1 ICT Auditing Introduction - limitations and purpose This document does NOT seek to provide guidance on how to conduct every type of IT audit assurance activity that may be required in every environment as it is impractical to do so and many other dedicated sources of guidance (which are referenced in this document) can assist in that regard. This document simply aims to provide clarity over the nature and scope of ICT Audit and Assurance activities and to provide links to appropriate information sources about most ICT Risk and Assurance Areas. Content summary The Basics Core ICT Risks Overview of the Four Types of ICT Audit Sets out the fundamental tenants for audit and assurance activities that culminate in the Annual Governance Statement. This section covers the fundamental risks associated with ICT: non-compliance – Data Protection Act, Code of Connection confidentiality – access controls and identity management integrity – accuracy and completeness of records availability – hardware, project or software failures Summary of the four primary types of ICT audit activities: application audits of in house and third party business systems ICT service delivery and management issue audits infrastructure audits – networks, servers and databases CAATS (duplicate payments, gaps in invoice numbers etc) ICT Audit Planning Explains how the ICT audit planning methodology for both annual plans and individual audits helps to establish appropriate “ICT audit plans” that consolidate, enhance and compliment, rather than duplicate or conflict with, existing assurance activity ICT Audit This covers the specific qualifications and skills that Skills and an ICT auditor can possess to provide an indication of Qualifications their knowledge and experience Sources of ICT Auditing List of links to sources of other best practice standards and organisations 2 Information Multiple Examples of ICT Audit Scope and Objectives Business Application Audits ICT Service Delivery and Management Audits Infrastructure Audits CAATS Data Analysis/Interrogations The Basics Internal audit provides an independent assurance on the adequacy of the management control frameworks established to: safeguard and secure assets ensure reliability of records monitor adherence to policy; and promote operational effectiveness. Overall and departmental risk registers and risk management arrangements are evaluated each year as part of the audit needs assessment to help establish the appropriate range of external and internal audit activities required to address the corporate governance and assurance needs. The assurance evaluation activities of internal audit assessments, together with any additional assurance sources such as health and safety activity reports, culminate in the Annual Governance Statement which is signed by the accountable senior governance members and officers. Audit committees take an ever increasing interest in ICT related risks and governance practices due to the ever increasing reliance being placed on ICT solutions. All auditors need to be aware of the scope of ICT within the organisation they work for and how it is structured and managed, as ICT is an essential aspect of the planning and conduct of any audit. Without access to the information that business systems contain, managers and auditors alike will be unable to perform their responsibilities effectively. It is therefore essential that there is clear accountability for assurances over the primary areas of ICT activities and the risks by ensuring that auditors seek to establish effective ICT audit resources and methodologies, such as the use of Computer Assisted Audit Techniques or even the development of continuous audit and assurance solutions. The need to cover IT auditing in the audit plans can be shown in an analogy with an office building (the business application): one can gain a level of assurance that unauthorised individuals can’t gain 3 access to the building because there is a fully working access control system in place (applications’ authentication controls) which are administered and monitored as being in line with effective (management) arrangements and policies. However, without also verifying the adequacy of controls around the ‘goods-in’ entrance and fire exits (database and operating system logical access controls), the process for allowing visitors or contractors access to the building (application change management process), and the alarm systems etc (application intrusion detection systems), you cannot gain full assurance that the building is adequately protected from unauthorised access. Auditing solely at a business process/application level will only provide a partial view of the control environment because weaknesses in the ICT infrastructure can completely undermine controls within ICT applications. For example, a weakness within the database management system supporting an application could easily enable the bypassing of controls over authentication, authorisation, integrity and segregation of duties. Core ICT Risks The key risks in the delivery of ICT solutions, which now encompass almost every aspect of public service delivery from email to payments and management information, are: Non-compliance risks. These include: Data Protection Act – high financial penalties and reputational damage Code of Connection – inability to effectively deliver joined up services Compute Misuse Act – abuse of computer resources for fraudulent gain Confidentiality Identity management, virus detection and access controls help ensure data is adequately secured Integrity Data input, processing, interface and output management monitoring controls ensure the accuracy and completeness of records (eg duplicate payments or CRB checks) Availability Network resilience, backup/restore arrangements and environmental data centre controls help minimise the probability and impacts of ICT service disruptions such as hardware/software failures or deletion by error or intent Overview of the Four Types of ICT Audits ICT audit and assurance activities assess the extent to which the above risks are mitigated and the basic audit control principles are applied to: safeguard and secure assets 4 ensure reliability of records monitor adherence to policy; and promote operational effectiveness. The key risks in the delivery of ICT solutions, which now encompass almost every aspect of public service delivery from email to payments and management information, are non-compliance, confidentiality, integrity and availability. As a result IT audit has to develop and maintain appropriate assurance assessment plans that address these risks in the four primary areas that IT audit covers: business applications, management issues, infrastructure and computer assisted audit tools and techniques: business applications – eg payroll, grants, benefits, AP – these audits cover the software system used to deliver business functionality and testing includes: – roles and responsibilities – access permissions and security – input, output and processing – system interfaces and audit trails – system maintenance; and – backup and recovery ICT service delivery and management – these audits cover the control framework and processes established for the implementation and delivery of IT services and skills associated with good practice and legislative compliance (ie the areas not directly looking at hardware or software): – general computer controls – IT strategy, policies, organisation, governance and responsibilities – project risks – statutory compliance (licensing, data protection and freedom of information) – IT security (Code of Connection) – IT service management arrangements (ITIL); and – data quality and integrity 5 infrastructure – these audits cover the supporting hardware and software generic to the delivery of secure service connectivity (eg anti-virus, operating systems and device configuration settings): – network operating systems – firewalls and device security – Wi-Fi/remote access (SSL/VPN) – server security (eg UNIX/SQL) – virtual servers and network management – laptops and mobile storage devices – public sector networks and G-Clouds. computer assisted audit techniques (CAATs) are IT data interrogation techniques to conduct tests on the accuracy and completeness of data to help perform assurance and compliance audits. (See ISACA Guideline G3 Use of Computerassisted Audit Techniques and the IIA GTAG 16: Data Analysis Technologies and GTAG-3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment). ICT Audit Planning Annual ICT audit plans This section sets out the approach for developing computer audit needs assessments to establish an appropriate ICT audit activity plan. Where annual governance statements state that effective risk management arrangements exist, IT auditors should use the existing corporate and departmental risk registers to determine IT audit activities. Where risk management arrangements are poor or absent IT audit should adopt the Global Technology Audit Guides prepared by the Institute of Internal Audit for Developing the IT Audit Plan (GTAG 11) and for the Management of IT Auditing (GTAG 4). IT audit plans should ensure that gaps in risk assurance coverage are identified and prioritised for attention and plans should always complement, not duplicate, existing assurance activities. For example, if a project office function exists to provide quality and compliance checks for ICT programmes and project risks, IT audit resource should focus on the adequacy of the corporate project 6 management standards and the results of project office activities, lessons learnt, and the effective transition of any residual project risks into the “business as usual” environment. Individual ICT audit plans As with all audit and assurance activities a “terms of reference” will always need to be agreed in advance of each ICT audit. See the examples section for suggestions on audit scope and objectives. Every effort should be made to avoid any duplication of audit resources and maximise the use of specialist IT audit resources. When general or external audit resources conduct a key business application audit, the IT audit resources should be assigned to evaluate specific ICT risks areas that complement the general audit coverage of “segregation of duties” etc so that the overall assurance opinion can be formed following comprehensive evaluation of the control environment. ICT audit resources are often allocated areas such as evaluation of backup and recovery solutions, system support and database administration (DBA) arrangements and work can also include the use of CAATS data analysis/interrogations to provide the general audit team colleagues with highly focused potential record exception reports to vouch such as potential duplicates or gaps in invoices. All auditors have expertise in risk assessment and internal control, and there is a need for all auditors to have a level of ICT awareness and knowledge. This should cover general ICT controls such as backup and recovery, password access control, data validation controls etc. They should also have the ability to comfortably use ICT in conducting audits, such as word processing and computer assisted audit techniques. Consequently, it is not unreasonable or uncommon to expect a non-ICT auditor to undertake reviews of general ICT and automated controls. These may include application controls around user authentication, authorisation of transactions, system enforced segregation of duties and disaster recovery plans for an application. However, the distinction between ICT and non-ICT auditors arises because the ICT auditor needs sufficient skills to be able to identify and evaluate technical risks associated with the use of ICT and the controls in place to manage those risks. Where appropriate the ICT auditor needs to provide an effective challenge and/or contribution to the existing ICT risk assessments. ICT Audit Skills and Qualifications Generally, ICT auditors are either auditors trained in ICT, or ICT staff trained in auditing. There has been much debate around which is the preferred route/background for an ICT auditor but the 7 essential criterion remains, as with any auditor, that they must have the appropriate skill set to be able to undertake the assignments allocated to them. It is unreasonable to expect anyone to have full expertise in all areas of ICT. The area is too large and constantly changing to make this viable. As such, it is common for ICT auditors to specialise in specific areas of ICT (eg operating systems, or specific databases, or else project implementation assurance). Many organisations, therefore, seek the services of specialist ICT auditors when the nature of assignments dictates and in-house resources are unavailable. For this, the services of a specialist organisation or contractor are commonly used, together with consortium arrangements or partnerships with other organisations. There are specific qualifications that an ICT auditor can possess, which provide an indication of their knowledge and experience. Primarily these are the: Certified Information System Auditor (CISA) qualification operated by the Information Systems Audit and Control Association (ISACA) Certified Information System Security Professional (CISSP) by ISC2 IT Auditing Certificate, which was initiated after the Qualification in Computer Audit (QiCA) was withdrawn in 2010 by the Institute of Internal Auditors UK. The IIA IT Auditing Certificate is aimed at qualified internal auditors (holding PIIA, CMIIA or CIA designations) who wish to gain skills in IT threats and vulnerabilities. As well as demonstrating knowledge through exams, these qualifications also require the candidate to demonstrate their experience before gaining certification and being able to use the QICA, CISSP and CISA designations. For example to obtain the CISA designation an ICT auditor is required to demonstrate five years’ practical experience of the following areas: IT audit process IT governance systems and infrastructure lifecycle management IT service delivery and support protection of information assets business continuity and disaster recovery. 8 Where organisations are too small to justify specific full time ICT audit resources, consideration should be given to: using ICT audit resources of other organisations, including external auditors maximising impact by identifying areas where audit principles may be applied to important ICT areas without the need for an in-depth technical understanding developing staff while minimising the investment in training use of short-term contactors or specialist firms focused upon specific audits that need to be conducted to assess specific technical risks. Sources of ICT Auditing Information Institute of Internal Auditors Global Technology Audit Guidance Series PG GTAG-16: Data Analysis Technologies PG GTAG-15: Information Security Governance PG GTAG-14: Auditing User-developed Applications PG GTAG-13: Fraud Prevention and Detection in an Automated World PG GTAG-12: Auditing IT Projects PG GTAG-11: Developing the IT Audit Plan PG GTAG-10: Business Continuity Management PG GTAG-9: Identity and Access Management PG GTAG-8: Auditing Application Controls PG GTAG-7: Information Technology Outsourcing PG GTAG-6: Managing and Auditing IT Vulnerabilities PG GTAG-5: Managing and Auditing Privacy Risks PG GTAG-4: Management of IT Auditing PG GTAG-3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment PG GTAG-2: Change and Patch Management Controls: Critical for Organizational Success PG GTAG-1: Information Technology Controls ISACA Further guidance can also be obtained from the International Systems Audit and Control Association (ISACA). ISACA is fully dedicated to the promotion and ongoing maintenance of ICT audit and security via its comprehensive Control Objective for Business Objective Information Technology (COBIT) audit and 9 control standards. This seeks to connect other major frameworks, standards and resources, including ITIL, ISO, ISF, OECD, AICPA and NIST, and to integrate other ISACA guidance, including Val IT, Risk IT, the IT Assurance Framework and the Business Model for Information Security (BMIS), into one cohesive and comprehensive picture. IT Governance Institute The IT Governance Institute is a one-stop-shop for everything to do with IT governance. Government Connect This site includes excellent support and guidance on ICT security and policy initiatives including the 2009 Local Government Data Handling Guidelines by Mark Brett of Socitm. Socitm Socitm is the professional Society of IT Management for the public sector. It includes the Socitm TV facility which provides free-to-view video content covering key aspects of technology-enabled improvement and public sector ICT management initiatives. itSMF UK itSMF UK is the IT Service Management Forum, a community for leadership in IT service management. IRMA The Information Risk Management and Assurance Group of the British Computer Society (IRMA) supports and promotes the awareness and use of computer auditing, control and risk management techniques. This includes: phone hacking and data storage compliance top IT management challenges in 2011 practical mobile business intelligence. CIPFA's Computer Audit Guidelines: Fully Revised Sixth Edition 2006 This is an essential key reference publication in this field that is endorsed by the Institute of Internal Auditors. It covers the following IT audit activities: planning IT audit 10 IT audit resources security and control management controls file controls PC controls network controls internet controls e-commerce controls environmental controls business continuity planning data protection reviewing systems project management controls application controls change control post-implementation review management issues IS/IT strategy procurement of IT facilities financial management of IT outsourcing using IT for audit data retrieval other CAATs audit control matrices. CIPFA also produces the following publications: Systems Based Auditing Control Matrices including: Systems Based Auditing Control Matrices: Series 7 (2008) 11 A Guide to Enhanced Systems Based Auditing: The Exeter Approach (2009) A Risk-based Approach to the Audit of Procurement (2010) Systems Based Auditing Control Matrices: Series 8 – IT Governance (2010) Systems Based Auditing Control Matrices: Series 9 – People Management (2011) The Excellent Internal Auditor: A Good Practice Guide to Skills and Competencies (2011). Using the CIPFA Systems Based Auditing Control Matrices – Series 8 IT Governance The purpose of these matrices is to provide tests for use by general and specialist IT auditors, as well as those concerned with IT governance. They are non-sector-specific and so can be used in the public, the private and the third sector. By undertaking these tests, a succinct overview will be obtained of the extent that IT governance standards, etc are being met, and in turn this will enable a gap analysis to be undertaken so that areas for improvement can be clearly identified and reported to senior management and the managing body. Series 8 consists of a Hazard Identification Document (the purpose of which is self-evident) and 18 control matrices. The first control matrix (ITG01 General) covers the overall ‘top-level’ direction and management, and includes the strategic plan, information architecture and technological direction. It is therefore suggested that the ITG01 compliance and assurance tests are undertaken before any of the other matrices. However, this is not essential – if a particular area gives concern or is considered high risk, then the tests contained in the relevant matrix can be undertaken before ITG01. A notable difference in this series is that the Internal Control Questionnaires have been dispensed with (as they were considered superfluous), and that as well as Compliance Test Papers (CTPs), there are also now Assurance Test Papers (ATPs). The latter were introduced by the authors, Exeter City Council’s internal auditors, as part of the Enhanced Systems Based Auditing (ESBA) and Enterprise Risk Management Auditing (ERMA) approach they devised to further incorporate best practice risk management techniques, particularly those of COSO. COSO is the abbreviation of the Committee of Sponsoring organizations of the Treadway Commission, of which the Institute of Internal Auditors is one of the five sponsors. In September 2004 COSO published the Enterprise Risk Management – Integrated 12 Framework. One of its key messages is that it is essential for good corporate governance and effective enterprise risk management that when organisations, for example: establish policies, standards, rules and procedures allocate roles and responsibilities, they actually tell the target audience about them, provide them with training where appropriate, and regularly remind them. The ATPs therefore serve as a means of assessing how well, or otherwise, the organisation has (for example) made its employees aware of what they are and what they are not allowed to do, and thereby identifying weaknesses that can be addressed, thus avoiding potential management problems. It is suggested that, once the various IT governance control matrices have been tested, for future audits only selective testing is undertaken rather than all of the CTPs and ATPs. Selective testing should only be undertaken for high risk areas (based upon risk assessments) or vulnerabilities, and for those areas where the results of previous testing were far from satisfactory. It should also be borne in mind that if the result of the ATP testing was satisfactory, and there have been no new staff appointments, there is no need to retest. The matrices cover: general – strategy, information architecture and technological direction infrastructure change management configuration management system security physical and environmental management service level management operations management service desk, incident and problem management service continuity management cost management data management performance and capacity management 13 procure IT resources project management acquire, implement and maintain application software management of third party services education and training of IT users. Legislation and standards Freedom of Information Act 2000 Data Protection Act 1998 Computer Misuse Act 1990 and the 2008 Amendments Copyright, Design and Patents Act 1988 Digital Economy Act 2010 BISO 27001: Information Security Management System ISO 20000, the ITIL based international IT Service Management Standard ISO 25999, the Business Continuity Standard ISO 27033, IT Network Security Standard ISO 38500 The IT Corporate Governance Standard. Supporting guidance and organisations Cloud Security Alliance Centre for Internet Security Department for Business Enterprise and Regulatory Reform information security pages Federal Financial Institution Examination Council (FFIEC) IT Audit Office Guides Federation Against Software Theft (FAST) www.best-management-practice.com Information Commissioner’s Office ISO:27000 Information (Department for Business Enterprise and Regulatory Reform) 14 IT Governance and Audit Guidance 2012 Multiple Examples of ICT Audit Scope and Objectives The following sections of this document address some of the key areas for the IT auditor to consider, together with a brief summary of the main risks associated with the selected area and controls that should exist to help reduce the organisation’s exposure to the identified risks. Business Application Audits The work of the auditor as regards information systems that have an ICT base has traditionally been broken down into three main areas of controls that were identified in the CIPFA Statement on Computer Audit published in the early 1980s. These are: systems procedural controls administrative and organisational controls controls over the use of resources. This analysis holds good today for all information systems irrespective of whether they are manual or ICT based. The three areas are covered in the following sections. Reference should be made to: CIPFA's Computer Audit Guidelines - Fully Revised Sixth Edition for a more detailed analysis of control objectives and desirable controls the IIA GTAG-8: Auditing Application Controls. Objectives and risks This area of control is concerned with accuracy and security. The advantages afforded an organisation by information systems and technology are unlikely to be fully realised if data is inaccurately processed or not processed at all. Organisations are also under a duty imposed by the Data Protection Act 1998 to ensure that all personal data held on computers is kept secure. However, public access has been increased as part of the Freedom of Information Act 2000. Auditors will have to be satisfied that access controls meet the potentially conflicting requirement of these Acts and of compliance requirements such as the PCCDSS for online payment processing. The objective of auditing this area is to assess the controls in place to help ensure: 15 system access is restricted to appropriately authorised individuals system inputs/data captured is processed and validated as planned and that any unexpected data is thoroughly investigated before being processed all data is authorised and processed correctly in accordance with the appropriate standards and procedures (eg the Payment Card Industry Data Security Standard (PCI DSS) and Data Protection Act) all outputs are as anticipated and passed to the appropriate individuals in a timely manner sufficient electronic audit trails are produced. Information processing: systems procedural controls The auditor should review systems to ensure that the following areas are covered: user identification and authentication (see IIA GTAG-9: Identity and Access Management and the ISACA Guide G38 on Access Controls) user account management user privileges configuration management event and activity logging and monitoring communications, email, and remote access security malicious code protection, including viruses, worms, and trojans software change management, including patching (see GTAG2: Change and Patch Management Controls: Critical for Organizational Success) firewalls/vulnerability management – antivirus patching and gateway protection (see GTAG-6: Managing and Auditing IT Vulnerabilities) data encryption backup and recovery incident and vulnerability detection and response (see GTAG15: Information Security Governance) 16 collaboration with management to specify the technical metrics to be reported to management accuracy of data input proper processing of data reasonableness and completeness of outputs adequacy of audit trail (see GTAG-3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment). Input controls Controls should be built into the system to help ensure that data input is genuine, complete and accurate. While data is normally input into a system by keyboard, all methods of data entry should be reviewed. This could include the electronic submission of data via removable media such as CD-ROMs and memory sticks, as well as through interfaces, including electronic data interchange (EDI). Data input should be by authorised persons whose access to the system is adequately restricted from unauthorised access. Data input should be subject to appropriate restrictions and validation. Data submitted for batch processing should have controls to ensure input is authorised, and where possible each batch should have control totals to ensure completeness. Incomplete or erroneous batches can then be rejected or held in suspense until corrected. Controls should also exist to prevent duplication of input. Where data enters a system from an interface, controls should exist to help ensure the integrity of the data between leaving its source to entering the receiving system. This may include reconciliation controls such as record counts, hash totals and control totals. Suitable processes and procedures should also exist to manage any data completeness or integrity issues encountered. Processing controls Processing controls within a computer system should ensure that the correct data and program files are used, that all data is processed in a secure manner, accounted for and written to the appropriate file, and that data conforms to predetermined standards or falls within specified parameter values. When the data is processed, the auditor should be satisfied that only the latest authorised version of the program is run. Many applications are now run as suites of programs controlled through the operating software. Procedures should be in place to ensure that the latest version is being used, and the auditor should be satisfied that appropriate controls are in place. The correct data files should be accessed both by ensuring that naming conventions are always 17 used and, ideally, by the renaming or deleting of processed data files within the process itself. Input logs should be kept and be available for audit. All processing should be performed in such a way that only authorised users of the data can have access to the data files and programs used, although it may be necessary for technical or development staff to have access if program errors occur. In such circumstances, clearly defined procedures should be laid down and files and programs should be kept secure at all times. Output controls All programs should be properly documented and a list of any expected output from a process kept in the ICT control section of the organisation (usually within the ICT department). The actual output from the system should always be checked against that list for completeness and reasonableness. Confidentiality is as vital with output as it is with input and only authorised officers of the appropriate user department should be allowed to receive the output of the system. A separate person from the one receiving the output should validate control total data. User departments should also be made aware of the need to dispose of sensitive output appropriately, in order not to contravene the Data Protection Act 1998. Audit trail As a fundamental of good governance and accountability for system processing arrangements it is the responsibility of management to establish and maintain system and procedure logs to record all input, including changes to data, to establish who did what and when they did it. This is known as a management audit trail. For example, if a fraudulent payment was initiated by online input at a particular terminal, the log should show who initiated the payment and who authorised it. Such controls are crucially dependent on strong controls over accountability arrangements for the creation of user accounts and the means of authenticating user identity (eg strong passwords and identification. In this way computer audit is no different from any other form of audit in that the system should ensure that all actions are sufficiently documented. Logs should be stored off-site, as should any manual control records. Management should also ensure that discrete logins are used, which identify users. Sharing logins or leaving a PC logged on should be discouraged. 18 As with all data sets management must determine and automate appropriate timescales for the retention of audit logs, as they take up storage space and data protection regulations may be breached if logs contain personal data and are kept for longer than necessary. Management should also ensure that system and user passwords are changed frequently to protect access and help ensure security of data. System controls should also be reviewed by management and audit to ensure that there is an appropriate division of duties. Information processing: administrative and organisational controls This area of control concerns the way in which departments are organised. In small departments it is more difficult to establish and apply adequate segregation of duties control principles. However, as a minimum detective system activity alert and reporting controls should exist to act as a deterrent against potential misuse of access rights. In addition, controls in this area can also include other centrally managed controls such as those in place to act as safeguards against infection by computer viruses. Objectives and risks The auditor should appraise departmental organisation and procedures to establish that: there are documented standards of operation for all aspects of the work of the department access to and retention of data/information, whether in the form of computerised or manual records, is limited to authorised personnel only and to comply with the requirements of the Data Protection Act 1998 adequate physical safeguards exist for the continued operation of computers logical safeguards exist to comply with appropriate standards to preserve software and data from corruption and viral infection (eg the Payment Card Industry Data Security Standard (PCI DSS)). For risks, see the Data entry section below. Key control areas Key control areas may include: clearly documented procedure and operation manuals. For ICT based systems these would include systems techniques, program specification and programming standards, testing techniques and documentation standards. For both ICT based 19 and manual systems the auditor should expect up to date user manuals and procedure notes to be maintained control of access to data, through mechanisms within the operating system in the case of ICT based systems, and by physical security measures for manual systems management of appropriate arrangements for dealing with disasters, including procedures for taking backups of data and storing them securely security of installations against potential catastrophe. The auditor should look for controls designed to prevent or mitigate the risk of disasters and those designed to minimise the effects of a loss of the installation, eg membership of disaster consortia and storage of key data at remote sites. For data stored in manual systems, sprinkler installations may be considered more appropriate protection from theft of PCs, especially laptops. In particular information contained within PCs and laptops may need to be protected from unauthorised access by methods such as encryption protection of software and data from corruption by means of virus checkers, protocols for the transfer of information between PCs, and firewalls between internet connections and live systems. In addition, data can be protected from loss through hacking via the use of vulnerability management, for example adoption of Intrusion Detection System (IDS) or Intrusion Protection System (IPS). Information processing: use of resources ICT resources are particularly valuable and auditors need to be aware that spare capacity inevitably exists on all computer environments. This is because they are purchased in anticipation of the future system capacity requirements that are in the process of being developed. The auditor should take steps to ensure that appropriate key performance indicators exist to demonstrate the efficient use of ICT resources as advocated by ITIL, the best practice IT Service Management Framework, and ISO 38500 the ICT Governance Standard. Applying risk management techniques, including disaster recovery and business continuity planning, can highlight the key areas of concern and ensure that controls are in place to help reduce exposure to risk. See GTAG-10: Business Continuity Management. 20 Objectives and risks The auditor should appraise the organisation’s procedures to ensure that: resources are not used for unauthorised purposes resource requirements are clearly established and the most efficient use is made of existing resources the costs of maintaining systems are regularly reported to both the managers of the central computer department and user department managers. For risks, see the Data Capture and Data Entry section below. Key control areas Key control areas may include: the adequate recording and monitoring of all use of ICT regular reviews of calculations of resource requirements to establish that they are adequately monitored documented standards and procedures exist which help ensure that effective and efficient data processing requirements are defined and monitored for achievement management review of the work done by individuals on a regular basis regular reporting of the true cost of systems to all levels of management accurate and prompt recharging where appropriate. ICT Service Delivery and Management Audits ICT strategy Objectives and risks The primary objective of the ICT strategic plan is to set out, in a clear and concise manner, the way in which ICT will be used within the organisation to effectively enable the achievement of the wider business objectives. A clear strategic plan is required covering the development, maintenance and enhancement of information systems. Ideally these will be encompassed within an ICT strategy that: 21 aligns with the organisation’s statement of aims and objectives, business plans, corporate plans or mission statement sets out the risk management and governance assurance frameworks and standards in use for the effective management of IT resources and mitigation of known vulnerabilities, threats and risks reviews and considers existing information systems to ensure they best serve the organisation in times of change, and continue to integrate to other (new) systems sets out the control around the development design and transition of new information systems into the organisation; and is reviewed and updated on a regular basis. Therefore, failure to have an up to date ICT strategy that is aligned with the current corporate plans could prevent corporate aims and objectives from being met, or being met in the most efficient and effective manner. See also the ICT Strategy section for further information. Key control areas The key control is the existence of a clearly stated ICT strategy. The auditor should investigate the strategy to establish that: the strategy includes a written statement setting out clearly and unambiguously what senior management have approved, together with when the strategy was formally issued and authorised senior management have been briefed and received sufficient training in information systems and technology to be capable of authorising the strategy in an informed manner there will be regular reviews to take account of new developments in both information requirements and technology the strategy takes a comprehensive and forward-looking approach. In this area more than any other, it is vital that not only current technology and thinking is reflected in the document but also that potential developments in technology and future information requirements are considered alternative ways of providing an information systems service have been considered during the drawing up of the strategy, ranging from non-ICT solutions to facilities management by external contractors 22 IT strategy monitoring compliance responsibility is clearly assigned and operated. ICT asset management The ICT asset management function is the primary point of accountability for the life-cycle management of information technology assets throughout the organisation. Included in this responsibility are development and maintenance of policies, standards, processes, systems and measurements that enable the organisation to manage the IT asset portfolio with respect to risk, cost, control, IT governance, compliance eg ISO:38500 and business performance objectives as established by the business. Audit should be aware of the difference between tangible and nontangible assets in terms of IFRS and that IFRS also affects hardware bought by a supplier for an organisation’s IT service, which may need to be recognised as an asset. ICT business continuity/disaster recovery plan The more the business relies on its IT systems, the more it needs to consider how unexpected disruptions might affect the business. These disruptions could come in many forms, from fire and floods to theft or malicious attacks on systems, such as viruses or hacking. The main benefit from business continuity planning is to improve a business’s ability to react to such disruptions. It describes how the business will restart its operations in order to meet its businesscritical requirements. The main risk the auditor should consider is the risk exposure of IT failure and the business impact that this may have. Key areas for the auditor to consider are: is an IT business continuity plan in place does the plan meet standards eg BS25999 (business continuity) or BS25777 (IT continuity) has the IT plan been communicated to appropriate staff has the IT business continuity plan developed in line and in conjunction with other businesses/departments are the systems ranked in terms of business critical has the plan been tested; and has the plan been updated as a result of the test. 23 ICT procurement and disposals Objectives and risks ICT procurement generally involves the procurement of hardware, software and ICT related services. Specific ICT considerations include: hardware – has future demand been taken into account when determining the specifications of the hardware being purchased? Has consideration been given to associated costs and procurement implications such as ongoing support, backup and recovery arrangements, peripherals etc? software – generally an organisation will not own the software purchased, and it should have a valid a licence to use the software. There are many different types of software licence arrangement such as per user, concurrent usage, site or enterprise agreements. It is important that the organisation obtains the most appropriate licence for its purposes. Software support agreements are also a consideration. It may be appropriate to insist that the supplier lodge a copy of the source code with a trusted third party so that another developer can support the system in the event of the supplier’s business failing ICT related services – see the following paragraphs and the Outsourcing section below for some important considerations when procuring ICT services, which are covered in GTAG 7 Information Technology Outsourcing of the series of IIA Global Technology Audit Guides ICT disposals – organisations and their employees have a responsibility under several EU Directives, including Data Protection directives, the Landfill Directive, the Waste Electronic & Electrical Equipment Directive (WEEE) and the Hazardous Waste Directive, to ensure that final disposal of all waste electronic and electrical equipment is responsible and traceable. In order to meet this obligation, it is the responsibility of an organisation to follow the procedures when purchasing electronic equipment and when disposing of such items. All ICT equipment containing data should be securely erased and/or destroyed beyond recovery. Further general details on procurement can be found in the Procurement information stream. The primary objective of ICT procurement is to ensure that the procurement of computer hardware, software and ICT services is aligned with the ICT strategy and takes place in accordance with the 24 organisation’s procurement rules and EU tendering legislation. Therefore ICT procurement should: align with ICT strategies and policies (including capital/revenue budget provision) be authorised following an objective assessment of alternative solutions be based upon a clear specification of requirements of what is needed appraise alternative suppliers and alternative products within an invitation to tender (ITT) process include the installation of the product and testing prior to handover note the use of “vanilla” off the shelf solutions rather than bespoke IT makes any software upgrading straightforward involve both pre- and post-implementation reviews. Weaknesses within this area can result in the procurement of hardware and software solutions that are ineffective and inefficient in meeting the organisation’s aims and objectives. This can be due to incorrect specifications or lack of interoperability with other areas of ICT. Failure to follow procurement policy standards can also result in poor value for money and non-compliance with legislation. Key control areas The key control is that appropriate procurement arrangements are in place, and followed. As part of this, this auditor should ensure that: ICT facilities management or cloud hosting services and hardware procured are fit for purpose, specifically in terms of its specification, strategic fit within the ICT strategy, and ongoing support and maintenance, with best prices being obtained software procured meets the business need, is aligned with the ICT strategy, appropriately licensed for the organisation, adequately supported, and best prices are obtained any movements to external provision of the services accord with the ICT strategy any arrangements made with third parties for the delivery of ICT services are adequately specified and contain sufficient safeguards for the organisation the organisation is obtaining value for money 25 post-implementation support and security are in place best value is being obtained and can be demonstrated there is a formal contract with the supplier that includes elements such as: – performance monitoring is in place, with action taken where the contract requirements are not being met (this also includes service levels agreements – SLAs) – security, backup and data retrieval procedures have been tested and operate with minimal disruption – there is both formal and informal communications with the supplier, and that problems are rectified – managers are proactively reviewing current practices in line with the best practice ITIL framework and looking to provide enhanced performance either during the outsourcing or when the contract is renegotiated – there are appropriate insurance and exit strategy termination arrangements in place – there is a clearly agreed tariff for system upgrades and support; and – there is a right of access for internal audit to the systems operated or provided by third parties. ICT outsourcing Objectives and risks Outsourcing of the whole ICT function is rare but increasing and most organisations have some degree of outsourcing. Auditors are, however, familiar with auditing procurement in general and third party work in particular, and the same general principles can be applied. The primary objective of auditing within this area is to ensure that appropriate actions have been identified and implemented to reduce the organisation’s exposure to risk. Failure to adequately control risks within this area can have a significant negative operational impact on the organisation. See GTAG 7 Information Technology Outsourcing of the series of IIA Global Technology Audit Guides. 26 Key control areas The auditor should appraise the quality and standard of an outsourced ICT function, or part of it, by ensuring that: a management framework is in place and performance is monitored against contract requirements, with action taken when the supplier fails to meet contract requirements there is a formal contract with the supplier, drawn up in accordance with the organisation’s contract procedures, that includes areas such as: – service levels and incentives – supplier personnel – data protection, privacy and intellectual property – price protections – management of subcontractors – ownership of existing and new assets – conflicts among different legal systems – contingency management and change planning – notice of adverse material impacts – right to audit – termination. there is both formal and informal communications with the supplier, and that problems are rectified security arrangements are tested to ensure adequate backup and retrieval of the organisation’s data, and that disruption to the organisation is minimised there is daily, and local where necessary, support (possibly including out of hours) to ensure that disruption to the organisation is minimised managers are reviewing current practices proactively and looking to provide enhanced performance either during the outsourcing or when the contract is renegotiated there are appropriate insurance arrangements in place comparisons are made with other organisations/providers, to ensure that costs and service provision are comparable; and 27 the supplier agrees to comply with the organisation’s security policy. Information systems architecture An information systems architecture is a formal definition of the business processes and rules, systems structure, technical framework, and product technologies for a business or organisational information system. Information systems are complex artefacts, and therefore they have to be developed very carefully. There are five main elements: 1. business architecture – business processes and the object classes that play a role considered from the perspective of the information system 2. functional architecture – the logical decomposition of the system into (logical) components and the assignment of processes and object classes to these components 3. software architecture – software components that realize the functional architecture, eg the database management system, the workflow engine and the connectivity software (middleware) 4. network architecture – a computer and communications network together with their operating systems 5. data architecture – the organisational model for business data storage and integration. Some benefits of information systems architecture are: business processes are streamlined systems information complexity is reduced enterprise-wide integration is enabled through data sharing and consolidation rapid evolution to new technologies is enabled. The auditor should be expected to cover risks relating to: ISA not aligned with business objectives inappropriate data storage utilisation of data maintenance costs data disposal. 28 Systems development Objectives and risks ICT is one of the fastest developing areas of most organisations. This is partially fuelled by the ever improving speed and capacity of computers, and the continual stream of similarly enhanced programs and operating systems. Therefore, the auditor needs to ensure that developments are managed and are in line with the strategic plan. See the IIA GTAG-12: Auditing IT Projects. There are a number of different ways in which new systems can be obtained, including bespoke developments, off-the-shelf systems, and customised solutions. Each brings with it a different set of risks and challenges. The organisation must take the most appropriate route to develop a new system, taking into account factors such as requirements, cost, time to develop, inherent risk of the solution and ongoing support and maintenance. In addition the organisation needs to ensure that sufficient resources, especially suitably trained personnel, are on hand to enable strategies and plans to be carried out. The key risks of inadequate control within this area include the development and implementation of procedures and/or systems that do not meet organisational or user requirement. At best this will lead to inefficient use of resources and it could also adversely affect the operation of the organisation. However, most organisations now use and apply project management techniques, for example PRINCE 2, to ensure systems developed is managed and implemented to the correct standard. Key control areas To ensure that exposure to risk is minimised during the development of procedures and systems, the auditor should establish that: off-the-shelf solutions adequately meet the organisation’s requirements, with compromise only on those requirements where this is deemed acceptable ongoing support and maintenance is available once the system is operational, with an appropriate level of knowledge and expertise being retained. This is especially true for tailored or customised solutions and where external resources are used in any development developments are following appropriate project management and system development lifecycle methodologies 29 only systems included in the approved information systems strategy and/or development plan are being developed and they are supported by appropriately approved business cases that clearly set out the justification for change and measurable business benefits developments are programmed in an organised and prioritised manner to make optimum use of available resources the programming of systems development work ensures that only authorised projects are being developed there is adequate user involvement and representation at all stages of the development of systems system specifications are clearly documented so that development staff are aware of the requirements of users and that systems are not over-specified with facilities that will not be used (ie essential developments should be considered and actioned before desirable ones). As an example, in purchasing mobile phones would one that simply makes and receives calls be sufficient or is a more technically advanced phone required with a sophisticated operating system allowing ‘push’ email, diary synchronisation, internet access, java applications etc? the auditor’s views are sought on the controls to be incorporated into any system all developments are adequately tested including system and user documentation systems are reviewed once they are in place to establish that they meet the objectives originally envisaged users are trained at an appropriate time to make the best possible use of the system and retain the knowledge once they need to use the system there is a method of costing and recharging or where appropriate. Infrastructure Audits Networks and communication Objectives and risks Networks are key for information flow and communication, linking users and computers in different locations across the globe. Networks can be regarded as the technological infrastructure that facilitates communication between users and systems. Therefore, managers and auditors need to understand the use and impact of 30 networks within the organisation, including those such as the internet, to enable them to ensure they meet the needs of the organisation and are properly managed and secure. Protecting networks is a complex task, requiring a clear understanding of business needs and the nature of the organisation’s systems that use networks, as well as a sound technical understanding of network technologies and controls. This is an important area for the auditor as weaknesses can adversely impact upon many areas of the organisation. When auditing networks, the auditor should consider the following objectives: a network strategy exists and standards and policies are in place to support its delivery connections and access to the network are approved and secure unauthorised access to data transmitted over the network is minimised management commission independent penetration testing whenever external links are changed the risk and impacts of network failure are minimised. For risks, see the Data Capture and Data Entry section below. Key control areas Key controls areas for the auditor to focus on in this area include ensuring that: a strategy exists for the continued effective, efficient and secure use of network facilities responsibilities for the management and operation of the network is clearly defined network users and administrators are trained appropriately technical standards and configuration information are clearly documented network activity is monitored for security breaches and to ensure performance is optimised commercial and service arrangements for the network are fully documented, supported, monitored, and agreed by all parties all relevant procedures are clearly documented 31 only authorised users and devices are able to make network connections and the network is monitored for unauthorised connections encryption is used to help prevent unauthorised access to data transmitted over the network data and programs are safeguarded from loss, misuse, theft, damage, and accidental or deliberate corruption or denial of service attacks hardware and communication media are protected against damage, malfunction and misuse arrangements exist for the maintenance and insurance of hardware, communications infrastructure, network management software and consequential loss recovery and business continuity arrangements exist in the event of failure of communication lines or network components. G-Cloud solutions to prevent staff violating corporate policy Objectives and risks On 27 October 2011, the government published four strategies covering G-Cloud, end user devices, ICT capability and greening government ICT. These provide the environment and approaches to radically transform the ICT landscape to create a more productive, flexible workforce that delivers digital public services in a much more cost effective way. The government strategy aims to “deliver better public services for less cost”. This is because the government views ICT as the enabler to release savings and increase public sector productivity to reduce the structural deficit and continue to fund front-line services. The government ICT strategy will enable the building of a common infrastructure underpinned by a set of common standards and government will work to accelerate the strategy as part of its drive to cut down costs and improve current capabilities. Specifically the strategy will build on the ICT moratorium, project review and contract renegotiations which have allowed the government to appraise and take control of spending and ensure that projects demonstrate value for money and effectiveness. It will further underline the government’s commitment to increasing governance and transparency. In preparation for the G-Cloud the compliance and assurance requirements for the ICT Code of Connection (Co-Co) Security Standards of the Government Secure eXtranet will be increasingly 32 important to protect sensitive enterprise data, intellectual property and financial information security. In a perfect world, all employees would take the guiding security principles to heart and carefully abide by all policies and procedures. Instead of a perfect world, we are living in a threat-conscious one in which hacking attempts and breaches are daily news items – and those are just the ones that are successful. Other attempts are thwarted before any damage occurs, thanks to companies that enforce good security policies – ones that align with business realities and the need to protect sensitive enterprise data. Employees present the biggest risk to the cloud security challenges. Employees will violate the security policy either by error or intent for any of the following reasons: they don’t understand the risk or think the threats are far less severe than they are told they don’t care about the risk they are rushed and feel abiding by security policies is too time consuming security policies impede their ability to perform their duties they think IT can stop outside threats and will cover for any security policy violations. Key control areas A May 2010 study by the Aberdeen Group indicated that organisations using cloud-delivered security (see Cloud Security Alliance) saw a significant improvement in malware incidents, website compromises, data loss and exposure, security related downtime and audit deficiencies. Adopting the cloud risk mitigation policies below helps to ensure that its data is adequately protected. Deliver security protocols. This enables the enterprise to control and ensure that security measures like password protocols, firewalls and security patches are current and adhered to, rather than leaving the decision making to sometimes-fickle employees. Enable deletion of data from endpoint devices in the event that they are lost or stolen. Deliver news items regarding the latest security threats. Keeping employees abreast of security breaches, phishing attempts and trick email ploys will help heighten their awareness about the issue. 33 Provide layered authorisation. This lets the company control server access depending on who is trying to use it: customers, employees or managers. For example, customers may need to access servers to buy products, while financial managers will need to access the firm’s internal financial data. Use the cloud to route all network requests such as email and server access through a centralised, protected connection such as message labs that stays up to date with the latest security protocols. This way any threats are blocked before they get to the network. Once there, they are extremely difficult and expensive to eradicate. Deliver new applications to employees and managers via the cloud. This ensures they use business, accounting, word processing and other solutions that include the same updated security protocols used throughout the network. Provide social networking solutions via the cloud to leverage the growing popularity of social networking while at the same time ensuring applications adhere to corporate security protocols. Taking steps towards the above controls in advance of the G-Cloud requirements being mandated can help proactively protect enterprise data from the known and burgeoning threats while still fulfilling the needs of employees, managers, business partners and customers. Voice communication networks Objectives and risks The voice network is also an important communication channel for organisations. Traditionally this facility was provided via a private branch exchange (PBX), which is a telephone system owned and operated by an organisation to switch calls between users within the organisation and the telephone network. More recently organisations are moving to voice over internet protocol (VoIP) technology for their voice communications. This technology routes voice conversations over the internet or through an internal internet protocol (IP) based network alongside data communications. Key risks associated with voice networks include theft of service, denial of service, unauthorised disclosure of information, data modification, unauthorised access, and traffic analysis. When auditing voice communication networks, the auditor should consider the following objectives: 34 the telecommunications organisation is effectively structured and has sufficient policies, strategies, resources and training monthly usage is reviewed and challenged by management for controlling costs telecommunications assets and facilities are effectively managed physical security controls are in place for the telecommunications facilities logical and system security controls are in place to protect the system from abuse controls are in place for making changes to configurations, software and users controls are in place to protect the system when problems are detected emergency and business continuity procedures are in place and reliable adequate controls are in place to ensure the system meets business requirements. For risks, see the Data Capture and Data Entry section below. Key control areas Key control areas for the auditor to focus on in this area include ensuring that: call patterns, capacity and errors are monitored network class of service is used to manage user profiles and restrict numbers that can be dialled and the times of day when calls can be made equipment is physically secured long distance calls are protected call forwarding and dial through are restricted remote maintenance is protected changes follow formal change control procedures. 35 Monitoring Objectives and risks Management need to be confident that the organisation’s information systems are working efficiently and effectively and that information systems strategies and development plans are produced. This should help to ensure that any potential problems are identified and rectified at the earliest opportunity to minimise disruption, and that the organisation’s changing needs are identified and plans put in place to reflect those changing requirements. Weaknesses within this area can lead to problems with ICT not being identified in a timely manner, not being anticipated sufficiently early enough to be avoided, or ICT not meeting changing business needs, and thereby being unable to support business requirements. For risks, see the Data Capture and Data Entry section below. Key control areas Key controls areas for the auditor to focus on in this area include ensuring that: policies and plans are reviewed on a regular basis information systems are adequately reviewed by management regular reviews take place of performance against the information systems strategy and development plan and reporting to senior management regular management reviews of systems usage and storage capacity take place. Security of Electronic Data Objectives and risks A good background to data security, including relevant legislation, can be found within the ICT Security section. The coverage here is not designed to give a detailed understanding of data security, but rather an overview of the subject and the risk areas for consideration. This overview will look at a number of risks to the security of electronic data (although a number of these risks are equally applicable to non-electronic data). It will then look at possible controls to mitigate these risks. See GTAG-15: Information Security Governance and the seventh principle of the Data Protection Act. 36 It must be borne in mind that developments in IT move at a great pace and therefore the list of risks and controls may not be comprehensive, however, the categories of risk will remain appropriate and with a little application and understanding the auditor can determine if the controls in place are appropriate. Data capture Risks The wrong data is collected, for example through poor form design or ambiguous questions. Data is captured by inappropriate methods, for example could barcodes and barcode readers be used as more accurate data capture methods than manual data input? The organisation collects data which it is not entitled to, for example personal data is collected for a use for which is not covered within a data protection registration. Potential controls Ensure all appropriate stakeholders are involved in developing and reviewing the requirements of new systems and ensure post-implementation reviews of “new systems”/“system changes” (to ascertain views of system users) are carried out. See GTAG-2: Change and Patch Management Controls: Critical for Organizational Success. There should be a mechanism for all “new systems”/“systems changes” to be reported to the data protection officer. Positive confirmation is needed that data protection issues have been assessed. Data entry Risks Data is entered into the system incorrectly. Key data is not entered into the system. Data entered is unreasonable, for example the age of a child at school is greater than that which could be possible. Data is duplicated. Data is missing or not entered. Data entry processes are unavailable. 37 Potential controls Validation and verification routines are embedded within the system to detect data entry errors. Key fields are made mandatory and require an entry in order to progress with data entry. Wherever possible, the data entered is restricted to predefined values, usually by the use of selection lists. Data is derived using other data where possible. For example, addresses are automatically derived from just entering a post code and house number, or an age is generated automatically from a date of birth. Exception reports are produced and subject to review to ensure data entry errors are resolved. Continuity plans are in place covering data entry mechanisms. User access management Risks Data can be accessed by unauthorised individuals. An inappropriate level of access is allowed to applications and files. Remote access to applications and data is not secure. Potential controls Access to applications, where appropriate, is via a menu and/or appropriate levels of user password and identification. Appropriate levels of passwords and user identity controls are used to grant and to limit, as appropriate, access to various levels of information by various classes of user or individual users. Firewall network protection programs including virus detection software are used. Software is used to regulate the use of the internet, possibly with a dial back procedure for external log-on. Encrypted data transfer is used. 38 Equipment security Risks Inappropriate access is granted to the hardware where data is stored. Equipment including data is removed off site. Potential controls Appropriate levels of physical access security, appropriate operating procedures/performance monitoring for equipment, and appropriate recovery and restart procedures are maintained. Storage of data Risks Data is inappropriately stored (eg stored off site; stored locally on PC hard disks or memory sticks). Data is not properly backed up. Data retention does not comply with the Data Protection Act 1998. Data is not stored in compliance with information governance policy. Potential controls The hard disk is disabled and dumb terminals are used with USB ports disabled or restricted to authorised users and encrypted devices. Reviews of compliance with the data security policy are carried out. Data encryption is used. Backup policy and procedures are in place, including backup copies subject to appropriate security (off site backup). Backup integrity checks are carried out (regular testing of the ability to restore data from backups). Backups for servers are automated. 39 Communication of data Risks The data is intercepted and corrupted. Data is lost or corrupted during transfer. Potential controls Data encryption is used. Control totals are used. Network software has inbuilt completeness and integrity checks. Dedicated communication lines are used. Inappropriate disclosure of data Risks The organisation fails to comply with the Data Protection Act 1998. The organisation fails to comply with Caldicott requirements within the NHS. Reputational damage is caused by disclosure of sensitive data. The organisation is sued for loss suffered by an individual due to inappropriate disclosure. Potential controls Reviews of compliance with the data security policy are carried out. Payments/transactions data Payment being made or received over the internet is becoming increasingly common within the public sector, and therefore, security on payments is the primary security risk with electronic transactions. The organisation must comply with payment card security standards where credit or debit card payments are accepted. Three of the best known options for the encryption and security of personal and card details are: Public Key Software Infrastructure (PKI) Secure Electronic Transaction (SET) 40 Secure Socket Layer (SSL). In addition, the government has initiated the set up of the Public Services Network (PSN) to create a “network of networks” for the public sector from the existing commercial network providers in compliance with the Government Connect Secure Extranet (GCSX) requirements. This is a secure, private, wide area network (WAN) which enables secure interactions between connected local authorities and other GSi connected organisations. GCSX is connected to the Government Secure Intranet (GSi), thus enabling secure interactions between local authorities and central government departments and national bodies. It also provides secure access from connected local authorities to many other secure networks such as the NHS. There are many benefits to local authorities from achieving the standard, uniform and high level security Code of Connection (CoCo), including compliance with the Data Protection Act and with both central government policy and the local government data handling guidelines. GCSX now provides a foundation upon which to build shared services and secure multi-agency joint working programmes. Data quality, security and sharing Information in both electronic and paper formats is vital to the operation of an organisation’s business activities and the volume of information held is increasing rapidly. Before sharing personal data, the following should be considered to ensure the risk of loss or unauthorised access is minimised: the sharing is lawful and necessary the recipient is verified the proposed method of sharing the personal data is appropriate and secure ie encrypted remote access to data is via a secure link such as a such as a virtual private network connection a risk assessment is carried out and documented before sharing any data either electronically or otherwise. Further information on this subject can be found in the Data Security and Transfer section. CAATS Data Analysis/Interrogations Computer Assisted Audit Techniques (CAATs) are data interrogation techniques that are increasingly used by auditors to help perform 41 assurance and compliance audits by testing the accuracy and completeness of data. See ISACA Guideline G3 Use of Computerassisted Audit Techniques, IIA GTAG 16: Data Analysis Technologies and GTAG-3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment. It is the volume of records examined via CAATs that makes an enormous difference in audit reports and this volume of testing adds real value to the quality of the assurance opinion provided. For example, which looks better in an audit report: “Audit tested 50 transactions and noted one transaction that was processed incorrectly” or “Audit used CAATS to test every payment made last year and found X exception records amounting to £n in value”. The value of CAATs driven audit reviews is limited by the quality of the business application data saved in files and the extent to which data is stored in accordance with a systematic pattern. Much data is not documented in a specific structure or else the saved data is poorly classified and contains deficiencies that make it integrity suspect. So, for now CAATs can complement audit activities in certain audits but can’t be used at all in some while in others the value of the audit opinion can be challenged unless CAATs have been used. “CAATs” can refer to any computer program used to improve the audit process. Generally, however, the term is used to refer to any data extraction and analysis software. This would include programs such as spreadsheets (eg Excel), databases (eg Access), statistical analysis (eg SAS), business intelligence (eg Crystal Reports and Business Objects), etc. There are, however, companies that have developed dedicated data analytic software specifically for auditors. Benefits of audit software include the following. The software is independent of the system being audited and will use a read-only copy of the file to avoid any corruption of an organisation’s data. Many audit-specific routines are used such as sampling. Many provide documentation of each test performed in the software that can be used as documentation in the auditor’s work papers. Automation of multiple tests is possible including: – data queries – data stratification 42 – sample extractions – missing sequence identification – statistical analysis – calculations – duplicate inquires – pivot tables and cross tabulation. Some advantages of using specialist computer audit software tools, rather than standard PC software reporting tools such as SQL query, MS Access and MS Excel, are: ability to scrutinise huge data volumes in a fraction of the time ability to help identify erroneous or exceptional items eg duplicate payments user friendly maintains a log of the tests undertaken ability to develop and run macros and automated test scripts. Some disadvantages of using software are: cost of software staff training learning development and retention obtaining access to data understanding the data obtained. ACL and IDEA dominate the proprietary market for CAATs but the open source alternative solution Picalo (www.picalo.org) represents a valid zero cost alternative. The Picalo software, which reads any Open DataBase Connectivity (ODBC) source files and any open source Python programming data, was designed with fraud detection in mind so while it does not include sampling it does include Benford's law and calculated columns. Picalo scripts are written in Python so sampling can easily be added and the documentation is very good. CAATs provide auditors with fraud detection tools that can identify unexpected or unexplained patterns in data that may indicate fraud. Whether the CAATs are simple or complex, data analysis provides many benefits in the prevention and detection of fraud. 43 CAATs form the basis of the annual National Fraud Initiative (NFI), which was initiated in the London boroughs by the Audit Commission and the London Audit Group, and now covers the national data matching and analysis of both public and private sector records. The NAO may take the NFI activities when the Audit Commission is decommissioned. CAATs can also provide audit and management with a continuous monitoring and assurance capability to implement an ongoing process for acquiring, analysing, and reporting on business data to identify and respond to operational business risks. See the IIA GTAG 16: Data Analysis Technologies and GTAG-3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment. CAATs links www.caats.ca/default.php?file=acl www.acl.com/products/ccm.aspx www.caseware.com/about-us/news-reviews/idea-script-is-asimple-way-to-automate-testing-for-continuous-controlsmonitoring Conclusion on the use of CAATs CAATs data analysis is a complex area that can provide real value in assessing the level of controls being applied but it is always necessary to understand the organisational policies and procedures and how they impact on the specific area under review. Data integrity and security is likely to be an audit consideration in a number of individual audit reviews and specialists may be required in order to undertake more detailed work in certain areas of data analysis, as they are in other technical ICT audit areas such as data security, network security, server security, intrusion detection systems, firewalls, routers and the cloud.