Uploaded by Agrita Johri

IT-general-controls-checklist

advertisement
CHECKLIST FOR IT GENERAL CONTROLS
It is necessary to assess the IT control environment as a basis for deciding how much audit reliance
to place on data produced by computerised IT systems. Weaknesses in the IT control environment
have a pervasive impact on all applications and data maintained in that environment.
This checklist for general controls is a set of close-ended questions for use in a limited review of
the IT control environment at the audited entity. It will help auditors check the main IT control
objectives, which are based on the COBIT framework in reference to the EU's regulatory framework
and information criteria in the areas of IT governance and management, data management,
business continuity planning, information security, change management and outsourcing of IT
infrastructure.
You can jump directly to the following sections of the checklist for general controls:
A.
IT governance and management
B.
Data management
C.
Business continuity planning
D.
Information security
E.
Change management
F.
Outsourcing of IT infrastructure
A. IT GOVERNANCE AND MANAGEMENT CONTROLS
Control objectives and reference to COBIT
the regulatory framework
1. Control objective: IT strategy is
aligned with and supports the overall
business strategy.
References to regulatory
ref.
PO1.4
PO1.5
Tests of controls
1. Is there a multiannual IT strategy or IT
at an appropriate level?
2. Does the IT strategy have adequate and
relevant objectives, budget and
27(3); ICS7
performance indicators?
Effectiveness
Documents
required

plan (3-5 years) that is formally approved
framework: FR Arts 28a(2)(a) and
Related information criteria:
Evaluation
3. Are there IT annual work programmes in
line with the IT strategy?
IT strategy or IT
plan

IT annual work
programmes
Control objectives and reference to COBIT
the regulatory framework
ref.
2. Control objective: Make effective and PO5.3
efficient IT investments and set and
PO5.4
Tests of controls
1. Is IT expenditure planned, managed and
Evaluation
Documents
required

IT annual budget
monitored within an annual budget which is
(separate or a
track IT budgets in line with IT strategy DS6.3
aligned with the IT strategy and detailed
section of the
and investment decisions.
enough to reflect the organisation's
general budget of
priorities?
the organisation)
References to regulatory
framework: FR Art. 27(3); ICS7
Related information criteria:
Effectiveness and efficiency

Any documents
for follow-up of IT
annual budget
Control objectives and reference to COBIT
the regulatory framework
3. Control objective: Provide accurate,
ref.
PO6.3
Tests of controls
1. Are there written and formally approved
Evaluation
Documents
required

Policies,
understandable and approved policies, PO6.4
policies and/or procedures covering most
procedures,
procedures and guidelines, embedded PO6.5
key aspects of IT management:
guidelines and
in an IT control framework.
manuals
a. Data management and classification?
References to regulatory
framework: ICS8 and ICS12
Related information criteria:
Effectiveness
b. Business continuity?
c. Information security?
d. Risks and controls?
e. Change management?
4. Control objective: Establish
PO4.1
1. Is the IT department appropriately placed

IT process
transparent, flexible and responsive IT PO4.3
within the organisation, given the
framework,
organisational structures and define
organisation's size and mission?
documented roles
PO4.4
and implement IT processes equipped PO4.5
with owners, roles and responsibilities. PO4.6
PO4.8
References to regulatory
framework: FR Art. 28a(2)(a); ICS3,
ICS7 and ICS8.
PO4.11
PO7.1
PO7.4
Related information criteria:
PO7.8
Effectiveness and efficiency
ME3.1
and
2. Is there an IT steering committee
responsibilities
composed of executive, business and IT
management and charged with ensuring
business alignment (with supervision of IT
plans and policies) and monitoring IT

IT job descriptions

IT human
resources policy
services and projects?
and procedures
3. Are IT processes and IT-specific roles and
responsibilities properly defined, exercised

Decision or other
document relating
and monitored?
to the
4. Have a local information security officer
establishment of
(LISO) and local security officer (LSO) been
an IT steering
appointed in accordance with the
committee
Commission's regulatory framework?

Sample minutes
of IT steering
Control objectives and reference to COBIT
the regulatory framework
ref.
Tests of controls
Evaluation
Documents
required
5. Are there policies and procedures for
committee
managing staff recruitment and job
meetings
termination?
6. Are the following roles segregated:
a. Security: security officer (LSO and
LISO) – system owner – security
administrator (LSA-Local security
administrator)?
b. Changes: development – testing –
quality assurance – production?
Control objectives and reference to COBIT
the regulatory framework
5. Control objective: Identify, prioritise,
ref.
PO9.1
Tests of controls
1. Are IT risks managed in accordance with
Evaluation
Documents
required

Risk management
contain or accept relevant risks arising PO9.2
the organisation’s risk management
framework and/or
in the IT area and associated
PO9.3
framework?
policy
functions.
PO9.4
PO9.5
References to regulatory
2. Is there an IT-specific risk management
framework?
framework: IR Art. 48(e); ICS6 and
ICS12
3. Are IT risks defined and monitored regularly
in an IT risk record (separately or within
Related information criteria:
Confidentiality, integrity and availability
the organisation's general risk record)?

IT risk record/map
Control objectives and reference to COBIT
the regulatory framework
ref.
6. Control objective: Identify, implement ME2.1
Tests of controls
1. Has a set of IT controls aligned with the
Evaluation
Documents
required

Documentation of
and monitor an internal control process ME2.2
organisation's internal control framework
internal IT
for IT-related activities.
been established?
controls or the
ME2.7
ME3.1
References to regulatory
framework: FR Art. 28a(2)(a,b,c); IR
organisation's
2. Has a set of IT controls designed to
internal control
mitigate IT risks been identified?
standards (e.g.
Arts 22a and 48(e); ICS9, ICS11, ICS
12 and ICS15
the ICS at the
3. Is there regular monitoring of and reporting
European
on the effectiveness of IT controls?
Commission)
Related information criteria:
Effectiveness and efficiency
4. Does the organisation of IT conform to the
applicable rules and regulations in areas

Audit reports in
such as data protection and intellectual
the field of IT (last
property rights?
3 years)
5. Have any internal or external audit reports
been produced on IT topics?
Control objectives and reference to COBIT
the regulatory framework
7. Control objective: Define a
ref.
PO10.2 1. Is there an IT project management
programme and project management
PO10.3
approach that is applicable to all IT
AI2.2
projects, enables stakeholder
AI4.3
participation and monitors project risks AI4.4
and progress.
References to regulatory
framework: ICS7
Related information criteria:
Effectiveness and efficiency
Tests of controls
Evaluation
Documents
required

methodology?
Project
management
guideline/
2. Are IT projects managed in line with the
documentation
project management methodology?
3. Are new IT systems developed in line with
a software development methodology (e.g.
RUP@EC)?

Software
development
methodology
Control objectives and reference to COBIT
the regulatory framework
ref.
Tests of controls
8. Control objective: Monitor and report ME.1.1 1. Are senior management (or the steering
process metrics and identify and
ME.1.4
committee) given regular progress reports
implement performance improvement
ME.1.5
on the overall contribution made by IT to
actions.
ME.4.1
the business so that they can monitor the
ME.4.2
extent to which the planned objectives have
References to regulatory
framework: IR Art. 22a(1)(e); ICS9
and ICS15
Related information criteria:
Effectiveness and efficiency
been achieved, budgeted resources have
been used, performance targets have been
met and identified risks have been
mitigated?
Evaluation
Documents
required

Regular progress
reports
B.
DATA MANAGEMENT CONTROLS
Control objectives and
reference to the regulatory
framework
COBIT
ref.
Tests of controls
Evaluation
Documents
required
1. Control objective: Ensure
DS11.
1. Are there policies established to store

Data
that data are properly stored,
2
documents, data and source programmes in
management
archived and disposed of.
DS11.
accordance with the organisation's activities,
policy
4
size and mission?
References to regulatory
framework: FR Art.
28a(2)(b,c); IR Arts 22a(1)(d),
48(f,g), 107 and 108; ICS10,
DS11.
5
DS11.
6

2. Do adequate policies and procedures exist for
the backup of systems, applications, data and
documentation:
Backup
procedures

Procedures for
disposal of
ICS11, ICS12 and ICS13
a. Do backup procedures provide guarantees of
Related information criteria:
data recovery (with frequencies, copies,
Integrity
verifications, etc.) and correspond to the
business continuity plan?
media

Contracts with
third parties or
service-level
b. Are all relevant data backed up (e.g. by means
of audit logs, documents, spreadsheets)?
c. Is there well-defined logical and physical
security for data sources and backup copies?
d. Has responsibility been assigned for the
making and monitoring of backups?
agreements
(data
management
clauses)
Control objectives and
reference to the regulatory
framework
COBIT
ref.
Tests of controls
3. Are systems, applications, data and
documentation maintained or processed by
third parties adequately backed up and/or
secured?
4. Does the organisation have policies to ensure
the protection of sensitive data and software
when data and hardware are disposed of or
transferred?
5. Are the retention periods for data in line with
contractual, legal and regulatory requirements?
Evaluation
Documents
required

2. Control objective: Establish
PO2.3
1. Has a data dictionary been defined so that data
an enterprise data model
PO2.4
redundancy/incompatibility can be identified
management
incorporating a data
DS5.1
and data elements can be shared among
policy
classification scheme to
1
applications and systems?
ensure the integrity and
DS11.
consistency of all data.
1

2. Is the data dictionary applied to existing
major changes to IT applications?
framework: FR Art.
28a(2)(b,c); IR Arts 22a(1)(d),
48(c,f) and 107; ICS11, ICS12
Data
classification
systems, application development projects and
References to regulatory
Data
scheme

3. Are owners identified for each data element
Assigned data
classifications
(files, folders, applications, etc.)?

and ICS13
4. Are data classified by information criterion:
Related information criteria:
a. confidentiality (public, limited, etc.);
Confidentiality and integrity
b. integrity (moderate, sensitive, etc.);
c. availability (moderate, critical, etc.)?
5. Is there a document showing the classification
of each data element in accordance with the
data classification scheme?
Data dictionary
Control objectives and
reference to the regulatory
framework
COBIT
ref.
3. Control objective (non-
AC2
COBIT): Ensure reliable
AC5
production of financial and
Tests of controls
1. Have controls been designed to ensure the
reliability of computerised data, with source
documents?
management information.
2. Have controls been designed to ensure the
References to regulatory
integrity and security of documents or files
framework: FR Arts 28a2(b)
(such as spreadsheets) which are kept on
and 61(e); IR Art. 48 (f);
personal computers or shared drives and are
ICS12 and ICS13
relied on by the organisation in its financial
workflow where:
Related information criteria:
Confidentiality and integrity
a. those files are used to gather financial data or
make calculations and serve as a basis for
manual entries in financial systems (e.g.
ABAC) instead of source documents?
b. the files are used for financial reporting?
Evaluation
Documents
required
C.
BUSINESS CONTINUITY CONTROLS
Control objectives and
reference to the
regulatory framework
COBIT
ref.
Tests of controls
Evaluation
Documents
required
1. Control objective: Build
DS2.5
1. Are there a written and formally approved
the capabilities to carry out
DS4.2
business continuity plan (BCP) and disaster
day-to-day automated
DS4.3
recovery plan (DRP)?
business activities with
DS4.4
minimal, acceptable
DS4.5
2. Does the BCP cover:
interruption.
a. Business impact analysis (BIA)?
References to regulatory
b. All key business functions and processes?
framework:
FR Art. 28a(2)(c);
IR Art. 48(c); ICS10
Related information
criteria: Availability and
effectiveness
c. Roles, responsibilities and communication
processes?
3. Are BCP tests scheduled and completed on a
regular basis?
4. Is the BCP kept updated so that it continually
reflects actual business requirements?
5. Are all critical backup media, documentation,
data and other IT resources necessary for IT
recovery stored offsite?

BCP and DRP

Test reports
6. Do the BCP and DRP define recovery point
objectives (RPOs) and recovery time objectives
(RTOs)?
7. Are backup policies defined in accordance with
RPOs and RTOs?
NB: in the absence of a suitable BCP the audited entity should be advised of the risk without delay.
D.
INFORMATION SECURITY CONTROLS
Control objectives and reference to
COBIT
the regulatory framework
ref.
Tests of controls
Evaluation
Documents
required
1. Control objective: Establish and
PO6.3
1. Has an IT security policy and/or plan
maintain IT security roles,
DS5.1
been drawn up and approved at the
responsibilities, policies, standards and
DS5.2
appropriate level?
procedures.
2. Does the IT security plan
References to regulatory framework:
include/cover the following:
FR Art. 28a(2)(c); IR Art. 48(c); ICS12
a. A complete set of security policies
Related information criteria:
and standards in line with the
Confidentiality, integrity and
established IT security policy
effectiveness
framework?
b. Procedures for implementing and
enforcing those policies and
standards?
c. Roles and responsibilities?
d. Staffing requirements?
e. Security awareness and training?
f. Enforcement procedures?

IT security policy
and/or plan

Relevant security
policies and
procedures
Control objectives and reference to
COBIT
the regulatory framework
ref.
Tests of controls
Evaluation
Documents
required
g. Investment in the necessary
security resources?
2. Control objective: Implement
procedures for controlling access based
DS5.3
DS5.4
1. Are there procedures for defining

User access
access rights
rights policy/ user
on the individual’s need to view, add,
(view/add/change/delete) to financial
management
change or delete data.
systems (ABAC, etc.) and
policy
data/documents?
References to regulatory framework:
FR Art. 28a(2)(c); IR Art. 48(c); ICS12
Related information criteria:
Confidentiality and integrity

Access control
lists (for financial
systems and
data)
Control objectives and reference to
COBIT
the regulatory framework
ref.
3. Control objective: Ensure that all users
(internal, external and temporary) and
DS5.3
AC6
Tests of controls
1. Are there authentication and
authorisation mechanisms, such as
their activity on IT systems are uniquely
passwords, tokens or digital
identifiable.
signatures, for enforcing access rights
according to the sensitivity and
References to regulatory framework:
criticality of information?
FR Art. 28a(2)(c); IR Art. 48(c); ICS12
2. Are IDs unique and individual and
Related information criteria:
Confidentiality and integrity
passwords known only to the persons
concerned?
Evaluation
Documents
required
Control objectives and reference to
COBIT
the regulatory framework
ref.
4. Control objective: Controls on the
Tests of controls
Evaluation
Documents
required

DS5.3
1. Are user access rights requested by
appropriate segregation of duties for
DS5.4
user management, approved by
lists (for financial
requesting and granting access to
PO4.1
system/data owners and implemented
systems and
systems and data exist and are
1
by the security administrator?
data)
followed.
2. Are the following roles segregated:
References to regulatory framework:
FR Art. 28a(2)(c); IR Art. 48(c); ICS8
a. Infrastructure: security officer
(LSO and LISO) – system owner –
Related information criteria:
security administrator
Confidentiality and integrity
(implementing access by LSA
etc.)?
b. Applications: system owner
(authorisation and monitoring) –
security administrator (e.g. profile
administrator in ABAC)?

Access control
Job descriptions
Control objectives and reference to
COBIT
the regulatory framework
ref.
5. Control objective: Make sure one
Tests of controls
Evaluation
Documents
required

DS5.4
1. Is there a security officer in charge of
person (security administrator) is
DS13.
the organisation's IT security who
of security officer
responsible for managing all user
4
obtains his/her authority from the
and security
senior management?
administrator
accounts and security tokens
(passwords, cards, devices, etc.) and
that appropriate emergency procedures
are defined. Periodically review/confirm
his/her actions and authority.
References to regulatory framework:
FR Art. 28a(2)(c); IR Art. 48(c); ICS8
and ICS12
2. Is only the security officer able to
manage user accounts and
passwords?
3. Are the actions of the security
administrator periodically reviewed (by
the LISO), attention being given to the
segregation of duties?
Related information criteria:
Confidentiality and integrity
Job descriptions
Control objectives and reference to
COBIT
the regulatory framework
ref.
Tests of controls
Evaluation
Documents
required

6. Control objective: Provide and
DS12.
maintain a suitable physical
2DS12
implemented, concerning the physical
to physical
environment to protect IT assets from
.3
security and access control measures
security
access, damage or theft.
DS12.
that are to be followed to prevent fire,
5
water damage, power outages, theft,
References to regulatory framework:
1. Has a policy been defined, and is it
etc. at IT premises?
FR Art. 28a(2)(c); IR Arts 48(c) and 108;
ICS12
2. Is access to IT premises (IT rooms
and facilities) granted, limited and
Related information criteria:
Confidentiality and integrity
revoked in accordance with physical
security policies?
3. Is there a procedure for logging and
monitoring all access to IT premises
(including by contractors and
vendors)?
Policies relating
E.
CHANGE MANAGEMENT CONTROLS
Control objectives
and reference to the
regulatory framework
COBI
T ref.
Tests of controls
Evaluatio
Documents
n
required
1. Control objective:
AI6.1
1. Is there a formally approved, implemented and monitored

Change
Control the impact
AI6.2
framework/procedures for managing changes to IT
management
assessment,
AI6.3
applications, programs and databases?
framework/
authorisation and
AI6.4
implementation of all
AI6.5
changes to IT
AI6.6
procedures
2. Does the change management framework include/cover:
a. Roles and responsibilities?
infrastructure,
applications and
technical solutions;
b. Change request procedures?
specifications; and halt
implementation of
unauthorised changes.
References to
regulatory
framework:
IR Arts 22a(1)(d) and
107; ICS8
All records of a
sample of
changes (from
change request
c. The assessment of risks and the impacts of changes?
minimise errors due to
incomplete request

d. Management authorisation for change requests?
e. Approval by the key stakeholders, such as users and
system owners, before changes move into production?
f. Management review and approval of changes before
they move into production?
g. The classification of changes (major, minor, emergency
changes, etc.)?
h. The tracking of changes?
log to move into
production)
Related information
i.
Version control mechanisms?
j.
The definition of rollback procedures?
criteria: Integrity,
availability,
effectiveness and
k. The use of emergency change procedures?
efficiency
l.
Audit trails?
3. Are the following criteria for the segregation of duties
respected in the context of program changes:
a. Is the segregation of duties for development, testing,
quality assurance and production tasks clearly
established?
b. Do program developers and testers conduct activities
on "test" data only?
4. Do end users or system operators have direct access to
program source codes?
2
Control objective:
AI7.2
Test that applications
AI7.6
and infrastructure
1. Are all major changes tested against functional and
free from errors, and
that adequate data
other documents
goals are achieved?
relevant to the
testing of a
2. Are all major changes executed in accordance with a test
plan which covers:
a. Organisational standards, roles and responsibilities?
conversion has
occurred.
b. Test preparation, including site preparation?
References to
c. Training requirements, if needed?
regulatory
d. Installation or update of a defined test environment?
framework: IR Arts
22a(1)(d) and 107;
ICS8
Related information
criteria: Effectiveness
Test plans and
operational requirements to ensure that original business
solutions are fit for the
intended purpose and

e. Planning/performance/documentation/retention of test
cases?
f. Error and problem handling?
g. Correction and escalation?
h. Formal approval?
major change to
an IT application/
program
3. Are tests implemented on the live production system or in
a test environment?
F.
CONTROLS ON OUTSOURCING IT INFRASTRUCTURE
Control objectives and
reference to the regulatory
framework
1. Control objective: Identify
services delivered by IT.
COBIT
ref.
DS1.1
Tests of controls
1. Are there clearly-defined benefits and business
objectives in support of the decision to outsource?
Define, agree upon and
regularly review service-level
agreements, which should
cover service support
2. Are management requirements and expectations
clearly defined in the contract/SLA?
3. Were the risks assessed when deciding to
requirements, related costs,
outsource and taken into account when specifying
roles and responsibilities,
the necessary controls?
etc., and be expressed in
business terms.
4. Was the IT project carried out in accordance with
existing project management standards?
Evaluatio
Documents
n
required

Contract(s)

SLA(s)
Control objectives and
reference to the regulatory
framework
COBIT
ref.
References to regulatory
AI 4.1
framework: FR Art.
AI 5.2
28a(2)(c); IR Arts 22a(1)(d),
DS1.3
48(c,f) and 108; ICS5, ICS8,
DS1.6
ICS10, ICS11 and ICS12
DS2.4
Related information
Tests of controls
5. Does the contract/SLA clearly define security
requirements:
a. Network security?
b. Physical security?
c. Anti-virus protection?
criteria: Confidentiality,
integrity, efficiency and
effectiveness
d. Logical access controls?
6. Are the data backup requirements clearly defined?
7. Are provisions included for business continuity
procedures?
8. Is there a clause on compliance with personal data
protection regulations?
Evaluatio
Documents
n
required
Control objectives and
reference to the regulatory
framework
COBIT
ref.
Tests of controls
9. Does the contract/SLA give a detailed description of
the service to be provided:
a. Hardware and software requirements?
b. Service support (help desk, incident
management, problem management)?
c. Maintenance and change management?
d. IT staffing needs?
Evaluatio
Documents
n
required
10. Does the contract/SLA include/cover the following:
a. Formal management and legal approval?
b. Costs, with specifications for payment (including
frequency)?
c. The principals' roles and responsibilities?
d. User/provider communications procedure and
frequency?
e. Contract duration?
f. Problem resolution procedures?
g. Non-performance penalties?
h. The dissolution procedure?
i.
The contract modification procedure?
j.
Non-disclosure guarantees?
k. Right to access and right to audit?
Control objectives and
reference to the regulatory
framework
COBIT
ref.
Tests of controls
Evaluatio
Documents
n
required
Control objectives and
reference to the regulatory
framework
2. Control objective:
COBIT
ref.
DS1.5
Tests of controls
1. Does the contract/SLA define reporting procedures
Continuously monitor
ME1.4
as regards the type, content, frequency and
specified service-level
ME1.5
distribution of reports?
performance criteria. Reports
ME1.6
on achievement of service
levels should be provided in a
format that is meaningful to
stakeholders.
References to regulatory
framework: IR Art. 22a(1)(e);
ICS9 and ICS15
Related information
criteria: Efficiency and
effectiveness
2. Is a procedure in place for continuous monitoring
and regular reporting on the achievement of
objectives?
3. Have formal performance criteria been established
to facilitate and measure the achievement of the
SLA objectives?
Evaluatio
Documents
n
required

Monitoring
report(s)
Download