appendix a: the cisa exam and cobit

advertisement
Appendix A
TM
Appendix A: The CISA Exam and CobiT
The CISA Exam and CobiT
CobiT 4.1 is an initiative conducted by the IT Governance Institute.
CobiT has been developed as a generally applicable and accepted
framework for good IT security and control practices that provide a
reference for management, users, and IS audit, control and security
practitioners. CobiT is based on ITGI’s control objectives, enhanced
with existing and emerging international technical, professional,
regulatory and industry-specific standards. The resulting control
objectives have been developed for application to organizationwide
information systems.
CobiT also supports a generic IT assurance/audit process which
can be summarized as:
• Obtaining an understanding of business requirements, related
risks and relevant control measures
• Evaluating the appropriateness of stated controls
• Assessing compliance by testing whether the stated controls are
working: as prescribed, consistently and continuously
• Substantiating the risk of control objectives not being met by
using analytical techniques and/or consulting alternative sources
Although knowledge of CobiT is not specifically tested on the
CISA exam, the CobiT control objectives or processes reflect the
tasks identified in the CISA job practice. As such, a thorough
review of CobiT is recommended for candidate preparation for
the CISA exam. To focus a candidate’s attention on the specific
CobiT processes that relate to CISA practice analysis tasks, the
following table has been provided to aid in a candidate’s exam
preparation.
Note: The CobiT framework is available at no charge from
ISACA/ITGI and can be downloaded at www.isaca.org/cobit.
To focus a candidate’s attention on the specific CobiT processes
that relate to CISA practice analysis tasks, the following table has
been provided to aid in a candidate’s exam preparation.
Chapter 1: The IS Audit Process
CobiT 3rd Edition
CISA Review Manual
1.1
evelop and implement a risk-based IS audit strategy for the
D
organization in compliance with IS audit standards, guidelines and best
practices.
PO9
M3
Plan specific audits to ensure that IT and business systems are
protected and controlled.
M3
1.3
onduct audits in accordance with IS audit standards, guidelines and
C
best practices to meet planned audit objectives.
1.4
1.2
1.5
CobiT 4.0 and 4.1
CobiT Processes
Tasks
Assess risk
btain independent
O
assurance
Provide for independent
audit
PO9
btain independent
O
assurance
Provide for independent
audit
PO9
M4
P rovide for independent
audit
ME2 M
onitor and evaluate
internal control
ommunicate emerging issues, potential risks and audit results to key
C
stakeholders.
M3
btain independent
O
assurance
Provide for independent
audit
PO8
PO9
A dvise on the implementation of risk management and control
practices within the organization while maintaining independence.
PO9 Assess risk
PO11 Manage quality
M3 Obtain independent
assurance
M4 Provide for independent
audit
CISA Review Manual 2010
M4
M4
M4
A ssess and manage
IT risks
ME2 Monitor and evaluate
internal control
A ssess and manage
IT risks
ME2 Monitor and evaluate
internal control
Manage quality
Assess and manage
IT risks
421
Appendix A
TM
Chapter 2: IT Governance (cont.)
CobiT 3rd Edition
CISA Review Manual
CobiT 4.0 and 4.1
CobiT Processes
Tasks
PO1
PO4
efine a strategic plan
D
Define the IT processes,
organization and
relationships
PO5 Manage the IT investment
PO6 Communicate
management aims and
directions
ME4 Provide IT governance
2.1
E valuate the effectiveness of the IT governance structure to ensure
adequate board control over the decisions, directions and performance
of IT so that it supports the organization’s strategies and objectives.
PO1 D
efine a strategic plan
PO4 Define the IT organization
and relationship
PO5 Manage the IT investment
PO6 Communicate
management aims and
directions
M2 Assess internal control
adequacy
M3 Obtain independent
assurance
M4 Provide for independent
audit
2.2
E valuate IT organizational structure and human resources (personnel)
management to ensure that they support the organization’s strategies
and objectives.
PO4
2.3
E valuate the IT strategy and the process for its development, approval,
implementation and maintenance to ensure that it supports the
organizations strategies and objectives.
PO1
PO5
efine a strategic IT plan
D
Manage the IT investment
PO1
PO5
efine a strategic IT plan
D
Manage the IT investment
2.4
Evaluate the organization’s IT policies, standards, procedures and
processes for their development, approval, implementation, and
maintenance to ensure that they support the IT strategy and comply
with regulatory and legal
PO8
E nsure compliance with
external requirements
Manage changes
Monitor the processes
AI6
ME1
Manage changes
onitor and evaluate
M
performance
Ensure regulatory
compliance (4.0)
Ensure compliance with
external requirements (4.1)
PO7
DS1
AI6
M1
efine the IT organization PO4 Define the IT processes,
D
and relationships
organization and
Manage human resources
relationships
Define and manage service PO7 Manage IT human
levels
resources
DS1 Define and manage
service levels
ME3
ME3
2.5
E valuate management practices to ensure compliance with the
organization’s IT strategy, policies, standards and procedures.
PO6 C
ommunicate
management aims and
direction
PO7 Manage human resources
PO10 Manage project
PO11 Manage quality
DS6 Identify and allocate costs
PO6 C
ommunicate
management aims and
direction
PO7 Manage IT human
resources
PO8 Manage quality
PO10 Manage projects
DS6 Identify and allocate costs
2.6
E valuate IT resource investment, use and allocation practices to ensure
alignment with the organization’s strategies and objectives.
PO5 Manage the IT investment
PO10 Manage projects
PO5 Manage the IT investment
PO10 Manage projects
2.7
E valuate IT contracting strategies and policies and contract
management practices to ensure that they support the organization’s
strategies and objectives.
PO7 Manage human resources
PO8 Ensure compliance with
external requirements
AI1 Identify automated
solutions
DS2 Manage third-party
services
DS9 Manage the configuration
PO7 M
anage IT human
resources
AI1 Identify automated
solutions
DS2 Manage third-party
services
DS9 Manage the configuration
ME3 Ensure regulatory
compliance (4.0)
ME3 Ensure compliance with
external requirements (4.1)
422
CISA Review Manual 2010
Appendix A
TM
Chapter 2: IT Governance (cont.)
CobiT 3rd Edition
CISA Review Manual
CobiT 4.0 and 4.1
CobiT Processes
Tasks
2.8
E valuate risk management practices to ensure that the organization’s
IT related risks are properly managed.
PO1 D
efine a strategic IT plan
PO6 Communicate
management aims and
directions
PO9 Assess risk
PO10 Manage projects
M1 Monitor the process
M4 Provide for independent
audit
PO1 Define a strategic IT plan
PO6 Communicate
management aims and
directions
PO9 Assess and manage IT
risks
PO10 Manage projects
ME4 Provide IT governance
2.9
E valuate monitoring and assurance practices to ensure that the board
and executive management receive sufficient and timely information
about IT performance.
PO8
PO8 Manage quality
PO10 Manage projects
ME2 Monitor and evaluate
internal control
ME3 Ensure regulatory
compliance (4.0)
ME3 Ensure compliance with
external requirements (4.1)
CISA Review Manual 2010
E nsure compliance with
external requirements
PO10 Manage projects
PO11 Manage quality
M2 Assess internal control
adequacy
M3 Obtain independent
assurance
423
Appendix A
TM
Chapter 3: Systems and Infrastructure Life Cycle Management (cont.)
CobiT 3rd Edition
CISA Review Manual
CobiT Processes
Tasks
3.1
3.2
E valuate the business case for the proposed system development/
acquisition to ensure that it meets the organization’s business goals.
E valuate the project management framework and project governance
practices to ensure that business objectives are achieved in a costeffective manner while managing risks to the organization.
CobiT 4.0 and 4.1
etermine technological
D
direction
PO11 Manage quality
AI1 Identify automated
solutions
AI2 Acquire and maintain
application software
AI3 Acquire and maintain
technology infrastructure
DS9 Manage the configuration
PO3
PO9
PO10
PO11
AI1
PO8
PO9
PO10
AI1
PO3
AI2
Assess risks
Manage projects
Manage quality
Identify automated
solutions
Acquire and maintain
application software
PO8
AI1
AI2
AI3
DS9
AI2
etermine technological
D
direction
Manage quality
Identify automated
solutions
Acquire and maintain
application software
Acquire and maintain
technology infrastructure
Manage the configuration
Manage quality
Assess and manage IT risk
Manage projects
Identify automated
solutions
Acquire and maintain
application software
PO10 Manage projects
AI1 Identify automated
solutions
AI2
Acquire and maintain
application software
ME2 Monitor and evaluate
internal control
3.3
P erform reviews to ensure that a project is progressing in accordance
PO10 Manage project
with project plans, it is adequately supported by documentation and the AI1 Identify automated
status reporting is accurate.
solutions
AI2 Acquire and maintain
application software
M3 Obtain independent
assurance
M4 Provide for independent
audit
3.4
E valuate proposed control mechanisms for systems and/or
infrastructure during specification, development/acquisition, and
testing to ensure that they will provide safeguards and comply with the
organization’s policies and other requirements.
PO10 Manage projects
PO11 Manage quality
AI1 Identify automated
solutions
AI2 Acquire and maintain
application software
AI5 Install and accredit
systems
PO8 Manage quality
PO10 Manage projects
AI1 Identify automated
solutions
AI2
Acquire and maintain
application software
AI7 Install and accredit
solutions and changes
3.5
E valuate the processes by which systems and/or infrastructure are
developed/acquired and tested to ensure that the deliverables meet the
organization’s objectives.
PO10 Manage projects
PO11 Manage quality
AI1 Identify automated
solutions
PO8 Manage quality
PO10 Manage projects
AI1 Identify automated
solutions
AI2
Acquire and maintain
application software
AI7
Install and accredit
solutions and changes
3.6
E valuate the readiness of the system and/or infrastructure for
implementation and migration into production.
AI2
A cquire and maintain
application software
Install and accredit
systems
PO3
etermine technological
D
direction
Acquire and maintain
technology infrastructure
Install and accredit
systems
PO8 Manage quality
PO10 Manage projects
AI7 Install and accredit
solutions and changes
3.7
P erform postimplementation review of systems and/or infrastructure to
ensure that they meet the organization’s objectives and are subject to
effective internal control.
AI5
PO3
AI3
AI5
424
AI3
AI7
etermine technological
D
direction
Acquire and maintain
technology infrastructure
Install and accredit
solutions and changes
CISA Review Manual 2010
Appendix A
TM
Chapter 3: Systems and Infrastructure Life Cycle Management (cont.)
CobiT 3rd Edition
CISA Review Manual
CobiT 4.0 and 4.1
CobiT Processes
Tasks
3.8
P erform periodic reviews of systems and/or infrastructure to ensure
that they continue to meet the organization’s objectives and are subject
to effective internal control.
PO10 Manage projects
PO11 Manage quality
AI5
Install and accredit
systems
PO6 Communicate
management aims and
direction
PO10 Manage projects
PO11 Manage quality
AI5 Install and accredit
systems
DS1 Define and manage
service levels
DS3 Manage performance and
capacity
M2
Assess internal control
adequacy
M3 Obtain independent
assurance
M4 Provide for independent
audit
PO6
3.9
E valuate the process by which systems and/or infrastructure are
maintained to ensure the continued support of the organization’s
objectives and are subject to effective internal control.
PO3
etermine technological
D
direction
PO11 Manage quality
AI3
Acquire and maintain
technology infrastructure
AI6
Manage changes
PO3
PO6
PO6
3.10 E valuate the process by which systems and/or infrastructure are
disposed of to ensure that they comply with the organization’s policies
and procedures.
AI1
ommunicate
C
management aims and
direction
Identify automated
solutions
ommunicate
C
management aims and
direction
PO8 Manage quality
PO10 Manage projects
AI7
Install and accredit
solutions and changes
DS1 Define and manage
service levels
DS3 Manage performance and
capacity
ME2 Monitor and evaluate
internal control
PO8
AI3
AI6
AI1
etermine technological
D
direction
Manage quality
Acquire and maintain
technology infrastructure
Manage changes
ommunicate
C
management aims and
direction
Identify automated
solutions
Chapter 4: IT Service Delivery and Support (cont.)
CobiT 3rd Edition
CISA Review Manual
CobiT Processes
Tasks
4.1
E valuate service level management practices to ensure that the level
of service from internal and external service providers is defined and
managed.
AI4
DS1
DS2
DS6
DS8
M1
4.2
E valuate operations management to ensure that IT support functions
effectively meet business needs.
CISA Review Manual 2010
CobiT 4.0 and 4.1
PO9
AI4
evelop and maintain
D
procedures
Define and manage
service levels
Manage third-party
services
Identify and allocate costs
Assist and advise
customers
Monitor the process
Assess risks
evelop and maintain
D
procedures
AI5 Install and accredit
systems
DS13 Manage operations
M2
Assess internal control
adequacy
AI4
DS1
Enable operation and use
efine and manage
D
service levels
DS2 Manage third-party
services
DS6 Identify and allocate costs
DS8 Manage service desk and
incidents
DS10 Manage problems
ME1 Monitor and evaluate IT
performance
PO9
A ssess and manage IT
risks
AI4 Enable operation and use
AI7
Install and accredit
solutions and changes
DS13 Manage operations
ME1 Monitor and evaluate IT
performance
425
Appendix A
TM
Chapter 4: IT Service Delivery and Support (cont.)
CobiT 3rd Edition
CISA Review Manual
CobiT Processes
Tasks
4.3
E valuate data administration practices to ensure the integrity and
optimization of databases.
CobiT 4.0 and 4.1
PO2
PO4
AI1
AI2
AI5
DS5
M1
efine the information
D
architecture
Define the IT organisation
and relationships
Identify automated
solutions
Acquire and maintain
application software
Install and accredit
systems
Ensure systems security
Monitor the process
PO2
efine the information
D
architecture
PO4 Define the IT processes,
organization and
relationships
AI1 Identify automated
solutions
AI2 Acquire and maintain
application software
AI7 Install and accredit
solutions and changes
DS5 Ensure systems security
ME1 Monitor and evaluate IT
performance
4.4
E valuate the use of capacity and performance monitoring tools
and techniques to ensure that IT services meet the organization’s
objectives.
PO11 Manage quality
AI1
Identify automated
solutions
AI5
Install and accredit
systems
DS1 Define and manage
service levels
DS3 Manage performance and
capacity
M1
Monitor the process
AI1
4.5
E valuate change, configuration and release management practices
to ensure that changes made to the organization’s production
environment are adequately controlled and documented.
AI2
PO8
AI2
AI3
AI5
AI6
DS9
A cquire and maintain
application software
Acquire and maintain
technology infrastructure
Install and accredit
systems
Manage changes
Manage the configuration
Identify automated
solutions
AI7 Install and accredit
solutions and changes
DS1 Define and manage service
levels
DS3 Manage performance and
capacity
ME1 Monitor and evaluate IT
performance
AI3
AI6
AI7
DS9
4.6
E valuate problem and incident management practices to ensure that
incidents, problems or errors are recorded, analyzed and resolved in a
timely manner.
DS8
A ssist and advise
customers
DS10 Manage problems and
incidents
DS11 Manage data
DS8
4.7
E valuate the functionality of the IT infrastructure (e.g., network
components, hardware, system software) to ensure that it supports the
organization’s objectives.
PO3
PO3
426
Manage quality
A cquire and maintain
application software
Acquire and maintain
technology infrastructure
Manage changes
Install and accredit
solutions and change
Manage the configuration
anage service desk and
M
incidents
DS10 Manage problems
DS11 Manage data
ME1 Monitor and evaluate IT
performance
etermine technological
D
direction
PO11 Manage quality
AI3
Acquire and maintain
technology infrastructure
AI6
Manage changes
PO8
AI3
AI6
etermine technological
D
direction
Manage quality
Acquire and maintain
technology infrastructure
Manage changes
CISA Review Manual 2010
Appendix A
TM
Chapter 5: Protection of Information Assets (cont.)
CobiT 3rd Edition
CISA Review Manual
CobiT Processes
Tasks
5.1
E valuate the design, implementation and monitoring of logical
access controls to ensure the confidentiality, integrity, availability and
authorized use of information assets.
CobiT 4.0 and 4.1
M1
Manage changes
Ensure continous service
Ensure systems security
Manage problems and
incidents
Monitor the process
AI6
DS4
DS5
DS10
ME1
Manage changes
Ensure continous service
Ensure systems security
Manage problems
Monitor and evaluate IT
performance
Ensure continous service
Ensure systems security
Manage data
Manage operations
Monitor and evaluate IT
performance
AI6
DS4
DS5
DS10
5.2
E valuate network infrastructure security to ensure confidentiality,
integrity, availability and authorized use of the network and the
information transmitted.
DS4
DS5
DS11
DS13
M1
Ensure continous service
Ensure systems security
Manage data
Manage operations
Monitor the process
DS4
DS5
DS11
DS13
ME1
5.3
E valuate the design, implementation and monitoring of environmental
controls to prevent or minimize loss.
PO9
DS4
DS12
M1
Assess risks
Ensure continous service
Manage facilities
Monitor the process
PO9 Assess and manage IT risk
DS4 Ensure continous service
DS12 Manage the physical
environment
ME1 Monitor and evaluate IT
performance
ME3 Ensure regulatory
compliance (4.0)
ME3 Ensure compliance with
external requirements (4.1)
5.4
E valuate the design, implementation and monitoring of physical access
controls to ensure that information assets are adequately safeguarded.
PO4 D
efine the IT organization
and relationships
PO8 Ensure compliance with
external requirements
DS5 Ensure systems security
DS12 Manage facilities
M1 Monitor the process
PO4 D
efine the IT processes,
organization and
relationships
DS5 Ensure systems security
DS12 Manage the physical
environment
ME1 Monitor and evaluate IT
performance
ME3 Ensure regulatory
compliance (4.0)
ME3 Ensure compliance with
external requirements (4.1)
5.5
E valuate the processes and procedures used to store, retrieve,
transport and dispose of confidential information assets.
AI
AI3
A cquire and maintain
technology infrastructure
DS4 Ensure continous service
DS5 Ensure systems security
DS11 Manage data
M1 Monitor the process
DS4
DS5
DS11
ME1
ME3
ME3
CISA Review Manual 2010
A cquire and maintain
technology infrastructure
Ensure continous service
Ensure systems security
Manage data
Monitor and evaluate IT
performance
Ensure regulatory
compliance (4.0)
Ensure compliance with
external requirements (4.1)
427
Appendix A
TM
Chapter 6: Business Continuity and Disaster Recovery
CobiT 3rd Edition
CISA Review Manual
CobiT 4.0 and 4.1
CobiT Processes
Tasks
6.1
E valuate the adequacy of backup and restore provisions to ensure the
availability of information required to resume processing.
PO2 D
efine the information
architecture
DS4 Ensure continuous service
DS11 Manage data
PO2 D
efine the information
architecture
DS4 Ensure continuous service
DS11 Manage data
6.2
E valuate the organization’s disaster recovery plan to ensure that it
enables the recovery of IT processing capabilities in the event of a
disaster.
DS4
DS11
DS12
DS13
DS4 Ensure continuous service
DS11 Manage data
DS12 Manage the physical
environment
ME3 Ensure regulatory
compliance (4.0)
ME3 Ensure compliance with
external requirements (4.1)
6.3
E valuate the organization’s business continuity plan to ensure its ability
to continue essential business operations during the period of an IT
disruption.
DS4 Ensure continuous service
428
Ensure continuous service
Manage data
Manage facilites
Manage operations
DS4 Ensure continuous service
DS13 Manage operations
CISA Review Manual 2010
Appendix A
TM
CobiT® 3rd Edition®
The following information provides the CobiT domains and the 34 IT processes which can be identified for each CISA job practice task
listed in the previous tables.
Planning and Organisation
High Level Control Objective
Planning and Organisation
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO10
PO11
Define a strategic IT plan
Define the information architecture
Determine technological direction
Define the IT organisation and relationships
Manage the IT investment
Communicate management aims and direction
Manage human resources
Ensure compliance with external requirements
Assess risks
Manage projects
Manage quality
Acquisition and Implementation
AI1
AI2
AI3
AI4
AI5
AI6
Identify automated solutions
Acquire and maintain application software
Acquire and maintain technology infrastructure
Develop and maintain procedures
Install and accredit systems
Manage changes
Delivery and Support
DS1
DS2
DS3
DS4
DS5
DS6
DS7
DS8
DS9
DS10
DS11
DS12
DS13
Define and manage service levels
Manage third-party services
Manage performance and capacity
Ensure continuous service
Ensure systems security
Identify and allocate costs
Educate and train users
Assist and advise customers
Manage the configuration
Manage problems and incidents
Manage data
Manage facilities
Manage operations
Monitoring
M1
M2
M3
M4
Monitor the process
Assess internal control adequacy
Obtain independent assurance
Provide for independent audit
CISA Review Manual 2010
429
Appendix A
TM
CobiT® 4.0
The following information provides the CobiT domains and the 34 IT processes which can be identified for each CISA job practice task
listed in the previous tables.
Domain
Process
Plan and Organise
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO10
Define a strategic IT plan.
Define the information architecture.
Determine technological direction.
Define the IT processes, organisation and relationships.
Manage the IT investment.
Communicate management aims and direction.
Manage IT human resources.
Manage quality.
Assess and manage IT risks.
Manage projects.
Acquire and Implement
AI1
AI2
AI3
AI4
AI5
AI6
AI7
Identify automated solutions.
Acquire and maintain application software.
Acquire and maintain technology infrastructure.
Ensure operation and use.
Procure IT resources.
Manage changes.
Install and accredit solutions and changes.
Deliver and Support
DS1
DS2
DS3
DS4
DS5
DS6
DS7
DS8
DS9
DS10
DS11
DS12
DS13
Define and manage service levels.
Manage third-party services.
Manage performance and capacity.
Ensure continuous service.
Ensure systems security.
Identify and allocate costs.
Educate and train users.
Manage service desk and Incidents.
Manage the configuration.
Manage problems.
Manage data.
Manage the physical environment.
Manage operations.
Monitor and Evaluate
ME1
ME2
ME3
ME4
Monitor and evaluate IT performance.
Monitor and evaluate internal control.
Ensure regulatory compliance.
Provide IT governance.
430
CISA Review Manual 2010
Appendix A
TM
CobiT® 4.1
The following information provides the CobiT domains and the 34 IT processes which can be identified for each CISA job practice task
listed in the previous tables.
Domain
Process
Plan and Organise
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO10
Define a strategic IT plan.
Define the information architecture.
Determine technological direction.
Define the IT processes, organisation and relationships.
Manage the IT investment.
Communicate management aims and direction.
Manage IT human resources.
Manage quality.
Assess and manage IT risks.
Manage projects.
Acquire and Implement
AI1
AI2
AI3
AI4
AI5
AI6
AI7
Identify automated solutions.
Acquire and maintain application software.
Acquire and maintain technology infrastructure.
Ensure operation and use.
Procure IT resources.
Manage changes.
Install and accredit solutions and changes.
Deliver and Support
DS1
DS2
DS3
DS4
DS5
DS6
DS7
DS8
DS9
DS10
DS11
DS12
DS13
Define and manage service levels.
Manage third-party services.
Manage performance and capacity.
Ensure continuous service.
Ensure systems security.
Identify and allocate costs.
Educate and train users.
Manage service desk and Incidents.
Manage the configuration.
Manage problems.
Manage data.
Manage the physical environment.
Manage operations.
Monitor and Evaluate
ME1
ME2
ME3
ME4
Monitor and evaluate IT performance.
Monitor and evaluate internal control.
Ensure compliance with external requirements.
Provide IT governance.
CISA Review Manual 2010
431
Download