IS AUDIT DR. MITIL CHOKSHI CHOKSHI & CHOKSHI CHARTERED ACCOUNTANTS For MIPA 2nd May 2014 Contents Introduction Guidelines Need for controls Internal Control Framework Security Threats Information Systems Risks IS Audit Process For MIPA 2nd May 2014 Introduction “The process of collecting and evaluating evidence to determine whether: • • • • Computer system safeguards assets Maintains data integrity, confidentiality and availability Allows organizational goals to be achieved Determines the efficient use of resources” Gain understanding of the organisation Understand Risks and evaluate Controls Test Controls For MIPA 2nd May 2014 For MIPA 2nd May 2014 Guidelines ISACA Guidelines • • • • IS Auditing Standards IS Auditing Guidelines IS Auditing Procedures COBIT (Control objectives for information and related technology) ISO 27001 Guidelines by Institute of Internal Auditors For MIPA 2nd May 2014 Guidelines COSO’s Internal Control – Integrated Framework (the COSO Framework) published by the Committee of Sponsoring Organisations of the Treadway Commission COCO (Criteria of Control) Framework published by the Canadian Institute of Chartered Accountants For MIPA 2nd May 2014 COSO Framework Monitoring Applied to the Internal Control Process For MIPA 2nd May 2014 Need for Controls The Organization must protect itself from: • Corruption of Data and Database. • Poor decision making due to poor quality of MIS. • Losses due to abuse of controls. • Loss of hardware, software and personnel. • Maintenance of Privacy . • Malicious Internet Content. • Authentication and Privilege attacks For MIPA 2nd May 2014 For MIPA 2nd May 2014 Security Threats For MIPA 2nd May 2014 Security Threats For MIPA 2nd May 2014 Security Threats For MIPA 2nd May 2014 Security Threats For MIPA 2nd May 2014 Security Threats Example: Phishing For MIPA 2nd May 2014 Security Threats Example: Drive-by downloads Unintended Software For MIPA 2nd May 2014 Security Threats Example: Virus Scan For MIPA 2nd May 2014 Security Threats Example: Trojan Horse For MIPA 2nd May 2014 Security Threats Example: Spoofing For MIPA 2nd May 2014 Security Threats Example: Spoofing For MIPA 2nd May 2014 For MIPA 2nd May 2014 Relationship Between General and Application Controls Risk of unauthorized change to application software Risk of system crash Cash receipts application controls Sales application controls Payroll application controls Other cycle application controls Risk of unauthorized master file update For MIPA GENERAL CONTROLS Risk of unauthorized processing 2nd May 2014 Information Systems Risks Access controls : • Non-detection of Compromised passwords. • Unauthorized users can access systems. • Inappropriate access allowing recognised users greater access than necessary. • Unauthorized changes to data in master files. • Unauthorized changes to systems or programs. • Denial to access systems, DBMS’s and servers in the event of a system interruption or disaster. For MIPA 2nd May 2014 Information Systems Risks Controls to Mitigate Risks arising from unauthorized Accesses : • Authentication (identification) controls need to be strong. • Roles and privileges should be granted on need-to-know basis only to authorized users. • Job scheduling procedures and stored procedures need to be secure. • An alternate method to identify and register users needs to be tested and made available when needed. For MIPA 2nd May 2014 Information Systems Risks Input Controls • Unauthorized data received for computer processing. • Loss of data or duplication of data. • Automated segregation of duties and access rights. • Automated authorization approval • Incorrect output due to wrong input (GIGO) For MIPA 2nd May 2014 Information Systems Risks Mitigating Risks arising from Input Controls: • Review access rights that set and amend configurable approval and authorization limits. • Accesses with super user rights. • Maker Checker Controls • Range check • Completeness check • Duplicate check For MIPA 2nd May 2014 Information Systems Risks Process Controls • Wrong Validation of data • Risks arising out of Editing Procedures • Incorrect processing of data • Absence of Data File Control Procedures For MIPA 2nd May 2014 Information Systems Risks Mitigating Risks arising from Process Controls: • Parity checking • Reasonableness check • Transaction logs • Table lookups • Version Usage • Existence check • File updating and • Key verification maintenance authorization • Sequence check For MIPA • Logical Relationship check • Limit check 2nd May 2014 Information Systems Risks Output Controls • Non-integrity of output • Untimely distribution of output • Availability of output to unauthorized users • Data processing results are unreliable For MIPA 2nd May 2014 Information Systems Risks Mitigating Risks arising from Output Controls: Checklist for mitigating Risk For MIPA 2nd May 2014 For MIPA 2nd May 2014 Statistics For MIPA 2nd May 2014 Issues Involved For MIPA 2nd May 2014 For MIPA 2nd May 2014 Preliminary Steps - Understanding of the Organisational Structure to identify CIO, CISO, etc. - Understanding of the System Architecture. - Understanding components of the systems (number of servers, routers, users, desk users, on/offsite users) - Reviewing the IS Security Policy - Performing systems walk - throughs. - Assessment of the risks and understanding of the related controls. For MIPA 2nd May 2014 IS Audit Process For MIPA 2nd May 2014 For MIPA 2nd May 2014 Procedures Interviews. - Interviews are a useful audit tool to gather information about internal system controls and risks. - Employees involved in the day - to - day operations of a functional area possess the best knowledge of that area. - They are in a position to identify the weak internal system controls and risks. For MIPA 2nd May 2014 Procedures Preparation of Checklist & Questionnaire - A detailed checklist should be prepared after having an understanding of the architecture of the system. - Checklist should be comprehensive. For MIPA 2nd May 2014 For MIPA 2nd May 2014 Access Controls testingProcedures • Verifying access rights allotted vis-à-vis organizational policy for need to know • Implementation of Password controls • Process of review of logs of super users, database administrator • Logs of active users vis-à-vis HR records for exit, leave, etc. • License control processes • Virus control procedures For MIPA 2nd May 2014 Access controls testing- Procedures Vulnerability testing through internal resources • Internal Security Vulnerability Assessment (ISVA) is a comprehensive analysis of all of the workstations and servers on your network. • The ISVA detects and identifies Trojan horses, hacker tools, DDoS (Distributed Denial-of-Service) agents, and spyware through code analysis and signature matching, in much the same way as anti-virus. • It also identifies specific vulnerabilities such as configuration problems in FTP servers, exploits in Microsoft IIS or problems in NT security policy configuration. For MIPA 2nd May 2014 Access controls testing- Procedures Vulnerability testing through external resources • One of the most common vulnerability assessment activities for companies of all sizes is an external penetration testing scan, typically targeting internet-facing websites. • Once you set yourself outside of the company, you immediately are given an untrusted status. The systems and resources available to you externally are usually very limited. For MIPA 2nd May 2014 VIDEO CLIP For MIPA 2nd May 2014 Input Controls -Procedures • Verification by entering invalid data • Verification by entering incomplete data • Testing Arithmetic Accuracy For MIPA 2nd May 2014 Processing Controls -Procedures Integrated Test Facility (ITF) Approach Parallel Simulation For MIPA 2nd May 2014 Processing Controls -Procedures Integrated Test Facility (ITF) Approach • A dummy ITF center is created for the auditors. • Creation of transactions to test the controls. • Creation of Working papers showing expected results from manually processed information. • Running of Auditor transactions with actual transactions. • Comparing of ITF results to working papers. For MIPA 2nd May 2014 Processing Controls -Procedures Parallel Simulation • Processing of real client data on an audit program similar to the client’s program. • Comparison of results of processing with the results of the processing done by the client’s program. For MIPA 2nd May 2014 Processing Controls -Procedures Parallel Simulation- Flowchart Computer Operations Actual Transactions Computer Application System Actual Client Report For MIPA Auditors Auditor’s Simulation Program Auditor Compares Auditor Simulation Report 2nd May 2014 For MIPA 2nd May 2014 Application Controls -Procedures Blackbox Boxtesting Testing Black • Method of software testing • Examines the functionality of an application (e.g. what the software does) without peering into its internal structures or workings. • Can be applied to virtually every level testing: unit, integration, system and acceptance. • of software Typically comprises most if not all higher level testing, but can also dominate unit testing as well. For MIPA 2nd May 2014 Application Controls -Procedures White Box testing Testing White-box • Also known as clear box testing, glass box testing, transparent box testing, and structural testing. • Method of testing software that tests internal structures or workings of an application, as opposed to its functionality (i.e. black-box testing). • Internal perspective of the system, as well as programming skills, are used to design test cases. • The tester chooses inputs to exercise paths through the code and determine the appropriate outputs. For MIPA 2nd May 2014 Output Controls -Procedures • Checking whether output contain key control information necessary to validate the accuracy and completeness of the information contained in the report such as last document reference period, etc.? • If the data has to be transferred from one process to another process, verify if no manual intervention is possible and no unauthorized modification to data can be made. • Verify physical controls over hardcopy printouts. For MIPA 2nd May 2014 For MIPA 2nd May 2014 Format Format of IS Audit Report For MIPA 2nd May 2014 For MIPA 2nd May 2014