Change Management Audit/Assurance Program ISACA® With more than 86,000 constituents in more than 160 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance. Founded in 1969, ISACA sponsors international conferences, publishes the ISACA Journal®, and develops international information systems auditing and control standards. It also administers the globally respected Certified Information Systems Auditor™ (CISA®) designation, earned by more than 60,000 professionals since 1978; the Certified Information Security Manager ® (CISM®) designation, earned by more than 10,000 professionals since 2002; and the new Certified in the Governance of Enterprise IT™ (CGEIT™) designation. Disclaimer ISACA has designed and created Change Management Audit/Assurance Program (the “Work”), primarily as an informational resource for audit and assurance professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, audit/assurance professionals should apply their own professional judgment to the specific circumstances presented by the particular systems or IT environment. Reservation of Rights © 2009 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written authorization of ISACA. Reproduction and use of all or portions of this publication are permitted solely for academic, internal and noncommercial use, and consulting/advisory engagements, and must include full attribution of the material’s source. No other right or permission is granted with respect to this work. ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL 60008 USA Phone: +1.847.253.1545 Fax: +1.847.253.1443 E-mail: info@isaca.org Web site: www.isaca.org ISBN 978-1-60420-075-1 Change Management Audit/Assurance Program Printed in the United States of America © 2009 ISACA. All rights reserved. Page 2 Change Management Audit/Assurance Program ISACA wishes to recognize: Author Norm Kelson, CISA, CGEIT, CPA, The Kelson Group, USA Expert Reviewers Dinesh O. Bareja, CISA, India Robert B. Brenis, CISA, CGEIT, MCP, PMP, Skoda Minotti, USA Sandeep Godbole, CISA, CISM, CISSP, Syntel, India Jimmy Heschl, CISA, CISM, CGEIT, KPMG, Austria Samuel Chiedozie Isichei, CISA, CISM, CISSP, Protiviti, USA Bharath Nallapu, CISA, PMP, Smith, Nallapu & Associates LLP, USA Kathy A. Rogers, CISA, USA ISACA Board of Directors Lynn Lawton, CISA, FBCS, FCA, FIIA, KPMG LLP, UK, International President George Ataya, CISA, CISM, CGEIT, CISSP, ICT Control SA, Belgium, Vice President Howard Nicholson, CISA, CGEIT, City of Salisbury, Australia, Vice President Jose Angel Pena Ibarra, CGEIT, Consultoria en Comunicaciones e Info. SA & CV, Mexico, Vice President Robert E. Stroud, CA Inc., USA, Vice President Kenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA, Vice President Frank Yam, CISA, CIA, CCP, CFE, CFSA, FFA, FHKCS, FHKIoD, Focus Strategic Group Inc., Hong Kong, Vice President Marios Damianides, CISA, CISM, CA, CPA, Ernst & Young, USA, Past International President Everett C. Johnson Jr., CPA, Deloitte & Touche LLP (retired), USA, Past International President Gregory T. Grocholski, CISA, The Dow Chemical Company, USA, Director Tony Hayes, Queensland Government, Australia, Director Jo Stewart-Rattray, CISA, CISM, CSEPS, RSM Bird Cameron, Australia, Director Assurance Committee Gregory T. Grocholski, CISA, The Dow Chemical Company, USA, Chair Pippa G. Andrews, CISA, ACA, CIA, Amcor, Australia Richard Brisebois, CISA, CGA, Office of the Auditor General of Canada, Canada Sergio Fleginsky, CISA, ICI, Uruguay Robert Johnson, CISA, CISM, CISSP, Executive Consultant, USA Anthony P. Noble, CISA, CCP, Viacom Inc., USA Robert G. Parker, CISA, CA, CMC, FCA, Deloittte & Touche LLP (retired), Canada Erik Pols, CISA, CISM, Shell International - ITCI, Netherlands Vatsaraman Venkatakrishnan, CISA, CISM, CGEIT, ACA, Emirates Airlines, UAE © 2009 ISACA. All rights reserved. Page 3 Change Management Audit/Assurance Program Table of Contents I. II. III. IV. V. VI. Introduction ............................................................................................................................... 4 Using This Document ............................................................................................................... 5 Controls Maturity Analysis ....................................................................................................... 8 Assurance and Control Framework........................................................................................... 9 Executive Summary of Audit/Assurance Focus ..................................................................... 11 Audit/Assurance Program ....................................................................................................... 14 1. Planning and Scoping the Audit.......................................................................................... 14 2. Understanding Supporting Infrastructure............................................................................ 16 3. Identify Change Need ......................................................................................................... 18 4. Production Library Management ........................................................................................ 21 5. Move to Production............................................................................................................. 24 6. Emergency Changes............................................................................................................ 28 7. Change Management Governance ...................................................................................... 32 VII. Maturity Assessment ............................................................................................................... 33 VIII. Assessment Maturity vs. Target Maturity ............................................................................... 35 I. Introduction Overview ISACA has developed the IT Assurance FrameworkTM (ITAFTM) as a comprehensive and good-practicesetting model. ITAF provides standards that are designed to be mandatory and are the guiding principles under which the IT audit and assurance profession operates. The guidelines provide information and direction for the practice of IT audit and assurance. The tools and techniques provide methodologies, tools and templates to provide direction in the application of IT audit and assurance processes. Purpose The audit/assurance program is a tool and template to be used as a road map for the completion of a specific assurance process. The ISACA Assurance Committee has commissioned audit/assurance programs to be developed for use by IT audit and assurance practitioners. This audit/assurance program is intended to be utilized by IT audit and assurance professionals with the requisite knowledge of the subject matter under review, as described in ITAF, section 2200—General Standards. The audit/assurance programs are part of ITAF, section 4000—IT Assurance Tools and Techniques. Control Framework The audit/assurance programs have been developed in alignment with the IT Governance Institute (ITGI) framework, Control Objectives for Information and related Technology (COBIT®)—specifically COBIT 4.1—using generally applicable and accepted good practices. They reflect ITAF sections 3400— IT Management Processes, 3600—IT Audit and Assurance Processes, and 3800—IT Audit and Assurance Management. Many organizations have embraced several frameworks at an enterprise level, including the Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control Framework. The importance of the control framework has been enhanced due to regulatory requirements by the US Securities and Exchange Commission (SEC) as directed by the US Sarbanes-Oxley Act of 2002 and similar legislation in other countries. They seek to integrate control framework elements used by the general audit/assurance team into the IT audit and assurance framework. Since COSO is widely used, it © 2009 ISACA. All rights reserved. Page 4 Change Management Audit/Assurance Program has been selected for inclusion in this audit/assurance program. The reviewer may delete or rename these columns to align with the enterprise’s control framework. IT Governance, Risk and Control IT governance, risk and control are critical in the performance of any assurance management process. Governance of the process under review will be evaluated as part of the policies and management oversight controls. Risk plays an important role in evaluating what to audit and how management approaches and manages risk. Both issues will be evaluated as steps in the audit/assurance program. Controls are the primary evaluation point in the process. The audit/assurance program will identify the control objectives and the steps to determine control design and effectiveness. Responsibilities of IT Audit and Assurance Professionals IT audit and assurance professionals are expected to customize this document to the environment in which they are performing an assurance process. This document is to be used as a review tool and starting point. It may be modified by the IT audit and assurance professional; it is not intended to be a checklist or questionnaire. It is assumed that the IT audit and assurance professional holds the Certified Information Systems Auditor (CISA) designation, or has the necessary subject matter expertise required to conduct the work and is supervised by a professional with the CISA designation and necessary subject matter expertise to adequately review the work performed. II. Using This Document This audit/assurance program was developed to assist the audit and assurance professional in designing and executing a review. Details regarding the format and use of the document follow. Work Program Steps The first column of the program describes the steps to be performed. The numbering scheme used provides built-in work paper numbering for ease of cross-reference to the specific work paper for that section. The physical document was designed in Microsoft® Word. The IT audit and assurance professional is encouraged to make modifications to this document to reflect the specific environment under review. Steps 1 and 2 are part of the fact gathering and pre-fieldwork preparation. Because the pre-fieldwork is essential to a successful and professional review, the steps have been itemized in this plan. The first-level steps, e.g., 1.1, are in bold type and provide the reviewer with a scope or high-level explanation of the purpose for the substeps. Beginning in step 3, the steps associated with the work program are itemized. To simplify the use of the program, the audit/assurance program describes the audit/assurance objective—the reason for performing the steps in the topic area. The specific controls follow and are shown in blue type. Each review step is listed below the control. These steps may include assessing the control design by walking through a process, interviewing, observing or otherwise verifying the process and the controls that address that process. In many cases, once the control design has been verified, specific tests need to be performed to provide assurance that the process associated with the control is being followed. Test objectives are shown in green type. The specific test process follows the test objective. The maturity assessment, which is described in more detail later in this document, makes up the last section of the program. © 2009 ISACA. All rights reserved. Page 5 Change Management Audit/Assurance Program The audit/assurance plan wrap-up—those processes associated with the completion and review of work papers, preparation of issues and recommendations, report writing and report clearing—has been excluded from this document, since it is standard for the audit/assurance function and should be identified elsewhere in the enterprise’s standards. COBIT Cross-reference The COBIT cross-reference provides the audit and assurance professional with the ability to refer to the specific COBIT control objective that supports the audit/assurance step. The COBIT control objective should be identified for each audit/assurance step in the section. Multiple cross-references are not uncommon. Processes at lower levels in the work program are too granular to be cross-referenced to COBIT. The audit/assurance program is organized in a manner to facilitate an evaluation through a structure parallel to the development process. COBIT provides in-depth control objectives and suggested control practices at each level. As the professional reviews each control, he/she should refer to COBIT 4.1 or the IT Assurance Guide: Using COBIT for good-practice control guidance. COSO Components As noted in the introduction, COSO and similar frameworks have become increasingly popular among audit and assurance professionals. This ties the assurance work to the enterprise’s control framework. While the IT audit/assurance function has COBIT as a framework, operational audit and assurance professionals use the framework established by the enterprise. Since COSO is the most prevalent internal control framework, it has been included in this document and is a bridge to align IT audit/assurance with the rest of the audit/assurance function. Many audit/assurance enterprises include the COSO control components within their report and summarize assurance activities to the audit committee of the board of directors. For each control, the audit and assurance professional should indicate the COSO component(s) addressed. It is possible, but generally not necessary, to extend this analysis to the specific audit step level. The original COSO internal control framework contained five components. In 2004, COSO was revised as the Enterprise Risk Management (ERM) Integrated Framework and extended to eight components. The primary difference between the two frameworks is the additional focus on ERM and integration into the business decision model. ERM is in the process of being adopted by large enterprises. The two frameworks are compared in figure 1. Figure 1—Comparison of COSO Internal Control and ERM Integrated Frameworks Internal Control Framework ERM Integrated Framework Control Environment: The control environment sets the tone of an organization, influencing the control consciousness of its people. It is the foundation for all other components of internal control, providing discipline and structure. Control environment factors include the integrity, ethical values, management’s operating style, delegation of authority systems, as well as the processes for managing and developing people in the organization. Internal Environment: The internal environment encompasses the tone of an organization, and sets the basis for how risk is viewed and addressed by an entity’s people, including risk management philosophy and risk appetite, integrity and ethical values, and the environment in which they operate. Objective Setting: Objectives must exist before management can identify potential events affecting their achievement. Enterprise risk management ensures that management has in place a process to set objectives and that the chosen objectives support and align with the entity’s mission and are consistent with its risk appetite. Event Identification: Internal and external events affecting achievement of an entity’s objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management’s strategy or objective-setting processes. © 2009 ISACA. All rights reserved. Page 6 Change Management Audit/Assurance Program Figure 1—Comparison of COSO Internal Control and ERM Integrated Frameworks Internal Control Framework ERM Integrated Framework Risk Assessment: Every entity faces a variety of risks from external and internal sources that must be assessed. A precondition to risk assessment is establishment of objectives, and thus risk assessment is the identification and analysis of relevant risks to achievement of assigned objectives. Risk assessment is a prerequisite for determining how the risks should be managed. Control Activities: Control activities are the policies and procedures that help ensure management directives are carried out. They help ensure that necessary actions are taken to address risks to achievement of the entity's objectives. Control activities occur throughout the organization, at all levels and in all functions. They include a range of activities as diverse as approvals, authorizations, verifications, reconciliations, reviews of operating performance, security of assets and segregation of duties. Information and Communication: Information systems play a key role in internal control systems as they produce reports, including operational, financial and compliance-related information that make it possible to run and control the business. In a broader sense, effective communication must ensure information flows down, across and up the organization. Effective communication should also be ensured with external parties, such as customers, suppliers, regulators and shareholders. Monitoring: Internal control systems need to be monitored—a process that assesses the quality of the system’s performance over time. This is accomplished through ongoing monitoring activities or separate evaluations. Internal control deficiencies detected through these monitoring activities should be reported upstream and corrective actions should be taken to ensure continuous improvement of the system. Risk Assessment: Risks are analyzed, considering the likelihood and impact, as a basis for determining how they could be managed. Risk areas are assessed on an inherent and residual basis. Risk Response: Management selects risk responses–avoiding, accepting, reducing or sharing risk—developing a set of actions to align risks with the entity’s risk tolerances and risk appetite. Control Activities: Policies and procedures are established and implemented to help ensure the risk responses are effectively carried out. Information and Communication: Relevant information is identified, captured and communicated in a form and time frame that enable people to carry out their responsibilities. Effective communication also occurs in a broader sense, flowing down, across and up the entity. Monitoring: The entirety of enterprise risk management is monitored and modifications made as necessary. Monitoring is accomplished through ongoing management activities, separate evaluations or both.. Information for figure 1 was obtained from the COSO web site www.coso.org/aboutus.htm. The original COSO internal control framework addresses the needs of the IT audit and assurance professional: control environment, risk assessment, control activities, information and communication, and monitoring. As such, ISACA has elected to utilize the five-component model for these audit/ assurance programs. As more enterprises implement the ERM model, the additional three columns can be added, if relevant. When completing the COSO component columns, consider the definitions of the components as described in figure 1. Reference/Hyperlink Good practices require the audit and assurance professional to create a work paper for each line item, which describes the work performed, issues identified and conclusions. The reference/hyperlink is to be used to cross-reference the audit/assurance step to the work paper that supports it. The numbering system of this document provides a ready numbering scheme for the work papers. If desired, a link to the work paper can be pasted into this column. Issue Cross-reference This column can be used to flag a finding/issue that the IT audit and assurance professional wants to further investigate or establish as a potential finding. The potential findings should be documented in a work paper that indicates the disposition of the findings (formally reported, reported as a memo or verbal finding, or waived). Comments The comments column can be used to indicate the waiving of a step or other notations. It is not to be used in place of a work paper describing the work performed. © 2009 ISACA. All rights reserved. Page 7 Change Management Audit/Assurance Program III. Controls Maturity Analysis One of the consistent requests of stakeholders who have undergone IT audit/assurance reviews is a desire to understand how their performance compares to good practices. Audit and assurance professionals must provide an objective basis for the review conclusions. Maturity modeling for management and control over IT processes is based on a method of evaluating the organization, so it can be rated from a maturity level of nonexistent (0) to optimized (5). This approach is derived from the maturity model that the Software Engineering Institute (SEI) of Carnegie Mellon University defined for the maturity of software development. The IT Assurance Guide Using COBIT, Appendix VII—Maturity Model for Internal Control, in figure 2, provides a generic maturity model showing the status of the internal control environment and the establishment of internal controls in an enterprise. It shows how the management of internal control, and an awareness of the need to establish better internal controls, typically develops from an ad hoc to an optimized level. The model provides a high-level guide to help COBIT users appreciate what is required for effective internal controls in IT and to help position their enterprise on the maturity scale. Maturity Level 0 Non-existent 1 Initial/ad hoc 2 Repeatable but Intuitive 3 Defined 4 Managed and Measurable 5 Optimized Figure 2—Maturity Model for Internal Control Status of the Internal Control Environment Establishment of Internal Controls There is no recognition of the need for internal control. Control is not part of the organization’s culture or mission. There is a high risk of control deficiencies and incidents. There is some recognition of the need for internal control. The approach to risk and control requirements is ad hoc and disorganized, without communication or monitoring. Deficiencies are not identified. Employees are not aware of their responsibilities. Controls are in place but are not documented. Their operation is dependent on the knowledge and motivation of individuals. Effectiveness is not adequately evaluated. Many control weaknesses exist and are not adequately addressed; the impact can be severe. Management actions to resolve control issues are not prioritized or consistent. Employees may not be aware of their responsibilities. Controls are in place and adequately documented. Operating effectiveness is evaluated on a periodic basis and there is an average number of issues. However, the evaluation process is not documented. While management is able to deal predictably with most control issues, some control weaknesses persist and impacts could still be severe. Employees are aware of their responsibilities for control. There is an effective internal control and risk management environment. A formal, documented evaluation of controls occurs frequently. Many controls are automated and regularly reviewed. Management is likely to detect most control issues, but not all issues are routinely identified. There is consistent follow-up to address identified control weaknesses. A limited, tactical use of technology is applied to automate controls. An enterprisewide risk and control program provides continuous and effective control and risk issues resolution. Internal control and risk management are integrated with enterprise practices, supported with automated real-time monitoring with full accountability for control monitoring, risk management and compliance enforcement. Control evaluation is continuous, based on self-assessments and gap and root cause analyses. Employees are proactively involved in control improvements. There is no intent to assess the need for internal control. Incidents are dealt with as they arise. There is no awareness of the need for assessment of what is needed in terms of IT controls. When performed, it is only on an ad hoc basis, at a high level and in reaction to significant incidents. Assessment addresses only the actual incident. Assessment of control needs occurs only when needed for selected IT processes to determine the current level of control maturity, the target level that should be reached and the gaps that exist. An informal workshop approach, involving IT managers and the team involved in the process, is used to define an adequate approach to controls for the process and to motivate an agreed-upon action plan. Critical IT processes are identified based on value and risk drivers. A detailed analysis is performed to identify control requirements and the root cause of gaps and to develop improvement opportunities. In addition to facilitated workshops, tools are used and interviews are performed to support the analysis and ensure that an IT process owner owns and drives the assessment and improvement process. IT process criticality is regularly defined with full support and agreement from the relevant business process owners. Assessment of control requirements is based on policy and the actual maturity of these processes, following a thorough and measured analysis involving key stakeholders. Accountability for these assessments is clear and enforced. Improvement strategies are supported by business cases. Performance in achieving the desired outcomes is consistently monitored. External control reviews are organized occasionally. Business changes consider the criticality of IT processes and cover any need to reassess process control capability. IT process owners regularly perform self-assessments to confirm that controls are at the right level of maturity to meet business needs and they consider maturity attributes to find ways to make controls more efficient and effective. The organization benchmarks to external best practices and seeks external advice on internal control effectiveness. For critical processes, independent reviews take place to provide assurance that the controls are at the desired level of maturity and working as planned. © 2009 ISACA. All rights reserved. Page 8 Change Management Audit/Assurance Program The maturity model evaluation is one of the final steps in the evaluation process. The IT audit and assurance professional can address the key controls within the scope of the work program and formulate an objective assessment of the maturity levels of the control practices. The maturity assessment can be a part of the audit/assurance report, and used as a metric from year to year to document progression in the enhancement of controls. However, it must be noted that the perception of the maturity level may vary between the process/IT asset owner and the auditor. Therefore, an auditor should obtain the concerned stakeholder’s concurrence before submitting the final report to management. At the conclusion of the review, once all findings and recommendations are completed, the professional assesses the current state of the COBIT control framework and assigns it a maturity level using the sixlevel scale. Some practitioners utilize decimals (x.25, x.5, x.75) to indicate gradations in the maturity model. As a further reference, COBIT provides a definition of the maturity designations by control objective. While this approach is not mandatory, the process is provided as a separate section at the end of the audit/assurance program for those enterprises that wish to implement it. It is suggested that a maturity assessment be made at the COBIT control level. To provide further value to the client/customer, the professional can also obtain maturity targets from the client/customer. Using the assessed and target maturity levels, the professional can create an effective graphic presentation that describes the achievement or gaps between the actual and targeted maturity goals. A graphic is provided on the last page of this document (section VII), based on sample assessments. IV. Assurance and Control Framework ISACA IT Assurance Framework and Standards Change management is included in ITAF. ITAF section 3630—Auditing IT General Controls—refers to the management of software in production and the promotion of software from a test environment into production. ISACA has long recognized the specialized nature of IT assurance and strives to advance globally applicable standards. Guidelines and procedures provide detailed guidance on how to follow those standards. IS Auditing Standard S15 IT Controls, IS Auditing Guidelines G23 System Development Life Cycle (SDLC) Review Reviews and G38 Access Controls, and IS Auditing Procedure P10 Business Application Change Control are relevant to this audit/assurance program. ISACA Controls Framework COBIT is an IT governance framework and supporting tool set that allows managers to bridge the gap among control requirements, technical issues and business risks. COBIT enables clear policy development and good practice for IT control throughout enterprises. Utilizing COBIT as the control framework on which IT audit/assurance activities are based aligns IT audit/assurance with good practices as developed by the enterprise. The COBIT Acquire and Implement (AI) domain addresses good practices for systems development and maintenance. AI6 Manage changes specifically addresses change management: All changes, including emergency maintenance and patches, relating to infrastructure and applications within the production environment are formally managed in a controlled manner. Changes (including those to procedures, processes, system and service parameters) are logged, assessed and authorised prior to implementation and reviewed against planned outcomes following implementation. This assures mitigation of the risks of negatively impacting the stability or integrity of the production. © 2009 ISACA. All rights reserved. Page 9 Change Management Audit/Assurance Program AI6 Manage changes provides the following guidance: AI6.1 Change standards and procedures – Control objective—Set up formal change management procedures to handle in a standardized manner all requests (including maintenance and patches) for changes to applications, procedures, processes, system and service parameters, and the underlying platforms. – Value drivers: - An agreed-upon standardized approach for managing changes in an efficient and effective manner - Changes reviewed and approved in a consistent and coordinated way - Formally defined expectations and performance measurements – Risk drivers: - Inappropriate resource allocation - No tracking of changes - Insufficient control over emergency changes - Increased likelihood of unauthorized changes being introduced to key business systems - Failure to comply with compliance requirements - Unauthorized changes - Reduced system availability AI6.2 Impact assessment, prioritization and authorization – Control objective—Assess all requests for change in a structured way to determine the impact on the operational system and its functionality. Ensure that changes are categorized, prioritized and authorized. – Value drivers: - An agreed-upon and standardized approach for assessing impacts in an efficient and effective manner - Formally defined change impact expectations based on business risk and performance measurement - Consistent change procedure – Risk drivers: - Unintended side effects - Adverse effects on capacity and performance of the infrastructure - Lack of priority management of changes AI6.3 Emergency changes – Control objective—Establish a process for defining, raising, testing, documenting, assessing and authorizing emergency changes that do not follow the established change process. – Value drivers: - An agreed-upon and standardized approach for managing changes in an efficient and effective manner - Formally defined emergency change expectations and performance measurement - Consistent procedure for emergency changes – Risk drivers: - Inability to respond effectively to emergency change needs - Additional access authorization not terminated properly - Unauthorized changes applied, resulting in compromised security and unauthorized access to corporate information AI6.4 Change status tracking and reporting – Control objective—Establish a tracking and reporting system to document rejected changes, communicate the status of approved and in-process changes, and complete changes. Make certain that approved changes are implemented as planned. – Value drivers: © 2009 ISACA. All rights reserved. Page 10 Change Management Audit/Assurance Program - An agreed-upon and standardized approach for managing changes in an efficient and effective manner - Formally defined expectations and performance measurement - Consistent change procedure – Risk drivers: - Insufficient allocation of resources - Changes not recorded and tracked - Undetected unauthorized changes to the production environment AI6.5 Change closure and documentation – Control objective—Whenever changes are implemented, update the associated system and user documentation and procedures accordingly. – Value drivers: - An agreed-upon and standardized approach for documenting changes - Formally defined expectations - Consistent change and documentation procedures – Risk drivers: - Increased dependence on key individuals - Configuration documentation failing to reflect the current system configuration - Lack of documentation of business processes - Failure of updates for hardware and software changes V. Executive Summary of Audit/Assurance Focus Change Management Introduction Change management is the process that ensures that system software (operating systems and supporting applications), application software and configuration files are introduced into production in an orderly and controlled manner. Change management relies upon several other processes, including those for: Systems development methodology (SDM)—The SDM manages applications development and applications programming to ensure appropriate design, testing, programming oversight and user acceptance. It is also used to manage systems software management and configuration. The specific applications and systems software processes may differ, but they should subscribe to similar controls. Systems request process—This process is normally a part of the SDM, and is the formal request for change services. Incident management—This process addresses problem tickets initiated by computer operations (processing errors or program failures), help desk (user-identified processing problems) or other stakeholders. Incidents or problem tickets should be considered unusual occurrences requiring monitoring and follow-up. Information security issues—These issues are generated by information security, operations, help desk or end users. Software library controls—The software libraries are the repositories of the applications programs (source code), configuration files, executable programs (computer executable code), report generators, etc. Access to these repositories must be restricted to authorized individuals and must be monitored for unauthorized access. Software distribution controls—In a distributed infrastructure, software executable programs must be distributed to the down-line computer systems. The definitive control over change management is the promotion to production or move to production process. Once a program has been tested and approved for migration or promotion to the production © 2009 ISACA. All rights reserved. Page 11 Change Management Audit/Assurance Program environment, the program is subject to final approvals and moved to protected production source and executable libraries. The documentation of the change is the change control document, often referred to as a “move to production ticket” or “promotion to production ticket.” This documentation is the final approval for the entry into production. Business Impact and Risk Systems and application software process enterprise data. The enterprise relies on the integrity of these subsystems to operate their applications and to be in alignment with the business’s goals, objectives and instructions. Good-practice change management provides business management with the assurance that only authorized and tested changes to business processes and the supporting infrastructure are implemented. Change management is an essential component of the IT operational infrastructure. Failure to implement good-practice change management may result in: Unauthorized business process changes being introduced into the operations Financial statements being materially misstated Unintended side effects Inconsistent processing results Changes not being recorded and tracked Emergency changes being implemented without adequate oversight, resulting in the introduction of erroneous processes, unauthorized business processes and inefficiencies Lack of priority management of changes Inability to respond effectively to emergency change needs Additional access authorization not being terminated properly Unauthorized changes being applied, resulting in compromised security and unauthorized access to corporate information Failure to comply with compliance requirements Changes not being adequately prioritized or aggregated, resulting in lost productivity, late implementation of required changes, or redundancy Adverse effects on capacity and performance of the infrastructure System or application failure, resulting in lack of availability Reduced system availability Security intrusions Insufficient allocation of resources Objective and Scope Objective—Perform a review of the change management process to provide management with assurance that the process is controlled, monitored and is compliance with good practices. Scope—The review will focus on the program change management processes. It will rely on the system’s development methodology to provide a design, development and testing methodology, and the system’s request and incident management processes to provide input to the change management system. All processes affecting these functions prior to the system’s request or incident/problem ticket entering the change management process are outside the scope of this review. Minimum Audit Skills The IT audit and assurance professional must have an understanding of the good-practice change management processes. Professionals holding CISA certification should have these skills. Technical skills © 2009 ISACA. All rights reserved. Page 12 Change Management Audit/Assurance Program necessary to perform some audit steps may require specific understanding of operating systems environments in use, the library management systems and computer-assisted audit techniques (CAATs). © 2009 ISACA. All rights reserved. Page 13 Change Management Audit/Assurance Program VI. Audit/Assurance Program 1. PLANNING AND SCOPING THE AUDIT 1.1 Define audit/assurance objectives. The audit/assurance objectives are high level and describe the overall audit goals. ME2.1 1.1.1 Review the audit/assurance objectives in the introduction to this audit/assurance program. 1.1.2 Modify the audit/assurance objectives to align with the audit/assurance universe, annual plan and charter. 1.2 Define boundaries of review. The review must have a defined scope. The reviewer must understand the operating environment and prepare a proposed scope, subject to a later risk assessment. 1.2.1 Perform a high-level walkthrough of the change management functions within the enterprise. 1.2.1.1 Determine what change management functions operate within the enterprise. 1.2.1.2 Determine the applications and/or operating environments serviced by the identified change management systems. 1.2.2 Establish initial boundaries of the audit/assurance review. 1.2.2.1 Where multiple change management systems exist, identify proposed change management systems to be within scope. 1.2.2.2 Identify limitations and/or constraints affecting the audit of specific systems. 1.2.2.3 Determine if integrity systems exist to provide assurance that changes made to the systems are reconciled to authorized change tickets from the change management systems. © 2009 ISACA. All rights reserved. Page 14 Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program 1.3 Define assurance. The review requires two sources of standards. The corporate standards, as defined in policy and procedure documentation, establish the corporate expectations. At minimum, corporate standards should be implemented. The second source, a good-practice reference, establishes industry standards. Enhancements should be proposed to address gaps between the two. 1.3.1 Obtain company change management standards, if they exist. 1.3.2 Determine if COBIT or the IT Infrastructure Library (ITIL) or both will be used as a good-practice reference. 1.4 Identify and document risks. The risk assessment is necessary to evaluate where audit resources should be focused. In most enterprises, audit resources are not available for all processes. The risk-based approach ensures utilization of audit resources in the most effective manner. 1.4.1 For the applications and systems identified as potentially being in scope: 1.4.1.1 Identify the change control risks associated with the applications and operating environment. 1.4.1.2 Assess the business risk of each operating environment, based on the applications serviced. 1.4.2 Based on the risk assessment, identify changes to the scope. 1.4.3 Discuss the risks with IT, the business and operational audit management, and adjust the risk assessment. 1.4.4 Based on the risk assessment, revise the scope. 1.5 Define the change process. The initial audit approach is based on the reviewer’s understanding of the operating environment and associated risks. As further research and analysis are performed, changes to the scope and approach will result. 1.5.1 Identify the senior IT assurance resource responsible for the review. © 2009 ISACA. All rights reserved. Page 15 Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Control Activities Information and Communication Monitoring COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO X X X 1.5.2 Establish the process for suggesting and implementing changes to the audit/assurance program, and note the authorizations required. 1.6 Define assignment success. The success factors need to be identified. Communication among the IT audit/assurance team, other assurance teams and the enterprise is essential. 1.6.1 Identify the drivers for a successful review (this should exist in the assurance function’s standards and procedures). 1.6.2 Communicate success attributes to the process owner or stakeholder, and obtain agreement. 1.7 Define audit/assurance resources required. The resources required are defined in the introduction to this audit/assurance program. 1.7.1 Determine audit/assurance skills necessary for review. 1.7.2 Estimate the total resources (hours) and time frame (start and end dates) required for review. 1.8 Define deliverables. The deliverable is not limited to the final report. Communication between the audit/assurance teams and the process owner is essential to assignment success. 1.8.1 Determine the interim deliverables, including initial findings, status reports, draft reports, due dates for responses and the final report. 1.9 Communications The audit/assurance process is clearly communicated to the customer/client. 1.9.1 Conduct an opening conference to discuss the review objectives with the executive responsible for operating systems and infrastructure. 2. UNDERSTANDING SUPPORTING INFRASTRUCTURE 2.1 Incident management system The incident management system (often referred to as the problem tracking system) feeds the change management system with requests resulting from system interruptions or user- DS10.4 © 2009 ISACA. All rights reserved. Page 16 Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO discovered issues. 2.1.1 If an audit of the incident management system has been performed previously, obtain the work papers from that audit. 2.1.1.1 Review the previous findings and gain an understanding of the incident management system and control issues that may affect the change management process. 2.1.2 If a prior audit has not been performed or the environment has changed significantly, obtain an understanding of the feeds from the incident management system. 2.1.2.1 Determine if the feed is automated, directly interfacing with the change management system. 2.1.2.2 Based on the review, determine if further investigation is required or if the scope of change management will assume validity of the incident/problem ticket. 2.2 Program library management The program library management process controls access to and documentation of the program source code and configuration files. AI3.2 AI7.8 DS5.7 X X AI3.2 AI7.8 DS5.7 X X 2.2.1 If prior assurance work has included a review of the program library management system, obtain and review the work papers and follow up on the findings. 2.2.2 If no prior assurance work has been performed, obtain documentation and descriptions of the various program library management systems in use within the scope of the application/system software included in the audit. 2.3 Executable library security The executable libraries include the compiled versions of the programs. This code is used by the computer to process the data. The executable library will have similar controls as the program library; however, it will have the added requirement that the program and executable libraries must be synchronized (the program stored in the program library must, when compiled, generate the same executable as the program stored in the executable library). © 2009 ISACA. All rights reserved. Page 17 Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO Reference Issue HyperCrosslink reference 2.3.1 Obtain the documentation describing how executable programs are stored on the systems within the scope (operating systems store the programs differently). 2.3.2 If an outside vendor provides patches or executable programs to the enterprise without providing the source, determine the distribution process for these programs. 2.4 Distributed executable distribution system Similar to the executable library, in a distributed operating environment, the programs are compiled centrally, but the executables are distributed to the various processing locations. 1. AI3.2 AI7.8 DS5.7 X 2. 2.4.1 Obtain the documentation describing how distributed systems receive the executable programs from the central programming location. 2.5 Systems development methodology This methodology addresses the planning, design, development and testing of new and updated software. Since systems requests resulting from the systems development methodology are within scope, it is necessary to obtain an understanding of the request process. 3. PO8.3 2.5.1 Obtain the documentation for the systems development process, including systems requests, evaluation of the project, risk assessment, resource allocation, testing and program quality assurance. 2.5.2 Obtain the documentation for change management relating to configuration management, including change requests, evaluation of the effect of the change on production systems, risk assessment, resource allocation, testing and system quality assurance. 3. IDENTIFY CHANGE NEED Audit/assurance objective: Only changes that are authorized, evaluated and prioritized and the resources required should enter the change process. 3.1 Control: Management classifies, reviews and approves change requests. This control ensures that management has considered and approved the changes in the queue. 3.1.1 Obtain the enterprise’s standards, procedures and guidelines for identifying, classifying and approving change requests. © 2009 ISACA. All rights reserved. Page 18 X X X X X 4. 5. 6. Comments Change Management Audit/Assurance Program 3.1.1.1 Information should be obtained by interviews, observation and reviewing documentation. 3.1.1.1.1 Determine if a process exists to classify change requests as an infrastructure or application change. 3.1.1.1.2 Determine if a process exists to perform a risk assessment focused on the impact of the change on other systems or applications. 3.1.1.1.3 Determine if there is a process to perform an impact analysis on changes to determine the effect the change would have on the business process’s integrity and availability. 3.1.1.1.4 Determine if there is a process for performing an analysis of any compliance issues that would be affected by the change request. 3.1.1.1.5 Determine if a resource budget is assigned to each change request. 3.1.1.1.6 Determine if a list exists of appropriate change requesters for each application. 3.1.1.1.7 Verify that the appropriate approvers within IT operations, IT systems development and the business owner have approved the change and their approval is documented. 3.1.1.1.8 Determine if the change requests are subject to prioritization. 3.1.1.1.8.1 If prioritization is performed, determine if appropriate members of management regularly authorize the priority. 3.1.2 Test objective: To verify compliance with the review and prioritization process 3.1.2.1 Using the move ticket, obtain a population of requested changes. 3.1.2.1.1 When making the selection, select representative samples resulting from emergency requests, systems requests and problem tickets. © 2009 ISACA. All rights reserved. Page 19 Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO Reference Issue HyperCrosslink reference 7. Comments Change Management Audit/Assurance Program 3.1.2.1.2 Stratify the selection of tickets to include a greater sample of higher-risk application/software changes, but also include a lesser number of medium- and low-risk changes. 3.1.2.1.3 For each selected ticket: 3.1.2.1.3.1 Trace the move request to the originating request (systems request, problem ticket or emergency request [if different]). 3.1.2.1.3.2 Determine if each ticket was classified as an infrastructure or application change. 3.1.2.1.3.3 Determine if there was a risk assessment performed for impact on other systems or applications. 3.1.2.1.3.4 Determine if an impact analysis was performed to determine the effect the change would have on the enterprise. 3.1.2.1.3.5 Determine if there was an analysis of any compliance issues that would be affected by the change request. 3.1.2.1.3.6 Determine if a resource budget had been assigned to the change request. 3.1.2.1.3.7 Determine if the appropriate approvers within IT operations, IT systems development and the business owner documented their approval of the change. 3.1.2.1.3.8 Determine if the change request had been subject to prioritization. 3.1.2.1.3.8.1 If prioritization had been granted, determine if appropriate management had authorized the priority. © 2009 ISACA. All rights reserved. Page 20 Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO 4. PRODUCTION LIBRARY MANAGEMENT Audit/assurance objective: Production libraries should be secure, allowing only authorized personnel to access the production libraries. Management must provide oversight of access to libraries, good-practice separation of duties, and synchronization of source and executable libraries. 4.1 Production source library controls The production source libraries contain the source language and configuration for the production programs. Access needs to be limited and monitoring processes need to be in place to effectively oversee change activities affecting the source libraries. 4.2 Control: Access to production source is limited on a need-to-know basis. Programmers are limited to READ access; only change management staff members are assigned WRITE access (except for emergency changes, described in Step 6). AI3.2 AI7.8 DS5.7 4.2.1 Through interviews, observation and review of documentation, determine the controls limiting access to the production source libraries. 4.2.1.1 Determine if there is a separation-of-duties table identifying the access levels and to whom they are assigned. 4.2.1.2 Verify that ID access logs, including date and time stamps, are maintained and reviewed on a regular basis. 4.2.1.3 Determine if access control lists are reviewed and updated regularly. 4.2.1.4 Test objective: To verify that access to the production source libraries is provided on a need-to-know basis 4.2.1.4.1 Obtain the access control list for production source library. 4.2.1.4.2 Review the list and identify any personnel not in the change management with WRITE access to the library. 4.2.1.4.3 Obtain the access log and identify unauthorized or suspect access to production library. 4.2.1.4.4 Verify documented management review of the access control list and unusual activity logs. Ensure periodic review. © 2009 ISACA. All rights reserved. Page 21 X X Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program 4.3 Control: Production source libraries maintain version control, which provides a history of all modifications and the ability to roll back the source to a previous version if the new version is not functioning properly. Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO AI3.2 AI7.8 DS5.7 X X AI3.2 AI7.8 DS5.7 X X 4.3.1 Through interviews, observation and review of documentation, determine how version control operates and if it can be overridden. 4.3.2 Through interviews, observation and review of documentation, determine if the functionality exists to roll back an update program to its previous version. 4.4 Production executable library controls The production executable libraries contain the computer code to process the programs. Access needs to be limited and monitoring processes need to be in place to effectively oversee change activities affecting the executable libraries. 4.5 Control: Access to production executable libraries is limited to a need-to-know basis. Programmers are limited to READ access; only change management staff members are assigned WRITE access (except for emergency changes described in Step 6). 4.5.1 Through interviews, observation and review of documentation, determine the controls limiting access to the production executable libraries. 4.5.1.1 Determine if there is a separation-of-duties table identifying the access levels and to whom they are assigned. 4.5.1.2 Determine if ID access logs, including date and time stamps, are maintained and reviewed on a regular basis. 4.5.1.3 Determine if access control lists are reviewed and updated regularly. 4.5.1.4 Test objective: To verify that access to the production executable libraries is provided on a need-to-know basis 4.5.1.4.1 Based on risk, select the production executable libraries to be tested. 4.5.1.4.2 Obtain the access control list for production executable libraries. 4.5.1.4.2.1 Review the list and identify any personnel not in the change management with WRITE access to the libraries. © 2009 ISACA. All rights reserved. Page 22 Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO 4.5.1.4.2.2 Obtain the access log and identify unauthorized or suspect access to production libraries. 4.5.1.4.2.3 Verify documented management review of the access control list and unusual activity logs. 4.6 Control: Production executable libraries maintain version control, which provides a history of all modifications and the ability to roll back the executable to a previous version if the new version is not functioning properly. AI7.5 DS9.1 X X AI7.8 X X 4.6.1 Through interviews, observation and review of documentation, determine how version control operates and if version control can be overridden. 4.6.2 Through interviews, observation and review of documentation, determine if the functionality exists to roll back an update program to its previous version. 4.7 Control: Changes to the production executable libraries of distributed systems utilize a scheduled transmission and acknowledgment process to ensure accurate, complete and timely transmission of changes. 4.7.1 Through interviews, observation and review of documentation, determine what control techniques are utilized to ensure complete and accurate transmission of program changes. 4.7.2 Test objective: To verify the accuracy of distribution of executables to remote processors 4.7.2.1 Select a sample of executables. 4.7.2.2 Determine the size, date and time of the executables to be distributed as they reside in the master executable library. 4.7.2.3 For the selected executable, determine the date and time transmitted and the size of the file at the distributed computer. 4.7.2.4 Evaluate the timeliness and completeness of the distribution. © 2009 ISACA. All rights reserved. Page 23 Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Control Activities Information and Communication Monitoring COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO X X X 5. MOVE TO PRODUCTION Audit/assurance objective: The move to the production process should be controlled and documented. Access should be limited to authorized change management personnel. Only authorized changes should have been made to production programs, and the move process should ensure synchronization of the source and executable libraries. 5.1 Control: Program changes require sign-off by the appropriate stakeholders prior to being moved into production. AI6.2 AI6.5 5.1.1 Determine if the sign-off process, prior to a change moving into production, includes the following: 5.1.1.1 The programming function indicates completion of testing, quality assurance and documentation. 5.1.1.2 Users indicate satisfactory acceptance test, approval and knowledge of implementation date. 5.1.1.3 IT operations indicates acceptance of documentation, scheduling changes, backup changes, run-time changes, etc. 5.1.1.4 Information security indicates acceptance of information security changes. 5.1.1.5 Documentation (user, IT operations, backup/recovery business continuity plan) is approved. 5.1.1.6 Test objective: To verify the sign-off process to ensure that all signoffs were completed before the move to production and the appropriate personnel approved the move 5.1.1.6.1 Obtain a sample of routine move-to-production tickets for applications and software changes in scope. 5.1.1.6.2 For each move ticket, verify timely approvals by: 5.1.1.6.2.1 The programming function indicates completion of testing, quality assurance and documentation. © 2009 ISACA. All rights reserved. Page 24 Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO 5.1.1.6.2.2 Users indicate satisfactory acceptance test, approval and knowledge of implementation date. 5.1.1.6.2.3 IT operations indicates acceptance of documentation, scheduling changes, backup changes, run-time changes, etc. 5.1.1.6.2.4 Information security indicates acceptance of information security changes. 5.1.1.6.2.5 Documentation indicates satisfactory reviews by users, IT operations, backup/recovery business continuity plan. 5.2 Control: Change management software is used to control the change process. AI6.1 5.2.1 Through interviews, observation and review of documentation, determine the automated change management process. 5.2.1.1 Walk through the process of entering a move ticket, approving the ticket, compiling the program and moving it into production. 5.2.1.2 Determine the controls to identify and authenticate the approver’s authority to move a program into production. 5.2.1.3 Determine the available logs and reports generated by the change management system to trace and research program moves into production. 5.2.1.4 Determine if there are “back doors” that allow bypassing of the change management software system. 5.2.1.5 Determine if logs and reports generated by the change management system are reviewed by management and if such reviews are formally documented. 5.2.2 Test objective: To verify that the change management software and user controls are effective © 2009 ISACA. All rights reserved. Page 25 X X Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO 5.2.2.1 Based on the reviewer’s understanding of the automated move process, identify control points to test (consider automated authorization, monitoring, logging capabilities, independent recompilation of programs, etc.). 5.2.2.2 Select several change tickets. 5.2.2.3 Focusing on the control points identified in step 5.2.2.1, follow the selected change tickets through the process, verifying compliance with identified controls. 5.3 Control: Manual controls throughout the program move process prevent unauthorized moves to production. AI3.2 AI7.8 DS5.7 5.3.1 Document the process of moving the program from the test to the production environment. 5.3.2 Document the process of independently recompiling the programs by someone other than the programmer, and placing the programs in a production library. 5.3.3 Where there is a lack of separation of duties, document alternative controls (program source and executable compares, log date and time verification, etc.) used to ensure the integrity of the program move-to-production process. 5.3.4 Test objective: To verify the effectiveness of the manual change management process 5.3.4.1 Identify key control points in the program change process (notification of program ready for move to production, transfer of program from test to production library, compilation of source, comparison of compilation and executable dates, etc.). 5.3.4.2 Select a statistically valid sample size (at least 25 randomly selected moves to production). 5.3.4.3 Trace the move to production against good practices and enterprise standards. Focus on the documented evidence of management review. © 2009 ISACA. All rights reserved. Page 26 X X Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program 5.4 Control: Management reviews program changes to ensure that only authorized changes from the move ticket, systems request or incident log are included in the modification. Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO AI6.1 AI6.5 X X AI6.5 DS9.2 X X 5.4.1 Determine whether a comparison of source code before and after the modification is included in the documentation. 5.4.2 Determine how management reviews the changes to ensure that only authorized changes have been implemented. 5.4.3 Test objective: To verify the process of comparing authorized changes to completed changes. 5.4.3.1 Select a sample (including emergency requests) from a population of move tickets. 5.4.3.2 Obtain the change request supporting the move ticket. 5.4.3.3 Based on the change request, obtain an understanding of the changes required. 5.4.3.4 Run a source code comparison of the previous and current programs to identify the code changes. 5.4.3.5 Perform a “reasonableness” test, ensuring that the changes requested in the systems request are the same changes implemented. 5.5 Control: The production source and executable libraries are synchronized, all executable library entries are supported by a move ticket, and appropriate logging is available to monitor and provide the ability to trace moves initiated by a move ticket to a library update. 5.5.1 Determine how the compile process generates the date and time stamp of compilation. 5.5.2 Determine that the executable library documents the date and time of update. 5.5.3 Determine the process that ensures that all executables in the library have move tickets. © 2009 ISACA. All rights reserved. Page 27 Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Control Activities Information and Communication Monitoring COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO X X X 5.5.4 Test objective: To verify that the production source and executable libraries are synchronized 5.5.4.1 Select a sample (including emergency requests) from a population of move tickets. 5.5.4.2 Verify that the source compilation date and time agrees with the date and time of the executable. 5.5.4.3 Select a few programs from the move log and recompile the programs using the production compilation process, but saving the executable to a storage area controlled by the reviewer. Compare the executable generated by the reviewer to the executable stored in the production executable library, and identify differences. 5.5.5 Test objective: To verify that all executables have move-to-production tickets 5.5.5.1 Select several executable programs/modules from the production executable library. Trace the executable to a move ticket. 6. EMERGENCY CHANGES Audit/assurance objective: Emergency changes should be controlled, documented and initiated only in true emergencies. 6.1 Control: Changes using the emergency change procedure are initiated only for changes where time is of the essence. AI6.3 6.1.1 Through interviews, observation and review of documentation, determine if there is a definition for an emergency change. 6.1.2 Test objective: To verify that only necessary changes are made using the emergency change procedure 6.1.2.1 Select a representative sample of emergency changes. 6.1.2.2 Using the definition of an emergency change, review the emergency changes to determine if the changes were, in fact, emergencies. © 2009 ISACA. All rights reserved. Page 28 Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program 6.2 Control: Emergency changes are adequately tested before being placed into production. X X AI6.3 X X AI6.3 X Monitoring Information and Communication AI6.3 COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment Control Activities COSO 6.2.1 Through interviews, observation and review of documentation, determine the process used to review testing procedures before an emergency change is accepted into production. 6.2.2 Determine if a list of authorized requesters for emergency changes exists. 6.2.3 Test objective: To verify that emergency change authorization was approved prior to the introduction of the change into the production environment 6.2.3.1 Select emergency changes from several sources. 6.2.3.1.1 Review the existence of test results and management review. 6.3 Control: Emergency changes are authorized by an appropriate member of management before being placed into production. X 6.3.1 Through interviews, observation and review of documentation, determine the process used to authorize emergency moves to production. Differentiate between minor and major enhancements, operating system, configuration files and source programs. 6.3.2 Test objective: To verify that change authorizations were documented prior to the introduction of the change into the production environment 6.3.2.1 Select a representative sample of emergency changes. 6.3.2.2 Determine if the move into production was properly authorized. 6.4 Control: Special processes are in place to allow one-time execution of emergency changes while keeping the integrity of the production libraries. 6.4.1 Determine if the emergency changes are executed from a temporary or test library, or copied into the protected production library. © 2009 ISACA. All rights reserved. Page 29 X Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO 6.4.1.1 If programs are copied into the production libraries, identify the controls to protect the libraries from unauthorized updates by the analyst/programmer initiating the changes. 6.4.1.1.1 Determine if one-time passwords are utilized to protect libraries. 6.4.1.1.1.1 If one-time passwords are utilized, evaluate the effectiveness of the one-time password controls to ensure that the passwords are not reused and the individual utilizing the password can be identified easily. 6.4.1.1.2 If the controls to protect the production libraries do not include one-time passwords, document and evaluate the effectiveness of the other controls. 6.4.2 Test objective: To verify the effectiveness of the change control process that ensures the integrity of the production libraries and application data. 6.4.2.1 Select a sample of emergency moves to production. 6.4.2.1.1 Determine if the program was run from an interim library or the production library. 6.4.2.1.2 If the production library was used, determine if a one-time password was retrieved. 6.4.2.1.3 Determine if the one-time password was disabled. 6.5 Control: Emergency changes are subject to the same quality assurance as normal changes. AI6.3 6.5.1 Through interviews, observation and review of documentation, determine the process for reviewing emergency changes. 6.5.1.1 Determine what controls are in place to ensure that the data processed used the updated program. © 2009 ISACA. All rights reserved. Page 30 X X Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program 6.5.1.1.1 For high-risk applications, it may be necessary to perform a comparison of the data to ensure that essential fields have not been changed. 6.5.2 Through interviews, observation and review of documentation, determine after-thefact quality assurance procedures, recompilation procedures, etc., to align the emergency change with standard move-to-production procedures. 6.5.2.1 Test objective: To verify the effectiveness of the change management quality assurance process and appropriate authorization 6.5.2.1.1 Select a sample of emergency moves to production. 6.5.2.1.2 Review the sign-off process to ensure that all signoffs were completed within a reasonable period after the move to production and that the appropriate personnel approved the move. 6.5.2.1.2.1 The programming function indicates completion of testing, quality assurance and documentation. 6.5.2.1.2.2 Users indicate satisfactory user acceptance test, approval and knowledge of implementation date. 6.5.2.1.2.3 IT operations indicates acceptance of documentation, scheduling changes, backup changes, run-time changes, etc. 6.5.2.1.2.4 Information security indicates acceptance of information security changes. 6.5.2.1.2.5 Documentation indicates satisfactory reviews by users, IT operations, backup/recovery business continuity plan. 6.5.2.1.3 Review the move to production and compile logs to determine if the emergency program move was subject to recompilation and was copied into the appropriate libraries. © 2009 ISACA. All rights reserved. Page 31 Monitoring Information and Communication Control Activities COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program Control Activities Information and Communication Monitoring COBIT Crossreference Audit/Assurance Program Step Control Environment Risk Assessment COSO X X X X X X 7. CHANGE MANAGEMENT GOVERNANCE Control objective: The change management process is subject to management oversight to ensure the consistent and timely processing of changes. 7.1 Control: Management receives timely reports, summarizing change management activities, key performance indicators and escalation of issues requiring management attention. AI6.4 X AI6.4 ME1 X 7.1.1 Identify the reports that management receives, and the frequency and scope of the reports. 7.1.2 Determine if service level agreements (SLAs) are in use. If so, verify that the reports summarize SLA attainment and/or deficiency. 7.1.3 Determine the escalation process for change management processes operating outside of normal conditions. 7.1.4 Test objective: To verify the effectiveness of management’s monitoring and resolution of change management issues 7.1.4.1 Select several periods. 7.1.4.2 Review management reports, minutes of management meetings and resolution plans to document management’s oversight of change management activities. 7.1.4.3 Verify compliance with escalation procedures and the attainment of SLAs. 7.1.4.4 Determine the circumstances and resolution of escalated situations. 7.2 Control: A management steering committee is responsible for and reviews change management issues. 7.2.1 Determine the management committee responsible for change management. 7.2.2 Determine if change management stakeholders are members of the steering committee. 7.2.3 Determine if the scope of the committee includes review of staffing levels, performance indicators, etc., to ensure a stable operational team. © 2009 ISACA. All rights reserved. Page 32 X Reference Issue HyperCrosslink reference Comments Change Management Audit/Assurance Program VII. Maturity Assessment The maturity assessment is an opportunity for the reviewer to assess the maturity of the processes reviewed. Based on the results of audit/assurance review, and the reviewer’s observations, assign a maturity level to each of the following COBIT control practices. Assessed Target Maturity Maturity COBIT Control Practice AI6.1 Change Standards and Procedures 1. Develop, document and promulgate a change management framework that specifies the policies and processes, including: • Roles and responsibilities • Classification and prioritization of all changes based on business risk • Assessment of impact • Authorization and approval of all changes by the business process owners and IT • Tracking and status of changes • Impact on data integrity (e.g., all changes to data files being made under system and application control rather than by direct user intervention) 2. Establish and maintain version control over all changes. 3. Implement roles and responsibilities that involve business process owners and appropriate technical IT functions. Ensure appropriate segregation of duties. 4. Establish appropriate record management practices and audit trails to record key steps in the change management process. Ensure timely closure of changes. Elevate and report to management changes that are not closed in a timely fashion. 5. Consider the impact of contracted services providers (e.g., of infrastructure, application development and shared services) on the change management process. Consider integration of organizational change management processes with change management processes of service providers. Consider the impact of the organizational change management process on contractual terms and SLAs. AI6.2 Impact Assessment, Prioritization and Authorization 1. Develop a process to allow business process owners and IT to request changes to infrastructure, systems or applications. Develop controls to ensure that all such changes arise only through the change request management process. 2. Categorize all requested changes (e.g., infrastructure, operating systems, networks, application systems, purchased/packaged application software). 3. Prioritize all requested changes. Ensure that the change management process identifies both the business and technical needs for the change. Consider legal, regulatory and contractual reasons for the requested change. 4. Assess all requests in a structured fashion. Ensure that the assessment process addresses impact analysis on infrastructure, systems and applications. Consider security, legal, contractual and compliance © 2009 ISACA. All rights reserved. Page 33 Reference Hyperlink Comments Change Management Audit/Assurance Program Assessed Target Maturity Maturity COBIT Control Practice implications of the requested change. Consider also interdependencies among changes. Involve business process owners in the assessment process, as appropriate. 5. Ensure that each change is formally approved by business process owners and IT technical stakeholders, as appropriate. AI6.3 Emergency Changes 1. Ensure that a documented process exists within the overall change management process to declare, assess, authorize and record an emergency change. 2. Ensure that emergency changes are processed in accordance with the emergency change element of the formal change management process. 3. Ensure that all emergency access arrangements for changes are appropriately authorized, documented and revoked after the change has been applied. 4. Conduct a post-implementation review of all emergency changes, involving all concerned parties. The review should consider implications for aspects such as further application system maintenance, impact on development and test environments, application software development quality, documentation and manuals, and data integrity. AI6.4 Change Status Tracking and Reporting 1. Establish a process to allow requestors and stakeholders to track the status of requests throughout the various stages of the change management process. 2. Categorize change requests in the tracking process (e.g., rejected, approved but not yet initiated, approved and in process, and closed). 3. Implement change status reports with performance metrics to enable management review and monitoring of both the detailed status of changes and the overall state (e.g., aged analysis of change requests). Ensure that status reports form an audit trail so changes can subsequently be tracked from inception to eventual disposition. 4. Monitor open changes to ensure that all approved changes are closed in a timely fashion, depending on priority. AI6.5 Change Closure and Documentation 1. Ensure that documentation—including operational procedures, configuration information, application documentation, help screens and training materials—follows the same change management procedure and is considered to be an integral part of the change. 2. Consider an appropriate retention period for change documentation and pre- and post-change system and user documentation. 3. Update business processes for changes in hardware or software to ensure that new or improved functionality is used. 4. Subject documentation to the same level of testing as the actual change. © 2009 ISACA. All rights reserved. Page 34 Reference Hyperlink Comments Change Management Audit/Assurance Program VIII. Assessment Maturity vs. Target Maturity A I6 .1 C hang e St and ar d s and Pr o ced ur es 5 4 3 2 A I6 .2 Imp act A ssessment , Pr io r it iz at io n and A ut ho r iz at io n A I6 .5 C hang e C lo sur e and D o cument at io n 1 0 Assessment A I6 .4 C hang e St at us T r acking and R ep o r t ing A I6 .3 Emer g ency C hang es © 2009 ISACA. All rights reserved. Page 35 Target