You are on page 1of 19

Chapter 16

Auditing IT
Controls Part III:
Systems
Development,
Program
Changes, and
Application
Auditing

James A. Hall, Accounting Information Systems, 10th Edition. © 2019


Cengage. All Rights Reserved. May not be scanned, copied or duplicated,
or posted to a publicly accessible website, in whole or in part.

Learning Objectives
• Be familiar with the controls and audit tests relevant to the
systems development process.
• Understand the risks and controls associated with program
change procedures and the role of the source program
library.
• Understand the auditing techniques (CAATTs) used to verify
the effective functioning of application controls.
• Understand the auditing techniques used to perform
substantive tests in an IT environment.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 2

1
Systems Development Controls
• In reviewing the effectiveness of a particular systems
development methodology, the accountant should focus
on the controllable activities that are common to all
systems development approaches.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 3

CONTROLLING SYSTEMS DEVELOPMENT


ACTIVITIES
• Systems Authorization Activities
• User Specification Activities
• Technical Design Activities
• Internal Audit Participation
• Program Testing
• User Test and Acceptance Procedures
• Audit Objectives Relating to Systems Development
• Tests of Systems Development Controls

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 4

2
Program Testing Procedures

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 5

CONTROLLING PROGRAM CHANGE


ACTIVITIES
• Upon implementation, the information system enters the
maintenance phase of the SDLC.
• Little is served by designing and implementing controls
over systems development activities if control is not
continued into the maintenance phase.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 6

3
SOURCE PROGRAM LIBRARY CONTROLS

• Even with formal maintenance procedures in place,


individuals who gain unauthorized access to programs
threaten application integrity.
• In larger computer systems, application program modules
are stored in source code format on a disk repository
called the source program library (SPL).
• Executing a production application requires that the
source code be compiled and linked to a load module,
which the computer can process.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 7

Uncontrolled Access to the Source Program


Libra

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 8

4
THE WORST-CASE SITUATION: NO
CONTROLS
• Legitimate maintenance programmers and others may
access any programs stored in the library, which has no
provision for detecting an unauthorized intrusion.
• Because these programs are open to unauthorized
changes, no basis exists for relying on the effectiveness of
controls designed into them.
• With no control over access to the SPL, a program’s
integrity during the period of review cannot be
established.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 9

A CONTROLLED SPL ENVIRONMENT

• Password Control
• Separation of Test Libraries
• Audit Trail and Management Reports
• Program Version Numbers
• Controlling Access to Maintenance Commands
• Audit Objectives Relating to Systems Maintenance
• Tests of controls are tests that establish whether internal
controls are functioning properly.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 10

10

5
A CONTROLLED SPL ENVIRONMENT
(continued)

• Audit Procedures for Identifying Unauthorized Program


Changes
• RECONCILE PROGRAM VERSION NUMBERS
• CONFIRM MAINTENANCE AUTHORIZATION
• Audit Procedures for Identifying Application Errors
• RECONCILE THE SOURCE CODE
• REVIEW THE TEST RESULTS
• RETEST THE PROGRAM
• Audit Procedures for Testing Access to Libraries
• REVIEW PROGRAMMER AUTHORITY TABLES
• TEST AUTHORITY TABLE

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11

11

Source Program Library under the Control of


SPL Management Software

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12

12

6
Auditing SPL Software System

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13

13

IT Application Control Testing and


Substantive Testing
• In addition to general IT controls, SOX requires
management and auditors to consider application controls
relevant to financial reporting.
• These controls fall into three broad categories:
1. Input controls
2. Processing controls
3. Output controls

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 14

14

7
DESIGNING TESTS OF APPLICATION
CONTROLS
• Tests for IT control fall into these general categories:
1. Access tests are tests that ensure that the application
prevents authorized users from unauthorized access to data.
2. Validity tests ensure that the system processes only data
values that conform to specified tolerances.
3. Accuracy tests are tests that ensure that the system
processes only data values that conform to specified
tolerances.
4. Completeness tests are tests identifying missing data within a
single record and entire records missing from a batch.
5. Redundancy tests are tests that determine that an application
processes each record only once.
6. Audit trail tests ensure that the application creates an
adequate audit trail.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 15

15

The Test Data Technique

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16

16

8
DESIGNING TESTS OF APPLICATION
CONTROLS (continued)
• Examples of Tests of IT Application Controls
• TESTING CUSTOMER CREDIT APPROVALS
• TESTING ACCURACY OF POSTINGS TO CUSTOMER
ACCOUNTS
• TESTING THE THREE-WAY MATCH
• TESTING MULTILEVEL SECURITY AND ACCESS
PRIVILEGES IN THE PURCHASES/AP SYSTEM
• TESTING ROUNDING ERROR ROUTINES IN FINANCIAL
SYSTEMS
• Salami fraud is fraud in which each of multiple victims is
defrauded out of a very small amount, but the fraud in total
constitutes a large sum.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 17

17

Rounding Error Algorithm

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18

18

9
Sample Data

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 19

19

Internal Control Testing Techniques


• Techniques for performing tests
• Black box approach
• Through-the-computer techniques

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20

20

10
BLACK BOX APPROACH

• The black box approach is an approach that does not


require the auditor to create test files or to obtain a
detailed knowledge of the application’s internal logic.
Instead, auditors can analyze flowcharts and interview
knowledgeable personnel in the client’s organization to
understand the functional characteristics of the
application.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 21

21

Auditing around the Computer – The Black


Box Approach

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 22

22

11
THROUGH-THE-COMPUTER
APPROACHES
• Computer-assisted audit tools and techniques
(CAATTs) is the use of computers to illustrate how
application controls are tested and to verify the effective
functioning of application controls.
• Test Data Method
• The test data method is a technique used to establish
application integrity by processing specially prepared sets of
input data through production applications that are under
review.
• CREATING TEST DATA
• Base Case System Evaluation
• Base case system evaluation (BCSE) is a variant of the test
data technique in which comprehensive test data are used.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 23

23

Example of Test Data and Test Results

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 24

24

12
THROUGH-THE-COMPUTER
APPROACHES (continued)
• Tracing
• Tracing is a test data technique that performs an electronic
walkthrough of the application’s internal logic.
• Advantages of Test Data Techniques
• Disadvantages of Test Data Techniques

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 25

25

Tracing

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 26

26

13
THE INTEGRATED TEST FACILITY

• Integrated test facility (ITF) is an automated technique


that enables the auditor to test an application’s logic and
controls during its normal operation.
• Advantages of ITF
• Disadvantages of ITF

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 27

27

The ITF Technique

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 28

28

14
PARALLEL SIMULATION

• Parallel simulation is a technique that requires the


auditor to write a program that simulates key features of
processes of the application under review.
• Creating a Simulation Program
• Generalized audit software (GAS) is software that allows
auditors to access electronically coded data files and perform
various operations on their contents.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 29

29

Parallel Simulation Technique

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 30

30

15
Substantive Testing Techniques
• Substantive tests are tests that determine whether
database contents fairly reflect the organization’s
transactions.
• Substantive tests include, but are not limited to, the
following:
1. Determining the correct value of inventory.
2. Determining the accuracy of prepayments and accruals.
3. Confirming accounts receivable with customers.
4. Searching for unrecorded liabilities.

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 31

31

THE EMBEDDED AUDIT MODULE

• Embedded audit module (EAM) is a technique in which


one or more specially programmed modules embedded in
a host application select and record predetermined types
of transactions for subsequent analysis.
• Disadvantages of EAMs
• OPERATIONAL EFFICIENCY
• VERIFYING EAM INTEGRITY

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 32

32

16
Embedded Audit Model Technique

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 33

33

GENERALIZED AUDIT SOFTWARE

• Using GAS to Access Simple Structures


• Using GAS to Access Complex Structures
• Audit Issue Pertaining to the Creation of Flat Files

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 34

34

17
Using GAS to Access Simple File Structure

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35

35

Using GAS to Access Complex File Structure

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 36

36

18
Complex Database Structure

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 37

37

Flat Version of a Complex File Structure

James A. Hall, Accounting Information Systems, 10th Edition. © 2019 Cengage. All Rights Reserved.
May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 38

38

19

You might also like