DISA Module 5 by CA.Shweta Ajmera - Indore

advertisement
Module 5-DISA(ICAI)
By:
CA.Shweta Ajmera
M.Com,CA,DISA(ICAI)
cashwetaajmera@gmail.com
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
MODULE 5
INFORMATION SYSTEMS ORGANIZATION
& MANAGMENT
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Information System Organisation &
Management
What is Information?
What is System?
What is Organisation?
What is management?
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Coverage – Module 5
This module covers 8 % of the DISA syllabus
i.e.approximately 16 questions.
It has been divided as follows:
Chapter 1 - Governance
Chapter 2 - The IS Management Process
Chapter 3 – Auditing Information Systems
Organisation & Management
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Unit-1
Governance
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
LEARNING GOAL
To understand as an auditor, structure of an IS
Organization and Management with respect
to various aspects of planning, policies,
standards, procedures and strategies.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Meaning
What is Governance?
--- To Govern???
--- To control???
Who will be the authority to govern
any organisation???
Any example???
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
GOVERNANCE
•
Enterprise Governance
• Corporate Governance
• IT Governance
• E- Governance
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ENTERPRISE GOVERNANCE
Definition:
• The Set of responsibilities and Practices
exercised by the Board and executive
management with the goal of :
 providing strategic direction
 ensuring that objectives are achieved
 ascertaining that risks are managed
appropriately
 verifying that the organization's resources are
used responsibly
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ENTERPRISE GOVERNANCE
ENTERPRISE
GOVERNANCE
CORPORATE
GOVERNANCE
i.e. Conformance –
Accountability & Assurance
(external, historical view)
BUSINESS
GOVERNANCE
i.e. Performance –
Value Creation & Resource
Utilisation
(internal, futuristic view )
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ENTERPRISE GOVERNANCE
Corporate Governance :
Conformance of processes –
state or act of adherence to
certain specification, standard or
guideline
•
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Conformance
Conformance deals with external
processes like:
•
•
•
•
•
•
•
Board committees - audits, remuneration and
nominations
Compliance with regulations
Roles of the chairman and CEO
Board of directors – composition, training, nonexecutive directors etc
Internal Controls
Risk Management
Executive remuneration
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Business Governance :
Performance
•-
Value creation and Resource Utilization.
Helping Board of Directors to :
 Make strategic decisions
 Understand its appetite for risk
 Identify its key points of decision
making
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Corporate
Governance
i.e.
Conformance
Business
Governance
i.e.
Performance
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CORPORATE GOVERNANCE
Ethical corporate behaviour by directors or
others charged with governance in the
creation and presentation of wealth for all
stakeholders.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Corporate Governance
OECD says: The distribution of rights and
responsibilities among different participants in the
corporation,
such
as
board,
managers,
shareholders and other stakeholders and spells out
rules and procedures for making decisions on
corporate affairs. By doing this, it also provides
the structure through which the company
objectives are set and means of attaining those
objectives and monitoring performance.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Corporate Governance
Implications – Includes system for:
1.
2.
3.
4.
5.
6.
Managing and monitoring risks and
Companies must have an internal control system,
to (a) manage systems and (b) culture
Provide continued value addition to shareholders
& stakeholders
Maintain ethical corporate behavior – integrity,
openness, transparency, accountability
Implementation – dependent on right people,
making right decisions, at right time
Other – board committees, compliance, role of
CEO etc, board dynamics, & executive
remuneration
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Decision
making style
Info.
systems
Funct.
strategies &
policies
Goals
Culture &
Values
Compet.
advant.
Org.
structure
HR mant.
Mant.
of
systems
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Corporate Governance issues
determined success & failure
1.
2.
3.
4.
that
Culture, ethics and tone at the top
The role of the chief executive officer
The board of directors
The board of directors
Failures
Enron,Worldcom, Parmalat, Xerox
Successes
Tesco,Bangkok Mass Transit Systemand Southwest
Airlines
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Strategic Issues Underlying Success
& Failures
1.
2.
3.
4.
Choice and clarity of Strategy
Effective strategy execution.
Ability to respond to abrupt changes and
fast moving market conditions.
Ability to undertake successful mergers
and acquisitions
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Traditional Role of IT
•
•
Managing systems and project development
Managing computer operations and the data
centre
•
Training, staffing and developing IS skills
•
Providing technical services
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
New Role of IT (incorporating Traditional Role)
Initiation and design of strategic information systems
Infrastructure planning, acquisition, control and
implementing improvements
Linking the business with the Internet and e-commerce
processes
Systems Integration
Educating non technical staff about IT and technical
staff about the business
Support for end user computing through help desks
etc
Constant liaison with top management
Business process reengineering
Managing related outsourced function

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
INFORMATION TECHNOLOGY
GOVERNANCE
IT governance ensures that enterprise’s IT
sustains and extends the organization’s
strategies and objectives.
IT governance is a sub-set of corporate
governance
Ensures twin purposes:
 IT delivers value to the business, by aligning IT with
the objectives of the Organization.
 IT risks are reduced by embedding accountability
into the processes of the enterprise.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
IT Governance- Purpose
IT delivers value to the business, by aligning IT
with the objectives of the organisation, and
IT risks are reduced by embedding accountability
into the processes of the enterprise
Dependant on availability of :
The right information to the
Right persons
At the right time
At the right place most effectively and efficiently
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
IT Governance-Some benefits
By ensuring that IT resources are used optimally
and responsibly, it helps to decrease costs and
therefore promote efficiency
By optimising resources for automation it
ensures effective use of resources
Helps the business to avail better opportunities
and maximise benefits by aligning IT and
business objectives
Promotes the management of risks by providing
for adequate security, compliance and
reliability of information.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Who needs IT governance ?
Those enterprises where:
Good corporate governance is lacking
There is insufficient liaison between the
board and the IT department
IT is not a regular item on the board
meetings agenda
There are no well defined rules and
procedures
People are not clear about what IT is
doing
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Who needs IT governance ?
There are many IT mishaps
There are many IT issues pending
resolution for a long time
The IT skills are decreasing
There are frequent network problems
There is no planning for contingencies ,
etc

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
INFORMATION TECHNOLOGY
GOVERNANCE
Best Practices in IT Governance :
 IT / IS Assurance System – recommended best
practices and providing assurance on their compliance.
 IT Strategy Committee – differs from IT steering
committee and works as advisory to Board.
 The Balance Scorecard
Information security governance – CIA issues etc
Enterprise architecture – Zachmann model used to
map it assets to promote management, planning and
understand IT investments from technology and business
perspectives and align them with organisational goals.
Risk management – assessment & treatment
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
IT STRATEGY COMMITTEE
Its
scope includes not only advice on strategy when
assisting the board in its IT governance responsibilities but
also to focus on IT value, risks and performance.
This
is a mechanism for incorporating IT governance
into enterprise governance.
As
a committee of the board, it assists the board in
overseeing the enterprise’s IT-related matters by ensuring
that the board has the internal and external information it
requires for effective IT governance decision making.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
IT BALANCE SCORECARD
The
standard IT balance scorecard is a process
management evaluation technique that can be applied to
the IT business governance process in assessing IT
functions and processes.
The method goes beyond the traditional financial
evaluation, supplementing it with measures concerning
customer ( user ) satisfaction, internal processes and ability
to innovate.
These additional measures drive organization toward
optimum use of IT, which is aligned with organization’s
strategic goals.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
INFORMATION SECURITY
GOVERNANCE
Information
security governance is a sub-set of
corporate governance that provides strategic
direction for the security activities and ensures
objectives are achieved.

It ensures that information security risks are
appropriately managed and enterprise
information resources are used responsibly.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ENTERPRISE ARCHITECTURE
EA involves documenting
an organization’s IT
assets in a structured manner to facilitate,
understanding, management and planning for IT
investments.
An EA often involves both a current and
optimized state representation.
The current focus on EA is a response to the
increasing complexity of modern organizations, and
an enhanced focus on aligning IT with business
strategy and ensuring IT investments deliver real
returns.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ENTERPRISE ARCHITECTURE
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
E- GOVERNANCE
Refers to the use of information
technology in order to exchange
information and services with citizens,
businesses and other arms of the
government.
 Government – to – Citizen
 Government – to – Customer
 Government – to – Business
 Government – to - Government
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Best Practices in Enterprise
Governance :

Strategic Oversight

Enterprise Risk Management
 The acquisition process
 Board performance
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Strategic Oversight

IT Strategy Committee
Balance Score Card
 CIMA Strategic Score card

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
IT Strategy Committee
It is a preparatory committee.
 The Board is still responsible for taking
Strategic Decision.
 This committee is responsible for taking
major decisions.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CIMA Strategic Scorecard
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Enterprise Risk Management
This reconciles both the:
 Assurance
that the business understands risks
and is managing them actively i.e. conformance
 Need to better integrate risk management in
Decision Making activities at all levels i.e.
performance
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
The acquisition Process
Mergers & Acquisitions are increasing:
The Critical success factors are:
 Effective and experienced full time project
management
Thorough evaluation of synergies and ruthless
implementation
 Effective due deligence
 Use of experiences specialists in M & A
 Early identification of risks with appropriate risk
reduction actions.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Board Performance
Performance Evaluation &
Measurement centre
 Dynamics
 Design

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Chapter 1 Q n A
1. Which of the following statements is
FALSE?
(a) The CIMA scorecard deals with strategic
position, options, implementation and risks only
(b) The balanced scorecard also brings into focus
non-financial performance indicators
(c) The new role of the IT department also includes
liaison with top management
(d) Corporate governance is a system for managing
risks only
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Chapter 1 Q n A
2. Which of the following statements is
FALSE?
(a) The balanced scorecard deals with financial and
non-financial performance measurements
(b) Information security need not consider issues
like authenticity, reliability, accountability and
non-repudiation
(c) Risk treatment is an integral part of risk
management
(d) The Zachmann model involves documenting the
organisations IT assets in order to align them
with the strategic goals of the organisation
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Unit-2
The Information
System Management
Process
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Agenda
To understand-managing IS
 PDCA cycle(Deming Cycle)
 PDCA-application to management processes
 Types of plans
 Steering Committee
 How to acquire the IS resources
 Control Methodologies
 Benchmarking
 Budgets and Variances etc

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Introduction
Objectives of organisation
 Importance of management
 Importance of managing the IS department
 PDCA-main role
 Planning
 Long range plans
 Short range plans
By steering committee
 Role of management

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Objectives of Organisation
To survive-It does this by:
 Identifying and meeting the needs of
customers & other stakeholders, in order
to achieve competitive advantage in an
effective and efficient manner
 To achieve maintain and improve its
performance and capabilities
 Systematic process is required

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Importance of Management

Management is an organ whose
performance determines the performance
and even the survival of the Institution.
The importance of management



Getting things done
Determine goals based on needs
Need to empower people with responsibility,
authority and accountability
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
What Management has to do?
Determine goals on the basis of customer
needs. Eg. Touchsreen mobile
 To implement and operate the required
resources and processes.
 To monitor and review the process and
resources.
 Maintain and improve the system
 Structure follows Strategy
 People power

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Importance of managing ISD
It has an operational as well as a Strategic
role to play in the success of organisation.
 E-commerce, E-Business, and other IT
initiatives
 To manage ISD , we have to understand
the IS management system properly

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Deming Cycle
Conceived by Walter Shewhart in 1930’s
 Popularised by Dr.W.Edwards Deming
(leader in Modern quality control)
 4 step Problem Solving Process for quality
management.
 In six sigma which is quality control
system, this is known as DMAIC- Define,
Measure, Analyse, Improve and Control.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PDCA
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PDCA Examples
ISO 9001- Requirement for quality
management system
 ISO 27001- Required for Information
security management system
 The Pearl River-Newyork

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
The Planning function
What should be done?
 How should it be done?
 When should it be done?
 Who should do it?

A plan is an action statement
CFS-Critical Success Factors
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Planning
Long Range Plans
 Short Range Plans


This plans are the responsibility of
Steering Committee.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Steering Committee
Appointment by-Board of directorsExecutive level
 Responsibilities-Charter –Approved by
Board
 Objective-IS department is aligned with
the organisation mission and objectives
 Chairman- Chaired by member of BOD
who understands information technology
risks and issues
 Representation

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Functions of Steering Committee
Board for large IS Projects only
 Review and Approve long range and short
range plans only
 Establish size and scope of IS function and
set principles
 Review and approve major acquisition of the
IS source within limits
 Approve and monitor the progress of major
project
 Liase between IS and the user department

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Advantages of Steering Committee
Top Management Involvement
 User representation
 Centralisation of Authority
 Promotes user ownership and systems
 Promotes Planning and Control
 Establishes user focus on IS

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Planning
Master Plan of the organisation- Main plan
prepared by BOD to guide the organisation
towards its objectives. It includes::
 A statement of mission, vision and values
 A statement determining strategic
objectives
 The strategies for achieving those objectives
 The factors that may favourably and
adversely affect the achievements of those
objectives
 Master plan is an aid for Long range and
short range plans

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Long Range Plans
Dimensions of Long range plans
----- Long Range----- Strategic Plans

Stratergy is derived from Greek word “
strategia”i.e art or science of being an
Army General which required them to
lead an army.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Strategic Plans
3 Dimensions
 Time- 2 to 5 years
 Projects- clearly defined and to be
completed in time
 Goals- Link between goals of
organisation and projects are clearly
defines

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Inputs for effective and efficient
planning
Stratergy and defined organisation goals
 Needs of customers and stakeholders
 Statutory, Regulatory and Contractual
needs
 Evaluating performance data on product and
processes
 Previous experiences
 any related risk assessment and treatment
information

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Outputs of good Planning
Defined product outcomes and support
process
 Skills and knowledge required by people
 Responsibility, Authority and accountability
of processes and improvement plans
 Resource needs
 Metrics for evaluating performances
 Need for improvement methods
 Need for Documentation and Records

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Contents of Long Range Plans
Current IS assessments-what do we have,
or where are we?
 Future IS assessments: Where do we want
to be in next five years in order to meet
our strategic objectives
 Development Strategy: Methodologies
and Vision used to reach the stated
Strategic Objectives

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Methods of creating LRP
SWOT
Eg. Dell
It needs:
1. Team Building
2. Scenario Models
3. Concensus creating exercises

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Short Range Plans
Operational or Tactical Plans
 They are derived at regular intervals from
LRP
 Micro issues:
 Project Reports
 Resource Allocation
 Implementation Schedule
 Initiatives to be undertaken

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Why does Planning Process always
fails??
Time Consuming
 Other immediate tasks
 Intensive mental effort
 Future look more uncertain

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
POLICIES
One of the function of the Steering
Committee is to develop policies
-- which are implemented through
standards, Guidelines and Procedures for
ISD.
-- Internal controls will flow from creation
of policies, which are required to ensure
that the stated objectives are met

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
What is Policy?
Formal statement made by the
management of their overall intention and
direction
 A stated coarse of action with a defined
purpose and scope in order to guide.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Effective Policies
Ideally in writing
 Clear, Concise, communicated in writing
 Under stood by all employees
 Regularly viewed and updated
 Be made by top management in order to
ensure consistency

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
IS -policies
Use of internet and email
 Data Security
 Change management
 Outsourcing
 Data retention
 Human Resources
 Project Management etc

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
STANDARDS
 They
are documents which state
management rules, legal and
regulatory issues that are mandatory
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
GUIDELINES
 To
choose most appropriate practice
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Procedures

Procedures are detailed documents that
define in writing how to ensure or apply
the policy

“ How to do it” statements
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
G
O
A
L
S
Business goals based on
customer & stakeholder
needs
Framework of
management intent
POLICIES
STANDARDS
GUIDELINES
PROCEDURES
Management rules,
legal and regulatory
issues, that are
mandatory
Framework for
understanding the
standards & the list of
tools to do it
How to apply the
policies i.e. how to do it
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Leadership




Energy
Energise
Edge
Execute
Eg: General Electric- Kack Welch was
appointed as the chairman of GE in 1981.
His immediate aim is to make GE the leader
in every business in which it was competing
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Importance of Leadership
Plan
Lead
Organise
Control
Innovation etc.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
IS Resources- Acquisition
Applications
 Information
 IT infrastructure
 People

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Process
Process for the acquisition and
Development of IT hardware will cover
process like
 Make or Buy Decisions
 Inhouse or Outsourced Acquisition and
Development and so on
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Acquisition & Implementation
of resources
Policies lead to determination and acquisition of
resources and processes
Processes lead to procedures and work instructions
which should be documented
Procedures should be capable of
a) Verification – confirmation that procedure is
accurate and complete at a low level, e.g. have we
built the right product in accordance with
specifications.
b) Validation – corroboration that procedure is
right or wrong in that context at ahigher level
against standards and rules, e.g. did we build the right
product as per user requirements, and
c) Approval.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Framework of
management intent
derived from
business goals
Policies
Set of interrelated
processes
Systems
Set of inter-related
activities which
transform inputs
into outputs
Processes / Practices
Procedures
Detailed steps
to perform an
activity
Documented processes
which can be verified,
validated & approved
Work Instructions
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Implementation of Processes
What are Benchmarks?
 How much should we spend on ID
department?
 Are we getting value from IS department?
 What are the goals of Benchmarking?
 -- Ultimate goal is to implement the Best
Practices
 Where are Benchmarking Statistics
Obtained from?

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Implementation - Benchmarking
processes
Definition – performance comparisons
Goals – import best practices
Sources – ITIL, IBC, QAIINDIA.com,
STQC.NIC.IN
Examples – system workloads, CPU
performance, quality
processes, etc
Problems – may lead to higher spending, no
relationship
with organisational performance, value addition
may be
subjective, plagiarism by competitors
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Financial Management Process
IS Budget and Variances
 User Pays scheme and Transfer Prices

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
User Satisfaction Survey Process
To determine the effectiveness of the IS
department after the users and the IS
department have agreed on the level of
service through service levels or
operating level agreements
 The basic beliefs that undertakes is that
the user satisfaction is highly correlated
with system success and at regular
interval management should provide
customer satisfaction

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Capacity management and Growth
Planning Process

Process of Planning, Sizing and continously
optimising the IS capacity in order to
meet long and short term business goals
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Implementation - Capacity Management
processes
Benefits
Better customer satisfaction
Justification for spending
Avoid incorrect capacity sizing
Reduce capacity failures
Better alignment with business goals and IS resources
Better service level management
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Goal Accomplishment Processes
 Actual
with the Standard Fixed
i.e. Predefined Business and IT
Goals
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Implementation - Goal accomplishment
processes
Objective
Determine system effectiveness by comparing actual
performance against defined business and IT goals i.e. Key
Goal Indicators (KGIs)
Examples
Productivity improvements like lower data entry time
taken and errors
Meeting customer requirements for quality
Standardisation of processes
Lower hardware or software errors
Lower IS risks
Lower security violations etc
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Performance Management
Processes/ Indicators

Measurement is important, if anything
cannot be measured than it cannot be
improved on
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Implementation – Performance
Measurement
processes
Objective
Measure performance to make improvements through Key
Performance Indicators (KPIs)
Uses
Measure products / services
Assure accountability
Make budgeting decisions
Optimise performance
Phases
Plan, Data collection, Check performance, Action for
improvements
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Implementation - Performance measurement
processes
Examples
Better use of bandwidth
Lower non-compliances with internal standards
Lower cost and efficiency of processes
Reduced complaints
Better quality
Lower errors
Improved staff productivity
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
QUALITY MANAGEMENT PROCESSES
What is Quality Management?
 It is a system of
 Processes and activities considered
necessary
 in order to plan , develop, monitor and
improve a product or service
 in an effective and efficient manner
 in order to meet the stated requirements

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO
ISO – word derived from ISOS or ISO
which in Greek and French, both means
equal
 Equal means– it must contain uniform or
standard characteristics
 ISO stands for The International
Organisation for Standardisation founded
in 1946 and is based in Geneva,
Switzerland

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO Certification
ISO is not responsible for certification,
 Certification is actually done by over 750
accredited certifying organisations in the
world.
 Certification is not mandatory- its
requirement of a client or organisation

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Technical Standards in early times
ISO
Number
ISO 216
Explanation
ISO 838
Punching filing holes into papers
ISO 2108
International Standard Book Numbering
(ISBN)
Identification cards- Physical characteristics
ISO 7810
ISO 7816
Paper sizes
Identification cards Integrated Circuit
cards
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Technical Standards in early times
ISO
Number
Explanation
ISO 9899
C Programming language
ISO/IEC
10026
Open System Interconnection
ISO/IEC
11179
Information technology-metadata registries
ISO 15930
Portable Document format(PDF)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO- two generic standards
ISO 14000 series: This series deals
with Environment Management
System9s.
 ISO 9000 series: Deals with QMS
(Quality Management systems).

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO 9000 series
Objective:
It gives confidence to the management
and its customers, that it is in control of
the way it conducts its business.
It
prescribes what standards the
organisation
should
met,
leaving
organisation free to conduct and organize
their business processes as they wish
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO 9000
 Certification
 The
Certification is valid for 3
years subject to the periodic
assessments by the certifying
bodies like British Standard
Institute, Det Norske Veritas,
Bureau Veritas (BVQI) etc
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO 9000:2000
Provides the starting point for
understanding the standard and
it defines the fundamental
terms and definitions used.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO 9001:2000
This deals with the requirements i.e understanding
the standards for Quality management systems. It
stresses on :
1. Managing and measuring performance in all
spheres in the organisation.
2. The
need for a documented quality
management system in all areas like quality
manuals, human resources, purchasing etc. It
enables each individual organisation to decide
on the minimum amount of documentation
required to demonstrate the effective planning,
operation & control of its processes.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO 9001:2000
Based on Eight Management Principles
1. Customer focus
2. Leadership
3. Involvement of people
4. Process Approach
5. System Approach to management
6. Continual Improvement.
7. Factual Approach to Decision making
8. Mutually beneficial Supplier relationship
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO 9004:2000
This provides guidance on the
Quality management systems and
concepts for continuous process
improvements
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO 9126- Software Quality Model
This is an international Standard for
evaluation of quality of software products
which include source code, executables,
architectural descriptions etc.
This standard is divided into 4 parts
ISO 9126-1
ISO 9126-2
ISO 9126-3
ISO 9126-4
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO 9126-1 Quality Model
This part classifies the software quality in a
structured set of six attributes and several
subrelated sub attributes as follows:
Functio Are the required functions
nality
available in the software?
Sub
Suitability, Accuracy,
attribute Interoperability, Compliance,
s
Security
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
2.
Is the software capable enough
Reliability to maintain its level of
performance?
Sub
Maturity, Recoverability, Fault
Attributes Tolerance
3. Usability
Is the software easy to use?
Sub
Attributes
Learnability, Understandability,
Operability
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
4. Efficiency
Does the software use the least
amount of resources?
Sub-Attributes Time behaviour and resourse behaviour
5.Maintainabilit Can the software be modified easily?
y
Sub-Attributes Stability, Analysability, Chargeability,
Testability
6. Portability
Can the software be easily transferred
from one environment to another?
Sub-Attributes Installability, Replaceability, Adaptability,
Conformance
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
ISO 9126-2 External Metrics: This
metrics apply to running software
ISO 9126-3 /internal Metrics: These are
statistics that do not rely on software
execution
ISO 9126-4 Quality in Use matrics
These are available only when the final
product is used in real life conditions
Ideally the internal quality determines the
external quality and external quality
determines the quality in use.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
The Software Capacity Maturity
Model (CMM)
Initially developed by The Software Engineering
Institute of Carnegie Mellon University in 1986.
 The Project was funded by the US department
of Defence, in order to establish

standards for excellence in software
engineering.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CMM
Soon going to release:
ISO/IEC 25001:2007- software engineeringSoftware product Quality Requirements
and evaluation (SQuaRE)
ISO/IEC 25030:2007: Software engineeringSoftware product Quality Requirements
and
Evaluation
(SQuaRE)Quality
requirements
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CMM- Assumption
The basic Assumption of CMM is
that the quality of the software
product is a direct function of the
associated
development
and
maintenance processes.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CMM- Application
It is used by
organisation to:
the
software
development
Identify best practices required to assist them
in increasing the maturity of their processes
and
2. Develop the means to graduate towards a
culture of excellence in software engineering
and management, in order to achieve their
goals.
1.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Definition- Sourcing Processes
The procurement practices of an organisation
in order to find, evaluate and engage vendors of
goods and services are called Sourcing
Processes. It involves several activities
 Timely identification of assets
 Evaluation of product cost, performance and
delivery
 Quality needs
 Contract administration, guarantee.
 Reduction of vendor related costs

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Outsourcing
•
•
•
Contractual agreement to hand over control of part or
all of the functions of the IS department to an external
party
Reasons for outsourcing:
 Desire to focus on core activities
 Pressure on profit margins
 Increasing competition that demands cost savings
 Flexibility with respect to organization
Variants : Out- tasking , Co-sourcing
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
OUTSOURCING
•
Services which can be outsourced:
 Data entry
 Design and development
 Maintenance of existing applications
 Conversion of legacy applications to new
platforms
 Operating the help desk or call centre
 Operations processing
Data centre operations or maintenance
Back up operations
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
OUTSOURCING
•
•
Advantages of Outsourcing:
 Economies of scale
 Outsourcing vendors are more effective and
efficient
 Outsourcing vendors are more experienced with
wider array of problems, issues and techniques
Disadvantages/Risks of Outsourcing:
 Loss of internal IS experience
 Costs exceeding customer expectations
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
OUTSOURCING
•
Disadvantages/Risks of Outsourcing (continued):
 Loss of control over IS
 Vendor failure
 Deficient compliance with legal requirements
 Lack of loyalty toward customer
 Difficulty of reversing or changing outsourced
arrangements
 Disgruntled customers or employees
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
OUTSOURCING
•
Controlling the disadvantages/risks:
 Establish measurable & shared goals and rewards
 Use multiple suppliers
 Perform reviews
 Implementing short term contracts
 Ensuring adequate access and security controls
 Ensuring damage indemnification clause in contracts
 Adequate address of BCP and DRP measures
 Ensuring right to audit
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
OUTSOURCING
•
Steps in IS audit of Outsourcing:
 Review of contract and service level determined
 Review service provider’s documented procedures
 Review the monitoring process for compliance with
terms of SLA
 Check the compliance with cross-border legislation
 Check compliance of access control procedures and
security controls by the employees of service
provider
 Check the process of escalation in case of violation
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Personnel management
•
Personnel management relates to polices and
procedures:
Hiring Policies
 Promotion
Training
Scheduling and Time Reporting
 Performance Evaluation
Employees Handbook
 Termination
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTHIRING POLICIES
•
•
Hiring practices are important to ensure effective and
efficient staff is chosen and compliance with legal recruitment
requirements.
Hiring Policies should include:
 Background checks
 Confidentiality agreements
 Formal documented job specification
Recruitment mix – internal/external. Internal is
important to maintain high morale and external is
important for inducting new knowledge.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTHIRING POLICIES
 Non-compete agreements
 Conflict of interest agreements
 Training of Employees
 To address Control risks of Hiring:
o Staff unsuitability for Job
o Reference checks may not be carried out
o Temporary staff and third party staff risks
o Lack of awareness of confidentiality
agreements
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTIndoctrination

These programs for staff are normally
given on or soon after joining in order to
ensure that the staff is made aware of the
organisation corporate culture and code
of conduct.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTIndoctrination
The program should explain:
 The organisation policies and procedures
 Security policies and procedures
 Employer expectations, company
exceptions, employees benefits etc and
overtime rules.
 Prohibition of outside employment
 Performance appraisal process
 Emergancy procedure in case of fire etc
 Disciplinary proceddings

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTPROMOTION POLICIES
•
Promotion policies should fair and understood by the
employees.
• Policies should be based on
•
 Objective criteria
 Fair
 Applied consistently
IS auditor to ensure – well defined policies and
procedures for promotion & organization’s adherence.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTTRAINING
•

Regular training is important, particularly for IS
professionals due to rapid change of technology
and
 products
• Training ensures effective and efficient use of
resources
• Training to cover general management, project
management
 and technical aspects
• IS auditor to ensure :
 Training program covers all essential aspects
 Training is ensured across to all departments
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTTRAINING
 Newly
joined employees are trained with in
specified time.
 Consistent awareness regarding key aspects of
security policy
 Proper maintenance of minutes of training
programs
 Ensuring improvement based on feedback
forms
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTTRAINING- Secured Networks
•
•
•
•
•
Pls do not keep any un-solicited Files in your PC or
Shared Folders.
Pls do not download/install any unlicensed/freeware
software without proper approvals.
Do not keep any confidential data in the shared
folders.
Pls do not use Thumb Drives/Mini Hard Disks
without the permission of IT.
Keeping Songs, Personal Photographs, Personal
Video Files in the PCs/Laptops/Shared Drives is
strictly not allowed.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTTRAINING- Secured Networks
•
•
•
•
•
•
•
Avoid Keeping business unethical files in your PC/
Laptops (film songs, personal video clips, personal
Photographs, etc.
Avoid downloading share/ freebies from Internet
and install.
Avoid installing unlicensed software/ driver files in
your PC/ laptop.
Avoid sharing of passwords among your friends.
Don’t use one User ID in multiple systems unless
authorized after submission of SOD.
Avoid misuse of data/ sharing of data with external
people without approval.
Avoid opening Mail attachments from unknown
sources
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTSCHEDULE AND TIME REPORTING
•
•
•
•
Scheduling provides for more efficient
operation and use of computing resources
Time reporting facilitates monitoring of
Scheduling
Time reporting – excellent tool for IT
Governance : Helps in cost allocation and
KGI and KPI measurement
Provides basis for manpower planning
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTPERFORMANCE EVALUATION
•
•
•
•
Most important after Training
Process should be objective and neutral
Helps to gauge employee aspirations and
satisfaction & identify problems
Should be extensively used for
identifying developmental/ training needs
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTEMPLOYEE HANDBOOK
•
Employee handbook should contain:
 Security policies and procedures
 Company expectations
 Employee benefits
 Vacation policies
 Overtime rules
 Emergency procedures
 Disciplinary actions for : excessive leave, breach
of
confidentiality and/or security
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTEMPLOYEE HANDBOOK
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTVACATION POLICIES
•
•
•
Reduces the opportunity to commit
improper or illegal act by employee
Opportunity for others employees to learn
Re-energize the employee
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
PERSONNEL MANAGEMENTTERMINATION POLICIES
•
•
Written termination policies with clearly defined steps
Should definitely include :
Return of all access keys, ID cards and badges
Deletion/ Revocation of login IDs and passwords
Notification to appropriate staff and security
personnel
 Arrangements of final pay routines
 Performance of termination interview
 Return of all company property
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
DOCUMENTATION PROCESSES
Documentation is an important factor
affecting the time taken to complete a
project.
 Also to ensure that processes are
effective and efficient
 ISO 27001 and ISO 9001
 Legal, regulatory and contractual
requirements

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
DOCUMENTATION PROCESSES
It should exist for the primary functions
within the IS enterprise
 IS operations
 System Software
 H/w and s/w acquisition and maintainance
 Application s/w
 Management reporting
 Physical and logical reporting
 Time reporting
 Short and Long term planning
 Quality processes

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
MANAGEMENT
STRUCTURES
PROJECT
MANAGEMENT
LINE
MANAGEMENT
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
IS MANAGEMENT STRUCTURE
•
Two types of management structure
 Project Management Structure :
o Created to accomplish specific project
o Specific tasks and deliverables
o Specific start and end time
o Staff can be drawn from Line management structure
o IS auditors may be included for better controls and expertise
 Line management structure
o Responsible for regular business processes and operations
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Project Management
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
LINE MANAGEMENT
STRUCTURE
•
It normally deals with the daily routine
functions which are not related to projects.
• The main aim of IS management subsystem is to
ensure that the development, implementation ,
operation, and maintanance of the Information
Systems proceed in a planned and controlled
manner
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
LINE Management
Top Management /
Board of Directors
IS Management /
Chief Information
Officer
Application
Information
Processing (IP)
Manager
Systems
Development
Manager
Application
Systems
Analysts
Application
Programmers
DA/
DBA
Quality
Assur
Security
Computer
Operations
(See below)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Roles performed by Personnel in IS
department
CIO(Chief Information Officer)
 Roles and Responsibilities
 The CIO reports to the Chief Operating
Officer or the Board of Directors
 He is the overseer of all the IT activities
 He is not involved in day to day activitieshe focuses on Business, IT planning and
strategy.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CIO(Chief Information Officer)
Controls:
 Regular interface with the BOD
 Training and other appropriate HR
controls
 Documentation of work
 Access should be granted on “need to
know”, “need to do” basis

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CIO(Chief Information Officer)
Risks
Inadequate interface with the top
management may result in the loss of
alignment with business and IT processes.
 This position may give him unrestricted
access to the system
 Inadequate background checking and
performance review may bring in
uncontrollable risks.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Application System Development
Manager (ASDM)
Roles and responsibilities
To oversee the work of:
1. Application systems analyst
2. Application programmers, who design
develop and maintain new or existing
application programs

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Application System Development
Manager (ASDM)
Controls:
 Employ a competent and trusted person
by deploying the HR controls
 Regular interface with the CIO
 His work should be documented and
subject to regular reviews
 Access should be granted on a on “need
to know”, “need to do” basis

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Application System Development
Manager (ASDM)
Risks
 Inadequate communication with the CIO
may result in the loss of effectiveness and
efficiency
 Work may have not been documented
and subject to regular reviews
 Access may have been granted without
reference to his job needs

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Application System Analysts
Roles and responsibilities
 Responsible for designing the application
systems based on User specifications
 It results in the development of functional
specifications and other high level systems
design documents required by the
application programmers

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Application System Analysts
Controls:
 Employ a competent and trusted person
by deploying the HR controls
 His work should be documented and
subject to regular reviews
 Access should be granted on a on “need
to know”, “need to do” basis

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Application System Analysts
Risks
 Inadequate communication with the CIO
may result in the loss of effectiveness and
efficiency
 Work may have not been documented
and subject to regular reviews
 Access may have been granted without
reference to his job needs

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Application System Programmers
Roles and Responsibilities
 To develop new application systems
 Maintain the existing production systems
based on the design made by the
application systems analyst.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Application System Programmers
 Controls
 Employ a
competent and trusted person by
deploying the HR controls
 He should not have access to live programs
and data
 he should work in test only environment
 he should not be allowed to have any
change control duties that would enable him
to say, modify a program and launch it in the
live environment without going through
change controls like quality control, security
and end user sign off.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Application System Programmers
Risks
The main risk are the manipulation of live
programs and the data in order to
perpetrate fraud

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Data Management


Data Administrator(DA)
Database Administrator(DBA)
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Data Administrator
Roles and Responsibilities:
 The role may be found in large IT
environments only
 He is responsible for the long term
planning of the data architecture and
management of data.
 It is basically a policy making and
administrative role.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Data Administrator
The DA functions are to:
 Undertake strategic data planning,
determining user needs
 Specifying validation criteria for data
 Specifying new conceptual and external
schema definitions
 Specifying retirement policies for data
 Determining end user requirements for
database tools, testing and evaluating end
user database tools

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Data Base Administrator
Roles and responsibilities:
 Define, manage, create and retire the data
 Specify and change the physical data
definition
 Make the data available to the users
 Service the end user needs
 Maintain the database integrity
 Monitor database operations
 Set up new installations, perform upgrades
and migration

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Data Base Administrator
Select and implement database optimisation tools.
Test and evaluate programmer and optimisation
tools
 Implement database definition controls, access
controls, update controls and concurrency
controls
 Monitor database usage, collect performance
statistics and tune the database
 Define and initiate backup and recovery
processes and procedures
 Ensure security of the data
 Mediate between users in the case of conflicting
requirements


CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
DA and DBA
Controls
 Separate the duties of DA and DBA
wherever possible
 The DBA’s job profile and activities should
be approved by the management
 Access logs should be reviewed by an
independent person
 The use of the database tools should be
subject to defective controls
 Employ a competent and trusted person by
deploying the HR controls

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
DA and DBA
Controls
 He should be given appropriate training
in the latest DBMS tools and systems.
 He should not have any application
programming or end user responsibilities
 He should be prevented from accessing
live data in the databases

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
DA and DBA
Risks
The DBA is a very technical person who
can use the tools to access and modify
live data and programs in order to
perpetrate a fraud

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Quality Management
It includes:
 Formulate quality goals
 Implement standards
 Monitor, processes, reports and train
users
 Suggests programs for obtaining
improvement in the processes

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Quality Management
Roles and Responsibilities
a. Quality assurance manager
b. Quality Control Manager

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Quality Management
Controls
 Competent and trusted person
 Appropriate training
 He is a checker and not maker
 Report to CIO

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Quality Management
Risks
There will be impairment in quality
processes if:
 a person is allowed to carry out a quality
review of his own work
 Incompetent person are recruited due to
inadequate HR controls
 Quality management do not have
independence in their reporting function

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Security management
Roles and responsibilities:
Top management should demonstrate their
commitment to security by developing an
Information security management policy
within the characteristics of the Business,
its assets, its technology and the
organisation.
This includes DRP’s

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Security management
Controls
 He should report to CIO directly in order
to maintain his independence. In small
organisation where this is not possible, he
may report to the operations manager, in
which case some compensation controls like
monitoring and awareness shall apply.
 A competent and trusted person
 Training
 He is a Checker not the maker

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Security management
Risks
There will be an impairment in the security
management process if:
 the security manager is allowed to carry out
conflicting work like application
programming
 Imcompetent or dishonest persons may be
recruited due to inadequate HR controls
 The security manager does not have
independence in the reporting function.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Technical Support Manager
Roles and Responsibilities:
He is responsible for seeing the following
technical support:
 Systems analyst
 Systems Programmer
 Systems Administrator
 Network Administrator
 End user support manager
• Controls:
• Competent person
• Risks:
• Incompetent or Dishonest persons

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Systems Analyst
Roles and Responsibilities:
 Designing of Operating system
 Responsible for designing System
Software
 They interpret users needs and develop
according to the users requirement.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Systems Analyst
Controls:
 Competent and trusted person
 Activity to be recorded in the computer
logs
 Need to know , need to do basis
• Risks:
 Inappropriate HR controls
 If computer logs are not enabled, any
breach of security will remain undetected.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Systems Programmer
Roles and Responsibilities
 Programers are responsible for
developing and maintaining the operating
systems and systems software designed
by the system analyst.
 They have complete access to the system
libraries

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Systems Programmer
Controls
 Competent and trusted persons
 Computer logs
 Need to know/ Need to do
 User of domain administration and
superuser accounts should be tightly
controlled and monitored

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Systems Programmer
Risks
 Inappropriate HR controls
 If computer logs are not enabled, any
breach of security will remain undetected

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Systems Administrator
Roles and Responsibilities
Every large organisations have LANs , each LAN will
require an administrator. The responsibilities and
function includes:
 creation and deletion of user accounts
 installation and maintanance of systems software.
Taking proactive virus prevention measures
 Allocating storage space
Maintenance of multi user computer systems
 Backups
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Systems Administrator
Controls:
 Employ competent and trusted person
 Computer logs
 Need to know/need to do basis
 He should not having any application
programming duties

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Systems Administrator
Risks
 Inappropriate HR controls as discussed
earlier may lead to employment of
persons who may be incompetent
 If the computer logs are not enabled than
any breach of security will remain
undetected

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Network Administrator
Roles and Responsibilities
 Responsible for the entire n/w of the
organization which may include LAN’s,
WAN’s and wireless communication
 N/w performance management, remote
access etc
 Technical and Administrative control over
the LAN

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Network Administrator
Controls
 Employ competent and trusted person
 Computer logs
 He should not having any application
programming duties

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Network Administrator
Risks:
 Inappropriate HR controls as discussed
earlier may lead to employment of
persons who may be incompetent
 He may breach the confidentiality,
integrity and availability of the data by
eavesdropping on the communication
between two nodes on the network or by
denial of service attack

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
End User Support Manager
 Roles
and responsibilities
Responsible for the liaison between
the end users and the IS department,
including the management of
helpdesk
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
End User Support Manager
 Controls
 Users complaints
should be alloted a
complaint number.
 The complaint should be forwarded to the
appropriate engineer
 All unresolved problem should be followed
up and closed by an independent person
 Competent and trusted staff should be
employed
 Complaints should be periodically
summarised
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
End User Support Manager
Risks
 Inappropriate HR controls as discussed
earlier may lead to employment of
persons who may be incompetent
 Computer logs if not enabled , the
resolution, frequency and nature of
complaints will remain undetected

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Operations Manager
Roles and Responsibilities
 Responsibility for computer operations
personnel including computer operators,
librarian, data entry personnel and
maintainance operators.
 They are also responsible for the physical
and data security of the department

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Operations Manager
Controls
Competent and trusted persons should be
employed
Only operations personnel should have
access to the operations department
Need to know/ need to do access principle
will apply
All operations and programming functions
should always be separated

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Operations Manager
Risks
 Incomoetent or untrustworthy persons
 Unauthorised access to the operations
centre may result in Breach of security

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Computer Operators
Roles and responsibilities
 They are responsible for schedulling and
allied activities in order to run the
computer system effectively and
efficiently.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Computer Operators
Controls & Risks
Same as Operations manager discussed
above

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
LIBRARIAN
Roles and Responsibilities
He is the stock keeper of all data and
program files kept on storage media like
tapes and hard disks.
He is responsible for recording,
issue,receipt and maintanance of
computer files and the data.

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
LIBRARIAN

Controls:
Competent and trustworthy person
 keep a log of all files
 Provide for appropriate physical and
environmental controls in order to protect
the data from damage
 File Retention are maintained for all files
 Segregate sensitive files
 Onsite and offsite backups
 Files are up to date and have internal and
external file headers
 Software safety and license

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
LIBRARIAN
Risks
Incompetent or trustworthy staff
 Unauthorized access to the library may
result in breach of security

CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
CHECK

This stage involves analysing the data,
monitoring trends and comparision of
Actual Results against the Plan results
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Act

The purpose in this phase of the Deming
Cycle is to apply necessary actions in
order to bring about necessary
improvements. This may involve repeating
the PDCA cycle with changes , adopting
the change or abondoning it and restart
the planning Process.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Chapter 3
Auditing Information
Systems Organisation &
Management
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Auditing IS O & M
Checklists
Create a checklist of the areas to be covered which
leads
the IS auditor to ask the following questions:
•
Who
•
What
•
When
•
Where
•
Why
•
How
•
Show me
•
Tell me
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Auditing IS O & M
Checklist – Benefits
Determines the sample relevant to the audit.
Formalises the audit process by defining the audit
procedures.
Creating the checklist requires some amount of
research which helps in the auditor’s understanding
of the processes.
Helps in maintaining the pace of the audit.
Assists in keeping the audit objectives clear.
Acts as a historical record which can be used as an
internal cross reference to the audit report.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Auditing IS O & M
Checklist – Benefits
◦ Reduces the auditor’s workload.
◦ Assures a degree of auditor professionalism.
◦ Ensures that the auditor is aware of the processes to
be audited.
Checklist – Disadvantages
◦ May become a tick list of YES/NO answers only.
◦ If the process is not in the checklist it may not be
covered during the audit.
◦ It may reduce initiative and proper analysis of the
processes.
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Auditing IS O & M
Read / Review Documentation
• IT Strategies , Plans, Budgets
• Security Procedures
• Organisation Charts
• Paper Job Descriptions
• New Projects
• New HW/SW
• HRD Policies etc.
• Operations Manuals
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Auditing IS O & M
Read / Reviewing Contractual
Commitments
•Development of contract requirements
•Contract bidding process
•Contract selection process
•Contract acceptance
•Contract maintenance
•Contract compliance
•Legal Clearance
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Auditing IS O & M
Inspect , Interview and Observe processes
and personnel in the performance of duties
• Actual Functions
• Security Awareness
• Reporting Relationships
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Auditing IS O & M
Test
•Policies
•Processes
•Procedures
•Paper / electronic records to collect and evaluate
evidence
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Chapter 2 Q n A
3. Which of the following statements is
FALSE?
(a) Management is the art of getting things done in
order to meet the objectives of the organisation
(b) Successful management is built on empowering
people with responsibility and authority
(c) Management must determine the goals of the
organisation based on customer needs
(d) Effectiveness precedes efficiency in successful
management
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Chapter 2 Q n A
4. Which of the following statements is
FALSE in connection with planning?
(a) It involves deciding in advance what should
be done amongst other things
(b) It is an action statement
(c) It should be entrusted to the IS steering
committee only
(d) It is best practice applicable to the private
sector only
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Chapter 2 Q n A
5. Which of the following statements is
FALSE in connection with the IS steering
committee?
(a) It oversees IS activities
(b) It should be chaired by a non-technical
board member
(c) It should have representation by user
management
(d) Its meetings should be minuted
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Chapter 2 Q n A
6. Which of the following statements is
FALSE in connection with strategic
planning?
(a) Such plans have a time span of less than one
year or one business cycle
(b) The projects to be completed are clearly
defined
(c) The plans have a strong link with
organisational goals
(d) The plans are approved before
implementation
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Thank You
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
See you tommorrow.. Have a nice evening
CA.Shweta Ajmera, M.Com,CA,DISA(ICAI)
Download