Information Technology (IT) & The Updated COSO Framework Phil Gesner, CPA.CITP, CISA Audit Manager and IT Auditor / Consultant Ocala, FL Nature Coast Florida Government Finance Officer’s Association | October 16, 2013 Disclaimer The views expressed by the presenters do not necessarily represent the views, positions, or opinions of the presenter’s respective organizations or any associated organizations cited. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client or attorney-client relationship. 2 COSO Considerations • Changed (from implicitly to explicitly recognizing technology’s role in internal control) due to greater use and dependence (reliance) on technology – Use of technology continues to grow – Extent of technology used in organizations continues to increase and evolve • Recognizes that management judgment (decisions) may be based on the use of and dependence on technology. • Outsourcing continues to grow – Business Processes (Payroll, Payables, Pension and Benefit Management, Investment Management) – Technology Activities supporting the Business Processes • Procure, manage, and maintain previously internally managed technology systems 3 COSO’s Definition of “Technology” • May be referred to as: – Management Information Systems (MIS) – Information Technology (IT) – Various other Terms • Technology is the use of a combination of automated and manual processes, and computer hardware and software, methodologies, and processes. – Very Generic Definition – as Technology continually evolves (ie. cloud computing and social media) 4 COSO’s Definition of “Technology” • Technology environments vary in size, complexity, and extent of integration. – Large, centralized, and integrated systems – Small, decentralized, and independent systems • May involve real-time processing environments that enable immediate access to information, including mobile computer applications that can cut across many systems, organizations, and geographies. 5 COSO’s Definition of “Technology” • Technology enables organizations to process high volumes of transactions, transform data into information to support sound decision making, share information efficiently across the entity and with business partners, and secure confidential information from inappropriate use. • In addition, technology can allow an entity to share operational and performance data with the public. 6 COSO’s Definition of “Technology” • Technology innovation creates both opportunities and risks. – Opportunities: • Enable the development of new business markets and models, • Generate efficiencies through automation, and • Enable entities to do things that were previously hard to imagine. – Risks: • Increased complexity, which makes identifying and managing risks more difficult. 7 Risk | Complexity of IT Security Like Ogres And Onions Data & Business Processes IT Security Has Layers IT Security Also Involves People (Employees); therefore, Training is Critical 8 IT Security Protects the Data and Business Process Data & Business Processes Controls should be in place to protect the data and business processes. • Data is an organizational asset • Value of Data • May not be readily ascertainable • Not recorded on Books • Varies Depending on Perspective • Your Organization • Other Organizations • Employees • External Individuals • Vendors • Your garbage is another individual’s or organization’s treasure!!!! 9 Source: AICPA Information Management and Technology Assurance (IMTA) Section. IT Audits and What to Pay Attention To. The CITP Body of Knowledge Series Webcast. 2013 10 Source: AICPA Information Management and Technology Assurance (IMTA) Section. IT Audits and What to Pay Attention To. The CITP Body of Knowledge Series Webcast. 2013 11 Risk | IT Complexity • The nature and extent of IT risks are dependent on the level of “complexity”. – Generally, as complexity increases, the type and number of potential IT risks increase. – The manner in which IT is used in conducting business also has a direct relationship with the potential IT risks. – Significant changes made to existing systems, or implementation of new system increase the potential IT risks. – Shared data between systems increases the potential IT risks. – Usage of emerging technologies (cloud computing, mobile - BYOD) increases the potential IT risks. – Availability of evidence only in electronic formats increases the potential IT risks. • Including reports Source: AICPA IT Audit Training School 12 Risks |IT Risk Factors for Internal Control Include • Reliance on systems or programs that are processing data inaccurately, processing inaccurate data, or both • Unauthorized access to data that may result in destruction of data or improper changes to data, including the recording of unauthorized or nonexistent transactions or inaccurate recording of transactions • Unauthorized changes to data in master files • Unauthorized changes to systems or programs • Failure to make necessary changes to systems or programs • Inappropriate manual intervention • Potential loss of data or inability to access data as required Source: AICPA IT Audit Training School 13 Applications | Purchased Systems • Commercial Off The Shelf (COTS) and/or configurable systems • Advantages • Generally cheaper for general business use applications • On-going support and maintenance • Disadvantages • Some limitations related to customizations • Vendor dependence • Example: Quickbooks Source: AICPA IT Audit Training School 14 Applications | Configurable Packages • • • • Configurable “mid-tier” system Not as expensive as an ERP System or Custom Developed Application Found in small, mid or large organizations Increased capabilities when compared to Commercial Off the Shelf – Purchased Systems: – Configuration changes – Customizations • Examples: Microsoft Dynamics (Great Plains/Solomon), MAS/90, Navision, Munis, Eden, etc. • Most Prevalent Source: AICPA IT Audit Training School 15 Applications | Enterprise Resource Planning (ERP) System • Integrates all facets of financial processing with operations, marketing, HR • Requires specialized knowledge to setup (usually with the vendor and outside consultants) • Generally, found in large organizations • Very expensive to purchase & maintain • Very complex security • Examples: SAP, JD Edwards, PeopleSoft, Oracle Financials, Lawson, etc. Source: AICPA IT Audit Training School 16 Applications | Custom Developed • Custom Developed Application – those applications that are designed and developed in-house to meet a specific business need for internal use (not resale) • Advantages – Customized to meet specific business need – Independence from vendors • Disadvantages – No outside vendor support – all by on-staff personnel (higher costs) – Often longer deployment times and less controls • Less prevalent, and becoming more so each day Source: AICPA IT Audit Training School 17 Applications | Outsourced • Organization contracts with a third-party service organization for one or all of the following activities: – Development of Application and Underlying Technology – Hosting of Application, Data, and Underlying Technology – Maintenance of Application and Underlying Technology – All or part of a/multiple business process(es) (ie. payroll) and related internal controls Source: AICPA IT Audit Training School 18 Applications | Outsourced • Advantages – Customized and configurable to meet specific business need – Can obtain access to ERP systems at lower costs • May not need to purchase any servers • May not need to hire new IT personnel and may be able to reallocate IT personnel or positions – Dependence on vendor rather than employees • IT third-party service organization is able to replace employees easier than the outsourcing organization Source: AICPA IT Audit Training School 19 Applications | Outsourced • Disadvantages – Dependence on vendor • Requires increased effort to manage vendors and service level agreements (SLA’s) – Service Organization Control (SOC) Reports – See AICPA Website – www.aicpa.org/InterestAreas/FRC/AssuranceAdvisoryServices/Pages/SORHome.aspx • Poor end user experience due to performance bottlenecks – Poor customer experiences could be perceived as organization weaknesses rather than vendor weaknesses – More limited control over application, data, and underlying technology • Examples: Xero Source: AICPA IT Audit Training School 20 Control Environment • Principle 2: The board of directors demonstrates independence from management and exercises oversight of the development and performance of internal control. – Executive management and the board should have an understanding of relevant systems and technology (or appropriate skills and expertise) needed to evaluate the organization’s approach to managing new technology innovations, critical systems, and the opportunities and risks associated with those challenges. • IT Governance Committee • IT Steering Committees • User Groups 21 Control Environment • Principle 3: Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives. – Technology is leveraged as appropriate to facilitate the definition and limitation of roles and responsibilities within the workflow of business. – Management is supported by requisite processes and technology to provide for clear accountability and information flows within and across the overall entity and its subunits 22 Control Environment • Principle 4: The organization demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives. – The organization should ensure that it has appropriately skilled personnel with knowledge of the operation of technology platforms underpinning the business processes. 23 Control Environment • Principle 5: The organization holds individuals accountable for their internal control responsibilities in the pursuit of objectives. – Accountability is driven by tone at the top and supported by the commitment to integrity and ethical values, competence, structure, processes, and technology, which collectively influence the control culture of the organization. 24 Risk Assessment • Principle 6: The organization specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives. • Entity-level risks – Technological—Developments that can affect the availability and use of data, infrastructure costs, and the demand for technology-based service – Internal factors • Technology—A disruption in information systems processing that can adversely affect the entity’s operations 25 Risk Assessment • Principle 8: The organization considers the potential for fraud in assessing risks to the achievement of objectives. – As part of the risk assessment process, the organization should identify the various ways that fraudulent reporting can occur, considering: • Nature of technology and management’s ability to manipulate information – Opportunities (and thereby fraud risks) may increase as a result of: • Turnover in technology staff • Ineffective technology systems 26 Risk Assessment • Principle 9: The organization identifies and assesses changes that could significantly impact the system of internal control. – New Technology—When new technology is incorporated into production, service delivery processes, or supporting information systems, internal controls will likely need to be modified. 27 Control Activities Principle 10: The organization selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels. 28 Principle 10: Selects and Develops Control Activities – When determining what actions to put in place to mitigate risk, management considers all aspects of the entity’s internal control components and the relevant business processes, information technology, and locations where control activities are needed. – Restricted access is especially important where technology is integral to an organization’s processes or business. • Configuring the security in applications to address restricted access can become very complex and requires technical knowledge and a structured approach. – Discussed in more detail under the Security Management Processes section of Principle 11. 29 Principle 10: Selects and Develops Control Activities – Control activities and technology relate to each other: • Technology Supports Business Processes – When technology is embedded into the entity’s business processes, such as robotic automation in a manufacturing plant, control activities are needed to mitigate the risk that the technology itself will not continue to operate properly to support the achievement of the organization’s objectives. • Technology Used to Automate Control Activities – Many control activities in an entity are partially or wholly automated using technology. 30 Technology Supports Business Processes Internal Control Over Financial Reporting (ICFR) Significant Accounts in the Financial Statements Balance Sheet Income Statement Cash Flows Notes Other Disclosures Key Application and IT-Dependent Manual Controls Significant Classes of Transactions / Business Processes Process A Process B Process C Process D Process E IT General Controls • Program Development Assertions • Accuracy Significant Financial Applications Application A Application B Application C •Program Changes •Completeness Objectives •Authorization •Program Operations Significant IT Infrastructure Services •Access Controls Operating System •Control Environment Network / Physical •Segregation of Duties Database Source: IT Control Objectives for Sarbanes-Oxley: The Role of IT in the Design and Implementation of Internal Control Over Financial Reporting, 2nd Edition 31 Technology Used to Automate Control Activities Manual vs. Automated Controls • Manual Control – A control performed manually (not through techcnology) • Automated controls: Control activities mostly or wholly performed through technology (e.g., automated control functions programmed into computer software. – Application Control • A control that occurs automatically, usually through computer systems, based on predefined criteria, circumstances, times, dates, or events. – IT-Dependent Manual Control (Hybrid Control) • Manual controls that are dependent on an automated process to take place. 32 Application Controls Type • Edit checks • Validations • Calculations • Interfaces • Authorizations Character • Embedded • Configurable 33 Technology Used to Automate Control Activities Examples of Application Controls – Computer generated batch control total comparison – Edit and validation checks on information entered into input fields – Master file data look-ups of information entered into input fields – Numeric range controls for data entered into input fields – Data matching – Error checking programs – Computations – Forwarding a transaction to the appropriate person for electronic authorization (using logical Segregation of Duties) 34 Examples of Application Controls Purchasing and Accounts Payable Business Process • Initiate/Authorize (Input) – Application will only accept purchase orders entered for vendors on an approved vendor list (ie. vendors in the vendor master file). – Access to add or modify vendor or vendor information through the purchasing module of the financial application in to the vendor master file (database) is restricted to purchasing department personnel. • Process – Application matches the purchase order, receiving report and vendor invoice before payment can be made (three-way match). – Application automatically selects items for payment based on the due date of the vendor invoice. • Record (Output) – Application automatically posts the payment to the G/L. 35 Example of a IT-Dependent Manual Control Purchasing and Accounts Payable Business Process – Detection: Computer detects a discrepancy between a PO, receiving report & vendor invoice. (automated control) – Investigation/Correction: Clerk reviews and follows-up until discrepancy is resolved. (manual control) – Resubmission: Clerk resubmits reconciled invoice for payment. (manual process) – NOTE: Test both automated and manual controls 36 Automated Control Implications • Software is designed to be used by many organizations with different requirements. • Many features, including controls, are optional or designed with adjustable parameters and thresholds. • End users may have the ability to change system configuration settings. • Segregation of duties when software is maintained by vendor. • Program change responsibilities may be shared between vendor and client. 37 Principle 10: Selects and Develops Control Activities – Most business processes have a mix of manual and automated controls, depending on the availability of technology in the entity. – Automated controls tend to be more reliable, since they are less susceptible to human judgment and error, and are typically more efficient. • Subject to whether technology general controls (Principle 11) are implemented and operating. • The design, implementation, and operating effectiveness of automated controls is dependent on or directly related to the design, implementation, and operating effectiveness of technology general controls. 38 Relationship of Technology General Controls (Principle 11) to Business Process Controls (Principle 10) Automated Controls Manual Controls (Purely) Manual Controls IT-Dependent Manual Controls Application Controls 1. Embedded 2. Configurable Controls Technology General Controls 39 Technology General Controls vs. Application Controls • IT General Controls – Relate to managing change, logical access and other technology general controls, including IT operations applied to individual applications and do not operate at the individual transaction level • Application Controls – Apply to each and every transaction – Reviewed at a “point in time” • “Application and IT general controls go hand-in-hand.” 40 Relationship of Technology General Controls (Principle 11) to Business Process Controls (Principle 10) Automated Controls Manual Controls (Purely) Manual Controls IT-Dependent Manual Controls Application Controls 1. Embedded 2. Configurable Controls Technology General Controls 41 Control Activities Principle 11: The organization selects and develops general control activities over technology to support the achievement of objectives. (Technology General Controls) 42 Principle 11: Technology General Controls • Determines Dependency between the Use of Technology in Business Processes (Principle 10) and Technology General Controls (Principle 11) – Management understands and determines the dependency and linkage between business processes, automated control activities, and technology general controls. • The reliability of technology within business processes, including automated controls, depends on the selection, development, and deployment of general control activities over technology. 43 Relationship of Technology General Controls (Principle 11) to Business Process Controls (Principle 10) Automated Controls Manual Controls (Purely) Manual Controls IT-Dependent Manual Controls Application Controls 1. Embedded 2. Configurable Controls Technology General Controls 44 Technology Supports Business Processes Internal Control Over Financial Reporting (ICFR) Significant Accounts in the Financial Statements Balance Sheet Income Statement Cash Flows Notes Other Disclosures Key Application and IT-Dependent Manual Controls Significant Classes of Transactions / Business Processes Technology General Controls • Technology Infrastructure Control Activities •Security Management Process Control Activities •Change Control Activities •Control Environment Process A Process B Process C Process D Process E Assertions • Accuracy Significant Financial Applications Application A Application B Application C •Completeness Objectives •Authorization Significant IT Infrastructure Services •Segregation of Duties Database Operating System Network / Physical Source: IT Control Objectives for Sarbanes-Oxley: The Role of IT in the Design and Implementation of Internal Control Over Financial Reporting, 2nd Edition 45 Principle 11: Technology General Controls • Technology general controls over the acquisition and development of technology are deployed to help ensure that automated controls work properly when first developed and implemented. • Technology general controls also help information systems continue to function properly after they are implemented. • Technology general controls apply to all technology – – – – – – – IT applications on a mainframe computer; Client/server, Desktop, End-user computing, Portable computer, Mobile device environments; Operational technology • Plant control systems or • Manufacturing robotics. 46 Principle 11: Technology General Controls • The extent and rigor of control activities will vary for each of these technologies depending on various factors, such as the complexity of the technology and risk of the underlying business process being supported. Similar to business transaction controls, technology general controls may include both manual and automated control activities. 47 Principle 11: Technology General Controls Technology Infrastructure Control Activities • Establishes Relevant Technology Infrastructure Control Activities – Management selects and develops control activities over the technology infrastructure, which are designed and implemented to help ensure the completeness, accuracy, and availability of technology processing. • Technology infrastructure includes: – Communication networks – to link technologies to each other and across the organization • Routers, switches, firewalls, etc. – Computing resources for applications to operate • Servers, Desktops, Laptops – Electrical power supply. 48 Principle 11: Technology General Controls Technology Infrastructure Control Activities • Technology Infrastructure – Can be complex – Shared by different business units in an organization – Outsourced to a third-party service organizations (including locationindependent technology services – cloud computing) • Technology changes constantly (3-5 years) • Technology Infrastructure Controls – Batch (mainframe) / real-time (client/server) process scheduling – Problem/incident management – Backup and recovery • Including disaster recovery plans 49 Principle 11: Technology General Controls Security Management Process Control Activities • Establishes Relevant Security Management Process Control Activities – Management selects and develops control activities that are designed and implemented to restrict technology access rights to authorized users commensurate with their job responsibilities and to protect the entity’s assets from external threats. • Sub-processes and control activities over who and what has access to the organization’s technology, including who has the ability to execute transactions. – Protects the organization from inappropriate or unauthorized access/use of system – Supports segregation of duties 50 Principle 11: Technology General Controls Security Management Process Control Activities • Sub-processes and control activities over who and what has access to the organization’s technology, including who has the ability to execute transactions. – Prevents unauthorized use/changes to system protects data and program integrity from malicious intent or a simple error from: • Internal threats – former, disgruntled employees motivated to work against the organization due to greater access and knowledge of the organization • External threats – due to the many potential uses of technology and points of entry and use of telecommunications networks and the Internet, 51 Principle 11: Technology General Controls Security Management Process Control Activities • Authentication control activities – Unique user identifications or tokens are authenticated (checked before access is allowed) against pre-approved list – Technology general control are designed to: • Allow only authorized users on these pre-approved lists • Restrict authorized users to the applications or functions commensurate with their job responsibilities and supporting an appropriate segregation of duties • Control activities are in place to update access when employees change job functions or leave the organization • A periodic review of access rights against the policy is often used to check if access remains appropriate • Access to different technologies (which may be integrated/connected) are controlled 52 Principle 11: Technology General Controls Change Control Activities • Establishes Relevant Technology Acquisition, Development, and Maintenance Process (Change) Control Activities – Management selects and develops control activities over the acquisition, development, and maintenance of technology and its infrastructure to achieve management’s objectives – Provides structure for system design and implementation, outlining specific phases, documentation requirements, approvals and checkpoints 53 Principle 11: Technology General Controls Change Control Activities • Provides appropriate controls over changes to technology – Authorization of change requests – Verification that the organization has a legal right to use the technology in the manner in which the technology is being employed – Review to ensure that the changes are appropriate (aka. testing and quality assurance) – Approval for the changes – Testing results of changes – Implementing protocols to determine whether changes are properly made • Varies depending on the risks (and complexity) of the technology 54 Information & Communication Principle 13: The organization obtains or generates and uses relevant, quality information to support the functioning of internal control. 55 Principle 13: Relevant, Quality Information Used to Support Functioning of Internal Controls • An organization’s information system encompass a combination of people, processes, data, and technology that support business processes managed internally as well as those that are supported through relationships with outsourced service providers and other parties interacting with the entity 56 Principle 13: Relevant, Quality Information Used to Support Functioning of Internal Controls – Information systems developed with integrated, technology-enabled processes provide opportunities to enhance the efficiency, speed, and accessibility of information to users. – Additionally, such information systems may enhance internal control over security and privacy risks associated with information obtained and generated by the organization. Information systems designed and implemented to restrict access to information only to those who need it and to reduce the number of access points enhance the effectiveness of mitigating risks associated with the security and privacy of information. 57 Principle 13: Relevant, Quality Information Used to Support Functioning of Internal Controls – Enterprise resource planning (ERP) systems, association management systems (AMS), corporate intranets, collaboration tools, interactive social media, data warehouses, business intelligence systems, operational systems (e.g., factory automation and energy-usage systems), web-based applications, and other technology solutions present opportunities for management to leverage technology in developing and implementing effective and efficient information systems 58 Principle 13: Relevant, Quality Information Used to Support Functioning of Internal Controls • Quality of Information is Dependent On: – Accessible—The information is easy to obtain by those who need it. Users know what information is available and where in the information system the information is accessible. – Correct—The underlying data is accurate and complete. Information systems include validation checks that address accuracy and completeness, including necessary exception resolution procedures. – Current—The data gathered is from current sources and is gathered at the frequency needed. – Protected—Access to sensitive information is restricted to authorized personnel. Data categorization (e.g., confidential and top secret) supports information protection. – Retained—Information is available over an extended period of time to support inquiries and inspections by external parties. 59 Principle 13: Relevant, Quality Information Used to Support Functioning of Internal Controls • Quality of Information is Dependent On: – Sufficient—There is enough information at the right level of detail relevant to information requirements. Extraneous data is eliminated to avoid inefficiency, misuse, or misinterpretation. – Timely—The information is available from the information system when needed. Timely information helps with the early identification of events, trends, and issues. – Valid—Information is obtained from authorized sources, gathered according to prescribed procedures, and represents events that actually occurred. – Verifiable—Information is supported by evidence from the source. Management establishes information management policies with clear responsibility and accountability for the quality of the information 60 Resources • AICPA’s Information Management and Technology Assurance (IMTA) Interest Area: www.aicpa.org • Located under Interest Areas Tab on AICPA’s Home Page • Sponsor of the Certified Information Technology Professional (CITP) credential which recognizes CPA’s for their ability to leverage technology to effectively manage information while ensuring the data’s reliability, security, accessibility and relevance. • Various Webcasts, Whitepapers, Newsletters, Etc. 61 Resources • Information Systems Audit and Control Association (ISACA): www.isaca.org • Sponsor of the Certified Information Systems Auditor (CISA), Certified Information Systems Manager (CISM), and Certified in Risk and Information Systems Control (CRISC) Exams • IT Governance Institute • Designed COBIT (Control Objectives for Information and related Technology) w/ ISACA, AICPA, and Other Interested Parties to serve as a framework for IT governance and control to fit with and support COSO’s Internal Control – Integrated Framework • COBIT Home Page: www.isaca.org/COBIT/Pages/default.aspx 62 Contact Information Phil Gesner, CPA.CITP, CISA Audit Manager and IT Auditor / Consultant Ocala, FL E-mail: pgesner@purvisgray.com Mobile: 352.642.4357 Company Website: www.purvisgray.com LinkedIn: www.linkedin.com/in/philgesner/ Nature Coast Florida Government Finance Officer’s Association | October 16, 2013