and objectives. Understanding the business context for IT auditing and identifying the IT portions of the audit universe start by understanding the organization’s business strategy. IT strategy, IT processes, and IT projects exist to support and enable this strategy and therefore should be in alignment with organizational strategy. The CAE will need to map the organization’s operations and IT infrastructure to: https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG4.aspx https://na.theiia.org/standards-guidance/performance-standards/Pages/Performance-Standards.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Engagement-Planning-Establishing-Objectives-and-Scope-Practice-Guide.aspx https://na.theiia.org/standards-guidance/mandatory-guidance/Pages/Standards.aspx Understand the impact of IT on strategy execution as well as the execution of strategies at business process levels. Define the boundaries of IT, such as whether or not the physical security systems or telecommunications systems are part of IT. Highlight previously unidentified risks that should be communicated to senior management and IT management. While IT general controls could be centralized, decentralized, or a mix of the two, cloud computing and other trends continue to make central control less feasible as a pure strategy. Thinking about IT risks and controls as a layered model will help internal auditors better understand the context for audit priority, risk assessment, and control evaluation. Exhibit 3-30 shows a generic model of the layers within IT management. Exhibit 3-30: IT Management Layers Key Point A key point about IT management layers is that the technical infrastructure layer is harder to understand both conceptually and in terms of its risk and control implications than the applications (software) layer. For example, for procurement: The three-way match process at the application level is fairly straightforward to assess for existence and proper functioning.However, at the database level, one insider (or hacker) threat is alteration of bank account routing numbers for Automated Clearinghouse (ACH) payments.A person with the right skills and access could divert funds without triggering security, control, and audit trail mechanisms. If the bank allows payments to unknown account numbers, the problem would not be known until the authorized recipients report not getting the money. Let’s briefly review each of these layers. IT management layer. IT management comprises the set of people, policies, procedures, and processes that manage IT services and facilities. This layer includes IT governance, security management, system monitoring, programming, planning, vendor management, problem and incident management, change management, IT project management, and disaster recovery. Audits will focus on the people and the tasks they perform rather than the technical details. External connections layer. External connections to the Internet (such as for customer account self-management) have different risks and controls than other external connections, such as to third- party business partner networks and cloud services. All communications to and from external networks should be considered a risk and should be tightly controlled and monitored based on the risk level. At a minimum, an inventory of all entry and exit points needs to be maintained. Technical infrastructure layer. Various technologies underlie, support, and enable the primary business applications, including operating systems, databases, networks, and data centers (e.g., server rooms). It is important to understand that technical infrastructure audits focus on a review of technical configuration settings in combination with their associated management processes (such as monitoring of privileged access users). Applications layer. Applications include transactional applications (developed in-house, by vendors, or customized) as well as support applications that facilitate business but do not process transactions (e.g., email, data analytics, data warehouses). The bulk of IT audit attention is on transactional applications, but support applications, such as those that support external reporting or manufacturing machinery, could be high risk as well. Some applications require specialized knowledge for audits. Assess Risks, Form Objectives, and Establish Scope When assessing risks to determine audit objectives and scope (both at the audit plan level and for individual engagements), use of the organization’s normal risk management framework is a best practice. It is better to use one consistent approach for all risk types. Due to the fast pace of IT change, the risk assessment (and audit universe) will need to be updated regularly. Similarly, there should not be a separate IT audit universe; it is part of the overall audit universe. However, there can be a grouping by audit type to facilitate allocation of specialist IT resources. The internal audit activity should also leverage whatever IT control framework the organization has selected, such as COBIT. This can help enable completeness, for example, including offshore service providers or automated business processes. Sharing the audit universe with relevant business partners is also a best practice. While specific IT risks are addressed elsewhere, in general, it is important to assess: Probability and impact using objective data such as IT statistics and error logs (e.g., number of incidents). Subjective data such as interviews with process owners (especially for difficult-to-measure risks). Risks with obvious severe negative consequences (like the loss of a data center) will require a response, so there is no need to quantify the risk. For less obvious risks, internal auditors look at the size (e.g., by budget) and business criticality (e.g., number of business entities the application supports or will support) of the IT project or underlying business function. Allocate Resources According to The IIA Implementation Standard 1210.A3 (Assurance Engagements) Internal auditors must have sufficient knowledge of key information technology risks and controls and available technology-based audit techniques to perform their assigned work. However, not all internal auditors are expected to have the expertise of an internal auditor whose primary responsibility is information technology auditing. When developing the audit universe and audit plan priorities, it is important to call out potential projects that will require IT staff resources and IT audit specialist skills. A frequent issue with allocating resources is that audits of a business area unrelated to IT often still have strong demand for IT specialist resources simply because so many business functions are now deeply dependent upon information systems. To support Standard 1210, “Proficiency,” it is important for the CAE to realize that there is a wide variety of IT competencies and a specialist may be competent in one area but not in others. For example, the skill set needed to audit a firewall configuration is vastly different from the set needed to audit accounts payable configuration database tables. Training, cosourcing, outsourcing, and recruitment efforts will need to focus on knowledge gaps or areas high in demand. Making an overview of the different skill sets that are https://na.theiia.org/standards-guidance/mandatory-guidance/Pages/Standards.aspx https://na.theiia.org/standards-guidance/attribute-standards/Pages/Attribute-Standards.aspx needed and then creating an inventory of current skills will help develop this gap analysis. Document the Plan According to The IIA Implementation Standard 1220.A2 (Assurance Engagements) In exercising due professional care, internal auditors must consider the use of technology-based audit and other data analysis techniques. While most of an IT audit engagement plan will be the same as for any other type of audit, here we focus on some of the differences: Some IT domains will be audited exclusively by specialist IT auditors, but audits of IT-enabled business processes take a view of the whole value chain and require collaboration with non- specialist auditors. Which party leads matters less than collaborating to delivery the optimal audit result. If an IT control framework does not exist at the organization, the CAE should select an appropriate framework based on best fit. (Perfect fit is not needed.) Audit testing tools selected should pass a cost-benefit test and should enable consistency and efficient review of large populations https://na.theiia.org/standards-guidance/mandatory-guidance/Pages/Standards.aspx of data. Such tools are often used by hackers to probe a system. They include: Security analysis tools. An important example of such tools is network analysis tools, which gather information about a network, validate the accuracy of network diagrams, identify network devices needing additional audit attention, and inventory what traffic is permitted across the network. Vulnerability assessment tools. This software automatically checks for known vulnerabilities such as default passwords or settings. Auditors can plug in a range for automated search, and the tool creates a report. Because such tools could impact the integrity of the systems they are checking, it is important to coordinate the tests with a security officer (or use the results of their tests). Application security analysis tools. Large applications such as ERP systems often have vendor-supplied security tools to analyze systems against pre-configured rules (e.g., vendor “best practices” that may need to be evaluated to see if they apply) or segregation of duties. Plans for reporting to management should take into account the level of detail that these parties need rather than burying the actionable information in unnecessary detail. The focus should be on business risk. Inthe control components, and the organization’s layers in the form of a cube, as shown in Exhibit 3-1. Each side of the cube relates to and influences the other sides. Exhibit 3-1: COSO’s Internal Control Framework The entity structure, which represents the overall entity, divisions, subsidiaries, and so on, is depicted as one side of the cube to show how the other sides of the cube apply to various organizational levels and become more granular. The rows represent the five components required for adequate governance, risk management, and internal control: the control environment, risk assessment, control activities, information and communication, and monitoring activities. These components relate to the organization’s strategy. For example: The control environment includes the organization’s values, attitudes, and ethics, which all influence the organization’s strategy. The risk assessment component helps shape strategy by weighing the pros and cons of competing strategies. The columns represent the operations, reporting, and compliance objectives: Operations objectives relate to the effectiveness and efficiency of operations, including but not limited to operational and financial performance goals and safeguarding of assets. Reporting objectives relate to financial and nonfinancial reporting, both internal and external, and may include reliability, timeliness, transparency, completeness, or other terms as identified by the standards setters, regulators, or policies of the entity. Compliance objectives relate to the laws, regulations, policies, and procedures to which the entity is subject and the entity’s adherence to the same. Subcategories may include compliance with contracts, industry standards and best practices, and internal policy. Note that the categories are distinct but often overlap. An objective may address more than one need or responsibility or may relate to different segments of the business or different individuals. Topic 2: Organizational Structure Risk and Control This topic helps internal auditors appraise the risk and control implications of different organizational structures, for example, centralized versus decentralized structures or traditional hierarchical versus flat structures. Organizational Structure and the Control Environment Organizational structure is the organization’s formal decision- making framework and its way of organizing authority, responsibilities, and performance activities. In the context of organizational structure: Chain of command refers to the line of authority in the organization. Span of control refers to the number of employees who report to an individual in the chain of command. Organizational structure is part of an organization’s control environment. The IPPF glossary defines control environment as follows: The attitude and actions of the board and management regarding the importance of control within the organization. The control environment provides the discipline and structure for the achievement of the primary objectives of the system of internal control. The control environment includes the following elements: Integrity and ethical values. Management’s philosophy and operating style. Organizational structure. Assignment of authority and responsibility. Human resource policies and practices. Competence of personnel. When auditing the control environment, internal auditors review organizational structure to see if it effectively fulfills the organization’s governance and business objectives. Key Point Organizational structure plays an important role in how controls may or may not work. The key consideration is what impact the structure would have on an auditable area. What strengths and weaknesses does the structure create? The introduction to The IIA’s International Standards for the Professional Practice of Internal Auditing states, “Internal auditing is performed in diverse environments and within organizations that vary in purpose, size, and structure” and that such “differences may affect the practice of internal auditing in each environment,” before going on to highlight the mandatory nature of the Standards regardless of these differences. Understanding and documenting the structure of an organization or one of its subdivisions is a preparatory step for an audit engagement. Each structure will have different risks and will need specialized controls. For example, a decentralized structure may have higher risks related to synchronizing organizational goals. Controls requiring process approvals may require more creativity to implement—such as by getting buy-in from autonomous managers and using automated control processes to get compliance without undue hardship or delay When internal auditors show sensitivity to the organizational structure in their workpapers, findings, and recommendations, it helps prove that they understand the area being audited and have tailored their engagements and findings to the needs and realities of the area. In short, understanding organizational structures is part of showing competence and adding value. Centralized and Decentralized Structures Organizational structures can be centralized or decentralized or somewhere in between these points along a spectrum. One type is not necessarily better than another. The optimum structure for a given organization depends on its industry, organizational culture and values, organizational management style, national or regional location(s), national culture, and global footprint. Key Point Structure type is important to internal auditors because it has a strong impact on management oversight. A centralized structure (also called a hierarchical, bureaucratic, or traditional structure) is one in which there are several levels of authority, a long chain of command, and a narrower span of control. Decision making is concentrated in the higher levels of the management hierarchy. This structure is more bureaucratic, with a top-down management philosophy. Employees have little autonomy and must gain approval for actions. Strengths: Economies of scale (e.g., shared services) Better control of expenses, preferred vendors, etc. Consistency of decisions such as for information system choices A weakness is that a “silo” mentality can form, where units are optimized but the overall system may be suboptimal and there is poor or slow communication between units. A decentralized structure (also called a flat structure) is one in which there are fewer levels of authority, a shorter chain of command, and a wider span of control. Decision making is dispersed in the lower levels of the organization. The structure is less bureaucratic, with more bottom-up and lateral communication. Employees have more freedom to take action and have more autonomy. Strengths: Better cross-functional teamwork (less of a “silo” mentality) More organizational flexibility and adaptability Easier communication (e.g., an “open door” policy) A weakness can be lack of clear roles and responsibilities. Key Point In geographically dispersed organizations or those that grow by mergers and acquisitions, a decentralized structure can provide timely and responsive decision making that can leverage local expertise and minimize management complexity. Exhibit 3-2 illustrates the differences between centralized and decentralized structures. Exhibit 3-2: Centralized versus Decentralized Organizational Structures Hybrid structures often form in large, diversified organizations. Selected functions are managed in a centralized fashion to provide control and economies of scale, while other functions are decentralized to reduce bureaucratic complexity and improve local accountability and entrepreneurial ability. Each individual business unit could be more or less centralized or decentralized depending on what model works best to achieve its objectives. Departmentalization Departmentalization ismany cases, the results of individual engagements in specific areas can be consolidated to highlight the overall process risks and controls. Risks Specific to IT IT and auditing are primarily concerned with information risk, which includes the risk that inaccurate information is used to make a business decision. However, widespread use of IT for all business processes has led internal auditing away from a focus on assurance regarding historical data at a specific point in time to assurance about the reliability of processes. If the process is wrong, the data will be, too, and vice versa. Therefore, internal auditing can help mitigate information risk. Note that this does not preclude auditing transactions to determine the impact on the business. IT can potentially remove risks from a manual system, but it introduces its own risks. In addition, because of the nature of IT activities, these risks may also affect each other. Physical audit trail replaced by data trail. Many physical documents are eliminated for audits, and controls must be used to compensate. Hardware/software failure. Permanent loss of data, e.g., from environmental damage, outages, civil disruption, ransomware, and disasters, is costly. Systematic errors. IT reduces random errors such as in data entry, but automated systems can uniformly duplicate errors, e.g., via faulty code. Fewer human inputs/less segregation of duties. Many IT systems reduce labor costs through automation. Mitigating controls include reviewing segregation of duties and requiring end users to review their output at a low enough level of aggregation to catch problems. Access authorization. Increased ability to access sensitive information remotely also increases the risk of unauthorized access. Automated transaction authorization. Transactions that formerly required review and authorization, such as credit decisions, can be entirely regulated by an application. Authorization assurance rests on software controls and master file integrity. Deliberate harmful acts. Outside individuals can cause significant harm to an organization. Trusted insiders are a source of significant risk. IT Auditing Challenges To identify and assess the control of IT risks properly, an internal auditor must: Understand the purpose of an IT control, what type of control it is, and what it is meant to accomplish, for example, whether it is preventive or detective. Appreciate the significance of the control to the enterprise: Benefits that accrue through the control (e.g., compliance or competitive advantage). Damage that a weak or nonexistent control can cause. Identify which individuals or positions are responsible for performing what tasks. Balance the risk posed with the requirements of creating a control. Implement an appropriate control framework and auditing plan. Remain current with methodologies and business objectives. Exhibit 3-31 summarizes the challenges internal auditors must master in conducting IT audits. Exhibit 3-31: Challenges of IT Auditing Assessing IT Controls Assessing IT Controls Understanding IT controls Governance, management, technical General, application Preventive, detective Information security Importance of IT controls Reliability and effectiveness Competitive advantage Legislation and regulation Roles and responsibilities Governance Management Audit Risk Risk analysis Risk response Baseline controls Monitoring and techniques Control framework Frequency Assessment Methodologies Audit committee interface Source: Practice Guide “Information Technology Risk and Controls,” second edition. CAE Role in IT Audits The CAE is responsible for ensuring a balance between the enterprise and its IT controls and proper implementation of a control framework. This involves: Understanding the organization’s IT control environment. Being aware of all legal and regulatory requirements. Assessing whether roles related to IT controls are appropriate. Developing and implementing an internal audit activity IT risk assessment process for annual audit planning. (IT management should have its own independent risk assessment process.) Identifying all internal and external monitoring processes. Establishing appropriate metrics for control success and policies for communicating with management. Communicating IT risks and controls to the board and management in an understandable way. Systems Development Life Cycle (SDLC) IT systems have a life cycle, from design through implementation to maintenance. Early systems designs were left largely to IT specialists. A better approach is team design. The purpose of team design is to ensure that the needs of all stakeholders are considered. The steps in the process are: Feasibility study. Request for system design. High-level design. Detailed systems design. Program coding and testing. Conversion (of old data files). Implementation. Maintenance. The internal audit activity can add value to this process. For example, during the feasibility study, internal audit can provide assurance that the team is adequately staffed, control deficiencies are remedied, the system can accommodate growth, budgets are reasonable, and users agree to the change. The use of a formal or normative model for systems development helps developers in much the same way that the use of project management keeps a project progressing toward its goals while handling problems in an orderly fashion rather than as emergencies. Internal auditors can use a normative model to observe where actual practice differs from expected practice in the model. One such normative model is the systems development life cycle (SDLC). SDLC Steps A development methodology is a vital tool because it forces management to be involved rather than relegating IT to specialists. Requiring a feasibility study, policies, objectives and standards, and testing forces IT to be treated as a resource that must be managed. Formal processes help managers understand how they can be involved. In fact, all stakeholders for a system should be involved in the formal process. Indicators of effective IT controls for systems development include the ability to execute new system plans within budget and on time. Resource allocation should be predictable. The traditional SDLC is a sequential process, moving between formal stages, where one step is completed before the next is begun. In this version of the SDLC, end users are not involved in the process other than as interviewees and reviewers of completed work. Systems analysts and programmers design and build the system. Most organizations now use a modified SDLC, because they have found that engaging end users thoroughly from the start results in a better product that is “owned” by its users. Another well-established trend is using agile project management to manage the design, programming, testing, and conversion and implementation phases of the SDLC. Exhibit 3-32 shows the SDLC. Each step is described in detail following the exhibit. Exhibit 3-32: Systems Development Life Cycle SDLC: Requirements and Design Systems Planning In the systems planning phase of the SDLC, executives and IT management establish a long-term technology strategy that measures success by its fulfillment of business strategy. Capital investments are allocated in accordance with business priorities. Systems planning is often conducted by an IT steering committee with members from top management and IT. While management alone may not be able to assess if standards are adequate, the committee should be able to do so collectively. The basic question asked at this level is “What problems exist, and are they worth fixing by use of scarce resources?” The committee: Sets IT policy. Approves both long- and short-term plans, including a master plan to schedule resources for all approved IT projects. Provides monitoring and oversight. Assesses the impactof new IT. Streamlines related business processes. Systems Analysis While systems planning is used to identify problems or challenges that are worth addressing in the design and development of new systems, systems analysis is used to point out deficiencies and opportunities in existing IT systems. Systems analysis could indicate that existing system modification is more cost-effective than a new system, or vice versa. The result of systems analysis is a request for systems design or selection. This is a written request submitted either to the steering committee (for large projects) or to IT management (for smaller projects). If approved, the committee allocates money for a feasibility study. Feasibility studies indicate the benefits to be obtained if a proposed system is purchased, leased as a service, or developed, including its operational impact. Off-the-shelf software and outsourced software development are evaluated against internal development costs and time to market. Feasibility studies: Identify the needs of all related parties—management, IT professionals, users—and develop metrics for future assessment (e.g., time frame, functionality, cost). Analyze the proposed system against: Needs. Defined resources (e.g., budget, personnel). Additional costs and future impacts (e.g., impact on existing systems/hardware, additional training/staffing). Technology trends. Alignment with enterprise strategies and objectives. Perform cost-benefit analysis. Identify the best risk-based alternative (e.g., no change, a new system, reengineering an existing system, buying an off-the-shelf product, customization, or lease of software). Feasibility study conclusions should provide the basis for a go/no go decision. The feasibility study results require written approval of the committee or IT management. Internal auditors should be involved here to ensure that control and auditability requirements are included in the scope of the project. Specific controls are defined in the next step. Systems Design/Selection Systems design occurs in two phases: high-level design and detailed design. In between these steps, sometimes prototyping (rapid creation of an experimental bare-bones system) is performed. Prototyping makes a functioning model for users to interact with; they can then suggest improvements. The prototype may have more than one revision. High-level systems design has four steps: 1. Analyze inputs, processing, and outputs of existing or proposed system. 2. Break down user requirements into specifics, such as support for a particular inventory valuation method or costing technique. 3. Define functional specifications to accomplish business goals, e.g., accounts receivable data updates customer credit. 4. Compare make-or-buy alternatives, including any needed configuration or customization. Flowcharts showing the path of inputs/outputs can help clarify processing tasks and ensure that user needs are being met. Structural design can facilitate development by identifying and organizing sub-processes. At this time, data files and the database structure must also be considered as well as how existing files and databases can be converted to the new system. If the decision is made to buy a system, systems selection begins. Assuming approval, a detailed systems design is created for both internally developed systems and for purchased software that needs modification. This is a blueprint including program specifications and layouts for files, reports, and display screens. Planners flowchart each process, including the method of implementation and testing. Specific areas of customization are authorized (controls need to minimize this), and configuration settings are determined. SDLC: Development Typically organizations purchase off-the-shelf software or a subscription to a cloud-based software service. Purchased software should be configured rather than customized due to cost, time, and licensing considerations as well as the risk of incompatibility with newer versions of the systems. Software that is hosted on a cloud- based service is automatically kept up to date with the latest version. Customization is not an option for cloud-based software, but some degree of configuration may be available. Off-the-shelf and cloud- based systems also incorporate best practices and well-developed controls and have complete documentation. Programmers must get sign-off from superiors at appropriate milestones. Programmers should follow a detailed systems road map when writing or reusing code, debugging code, converting existing data and processes to the new system, reconfiguring and acquiring hardware as needed, and training staff. Source code must be protected during the project by a librarian. Online programming allows programmers to write and compile code using real data. It also speeds development time. However, it does introduce risks that must be controlled: Creation of multiple versions of programs Unauthorized access Overwriting of valid code SDLC: Testing and Debugging Testing involves creating a testing plan, collecting or creating testing scenarios, executing the tests and managing test conditions, collecting and evaluating feedback, and reporting the results. Testing and quality assurance are done in two phases: unit testing and system testing. Unit or performance testing keeps the application in isolation to find internal bugs. (Bugs are errors in software code that can cause aberrant behavior or worse.) It is useful to conduct unit testing as early as possible to prevent errors from affecting ongoing work in other units (often as a required part of the programming step). System testing strings together all programs in the application to find intercommunication bugs. In addition, the new or acquired system’s operation must be tested in an interface with all other systems with which data is transferred. Before implementation, the system faces final acceptance testing for quality assurance purposes and user acceptance. Testing terminology includes the following: Debugging—checking software for bugs Load testing—examining a system’s performance when running under a heavy load (e.g., a large number of simultaneous users) Throughput testing—validating that a system can process transactions within the promised time Alpha testing—conducted by developers Beta testing—conducted by users Pilot testing—a preliminary and focused test of system function Regression testing—confirming that revisions have corrected problems and not introduced new ones and checking for backward compatibility Sociability testing (SOCT)—testing the system in its intended environment, with actual hardware and resources, while running with competing and collaborating applications Security testing—validating the ability to control vulnerabilities In some instances, testing may be conducted automatically, during off-peak use times, thus speeding testing and development. Teams not involved in programming deliberately try to make the system fail. Security applications can be tested by deliberately trying to hack into the system. Auditors should make sure that testing is given sufficient resources, time, and attention. In addition, review of testing results, potential issues identification, and test result follow-up are vital to ensure that testing results in practical improvements. SDLC: Delivery/Deployment Conversion is the process of migrating any data to the new system and going “live.” This area is of particular concern to audits, because errors can be introduced at this point (after testing) and not detected until they cause material harm. Errors include incorrectly converting code, truncating fields, use of the wrong decimal place in calculations, and loss of records. Manual conversion is physical data entry of old records and should be avoided if possible. To reduce data entry errors, hash totals, recordcounts, and visual inspections should be used. Both automated and manual data migration should include a data cleansing step. Adequate preparation and training of staff and end users must be planned and implemented as well. Implementation is turning on the new system. Management must sign off on the conversion review. Different implementation approaches can be used. Big bang or cutover approaches have the entire system go “live” at the same time. Phased approaches are implemented by department or plant. Pilot approaches implement a test version and run it for a given period prior to full implementation. Parallel approaches run the old and new systems simultaneously for a period, requiring double entry of all transactions. This safeguards business continuity and provides independent system verification through comparison of process totals. Regardless of the method, internal auditors should ensure that a backout procedure exists. User support, such as help desks and documentation, must be available at the time of implementation. After implementation, the new/acquired system and project should be reviewed, using the metrics defined at the beginning of the project. Attention should focus on whether: The system has met user requirements (in terms of resource use and performance). Specified controls have been created and are adequate. The development process was conducted in compliance with policy. SDLC: Maintenance Operations and maintenance are ongoing activities that continue for the life of the software. It is important that management schedule and communicate the need for system downtime for routine maintenance. SDLC Documentation The change log is only part of the documentation produced by the SDLC. Large amounts of other documentation and formal specifications—covering, among other things, the software, the related business process, security features, and backup processes— are also produced. Documentation can be a boon to auditors if it is easy to use, so it should be clear and concise and follow a structured and well- communicated methodology. A risk is that programmers could shirk their documentation duties, preferring to move on to the next task. Early auditor involvement and having a designated person review the documentation as it is submitted can help lower this risk. Asking developers for personal notes can help fill in some blanks. Attempting to change a system without documentation can be made even more difficult if turnover occurs. Documentation is also a control for preventing fraud, but it is useful only if all valid changes are recorded. Another problem with documentation and the traditional SDLC appears when a long-duration project needs to be changed due to shifting business requirements, new technologies, or releases of an application. In this case, the documentation needs to be updated. Therefore the urge to fix design flaws discovered later in the process is sometimes suppressed by freezing the specifications, which could result in a less-than-useful tool. Agile software development methods address these risks. Agile Software Development The traditional SDLC can create inefficiencies through its rigidly enforced sequence of events and its assumption that the requirements for the software can be known or frozen early in the project. However, software requirements often cannot be known until significant development work has occurred. The customer often also identifies new requirements even late in development that would be key to competitive advantage. Agile is an umbrella term for a number of project management methodologies for software engineering or other projects that have high requirements and scope uncertainty even late in the project and so need to enable frequent changes in a cost-effective manner. Examples include Scrum, the Kanban method, and eXtreme Programming. Agile uses both increments and iterations: Increments create a new/improved system release by release. A release is a relatively self-contained portion of functionality released into production as soon as it is “done.” The definition of “done” includes the programmer doing all testing and quality steps. Iterations are a series of very short SDLC cycles. Each cycle, or iteration, has its own requirements definition, design, planning, development, testing, and feedback steps. Typical iteration durations are one to six weeks, and many methods have fixed- duration iterations with regular meetings, including brief daily meetings called standups and a meeting called a retrospective for continuous improvement. This allows new requirements to be incorporated quickly and with much lower risk of replanning or rework. Here are a few other qualities of agile development: An agile role is the scrum master, who is like a project manager but is an expert in the chosen agile methodology and helps enforce its use. The scrum master is more of an enabler (removes obstacles) and a coach, since collaboration is extremely important in agile and team members take the lead whenever they have the most expertise. The customer (called the product owner) needs to be involved on a daily basis and serves as the change control owner. The product owner attends all meetings with the software developers and helps set or change priorities. Change control is less formal and more collegiate. The product owner meets with the other stakeholders and represents their interests. In this way, use of the agile methodology can significantly reduce the risk that a project will be outdated before it is finished. While documentation is still necessary, its importance is reduced. The primary measure of success is working software. Many programmers employ reusable code to speed development. The team uses a Kanban board, which is a physical space like a whiteboard or software that empowers team members to pick what they want to work on next from a continually updated, reprioritized list of tasks and their current status. It ensures that the current work is done before new work is started. Auditing Agile Projects Audits of agile methods tend to be more difficult than audits of traditional methodologies, in part because agile is designed to embrace uncertainty and in part because its speed means that changes happen quickly. For example, even when properly implemented, agile methods de-emphasize documentation in priority, and poor documentation can weaken an audit trail. A thorough use of the chosen methodology can reduce risks of failure. If the product owner fails to be involved on a daily basis, information may have been missed, and the system may function but not provide the right functions for business needs. Gold plating (programmers adding unasked-for features) or scope creep (stakeholders adding unnecessary requirements) can also occur if the product owner is ineffective at change management. Risks related to emphasis on speed include that the system could have poor scalability if a minimum viable product (the smallest-scope first release) is chosen that takes shortcuts or prioritizes easier releases and pushes the difficult ones back. If an agile project starts running out of budget or schedule, some high-priority releases may not yet be done. Web Services and SOA In addition to there being many ways to customize how software projects are managed, software development sometimes transcends the traditional boundaries of stand-alone application development. One form this takes is web services along with service-oriented architecture. Web services use open Internet protocols and standards to create stand-alone, modular software services that are capable of describing themselves and integrating with other similar services. Web services work independent of platform, operating system, or computer language, and the offerings of other providers can be leveraged without any middleware. Web services can work with traditionalapplications by creating a universal wrapper around the message content. They speed software development efforts because common services such as a credit check tool can be found on a registry server. Web services are especially good for making automated or one-time connections with business partners. A service-oriented architecture (SOA) is a software system design that allows for sharing of web services as needed. A service consumer sends out requests for services to service providers, which either provide the service or forward the request. SOA has an architecture goal of loose coupling, which means that the data is separated from the application and each service says what it needs another service to do, not how to do it. Advantages include the ability for remote users to access ERP systems using mobile devices and for various applications to work together to synthesize data into information faster. In addition, developers have easier and faster upgrades. What does this all mean for internal auditors? Despite the many advantages of this set-up, control issues abound. Internal governance models that were created for traditional software will need to be reengineered. This is especially true if the organization must comply with the rules of Section 404 of the U.S. Sarbanes-Oxley Act or an international equivalent on internal controls. The openness of SOA creates new risks to internal controls. For example, in a traditional IT system, there would be barriers between the sales, credit, and billing modules that rely on logical access controls and role-based access. Customers would be assigned a customer role and a temporary unique ID. Their access would be restricted, and moving further would require knowledge of the proprietary interface that resides between the Internet portal and the rest of the ERP system. Customers could create a purchase but not change their credit. In SOA architecture, all modules such as sales, credit, billing, and the general ledger are web services connected to the web. The system would still have a firewall and other protections, but the SOA would be like a trunk line to which each set of modules and databases is connected. The entire ERP system would become a web service. Now the customer’s ERP system gets approval for and establishes a direct link to the organization’s ERP system. The two parties can automate their trading. Therefore, some of the segregation of duties will be missing. A compensating control is to designate the system making the interface as a user with its own role-based access. The ID of the user commanding that “user” also needs to be mapped to prove compliance with controls (e.g., nonrepudiation, authentication, segregation of duties). In the worst-case scenario, an organization with this set-up could allow the SOA modules, such as the general ledger, to communicate over port 80, an open channel that bypasses the firewall. Any service anywhere could then modify the general ledger. Auditors may need to seek external assurance that the SOA system can do either of the following: Authenticate the external system, the system user, and the user’s role or deny all service. Place greater emphasis on application-level controls than with a traditional set-up. General audit recommendations include implementing SOA in stages, starting with nonfinancial business functions. The organization can then assess risks and controls. IT Change Management The Global Technology Audit Guide, “IT Change Management: Critical for Organizational Success,” 3rd Edition, defines change management broadly as “the technology changes that affect an organization’s systems, programs, or applications.” Change management is an integral part of the organization’s IT general controls (ITGCs). Change management is no longer just an IT management responsibility: The entire senior management team is accountable for managing change risks. The board is responsible for holding management accountable. The internal audit activity leverages its independence, objectivity, and holistic view of processes to help senior management and the board recognize the importance of IT change management, provide assurance, and help improve programs. Importance of Change Management https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/na-Technology-Audit-Guide-IT-Change-Management-Critical-for-Organizational-Success.aspx Changes in the IT environment may be frequent and significant. Change controls can keep numerous noncritical changes from resulting in lost productivity and blown budgets while allowing for necessary changes and problem escalation in emergencies. Change control can also prevent implementation of unauthorized changes. Changes might be unauthorized because they: Are not in the scope of currently planned work. Require thorough design, planning, and testing before being included in updates. Require a technical review as part of an internal control step (e.g., to detect whether changes provide system backdoors or other opportunities for programmer malfeasance. The internal auditor should look for adequate change controls, including governance and security controls, audit trails, quality assurance, provision for emergency changes, source controls, and tracking. Changes must be approved by management, follow development standards, and be tested. The change controls should follow the organization’s or project’s chosen methodology. The process and results should be predictable, defined, and repeatable. In addition, change control involves maintaining thorough documentation in a change log. Types of Change Management Change management includes application code revisions; system upgrades; infrastructure changes such as changes to servers, routers, cabling, or firewalls; and security patches/updates. Security patches/updates have significant risks and so are discussed more next. Security patches/updates, also called patch management, are updates to applications that are already in production. They involve installing a patch—a bundled set of fixes to a software’s code to eliminate bugs or security vulnerabilities. Patches should be handled as their own category. High-performing organizations perform far fewer patches than low- performing organizations. Organizations with poor change management controls have low success for IT changes due to project delays or scope creep. They suffer from unexpected outages and may frequently be in crisis mode, with many emergency or unauthorized changes. Constant crisis creates stress and turnover for IT staff, shows lack of control over escalation, and heightens risks that a change will have unintended consequences. If IT staff has no time for new projects, deteriorating service results. If a change results in downtime or, even worse, a material error in system data (such as in financial reporting data), it could carry a higher risk of loss than even that of a system attack. When a possible patch or change comes up, IT staff and management should perform triage, sorting out the true emergency situations. Criteria should be based on business need and the relative risk of waiting. Changes to security controls or to make a system resume functioning are high- priority. To make the change management process cost-effective, multiple changes are bundled for release on a regular basis (e.g., monthly); these are called blanket changes. The organization should test planned changes using a robust testing plan with a specific movement of changes from environment to environment, called migration. The purpose is to determine if there will be unintended consequences of installing a patch or making another change. Orchestration change tools are used to promote code between environments and deploy patches. An example of a series of environments for IT change migration follows. Development (DEV). The code under developmentresides in this environment. Code that has been created and unit-tested is incorporated here. Testing (TEST). System testing occurs in a sandbox environment, which is a copy of the system that is not the production environment (the live version). User acceptance testing (UAT). This sandbox environment uses the full amount of user traffic and data. Production (PROD). This is the live production environment for end users. Production changes should be performed in off-hours. While the organization can prepare a software update and should notify users of important vulnerability fixes, it may be up to the end users to install patches, and failure to do so could leave them vulnerable. In other cases, software vendors can “push” changes automatically without requiring end-user intervention (called automation “bot-driven” changes), but the end user may need to opt in to such programs. Cloud software, on the other hand, is updated for all users simultaneously, since the software is not on end-user systems. Change Management Process Steps The “IT Change Management” Global Technology Audit Guide lists the following change management process steps: 1. Identify the need for change. 2. Prepare. Document the step-by-step procedure for the change request, the change test plan, and a change rollback plan. 3. Justify the change and request approval. Determine the impact and cost-benefit; review associated risks and regulatory impact. The organization may use ticketing systems for reporting and managing bugs. 4. Request approvals. 5. Authorization. The change approval board rejects, approves, or requests more information. Set priorities relative to the overall schedule. 6. Schedule and coordinate change. Schedule a change implementer and a change tester, test in preproduction, communicate to affected parties, get final approval, and implement change. 7. Test in appropriate environment(s). 8. Implement change. 9. Verify/validate change. Back out change if unsuccessful. 10. Close change request and report to stakeholders. Document the final changes that were made. Measure change success, use of process, variances, and regulatory compliance. Report lessons learned. Revisit the change management process for improvement. Change Management Risks Exhibit 3-33 reviews some examples of change management risks. Exhibit 3-33: Change Management Risks General risks Business objective failure Unauthorized or unrecorded changes Patch-related risks Poor documentation Small configuration change with big impact Downtime or slowdowns Security issues Inefficiencies, inconsistencies, or financial misstatements Disgruntled staff or customers Failure to analyze threats or use change approval process Poor timing of pushes that leaves end users unprepared Poor change success rate Cybersecurity vulnerabilities if changes are not made, are delayed, or are not fully implemented by end users Emerging risks Advanced systems that create new risk categories Cloud third-party risk impact on support infrastructure Mobile and bring-your-own- device (BYOD) changes made by organization versus by end user that create inconsistency End-user computing (e.g., open source) that makes it hard to design controls; lack of organizational time invested that makes it seem like lower audit priority than it is Third-party and compliance risks Vendor reports needed for compliance, but no guarantee that controls are effective Poorly determined division of controls between parties Lack of patch and patch notification clauses in contracts New or expanded regulations improperly change-controlled Poor change documentation that makes it hard to affirm internal controls over financial reporting (ICFR) or data privacy compliance Controls for IT Change Management IT change management starts with proper IT governance. Top management needs to set the proper tone. Segregation of duties and change authorization are key controls. Complex production environments require more controls. Adherence to development methodologies such as the systems development life cycle is critical. Routine maintenance changes are easier to audit, because their results can be objectively determined and management override risk is low. More scrutiny is needed for software-based controls that detect when controls are being overridden due to higher risk of management override and the need for auditors to subjectively judge their effectiveness. Software applications also have detective controls to verify production changes against authorizations. Other supervisory controls include the following: Software development should report to a high enough level of management to keep department heads from improperly scheduling low-priority projects. During outages, controls can be used to enable authorizations and changes to be made quickly to reduce repair time. Preventive controls include enforcing change and patch management policies and having key stakeholders assess change risks. Detective controls include measuring and correcting poor performance, such as by measuring the mean time to repair. Exhibit 3-34 summarizes some risks, controls, and related metrics for IT change management. Exhibit 3-34: Metrics for Determining IT Change Management Success Risk Control Metric Unauthorized changes Policy for zero unplanned changes Proactive management Detective software Number of unplanned changes Number of unplanned outages Number of changes authorized Number of changes implemented Changes fail to be implemented or are late Change management process Greater than x% change success rate (High- performing organizations are near 100% and investigate all deviations.) New work created by change Unplanned work displaces planned work Triage Planned changes bundled Patches treated as a normal process to expect Less than x% of work is unplanned (e.g., 5% or less) Percentage of time on unplanned work Percentage of projects delivered late Percentage of patches installed in a planned software release Source: Global Technology Audit Guide, “IT Change Management: Critical for Organizational Success,” 3rd Edition. Another control is a system librarian, an IT role that provides control over original documentation and maintains and controls the change logs that show how the software has changed at each version. This practice helps track down the root causes of issues and facilitates software rollbacks to prior versions as needed. Even if a librarian position does not exist, the organization will likely have a code repository, which is a securely located repository that requires programmers to check out code they will work on. Topic 7: IT Controls and Control Frameworks This topic describes some IT control objectives and places IT controls in a system of classification, and it then helps internal auditors recognize the purpose and applications of basic IT controls and IT control frameworks such as COBIT, ISO 27000, and ITIL. According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition Basic IT Controls https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG1.aspx Key Point A key concept is that IT controls must provide continuous assurance for internal controls. A related concept is that auditors must provide independent assurance of this coverage. Effective IT controls provide continuous assurance supported by a reliable and continuous trail of evidence. In addition, this assurance is itself assured through the internal auditor’s independent and objective assessment of the control. According to the Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition, the goals of the IT controls and the control framework are to provide and document: Compliance with applicable regulations and legislation.Consistency with the enterprise’s business objectives. Continuity with management’s governance policies and risk appetite. IT Control Objectives IT internal control objectives include: Protecting assets/resources/owners’ equity. Ensuring that information is available, reliable, and appropriately restricted. Holding users accountable for functions performed. https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG1.aspx Protecting customer privacy and identity. Providing support and evidence of employee job performance. (Employees can prove that they did the right things.) Maintaining data and system authenticity and integrity. Assuring management that automated processes are controlled. Providing an audit trail for all automated and user-initiated transactions. Exhibit 3-35 lists some indicators of effective IT controls. Exhibit 3-35: Indicators of Effective IT Controls Ability to execute and plan new work (e.g., IT infrastructure upgrades to support new products/services) Projects that come in on time and within budget, saving the organization time and resources and improving its competitive position Ability to allocate resources predictably Consistent availability of reliable information and IT services across the organization and with customers, partners, and external interfaces Clear communication to management of key indicators of effective IT control Ability to protect against new threats and vulnerabilities and to recover from disruptions quickly and efficiently Efficient use of a customer support center or help desk Heightened security awareness throughout the organization Source: Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition. Control Classification The hierarchy of IT controls in Exhibit 3-36 is discussed next. Note that systems software controls and application-based controls were discussed in more detail elsewhere. Exhibit 3-36: Hierarchy of IT Controls Source: Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition. Policies are IT governance controls. Governance controls are oversight rather than performance controls that rest with the board of directors and their committees, such as the audit committee, in consultation with executives. Policy examples include security policies about the use of IT throughout the organization, data privacy, ownership, level of autonomy to create and use applications, and measures to assure business continuity. Policies must be approved by management (and the board of directors, as appropriate) and communicated throughout the organization to set the “tone at the top” and expectations. Policies need to be monitored and evaluated using metrics. An organization may have a technology steering committee consisting of IT, key business functions, and internal audit. The committee prioritizes user technology requests given limited resources. Management controls occupy the next three levels. They focus on identifying, prioritizing, and mitigating risks to the organization, its processes and operations, its assets, and its sensitive data. Such controls have a broad reach over many organizational areas, requiring collaboration between executives and the board. They include: Standards for systems development processes (both those developed internally and those acquired from vendors), systems software configuration, and applications controls, data structures, and documentation. Organization and management of lines of responsibility and reporting, incorporating separation of duties as appropriate, financial controls for IT investment, IT change management, and personnel controls. Physical and environmental controls to mitigate risks from hazards such as fire or unauthorized access. Technical controls form the remaining three levels and are the foundation of almost all other organizational IT controls. Technical controls are the specific controls that must be in place for management and governance controls to be effective. Automated technical controls implement and demonstrate compliance with policies. Technical controls include: Systems software controls such as those controlling access rights, enforcing segregation of duties, detecting and preventing intrusion, implementing encryption, and managing change. Systems development controls such as documentation of user requirements and confirmation that they have been met, a formal development process that incorporates testing, and proper maintenance. Application-based controls that ensure that all input data is accurate, complete, authorized, and correct and is processed as intended; all stored and output data is accurate and complete; and all data processes are tracked from input, through storage, to eventual output. Controls may be classified in other ways, for example, according to the way they are viewed throughout the organization. Exhibit 3-37 classifies controls by different perspectives. Exhibit 3-37: Control Classifications Source: Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition. Since governance, management, and technical controls were addressed above, the other two sides of the cube are addressed in relation to IT next. IT general controls (ITGC) and application controls An IT general control (ITGC) applies generally to the IT environment or the overall mix of systems, networks, data, people, and processes (the IT infrastructure). The use of an IT control framework requires implementing a general control framework such as the COSO Internal Control—Integrated Framework. An application control is related to the specific functioning (inputs, processing, outputs) of an application system that supports a specific business process. Balancing of process totals is an example. Preventive controls, detective controls, and corrective controls Preventive controls are designed to stop fraud or errors before they occur. Examples include a firewall, a drop-down menu, or assigning access privileges by job role. Detective controls are triggered after an error (an exception condition) occurs, e.g., automated flagging of inactive users or review of exception reports for completed transactions to detect credit limit overrides. Corrective controls are used once errors, fraud, or other control issues have been detected. They need their own preventive and detective controls to ensure that the process isn’t corrupted. Corrective controls range from automated error corrections to business continuity plans. IT Control Frameworks According to “Information Technology Risks and Controls,” a control framework is an outline that identifies the need for controls but does not depict how they are applied. Control frameworks help determine the appropriate level of IT controls within the overall organizational controls and ensure the effectiveness of those controls. IT control frameworks are internal control systems that help managers: Set IT control objectives. Link IT to business processes and overall control frameworks. Identify key IT areas to leverage. Create a process model that logically groups IT processes. Why are control frameworks needed? Managers need assurance that their IT processes are contributing to business objectives and competitive advantage. The organization needs assurance that it is resilient because it can mitigate risks of fraud or cyber attacks. Stakeholders need to know that the organization can be trusted. One way to gain such assurance is for management to increase its understanding of IT operations without getting bogged down in the increasingly complex execution details. Breaking systems down into understandable processes helps managers combine business with IT strategy, align organizational structures, and set performance goals and metrics. Control frameworks provide a methodology for seamlessly linkingobjectives to requirements and requirements to actual performance. A process model breaks IT down into easy-to-understand activities organized around the control objectives to be achieved and identifies resources to be leveraged. Control frameworks provide a foundational structure upon which effective regulatory compliance can be reasonably addressed and assured, such as for the U.S. Health Insurance Portability and Accountability Act [HIPAA]). Use of standardized, well-accepted frameworks means that there is a body of literature available for guidance and that users can benchmark against the standards or against competitors using similar methods. The framework should clearly communicate specific IT control roles—IT controls need to be everyone’s responsibility. IT controls can provide “defense in depth,” meaning that guidance on setting up multiple layers of controls reduces the likelihood of a control failure. Selecting an IT Control Framework Selecting an IT control framework involves deciding which model will benefit the entire organization, since the model will be used by a large number of employees with control responsibilities. Frameworks are generalized for broad use, but no framework encompasses all business types or all IT. The expectation is that they should be tailored to the need. The CAE can assist with this process. Control frameworks can be formal, or they can be informal, meaning that they are not written down but are communicated verbally and through action. Such systems are not appropriate once an organization has moved past the earliest stages of maturity. Satisfying regulatory requirements requires the use of formal approaches. Properly understanding risks is a prerequisite for selecting a control framework. The CAE should determine the organization’s risk appetite, defined in the IPPF glossary as “the degree of risk that an organization is willing to accept.” IIA Practice Guides The IIA’s Practice Guides (formerly GTAGs ) can help in selecting the proper framework for an organization. The Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition, covers IT controls as an executive needs to understand them, including organizational roles and structure and how the IT ® https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG1.aspx controls fit within the overall control framework. The other GTAG documents cover specifics such as IT change management. These guides contain advice for set-up, management, and measurement of application-level controls. The GTAG documents can be used to create a unique framework or to supplement an existing one. One example of a tool that can be used to plan for sufficient audit coverage is the CAE checklist shown in Exhibit 3-38. Studying the questions CAEs should raise for each of the actions listed shows how a general risk-based framework would be customized for each organization. Exhibit 3-38: IT Control Framework Checklist Source: Global Technology Audit Guide (GTAG) 1, “Information Technology Risk and Controls,” 2nd Edition. COBIT Model for IT COBIT , formerly known as Control Objectives for Information and Related Technology, is an internationally accepted framework created by ISACA. ISACA helps enterprises to achieve their objectives for the governance and management of IT. The current version of the framework, COBIT 2019, helps: Users be more satisfied with IT security and outcomes. Management understand the role of IT and its place in organizational strategy. Management create more value from IT resources, meet regulatory compliance, and control IT risks by providing better risk awareness to enable informed risk decisions. COBIT sets clear lines of responsibility. The framework can be adapted for use by any size or type of organization to set and achieve separate governance and management objectives for its information systems. The COBIT 2019 framework includes the following interrelated elements: Governance system components (seven of these) ® ® Governance framework principles (three of these) and governance system principles (six of these) Governance and management objectives (40 of these) Components The components are the aspects or functions of the organization that are needed individually and collectively to create and sustain a governance system. Generally self-explanatory, they are as follows: Processes Organizational structures Principles, policies, and frameworks Information Culture, ethics, and behavior People, skills, and competencies Services, infrastructure, and applications Principles Exhibit 3-39 illustrates the three principles for a governance framework and six principles for a governance system that form the COBIT 2019 framework. Each set of principles is explained next. Exhibit 3-39: COBIT’s Governance System Principles and Framework Principles Source: Adapted from “COBIT 2019 Framework: Introduction and Methodology,” © 2018 ISACA. All rights reserved. Used with permission. COBIT 2019 governance framework principles are as follows: Framework Principle 1: Based on conceptual model. A governance framework (such as COBIT 2019) should be based on a conceptual model that clearly calls out the relationships between its elements so that persons will use the model consistently and the model is capable of being automated in software systems. Framework Principle 2: Open and flexible. A governance framework should be able to be extended with new content without harming the model’s integrity or consistency. This enables the framework to flexibly address innovations, emerging risks, and so on. Framework Principle 3: Aligned to major standards. A governance framework should be compatible with major regulations, other frameworks, or relevant government or industry standards. COBIT 2019 governance system principles are as follows: System Principle 1: Provide stakeholder value. Stakeholder needs drive value creation. Since the objective of governance is the creation of value in an organization, governance must define value creation as the realization of the benefits expected by stakeholders while optimizing the use of resources and the management of risks. The needs of stakeholders often conflict, such as shareholders’ need for profit versus regulators’ or society’s need for environmental sustainability. Therefore, the COBIT 2019 framework promotes governance as a process of negotiating among stakeholders’ value interests and then deciding how to create optimum value for stakeholders overall. Since this is a generic framework, what constitutes value for stakeholders may differ considerably, such as between for-profit and not-for-profit organizations. To help organizations define value based on customized stakeholder needs, the COBIT 2019 framework includes a goals cascade: The cascade starts with stakeholder drivers and needs, which direct the selection of enterprise goals. Enterprise goals direct the selection of alignment goals. (Alignment goals are broad IT efforts that help IT align with business objectives.) Alignment goals direct the selection of governance and management objectives. The goals cascade is basically a set of tables that starts with a set of 13 generic enterprise goals. For example, one goal is a “portfolio of competitive products and services.” Organizations use the knowledge of their stakeholders’ drivers and needs to select from among these generic goals. The enterprise goals then cascade down to 13 IT-related alignment goals, for example, “knowledge, expertise, and initiatives for business innovation.” These in turn cascade down to the set of governance and management objectives (addressed later). The point is to translate stakeholder needs and the derived governance goals into priority- weighted IT goals and from there to easily implementable processes, policies, and procedures. System Principle2: Holistic approach. The seven components listed previously are used to implement each goal determined using the goals cascade. While each component (e.g., organizational structures) may differ considerably between organizations, the set of components as a whole needs to work together. The processes, organizational structures, and culture, ethics, and behavior principles are governance-directed management organizing activities that help ensure successful adoption of the principles, policies, and frameworks. (Governance direction over culture, ethics, and behavior is critical to achieving goals. The influence of these three factors is often underestimated.) The principles, policies, and frameworks component provides practical guidance on how to shape desired behavior by doing specific management activities. The remaining components of information; services, infrastructure, and applications; and people, skills, and competencies are resource management components. These components rely on one another to succeed. For example, processes need proper information, skills, and behavior to make them effective and efficient. System Principle 3: Dynamic governance system. When the organization changes technologies or IT strategies, it is important that the IT governance system consider the impact of these changes and adapt itself to remain useful. System Principle 4: Governance distinct from management. The board needs to see itself as a discipline separate from the management of an organization. The COBIT 2019 framework’s governance and management objectives clearly distinguish between governance objectives and management objectives. System Principle 5: Tailored to enterprise needs. Tailoring is adapting a framework to an organization’s unique needs. The framework contains a set of design factors to help customize it and to determine which governance system components to prioritize or customize. An example of a design factor is to create an enterprise information and technology risk profile. Each design factor contains some useful aids, for example, a set of IT risk categories. System Principle 6: End-to-end governance system. The end- to-end principle is that IT governance must be wholly and completely part of the organization’s overall governance and internal control framework. The COBIT 2019 framework integrates the most current governance models and concepts. It also applies to processes that have been outsourced or are part of an extended enterprise of partners in a supply chain. Because the seven components listed earlier are organization-wide in scope, focusing on each of these components allows governance to be end-to-end. The last part of this principle involves defining governance roles as well as their relationships and activities. Owners or shareholders delegate to a governing body such as the board, which sets the direction for management, which provides instructions to operations so that it aligns to stakeholder goals. Each relationship also includes a feedback process of reporting, monitoring, and accountability. Governance and Management Objectives There are five governance objectives. Governance objectives are all in the same domain: Evaluate, direct, and monitor. Governance objectives include ensuring that the governance framework is in place and maintained, stakeholder benefits are delivered, risk responses are optimized, resource use is optimized, and stakeholders remain engaged. There are 35 management objectives. Management objectives are divided into the following domains that reflect a cyclical set of management roles: Align, plan, and organize. Processes include managing strategy, enterprise architecture, innovation, the portfolio of IT systems, risk, security, HR, and relationships. Build, acquire, and implement. Processes include IT program management, change management, defining requirements, identifying and building solutions, and managing configuration, knowledge, and assets. Deliver, service, and support. Processes include managing operations, incidents and problems, continuity, security, and process controls. Monitor, evaluate, and assess. Processes include monitoring and managing performance and conformance, the system of internal control, compliance with external requirements, and assurance. ISO 27000 IT Control Framework The ISO 27000 series of standards is related to information security management systems (ISMS). An ISMS is a systematic framework for ensuring that sensitive organizational information remains secure. The series applies a risk management process to information security. ISO 27001:2013: Sets requirements for an ISMS to ensure that the system is appropriate for the context of the organization, meets stakeholder needs and expectations, and is scoped, documented, communicated, and maintained appropriately. Provides a code of practice for information security controls to help organizations select and implement those that are relevant to them and also develop customized information security management guidelines. Has a section on leadership and commitment to ensure that objectives trace to the strategy, ISMS requirements are integrated into policy and processes, the ISMS is competently resourced, and the system is monitored and controlled using appropriate metrics to: Achieve information security objectives. Mitigate or prevent undesired effects based on a formal risk assessment process with a consistent set of criteria for comparability among results. Continually improve. Includes control objectives, individual controls, and security control clauses in the areas of: Information security policies (gives management direction and support). Organizational structure (a framework for implementing and controlling information security, including roles, responsibilities, segregation of duties, etc.). Mobile devices and remote workers (to ensure security). HR security (screening, learning responsibilities, training, at termination, etc.). Asset management (inventories of assets, acceptable use, return at termination, how to classify information types, how to control access and changes to media, etc.). Access control (similar to earlier discussion of identity and access management). Cryptography (policies on encryption and storage of keys). Physical and environmental security (from perimeter security down to how to work in secure areas, plus equipment security controls). Operations security (operating procedures, change management capacity management, malware protection, backups, audit trails, etc.). Communication security (networks, information transmittal, etc.). System acquisition, development, and maintenance (information system security requirements, development and support process controls, test data protection, etc.). Supplier relationships (monitoring and managing supplier services and related changes). Incident management (management of incidents and communications on security events and vulnerabilities). Business continuity management. (Information security is an embedded component of such a system.) Compliance (regulations related to contracts, intellectual property, document retention, etc.). The standard requires both management reviews and internal audits at planned intervals to ensure conformance to related organizational requirements and the requirements of ISO 27001. There are numerous other standards in this family that relate to specialized areas such as ISMS auditing (ISO 27007), network security, application security, and so on. ITIL IT Control Framework ITIL 2011 is a five-tiered certification. Formerly called the IT Infrastructure Library, ITIL is a framework for management of IT as a portfolio of outsourced services using service level agreements (SLAs) and ongoing processes for monitoring and controlling availability, capacity, configurations, issues or problems, patches, change management, andso on. It addresses the concept and life cycle of IT service management, from service strategy and design to operations and continuous improvement. Bibliography The following references were used in the development of Part 3 of The IIA’s CIA Challenge Exam Study Guide. Please note that all website references were valid as of April 2020. Accounting Standards Update No. 2016-02, “Leases (Topic 842).” FASB, www.fasb.org/jsp/FASB/Document_C/DocumentPage? cid=1176167901010&acceptedDisclaimer=true, February 2016. “All about Ransomware.” Malwarebytes, www.malwarebytes.com/ransomware/. American Institute of Certified Public Accountants (AICPA). “AU-C Section 240, Consideration of Fraud in a Financial Statement Audit.” www.aicpa.org/research/standards/auditattest/downloadabledocume nts/au-c-00240.pdf, 2017. “Assessing Cybersecurity Risk: Roles of the Three Lines of Defense” (Global Technology Audit Guide [GTAG]). Altamonte Springs, Florida: The Institute of Internal Auditors, 2016. “Auditing Insider Threat Programs” (Global Technology Audit Guide [GTAG]). Lake Mary, Florida: The Institute of Internal Auditors, 2018. Babeni, Sadissa. “Most Popular Databases in 2020: Here’s How They Stack Up.” ormuco.com/blog/most-popular-databases, January 24, 2020. BS ISO/IEC 27001:2013. “Information Technology—Security Techniques—Information Security Management Systems— Requirements,” second edition. The British Standards Institution, 2013. Buccella, Diana. “Five Prevalent Risks for Marketing Departments.” Resolver, www.resolver.com/blog/top-5-risks-marketing-teams/, October 18, 2019. Buccella, Diana. “Five Risks that Keep Sales Leaders Up at Night.” Resolver, www.resolver.com/blog/top-5-risks-sales-teams/, October 23, 2019. “Business Continuity Management” (Global Technology Audit Guide [GTAG] 10). Altamonte Springs, Florida: The Institute of Internal Auditors, 2009. Cau, David. “Governance, Risk and Compliance (GRC) Software: Business Needs and Market Trends.” www2.deloitte.com/content/dam/Deloitte/lu/Documents/risk/governan ce-risk-compliance-software_DCA.pdf. CERT Insider Threat Center. “Common Sense Guide to Mitigating Insider Threats, Fifth Edition.” resources.sei.cmu.edu/asset_files/TechnicalReport/2016_005_001_4 84758.pdf. “Change and Patch Management Controls: Critical for Organizational Success,” 2nd ed. Altamonte Springs, Florida: The Institute of Internal Auditors, 2012. “COBIT 5: Enabling Processes,” www.isaca.org/bookstore/cobit- 5/cb5ep. “COBIT 2019 Framework: Introduction and Methodology.” Schaumburg, Illinois: ISACA, 2018. Committee of Sponsoring Organizations of the Treadway Commission. Enterprise Risk Management—Integrating with Strategy and Performance. Jersey City, New Jersey: American Institute of Certified Public Accountants, 2017. ® Committee of Sponsoring Organizations of the Treadway Commission. Internal Control—Integrated Framework (2013). Jersey City, New Jersey: American Institute of Certified Public Accountants, 2013. Creely, Edel. “Five BYOD Security Implications and How to Overcome Them.” Trilogy Technologies, May 26, 2015. Crowe Horwath LLP. “Enterprise Risk Management for Cloud Computing.” COSO, www.coso.org/Documents/Cloud-Computing- Thought-Paper.pdf, 2012. “Data Analysis Technologies” (Global Technology Audit Guide [GTAG] 16). Altamonte Springs, Florida: The Institute of Internal Auditors, 2011. “Effective Dates of Major Standards.” FASB, www.fasb.org/cs/Satellite? c=Page&cid=1176169222185&pagename=FASB%2FPage%2FSectio nPage. “Evaluating Corporate Social Responsibility/Sustainable Development” (IPPF Practice Guide). Altamonte Springs, Florida: The Institute of Internal Auditors, 2010. “FASB Accounting Standards Codification —About the Codification” (v 4.10). FASB, asc.fasb.org/imageRoot/71/58741171.pdf. “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0. NIST (National Institute of Standards and Technology), 2014. ® “Gartner Says 8.4 Billion Connected ‘Things’ Will Be in Use in 2017, Up 31 Percent from 2016.” Gartner, www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner- says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent- from-2016, February 7, 2017. Grassi, Paul A., Michael E. Garcia, and James L. Fenton. “Digital Identity Guidelines” (NIST Special Publication 800-63-3). NIST (National Institute of Standards and Technology), nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf. “Identity and Access Management” (Global Technology Audit Guide [GTAG] 9). Altamonte Springs, Florida: The Institute of Internal Auditors, 2007. “Information Technology Risks and Controls,” 2nd ed. (Global Technology Audit Guide [GTAG] 1). Altamonte Springs, Florida: The Institute of Internal Auditors, 2012. “The IoT Rundown for 2020: Stats, Risks, and Solutions.” Security Today, securitytoday.com/Articles/2020/01/13/The-IoT-Rundown-for- 2020.aspx?Page=2, January 13, 2020. ISACA, www.isaca.org. ISO/IEC 27017:2015, “Information Technology—Security Technologies—Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services.” www.iso.org/standard/43757.html. “ITIL Certifications.” Axelos, www.axelos.com/certifications/itil- certifications. “The ITIL Foundation Certificate in IT Service Management Syllabus,” Version 5.5. Axelos, www.axelos.com/getmedia/b2d6281d-14aa- 45fc-abb7- 4d228810c328/The_ITIL_Foundation_Certificate_Syllabus_v5-5.aspx, 2013. Kaplan, Robert S., and David P. Norton. “The Balanced Scorecard— Measures That Drive Performance.” Harvard Business Review, January-February 1992, hbr.org/1992/01/the-balanced-scorecard- measures-that-drive-performance-2. “Leases.” FASB, www.fasb.org/cs/Satellite? c=Page&cid=1351027207574& d=Touch&pagename=FASB%2FPage%2FBridgePage#section_2. “Management of IT Auditing,” 2nd ed. (Global Technology Audit Guide [GTAG] 4). Altamonte Springs, Florida: The Institute of Internal Auditors, 2013. “Managing and Auditing IT Vulnerabilities.” Altamonte Springs, Florida: The Institute of Internal Auditors, 2006. “Measuring Internal Audit Effectiveness and Efficiency” (IPPF Practice Guide). Altamonte Springs, Florida: The Institute of Internal Auditors, 2010. “The New Mafia: Gangs and Vigilantes: A Guide to Cybercrime for CEOs.” Malwarebytes, www.malwarebytes.com/pdf/white- papers/Cybercrime_NewMafia.pdf. OECD. “Tool: Indicators of Procurement Risk.” www.oecd.org/governance/procurement/toolbox/search/indicators- procurement-risk.pdf, 2009. “Revenue Recognition: Why Did the FASB Issue a New Standard on Revenue Recognition?” FASB, www.fasb.org/jsp/FASB/Page/ImageBridgePage&cid=117616925735 9. Sawyer, Lawrence B., Mortimer A. Dittenhofer, and James H. Scheiner. Sawyer’s Internal Auditing, fifth edition. Altamonte Springs, Florida: The Institute of Internal Auditors, 2005. “Statement of Comprehensive Income.” Audit IT, www.readyratios.com/reference/accounting/statement_of_comprehen sive_income.html. Stippich, Warren W., Jr., and Bradley J. Preber. Data Analytics: Elevating Internal Audit’s Value. Altamonte Springs, Florida: The IIA Research Foundation, 2016. “Strategic Planning Basics.” Balanced Scorecard Institute, balancedscorecard.org/strategic-planning-basics/. “Supplemental Guidance.” The Institute of Internal Auditors, na.theiia.org/standards-guidance/recommended-guidance/practice- guides/Pages/Practice-Guides.aspx. Taber, David. “The 11-Point Audit for Your Salesforce.com System.” CIO, www.cio.com/article/3146983/the-11-point-audit-for-your- salesforcecom-system.html, December 5, 2016. “Understanding and Auditing Big Data” (Global Technology Audit Guide [GTAG]. Lake Mary, Florida: The Institute of Internal Auditors, 2017. Vito, Kelli. Auditing Human Resource, 2nd ed. Altamonte Springs, Florida: The IIA Research Foundation, 2010. “What Is COBIT 5?” ISACA, support.isaca.org/app/answers/detail/a_id/733/~/what-is-cobit-5%3F. “What Is the Difference Between Differential and Incremental Backups (and Why Should I Care)?”Acronis, www.acronis.com/en- us/articles/incremental-differential-backups. Zamora, Wendy. “Truth in Malvertising: How to Beat Bad Ads.” Malwarebytes, blog.malwarebytes.com/101/2016/06/truth-in- malvertising-how-to-beat-bad-ads/, December 13, 2017. Index A agile project management [1] anomaly detection [1] antivirus software [1] , [2] audit trails [1] B baseline controls [1] big data [1] bring-your-own-device (BYOD) policies [1] BYOD (bring-your-own-device) policies [1] C centralized organizational structure [1] change control [1] change management [1] , [2] COBIT [1] , [2] Committee of Sponsoring Organizations Internal Control—Integrated Framework [1] compliance [1] control(s) baseline [1] control(s):malicious software [1] information technology [1] internal [1] , [2] , [3] , [4] , [5] IT general [1] operational [1] program change management [1] control frameworks ISO 27000 series [1] ITIL [1] COSO Internal Control—Integrated Framework [1] cosourcing [1] CPM (critical path method) [1] critical path method [1] cybersecurity [1] D data analytics [1] , [2] , [3] big [1] cleansing [1] data analysis software [1] governance [1] normalizing [1] privacy [1] , [2] , [3] , [4] security [1] decentralized organizational structure [1] departmentalization [1] descriptive analysis [1] device tampering [1] diagnostic analysis [1] divisional organizational structure [1] E encryption [1] ethics in data storage [1] F fair information practices [1] FIPs (fair information practices) [1] firewalls [1] functional organizational structure [1] G Gantt charts [1] GDPR (General Data Protection Regulation), European Union [1] General Data Protection Regulation, European Union [1] Global Technology Audit Guides “Assessing Cybersecurity Risk, Roles of the Three Lines of Defense” [1] “Information Technology Risks and Controls,” 2nd Edition [1] , [2] “IT Change Management, Critical for Organizational Success,” 3rd Edition [1] “Management of IT Auditing,” 2nd Edition [1] governance data [1] information security [1] GTAGs See: Global Technology Audit Guides H HR (human resources) [1] human resources [1] I identity theft [1] IDSs (intrusion detection systems) [1] information risk [1] information security [1] , [2] , [3] , [4] information technology auditing [1] , [2] , [3] control frameworks [1] controls [1] general controls [1] risks [1] insider threat programs [1] internal controls [1] , [2] , [3] , [4] , [5] International Organization for Standardization ISO 27000 family of standards [1] International Standards for the Professional Practice of Internal Auditing 1210.A3 [1] 1220.A2 [1] 2110.A2 [1] , [2] intrusion detection/prevention systems [1] IPSs (intrusion prevention systems) [1] ITGCs (information technology general controls) [1] ITIL [1] L logistics [1] M malicious software [1] malware [1] marketing and sales [1] matrix organizational structure [1] N network analysis [1] , [2] O objectives [1] operational controls [1] operations objectives [1] organizational structure centralized [1] decentralized [1] departmentalization [1] divisional [1] functional [1] matrix [1] outsourcing [1] P patches [1] PERT (program evaluation review technique) [1] piracy, software [1] Practice Guides “Auditing Third-Party Risk Management” [1] “Engagement Planning, Establishing Objectives and Scope” [1] predictive analysis [1] prescriptive analysis [1] privacy audits [1] procurement [1] program alterations [1] program change management controls [1] program evaluation review technique [1] projects change management [1] constraints [1] life cycle of [1] schedule [1] scope [1] teams [1] R reporting objectives [1] risk assessment [1] information [1] information technology [1] risk and control matrix [1] risk by process matrix [1] S sales and marketing [1] scope control [1] SDLC (systems development life cycle) [1] , [2] , [3] , [4] , [5] , [6] security cybersecurity [1] information [1] , [2] levels of [1] service-oriented architecture [1] smart devices [1] SOA (service-oriented architecture) [1] software antivirus [1] , [2] malicious [1] piracy [1] systems development life cycle [1] , [2] , [3] , [4] , [5] , [6] T text analysis [1] Three Lines Model [1] Trojan horses [1] V VirWare [1] W web services [1] License Agreement for The IIA’s CIA® Challenge Exam Study Guide The IIA’s CIA® Challenge Exam Study Guide Part 3: Business Knowledge for Internal Auditing Section A: Business Acumen Topic 1: Strategy, Globalization, and Audit Alignment Objective and Strategy Setting Operations, Reporting, and Compliance Objectives Topic 2: Organizational Structure Risk and Control Organizational Structure and the Control Environment Centralized and Decentralized Structures Departmentalization Summary of Organizational Structures Topic 3: Business Process Risks and Controls Common Business Processes HR Risk and Control Procurement Risk and Control Sales and Marketing Risk and Control Logistics Risk and Control Outsourcing Risks and Controls Topic 4: Project Management Project Management Project Planning and Scope Time, Resources, and Cost Change Management (Scope Control) Section B: Data Analytics Topic 1: Data Analytics, Types, and Governance Data Analytics Big Data Data and Information Security Governance Topic 2: Data Analytics Framework and Process Data Analytics Framework Data Analytics Process Topic 3: Data Analytics in Internal Auditing Data Analytics in Internal Auditing Types of Data Analytics Detecting Anomalies with Data Analytics Data Analysis Software Section C: Information Technology and Security Topic 1: Information Security Controls Information Security IT General Controls IT Operational Controls Information Security Controls Encryption Firewalls Antivirus Software Topic 2: Data Privacy and Security Data Privacy Data Privacy Laws and Frameworks Data Privacy Controls Data Security Practices Auditing Data Privacy Topic 3: Emerging Technology Emerging Technology Smart Devices Topic 4: Cybersecurity Risks Cybersecurity Risks Malware Piracy and Device Tampering Insider Threat Programs Topic 5: Cybersecurity Policies Cybersecurity Policies Information Security Policies Role of the Three Lines Model in Cybersecurity Topic 6: IT Auditing, SDLC, and Change Management Goals of IT Management of IT Auditing Risks Specific to IT IT Auditing Challenges CAE Role in IT Audits Systems Development Life Cycle (SDLC) SDLC: Requirements and Design SDLC: Development SDLC: Testing and Debugging SDLC: Delivery/Deployment SDLC: Maintenance Agile Software Development Web Services and SOA IT Change Management Topic 7: IT Controls and Control Frameworks Basic IT Controls IT Control Frameworks COBIT ® Model for IT ISO 27000 IT Control Framework ITIL IT Control Framework Bibliography Indexa structure for grouping organizational work into specialized units and jobs. Both centralized and decentralized organizations use departmentalization but in different ways and to different degrees. Grouping classifications may include product, geographic, process, and customer departmentalization as well as functional, divisional, and matrix. In a functional structure, authority and decision making are arranged by functional groups such as finance, marketing, sales, manufacturing, and research. Advantages are the ability to specialize and control business activities. A disadvantage is narrower perspectives in the organization. A divisional structure is one in which divisions are fairly autonomous units within the organization. Divisions are specialized and may not even relate to one another. A division may contain all functions for a distinct group of products or services. Overall support is received from the centralized core of the organization. Advantages and disadvantages are similar to those of the functional structure, with the ability to specialize but narrower organizational perspectives. A matrix structure is a team- and project-based approach between functions and divisions. An employee from a functional department works with a manager from another department on a special team assignment. In essence, the employee reports to two managers for the duration of the project. The matrix structure permits greater flexibility and use of resources. However, there can be accountability and work conflict issues because of the dual reporting relationships. A matrix assignment can be short or long term. Exhibit 3-3 shows an example of a matrix structure. Exhibit 3-3: Matrix Organizational Structure A primary benefit of departmentalization is that efficiencies are gained from grouping common knowledge and skills for a focused effort. Disadvantages may be departmental conflicts and the formation of a “silo” mentality. Summary of Organizational Structures Exhibit 3-4 compares the advantages and disadvantages of the various types of organizational structures. Exhibit 3-4: Organizational Structure Comparisons Structure Advantages Disadvantages Centralized (hierarchical) Economies of scale Control Management consistency Slower decision making/responses Low employee participation Possible “silos,” conflict/inefficiency, and communication barriers between departments Decentralized (flat) Higher employee participation and satisfaction Faster decision making/responses Loss of economies of scale Less control over productivity and efficiencies Functional Specialization by function More employee participation Narrower area perspective Coordination difficult Divisional Autonomy by division Specialization Narrower perspectives Loss of economies of scale Structure Advantages Disadvantages Matrix Blend of technical and market emphasis Efficient use of resources Dual reporting causes employee confusion and possible manager conflict Topic 3: Business Process Risks and Controls The internal audit activity frequently needs to perform assurance and consulting engagements for specific functional areas such as HR, procurement, product development, sales, marketing, logistics, or the management of outsourced processes. Some risk and control implications of each of these business processes are presented in this topic. Note that in the interest of brevity, the HR area is addressed in more detail to illustrate the full process, while the other areas have lighter coverage. According to The IIA In addition to reviewing the contents of this topic, students can review the following IIA materials: Practice Guide, “Engagement Planning: Establishing Objectives and Scope” Practice Guide, “Auditing Third-Party Risk Management” Auditing Human Resources, second edition, by Kelli Vito https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Engagement-Planning-Establishing-Objectives-and-Scope-Practice-Guide.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Auditing-Third-Party-Risk-Management-Practice-Guide.aspx Common Business Processes Common business processes are often grouped into functional areas or departments such as human resources (HR), procurement, product development, sales, marketing, production, finance, accounting, IT, and logistics. Each business process might be managed in-house and/or outsourced in whole or in part. Management of these processes directly and/or as outsourced functions can carry different risk and control implications. Some business processes are also handled as projects. Business processes may cross between functional areas, requiring close coordination and communication. Functional areas or projects might also be differentiated as core versus non-core activities. Operations (production or service delivery), product development, sales, or perhaps logistics might be core processes, while HR, finance, and other administrative or support functions typically are designated as non-core processes. However, a vendor that provides outsourced HR services would consider these services to be core operations, because HR services is what they are selling. The differentiating factor is usually one of competitive advantage. If a business process can provide a competitive advantage, the organization will typically retain the process in-house because it can provide these functions at lower cost and/or higher quality (i.e., better value) than if they were outsourced. Conversely, the organization may or may not outsource part or all of the non-core processes, depending on the best overall value. Key Point It is important to understand why the sub-processes within a functional area are grouped together in the first place (and whether some other grouping would make more sense). Business processes exist to support achievement of one or more business objectives. The various sub-processes in the overall process are all likely interlinked primarily because it creates economies of scale to plan, direct, monitor, and control them as one unit. Logistics and supply chain management arose because new methods were needed to address a business process that crossed multiple functional areas (procurement, warehousing, shipping and receiving, customer service, supplier relationship management, etc.). The new management model created efficiencies and a better customer experience over maintaining “silos.” Some of the methods discussed next for evaluating business processes or specific functional areas could be used from a big- picture perspective to define engagements in the annual audit plan. Here the focus will be on individual engagement planning and execution. Prior to delving into an audit of an area, internal auditors determine how thorough the audit should be. For example, this could be: A routine checkup as part of an audit rotation. An alignment review to see how well the area aligns with organizational objectives. A compliance review. According to The IIA Performance Standard 2200, “Engagement Planning” Internal auditors must develop and document a plan for each engagement, including the engagement’s objectives, scope, timing, and resource allocations. The plan must consider the organization’s strategies, objectives, and risks relevant to the engagement. As established by Standard 2200 and flushed out in the “Engagement Planning: Establishing Objectives and Scope” Practice Guide, internal auditors use the following steps to determine objectives and the overall scope of an audit engagement: Understand context. Gather information. Assess risks. Form objectives. Establish scope. Allocate resources. https://na.theiia.org/standards-guidance/performance-standards/Pages/Performance-Standards.aspx https://na.theiia.org/standards-guidance/performance-standards/Pages/Performance-Standards.aspx https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Engagement-Planning-Establishing-Objectives-and-Scope-Practice-Guide.aspxDocument plan. Since this overall process was addressed in Part 2, here the focus is on the first three of these steps and on the last step, documenting (and implementing) the plan. The internal audit activity reviews and analyzes the business process to understand context and gather information and then assesses area risks to determine which areas should receive higher priority and more audit resources. The discussion that follows assumes appropriate objectives, scope, and resources are allocated based on this information. (See the Practice Guide mentioned above for more information.) The last part of the discussion for each functional area discusses plan documentation and implementation. This involves assessing whether the area’s internal controls are appropriate and effective given the area’s objectives and risks. Before discussing these steps for each functional area, some general points follow. Understand the Business Process and Gather Information In order to determine the intensity level and areas of focus for an audit engagement of a functional area, internal auditors need to understand the business process and its context. What are the area’s objectives, and how do these trace upward to the organization’s strategy, mission, and vision? What long-term strategy and annual goals were set for this business process? Auditors can start to understand strategic and annual goals by reviewing business process documentation, including: Prior audit workpapers. Process workflows (flowcharts) and area organizational charts. Job descriptions or documents related to consultant work. Customer reviews. Plans and budgets for the area. Policy and procedure manuals. Trends in key performance indicators. Reviewing process workflows and related narratives is especially valuable. If a process flowchart does not exist, creating one or more with the help of the process owner, such as by conducting walkthroughs, can help the auditor understand how various parts of the process interrelate as well as the process inputs and outputs. Key Point Reviewing or creating process workflows is vital because they can reveal where one process or sub-process interacts with or impacts other processes (including processes in other functional areas) from a risk and control standpoint. Process workflows can also help to differentiate between key and support processes. If a key process fails to occur correctly, achievement of a specific objective could be directly and negatively impacted. Even non-core functional areas will likely have key processes that support the achievement of a top-level business objective, such as procurement needing to minimize the cost of goods sold (competitive price) while maintaining agreed-upon quality levels (customer satisfaction). Note that lack of documentation for an area in question may be a risk in itself that needs to be part of engagement observations, because it may negatively impact new employee orientations, leave roles and responsibilities open to interpretation, make it hard to assess area efficiency, and make risk and control assessments more difficult. Documentation review may also include review of external documents. For example, the management’s discussion and analysis section of the organization’s financial statements may discuss the functional area’s objectives and key risks. A regulatory report or finding may have been issued. There could be court cases or settlements. For each process, internal auditors also enlist the help of the process owner to determine: Why the process exists. What functional area objective(s) it supports. Whether it can be linked to achievement of overall organizational objective(s). What policies and procedures exist to direct how people involved are supposed to act. What its inputs and outputs are and whether these result in difficulties due to the need for cooperation and communication with other functional areas. Whether the process provides other important benefits to management. If the process owner is having difficulty describing these elements, one way to get to the important parts of the process is to ask “What part of your job gives you the most satisfaction?” Another question to ask is “What would most endanger organizational success if it were done wrong?” Given an understanding of the business process, its objectives, and its sub-process interactions, the next step is to assess risks affecting the process to guide audit priorities. Map and Weigh the Business Process Risks Assessing risk for a business process involves harnessing the organization’s chosen risk management framework, tools, and techniques. Since the CAE is responsible for ensuring that a risk assessment is done at least annually, an overall assessment will likely exist, and this may have been the reason to include the business process in the annual audit plan. When determining the risk and control implications of a particular business process, after reviewing the applicable risk management reports, internal auditors may need to: Evaluate risk at the detail level to determine which risks are most likely to negatively impact key processes. Update the assessment for any changes in likelihood/impact or to identify new risks. Reassess if new risk information should alter the depth of the engagement or priorities (such as by using a heat map, as discussed in Module 1). After revisiting risk identification and risk prioritization, internal auditors need to determine which risks affect which processes or sub-processes. One way to do this is to use a risk by process matrix as part of HR risks and controls. The results of the detailed risk assessment are used to set audit objectives, establish scope, and assign resources. Documenting and Implementing the Plan: Assess Internal Controls The process of planning, including documenting the plan, is the most important factor in an audit engagement’s success. A key aspect of the plan is to ensure that the plan and the budget for the engagement are properly aligned. Internal auditors document the results of the prior steps such as process maps and interview summaries in workpapers. Supervisors review these workpapers to ensure that they properly reflect the context, risks, scope, resources, budget, and so on. Internal auditors may also develop planning memos that communicate planned work to management. Key Point Because not every risk can—or should—be included in a single engagement, proper planning helps internal auditors focus their efforts on the most significant risks to the area. During the engagement, internal controls are assessed for their efficiency and effectiveness. One way to assess internal controls against identified risks is to create a risk and control matrix. An example of such a matrix is shown below in the discussion of HR risks and controls. In addition to determining if existing controls adequately address the prioritized list of risks, internal auditors may need to determine control effectiveness. A risk control map, with risk significance on one axis and control effectiveness on the other axis, can be created to determine which controls may need improving and in what priority. An example follows in the HR area. Such a map or other analysis might also identify if a business process has too many controls (i.e., too many controls over low-impact or low-probability risks). The process might be made more efficient by eliminating some unnecessary controls. Reviews such as these may be especially needed during times of change for the business process. Outsourcing or cosourcing is one example, but rapid growth or downsizing, implementation of new technology for the area, new regulations, or changes in cultural expectations for the process or area are other examples. HR Risk and Control Human resources is often an important functional area for internal audit review due to the importance of qualityhuman resources in achievement of objectives and the high liability risk many HR violations can entail. Understand the HR Process and Gather Information The HR functional area can be a strategic partner that develops the programs and systems necessary to fulfill the organization’s mission. HR plays a strong role in shaping the organization’s culture and control environment. HR objectives may include: Developing and executing HR strategic planning that is effective in realizing the human potential required to achieve organizational strategy. Ensuring that HR staff are appropriately skilled. Increasing HR productivity through HR technology while securing sensitive data. Accurately determining workforce staffing requirements. Developing and administering effective organizational design. Developing and administering an effective recruitment and recruit selection process. Developing legally defensible contractor management and use policies and processes. Managing employee turnover and retention (churn) appropriately. Ensuring compliance with employment regulations. Accurately assessing training needs and administering effective new employee training, technical area training, and supervisor training. Developing and administering a training effectiveness assessment process. This list could go on, with compensation and benefits, disciplinary processes, retirement, leave, payroll, employee and labor relations, employee engagement, safety and security, and outsourcing or cosourcing. Exhibit 3-5 shows an example of a process workflow (flowchart) for the HR functional area highlighting the sub-process of staffing a new job position and ensuring that appropriate training and performance monitoring occur. This workflow would be supplemented by narrative description, for example, notes indicating who would be responsible for performing the job analysis. Exhibit 3-5: HR Workflow for a New Position This workflow could be analyzed to see if the decision points are appropriate. For example, a new external hire is always on-boarded, a contractor may or may not be on-boarded, and existing employees are never on-boarded again. In addition to discussing with HR professionals whether this process is appropriate, the internal auditor could also work to determine whether the process as implemented aligns with the process as designed. Map and Weigh HR Process Risks HR process risks typically include the following: Nonexistent or deficient HR strategic plans Lack of appropriate skills among HR staff leading to noncompliance with employment law HR technology privacy risks or record keeping that fails to keep up with data regulations Staffing: productivity versus expense risks (Wrong number of workers are identified, risking unnecessary expense, incorrectly balanced roles, or poor productivity.) Organizational structure that harms productivity or communications Recruitment or recruit selection risks such as lawsuits or regulatory noncompliance Contractor overuse that could violate tax laws High churn (employee turnover) that risks talent loss Poor or inadequate employee training that risks loss of competitive advantage New employee training that fails to teach employment law Technical training poor or nonexistent Manager training poor or nonexistent Inaccurate performance appraisals Poor-performing employees not being escalated to higher levels of disciplinary action Discipline that is unrecorded or ineffective Poor workplace culture Ineffective or nonexistent on-boarding strategies Workers’ compensation injury claims, medical costs, and lost productivity Employee benefits liability (e.g., pension obligations) Employee or contractor theft or embezzlement One way to determine which risks affect which processes or sub- processes is to use a risk by process matrix, which lists processes or sub-processes in rows and risks in columns. Such a matrix can differentiate between key (K) and secondary (S) links between the process and the risk. There should be only a limited number of key links for a process, perhaps just one. Secondary links between objectives and risks help show how processes are interrelated. There could be any number of secondary links. Exhibit 3-6 shows an abridged example of a risk by process matrix for the HR functional area. Exhibit 3-6: Risk by Process Matrix for HR Functional Area (Abridged) Planning and Implementation: Assess HR Internal Controls One way to assess internal controls for risk is to use a risk and control matrix. This type of matrix lists each objective and the key risk that might negatively impact achieving that objective. It has columns for probability and impact, the relevant activity that is performed to implement the objective, and related controls. This could be a listing of controls that exist or of typical controls for the objective. Exhibit 3- 7 shows an abridged risk and control matrix for the HR functional area. It lists both existing and needed (recommended) controls. Exhibit 3-7: Risk and Control Matrix (HR Example, Abridged) Objective Key Risk Probability/ Impact Activity Controls Effective HR strategic plans HR strategic plans nonexistent/deficient. Probability: Low, but will grow over time (See needed controls.) Impact: High HR program creation. Existing: Strategy linked to organizational strategy, consistent with culture. HR operational plan outlines programs, staff, and time lines. Needed: Ongoing HR area assessments. Monitor legislative changes and alter plans. Skillful HR staff HR staff lack appropriate skills, risking noncompliance with employment law. Probability: Medium Impact: Medium Recruit and select HR staff. Existing: Clear HR position descriptions, tasks, authorities, and competencies. Education, experience, and continuing education requirements are adhered to. Needed: HR staff encouraged to get HR certification (PHR, SPHR). HR staff compensation matches salary scales. Objective Key Risk Probability/ Impact Activity Controls HR technology that enables productivity while controlling sensitive data HR technology privacy risks or record keeping that fails to keep up with data regulations. Probability: Medium Impact: High HR staff recruitment and recruit selection. Existing: Employee information safeguards exist, including employee master controls. HR IT system security exists. Needed: HR staff training on social engineering scams. Effective staffing needs assessment Staffing: Productivity versus expense risks. (Wrong number of workers are identified, risking unnecessary expense, incorrectly balanced roles, or poor productivity.) Probability: Low now, could grow Impact: Medium Workforce needs identification process. Existing: Workforce plan is linked to strategy and mission. HR forecast of number of workers needed per position. Needed: Gap analysis of current versus future workforce profile. Link staffing forecast to training plans in addition to recruitment. This matrix would continue for each of the many objectives of the area. Note that the above matrix was inspired by the Sample HR Risk Impact and Control Matrix that is an appendix to The IIA Research Foundation’s Auditing Human Resources, second edition, by Kelli Vito. See that publication for more information. Procurement Risk and Control Procurement is a process that often requires internal audit activity attention due to the risk of fraud and corruption. Note that this and the remaining functional area discussions are in less depth than the HR discussion. Many of the concepts and tools discussed in that area can be applied in similar ways to these remaining functional areas. Understand the Procurement Process and Gather Information Exhibit 3-8 shows an example of a process workflow for procurement. This is an example of what is called a swimlane flowchart, in which the processes are divided into “lanes” based on the role or system that is responsible for thatprocess element. For example, the segregation of duties between the purchase requisition and its approval by a superior is obvious in this format. Exhibit 3-8: Procurement Workflow Developing an understanding of your organization’s procurement process is vital, because each procurement process will have its own risks and red flags depending on the procurement workflow step, the process maturity, and the type, materiality, and complexity of the purchases. Map and Weigh the Procurement Process Risks Like the HR risk assessment, mapping and weighing risks in the area of procurement entails using a systematic process, including the use of tools such as a risk by process matrix. The result of this process will reveal key procurement process risks, such as the following: Fraud, collusion, and corruption Kickbacks resulting in padded or non-competitive bids that are accepted Rigged bidding/tender process Nonexistent or falsified due diligence Cost estimates not aligned with market rates Requirements prepared by a service provider that exist solely to reduce competition Bids unsealed before bid opening session Fictitious invoice payments Bias in procurement decisions or conflicts of interest in bid evaluators Inadequate or nonexistent training of procurement professionals and supervisors to recognize, detect, and report fraud and corruption Procurement not aligned to strategy Decentralized procurement lacking supervision Anonymity of bidders/tenderers or confidentiality of bid information not maintained Poor or selective disclosure of selection and award criteria Insufficient distribution/advertisement of requests for proposals/invitations to tender or insufficient time allowed for bidding Suppliers who have falsified certifications, insurance documents, etc., and are not qualified Implementation: Assess Procurement Internal Controls Important procurement internal controls to assess include: Whistleblower hotline and procedures to encourage whistleblowers. Fraud and corruption awareness training. Vendor information system controls. Supplier prequalifications and approved supplier lists. Required approvals and supporting documentation. Normalization of requests for proposals/invitations to tender and response format. Supplier formal complaint or appeal mechanisms for reporting irregularities. Supplier performance evaluation. Due diligence and background/affiliation checks of bid evaluators, procurement professionals, supervisors, and suppliers. Review of winning and non-winning bids for bias, fraud, or corruption. Sales and Marketing Risk and Control Sales and marketing are closely tied to the organization’s success or failure. Understand the Sales and Marketing Process and Gather Information Exhibit 3-9 is an example of a workflow for the sales and marketing process that shows how sales processes generate feedback for marketing at many points, both from positive and negative sales results. Exhibit 3-9: Sales and Marketing Workflow Sales and marketing could also have separate workflows, and many sales processes might look very different depending on what is being sold. Map and Weigh the Sales and Marketing Process Risks Here are some examples of sales process risks: Inadequate sales strategy (e.g., failure to understand customer needs or price sensitivity) Inaccurate, inadequate, or misleading profit and sales metrics (e.g., poor quality data, inaccurate data on profit margins leading to poor profits, treating leads as more likely to buy than they actually are) Sales force unaware of or unaligned with marketing strategy (e.g., ineffective marketing, customers with unrealistic expectations) Sales force uneducated or incorrect about product features (e.g., obvious lack of knowledge, customer misinformed) Missed sales quotas (e.g., too few opportunities in pipeline, lack of direct customer contact, failure to use data-driven analysis) Undue sales incentives (e.g., pressure to commit fraud such as fraudulent procurement activities) Here are some examples of marketing process risks: Inadequate or misaligned marketing strategy (e.g., low conversion rates) Poor or damaged brand (e.g., improperly managed negative events, press, or social media criticism) Marketing affiliations that go awry (e.g., spokesperson gaffes or misconduct, organization partners who behave unethically) Unaligned, incorrect, or poor event branding (e.g., typos in convention space signage) False advertising (e.g., public loss of trust, lawsuits, fines) Violation of anti-spam or data privacy laws and regulations (e.g., fines, lawsuits) Implementation: Assess Sales and Marketing Internal Controls Here are some examples of sales and marketing internal controls: Setting explicit sales and marketing strategies aligned with organizational strategy Reinforcement of ethical culture and control environment regarding acceptable sales and marketing tactics Supervision and required supporting documentation Regular sales and marketing training, both on soft skills and use of data-driven analysis Regular sales and marketing communications and meetings (including discussions of sales leads earlier in the pipeline) Regular product training Logistics Risk and Control Logistics involves coordination of many interconnected processes and entities. Many things could go wrong that could negatively impact profitability or customer satisfaction. Understand the Logistics Process and Gather Information Logistics is a large process area and, while a large workflow of the entire process might be constructed, it could be unwieldy. It is likely that logistics will have many workflows such as inbound logistics, warehousing, and outbound logistics. These various workflows still need to be coordinated with one another to be efficient and effective. Exhibit 3-10 shows a logistics workflow for how goods flow through a warehouse to ensure efficiency, safety, and security. Exhibit 3-10: Logistics Workflow (Warehouse) Map and Weigh the Logistics Process Risks Here are some examples of logistics process risks: Logistics consuming too much of profit margin, or total cost of logistics unknown Carrier hijacking or theft of goods from warehouses, shipping ports, etc. Inadequate security procedures or infrastructure Natural disasters, war, piracy, shipwreck, etc., disrupting supply chain or specific shipments Carrier delays, nonperformance, or bankruptcy Inaccurate inventory recorded Lack of inventory or too much inventory Low inventory turnover or obsolete inventory Accidental or fraudulent discrepancies in shipping: type, quantity, destination, etc. Liability for delays or losses (e.g., contractual requirements, inadequate insurance) Regulatory changes (e.g., security, safety, environmental) impacting logistics profitability Poor resource or equipment utilization Spikes and dips in demand caused by poor communication up the supply chain (called the bullwhip effect) Implementation: Assess Logistics Internal Controls Here are some examples of logistics internal controls: Metrics on utilization, turnover, and the seven “rights” of logistics: right quantity, right product, right time, right place, right condition, right price, and right information Increased focus on actual demand by communicating better with supply chain partners and relying less on forecasting Warehouse safety and security protocols and systems Cost analyses that factor in transportation modes, distances, warehousing, and third-party intermediary costs in addition to product costs from various countries Benchmarking against best-in-class logistics providers Lists of preferred logistics service providers for backup transportation or other services Outsourcing Risks and Controls This part of the topic includes information from the Practice Guide “Auditing Third-Party Risk Management” in addition to other sources. Understand the Organization’s OutsourcingStrategy and Risk Appetite When preparing to audit a business process that is outsourced or cosourced (or is being analyzed for suitability for being outsourced), the first thing to do is to determine whether the organization has a defined third-party risk management program and a related governance structure as part of its enterprise risk management (ERM) framework. If so, this program will provide a starting point for identifying outsourcing risk appetite, policies, processes, defined roles and responsibilities, and tools used to control risks. https://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/Auditing-Third-Party-Risk-Management-Practice-Guide.aspx The key question to consider is whether the risk exposure the organization is incurring (or may incur) by outsourcing or cosourcing this service, raw material, or component is (or will be) in line with the organization’s risk appetite. Opportunities should also be considered, since keeping an inefficient process in house could have an opportunity cost (i.e., be a larger ongoing cost than necessary). The organization may translate its risk appetite for third parties into a set of minimum standards for the capabilities of the candidates in terms of governance, risk management, and control. Internal auditors can assess specific third-party compliance against these minimum standards. Organizations have formal or informal third-party risk management governance structures: The lowest level of formality can be as simple as a business manager making independent decisions about qualifying third parties. An informal structure can create risks of bias toward certain suppliers or conflicts of interest, but compensating controls could include thresholds requiring approval for contracts above a certain monetary value. Adding a second-line of defense, for example, a contract review and compliance function, would make this a defined governance structure. A third level of formality would be a standardized third-party risk management governance structure, as is shown in Exhibit 3-11. Such models are highly recommended for highly regulated industries or organizations with more outsourcing complexity. Exhibit 3-11: Standardized Third-Party Risk Management Governance Key Point Management must—as the owners of organizational risk—identify, assess, manage, and monitor the risks associated with each third- party relationship on an ongoing basis. The standardized model adds third-party specialists (e.g., supply chain managers) to the first and/or second lines of defense. Some functions, such as third-party sourcing, evaluation, and management, may be centralized for improved control. Internal audit will assess both the first line of defense (line management) and the second line (compliance specialists). Understand the Third-Party Provider Management Process Internal auditors auditing outsourced processes may need to audit the overall third-party risk management program or just one of its process steps. Exhibit 3-12 shows the elements of a generic third- party provider management process. Exhibit 3-12: Third-Party Provider Management Process Sourcing. Management works to understand the business context and drivers of the area to be outsourced, strategic objectives, core competencies, and so on, and then issues a request for proposal (RFP)/invitation to tender (ITT) for contracts that exceed a certain monetary value or risk exposure. Due diligence. Management narrows the list of candidates by assessing each against relevant criteria (e.g., a statement of work), assesses third-party risks (with the help of subject matter experts), does background and business performance checks, assesses ethics, and starts forming a relationship of open communications. Contracting. Contracts communicate risk appetite and minimum standards of internal control to the third party as well as expected service levels. Monitoring. Persons with knowledge of the process should be appointed to manage the third-party relationship. If a business manager owns the relationship, decentralized management can be used. KPIs, risks analyses, required attestations, relationship status, and other areas of compliance are monitored. Issue resolution. The third-party relationship owner is usually responsible for monitoring and addressing issues and risks that exceed the risk appetite. Termination. The contract specifies termination conditions. Thorough and complete termination clauses can address equipment and technology retrieval, separation costs, and so on. Understand the Outsourced Business Process and Gather Information In addition to auditing the overall third-party risk management process, internal auditors may need to audit a specific outsourced business process. The objectives for each such process will be specific to the area being outsourced. For HR outsourcing or cosourcing, for example, the objectives may be to develop and administer appropriate service provider selection and management (this may be called vendor due diligence) and to provide effective change management for the transition period toward the new sourcing model. Map and Weigh the Outsourced Business Process Risks Internal auditors can use tools such as heat maps or the other tools to map and weigh the business process risks of an outsourced process. Key risks for outsourced HR, for example, may include underestimating the time needed for the transition due to the complexity of the process, underestimating organizational resistance to change, HR technology incompatibility, and information security breaches. A few examples of generic outsourcing risks follow: Bids accepted are bad business deals due to incompetence or fraud. Poorly worded contracts create loopholes. Poor contract choice can create liabilities that reduce profitability. Miscommunication occurs due to language or national culture differences. Contract noncompliance or default is expensive to remediate. Contract termination clauses may include auto-renewal windows that, if missed, could entail significant additional costs. Implementation: Assess Internal Controls For the outsourcing or cosourcing of a business process or a functional area, controls may include the following: Statements of work in the RFP/ITT accurately describe scope and scope limitations. The process owner and other stakeholders such as budget analysts are involved in RFP/ITT creation. Bids are evaluated for both best value and service provider competency. Sole-source contracts are justified, if used, and the selected provider is capable of providing the full range of services. Provider selection uses an adequate due diligence process, including reference checks. The process owner reviews future workforce needs to ensure that the service provider is capable of scaling up to meet future demand. Contract negotiations gain agreement on appropriate incentives, penalties, and the definition of specific services to provide in a service level agreement. The service provider contract has appropriate clauses, including a definition of nonperformance, the means of correcting deficiencies, and when and how the contract can be terminated by either party. The organization maintains a vendor master file for each vendor to track performance, document sustainability or ethics agreements, indicate preferred status, ensure proper application of negotiated discounts, etc. Key controls for the outsourcing of HR, for example, may include clearly defined roles and responsibilities or having a dedicated transition team that sets the scope of the services offered and coordinates with any cosourced staff to avoid duplication of efforts. Topic 4: Project Management This topic helps internal auditors identify techniques used to control projects, including a project plan that manages scope, time, cost, teams, and resources as well as a process for project changemanagement. Project Management Project management is the process of planning, organizing, directing, and controlling an organization’s resources (people, equipment, time, and money) for a temporary endeavor so that project objectives can be met within defined scope, time, and cost constraints. Internal auditors typically have excellent project management skills, since both assurance and consulting engagements are examples of projects. It is therefore incumbent upon newer internal auditors to acquire project management skills and for all internal auditors to continue developing these skills. Why use project management techniques? Project management requires much up-front work to define the problem that needs to be solved and then form a plan to achieve it. Exhibit 3-13 shows how more up-front “pain” or effort can reduce total effort, which reduces risks of uncertain achievement of goals or failure. Exhibit 3-13: More Up-Front Planning Effort Reduces Total Effort Required Without such a plan, the budget and the project duration may end up being far exceeded or the project could fail because of problems such as scope creep, gold plating, and/or rework. Scope creep is when project objectives are extended by external influences. Gold plating is when project objectives are extended by team members without authorization. Rework may be needed because the wrong tasks (i.e., audit tests) were performed. Scope creep and gold plating result in unplanned additions to a project’s scope or time, cost, and quality constraints. Serious problems can occur if internal or external stakeholders are allowed to add requirements to a project without also providing additional money and time to get the extra work done. While project change is necessary to keep the project responsive, changes must be controlled using the project objectives and scope as gatekeepers. Project Planning and Scope Projects can vary in duration and complexity, but the majority share the following characteristics: A project is a series of tasks and activities. It fulfills some need or requirement in an organization. It has stated objectives that outline a path for achieving the goal. It has a defined start date, time line, and target completion date. It has funding or budget limits and dedicated resources (which include materials, energy, space, provisions, communication, quality, risk, etc.). The challenges of successful project management include delivering a project: That maintains consistent alignment with project objectives. Within defined constraints. At a desired performance/quality level. That optimizes allocation and integration of the inputs needed to meet the objectives. Project Life Cycle Most projects cycle through similar stages from beginning to end. Although the terms and specifics of the cycles vary from industry to industry, projects generally include these stages: Conception or project initiation is where the project is born and the project goals and objectives are established. Stakeholder expectations must be clearly identified. It is vital to obtain support from senior management at this stage. During this stage, the nature and scope of the project are determined in a project charter and the project manager and project team are selected. A signed charter releases funding and resources. The planning, design, budgeting, and scheduling stage is where the project schedule is outlined, the budget is set, and resources are assigned. The execution and production stage is when the work takes place. During monitoring and control, the project manager is responsible for overseeing the quality of the work, the progress against the schedule, and the proper use of resources. Project control systems keep a project on track, on time, and within budget. Internal auditors can help determine how important specific projects are to an organization’s bottom line, the types of controls that exist, and any additional controls that are necessary. The completion and evaluation stage typically involves some culminating event such as client acceptance and sign-off of deliverables. Evaluation often includes assessing the project’s effectiveness at the end of the process. Administrative activities include archiving files and documenting the lessons learned. Exhibit 3-14 shows the project life cycle and the tasks associated with each phase. Exhibit 3-14: Project Life Cycle Project Phase Project Tasks Project Phase Project Tasks Conception or project initiation Analyze project and spell out organizational needs in measurable goals. Conduct review of current operations. Complete conceptual design of finished project. Prepare financial analysis, costs and benefits, budget. Prepare list of assumptions, risks, and obstacles. Select stakeholders, including users and support personnel, and develop an understanding of their expectations. Develop project charter, including costs, objectives, tasks, deliverables, and schedules. Gain approval for the project charter and acquire funding. Planning, design, budgeting, and scheduling Define work requirements. Determine quantity and quality of work. Determine and allocate resources needed and estimate their cost. Establish major timetable milestones and budget. Define deliverables and documentation (can include feasibility study, scope statement, project plan, communications plan, issue log, resource management plan, project schedule, status report). Establish basis for performance measurement. Generate a project management plan and get formal approval for it, including approval for the required resources. Project Phase Project Tasks Execution and production Launch the project management plan. Confirm availability of adequate and appropriate project resources. Document work teams. Teams do work, provide status updates, and produce deliverables. Project managers lead, direct, and control. Managers and stakeholders receive progress reports and review action plans for correcting differences between plan and actual. Monitoring and control Track progress, especially during execution but also during planning. Compare actual and predicted outcomes. Analyze impact. Make adjustments to meet project objectives and acceptance criteria. Completion and evaluation Obtain client acceptance based on acceptance criteria. Install project deliverables. Complete project documentation such as lessons learned. Complete evaluation (for example, measuring stakeholder satisfaction) and post-implementation audit. Issue final project report and communicate lessons learned. Projects need to be performed and delivered under what has traditionally been known as the “project management triangle,” as shown in Exhibit 3-15. One side of the triangle cannot be changed without impacting the others. Exhibit 3-15: Project Management Triangle Time is the amount of time available to complete the project. It is broken down into the time required to complete each component of the project and further into task times. Cost refers to the budgeted amount available for the project. It depends on variables such as labor rates, material rates, risk management, consultant rates, equipment, and profit. Quality and performance of the final product/service are major components of scope. The amount of time put into individual tasks and the amount of cost expended on resources influence the overall quality. Meeting a defined quality level can have a significant impact on time and cost. If this side of the triangle is fixed, it requires juggling the other constraints to meet this requirement as defined by customer acceptance criteria. Scope means what must be done to produce the project’s end result. It is sometimes represented as the inside of the triangle to show that scope is strongly affected by the time, cost, and quality inputs. This is the overall definition of what the project is supposed to accomplish and a specific description of what