CHAPTER 2 IT (INFORMATION TECHNOLOGY) GOVERNANCE new subset of corporate governance that focuses on the management and assessment of strategic IT resources. - Key Objectives: 1. Reduce Risk 2. Ensure that investments in IT resources add value to the corporation - IT GOVERNANCE CONTROLS IT governance issues that are addressed by SOX and the COSO internal control framework: 1. Organizational structure of the IT function 2. Computer center operations 3. Disaster recovery planning STRUCTURE OF THE INFORMATION TECHNOLOGY FUNCTION Two extreme organizational models: • Centralized Approach • Distributed Approach 1. Centralized Data Processing - all data processing is performed by one or more large computers - IT services function - treated as a cost center Primary Service Areas: a. Database Administration- responsible for the security and integrity of the database. b. Data Processing - manages the computer resources used to perform the day to-day processing of transactions. Consists of organizational functions: • Data Control - transcribes transaction data from hard-copy source documents into computer input. • Computer Operations - The electronic files produced in data conversion are later processed by the central computer. • Data Library - Provides safe storage for the off-line data files. Data Librarian - responsible for the receipt, storage, retrieval, and custody of data files c. Systems development and maintenance a. Systems Development • systems professionals – gather facts about the user’s problem • end users – for whom the system is built • stakeholders – individuals inside or outside the firm who have an interest in the system. b. Systems Maintenance SEGREGATION OF INCOMPATIBLE FUNCTIONS A. Separating Systems Development from Computer Operations - The relationship between these groups should be extremely formal and their responsibilities should not be commingled. B. Separating Database Administration from Other Functions - Delegating these responsibilities to others who perform incompatible tasks threatens database integrity C. Separating New Systems Development from Maintenance • • Systems analysis group – works with the users to produce detailed designs of the new systems Programming group - codes the programs according to these design specifications Two types of control problems: 1. Inadequate Documentation 2. Program Fraud - involves making unauthorized changes to program modules for the purpose of committing an illegal act. D. A Superior Structure for Systems Development The systems development function is separated into two different groups: 1. New systems development group - responsible for designing, programming, and implementing new systems projects. 2. Systems maintenance group – responsible for the system’s ongoing maintenance. 2. The Distributed Model “Distributed Data Processing (DDP)” - involves reorganizing the central IT function into small IT units that are placed under the control of end users. Risks Associated with DDP A. Inefficient Use of Resources - The risk of mismanagement of organizationwide IT resources by end users B. Destruction of Audit Trails - Audit trail provides the linkage between a company’s financial activities and the financial statements that report on those activities. C. Inadequate Segregation of Duties - may result in the creation of small independent units that do not permit the desired separation of incompatible functions. D. Hiring Qualified Professionals - The risk of programming errors and system failures increases directly with the level of employee incompetence. Downloaded by Glaiza Czarina Gleabo (glaizaczarinagleabo0719@gmail.com) lOMoAR cPSD| 32116449 E. Lack of Standards - risks associated with the design and operation of a DDP system are made tolerable only if such standards are consistently applied. Advantages of DDP A. Cost reduction B. Improved Cost Control Responsibility C. Improved User Satisfaction D. Backup Flexibility Controlling the DDP Environment 1. Implement a Corporate IT Function 2. Central Testing of Commercial Software and Hardware 3. User Services – valuable feature of the corporate group is its user services function. – provides technical help to users during the installation of new software 4. Standard-Setting Body - establishing some central guidance. 5. Personnel Review Audit Objective - To verify that the structure of the IT function is such that individuals in incompatible areas are segregated in accordance with the level of potential risk and in a manner that promotes a working environment. THE COMPUTER CENTER Objectives: mitigate risk and create a secure environment Areas of potential exposure 1. Physical Location – directly affects the risk of destruction to a natural or man-made disaster. 2. Construction 3. Access – access to the computer center should be limited to the operators and other employees who work there. 4. Air Conditioning 5. Fire Suppression – Fire is the most serious threat to a firm’s computer equipment. 6. Fault Tolerance – is the ability of the system to continue operation when part of the system fails. Two examples of fault tolerance: • Redundant Arrays of Independent Disks (RAID). It involves using parallel disks that contain redundant elements of data and applications • Uninterruptible Power Supplies. Commercially provided electrical power presents several problems that can disrupt the computer center operations Audit Objectives To evaluate the controls governing computer center security. Audit Procedures 1. Tests of Physical Construction - obtain architectural plans and assess the physical location of the computer center 2. Tests of the Fire Detection System - the auditor should establish that fire detection and suppression equipment 3. Tests of Access Control - must establish that routine access to the computer center is restricted to authorized employees. 4. Tests of Raid - most systems that employ RAID provide a graphical mapping of their redundant disk storage 5. Tests of the Uninterruptible Power Supply perform periodic tests of the backup power supply to ensure that it has sufficient capacity to run the computer and air conditioning. 6. Tests for Insurance Coverage - annually review the organization’s insurance coverage on its computer hardware, software, and physical facility Disaster Recovery Planning - comprehensive statement of all actions to be taken before, during, and after disaster. Four Common Features: 1. Identify Critical Applications - Recovery efforts must concentrate on restoring those applications that are critical to the shortterm survival of the organization - short-term survival requires the restoration of those functions that generate cash flows sufficient to satisfy short-term obligations. 2. Creating a Disaster Recovery Team - To avoid serious omissions or duplication of effort during implementation of the contingency plan, task responsibility must be clearly defined and communicated to the personnel involved 3. Providing Second-Site Backup - provides for duplicate data processing facilities following a disaster 3.1 Mutual Aid Pact – agreement between two or more organizations to aid each other 3.2 Empty Shell (cold site) – arrangement wherein the company buys or leases a building that will serve as data center 3.3 Recovery Operations Center – or hot site is a fully equipped backup data center that many companies share. lOMoAR cPSD| 32116449 3.4 Internally Provided Backup – permits to develop standardized hardware and software configurations 4. Backup and Off-Site Storage Procedures 4.1 Operating System Backup 4.2 Application Backup 4.3 Backup Data Files 4.4 Backup Documentation 4.5 Backup Supplies and Source 4.6 Testing the DRY Audit Objectives - Auditor should verify that management’s disaster recovery plan is adequate and feasible for dealing with a catastrophe that could deprive the organization of its computing resources. Audit Procedures 1. Site Backup 2. Critical Application List 3. Software Backup 4. Data Backup 5. Backup Supplies, Documents, and Documentation 6. Disaster Recover Team – should clearly list the name, addresses, and emergency number. 1. Software-as-a-Service – a software distribution model in which service providers host application for client organizations over a private network 2. Infrastructure-as-a-Service – provision of computing power and disk space to client firms 3. Platform-as-a-Service – enable client firms to develop and deploy onto the cloud infrastructure consumer-generated application Virtualization - Multiplies the effectiveness of the physical system by creating virtual versions of the computer with separating operating systems - Types: 1. Network virtualization – increases effective network bandwidth by dividing it into independent channels 2. Storage Virtualization – pooling of physical storage from multiple network storage devices into what appears to be a single virtual storage device. Risks: 1. 2. 3. 4. 5. OUTSOURCING THE IT FUNCTION Benefits: 1. Improved core business performance 2. Improved IT performance 3. Reduced costs Core Competency Theory - Argues that an organization should focus exclusively on its core business competencies • Commodity IT assets – not unique to a particular organization and thus easily acquired in market place • Specific IT assets – Unique to organization and support its strategic objectives Transaction Cost Economics (TCE) Theory - in conflict with the core competency theory school by suggesting that firms should retain certain specific non-core IT assets in-house. Cloud Computing - location-independent computing - model for enabling convenient, on-demand network access to a shared pool configurable computing service Primary classes: Failure to perform Vendor Exploitation Outsourcing cost exceeds benefits Reduced Security Loss of strategic advantage Audit Implications of IT Outsourcing • Statement on Standards for Attestation Engagements No. 16 – internationally recognized third party attestation report designed for service organization Two types of SSAE No. 16 report: a. Type 1 report b. Type 2 report • SSAE 16 attest report – provides a description of the service provider’s system Two reporting Techniques: a. Carve-out Method – exclude the subservice organization’s relevant control objectives b. Inclusive Method – include the services performed by the subservice organization