You are on page 1of 20

Table of Contents

Entity Name: W/P reference

Project name: Prepared by

Audit Period: Date

Sheet Name
Common Findings
IT Governance and Framework
Access Management
Authentication and Authorization
Change Management
Computer Operations
Continuity and Disaster Recovery
Systems Development
Outsourced Services
Common Findings
Entity IT access controls need improvement so that any excessive or
unnecessary access privileges are detected and timely removed.

Entity IT security controls related to account management need


improvement.

Some access privileges did not promote an appropriate separation of


duties.

Administrative access privileges granted for some users and service


accounts to selected network domain/database/server were not
appropriate.

Server environments did not promote an appropriate separation of


duties and did not restrict users to only those functions appropriate
and necessary for assigned job duties or functions.

The entity did not perform comprehensive periodic reviews of access


privileges for the application/server/database/network accounts.
Certain controls related to logical access/user authentication/account
management/change management/logging and monitoring need
improvement to ensure the confidentiality, integrity, and availability of
entity data and related IT resources.

Change management controls related to application and systems


software and network infrastructure changes need improvement to
ensure that changes are appropriately documented, authorized, tested
(where applicable), and approved prior to implementation into the
production environment.

Contrary to laws/policies/guidelines the entity did not have signed


service-level agreements (SLAs) with the third-party service provider,
increasing the risk that the effective, efficient, and secure operation of
IT systems may be compromised.

No periodic reviews and monitoring of independent audit reports of


service provider was performed to ensure the IT security
controls/access controls for the third-party service provide was
continued to be effective and adequate to ensure the confidentiality,
integrity, and availability of entity data and related IT resources.

Backup controls continue to need improvement to ensure that all IT


resources that require back up are identified, backups are performed
as required, and backups are periodically tested for recoverability.

The business continuity and disaster recovery plans continue to need


improvement to ensure that critical operations continue in the event of
a disaster or other interruption of service.
IT Governance and Framework
Objective: Evaluate if reasonable controls over the University Information
Technology structure are in place to determine if the IT Department is
organized to properly meet the Company’s business objectives.

Methodology: Inquire with executive management or through available


documentation (corporate strategy, annual report, etc.) to:

Obtain an understanding of the IT governance and framework.

Obtain an understanding of the University’s strategies and objectives,


and document them to the extent the relevent for process under
review.

Determine if IT related decisions align with the University's strategies


and objectives.

Determine IT related processes are overseen effectively and


transparently.

Determine whether there is an IT steering committee that includes


members from different areas of the University.
Determine whether IT Security has been established as a separate
University function.
Access Management
Objective: Ensure appropriate controls are in place over user account
management.

Methodology: Inquire with executive management or through available


documentation policies, procedures, guidelines etc., obtain an
understanding about the University’s access management process

Obtain an understanding of the user account management process.

Determine whether there are policies and procedures related to


user account management which includes but not limited to:

Requiring unique user IDs;

New user creation;

Modifying existing user rights when roles change or


individuals transfer;

Disabling and/or removing user accounts for users who are


terminated or transferred;
Periodic review of user access.

Determine whether policies and procedures are applicable to all user


accounts including privileged user accounts.

Review sample user accounts to ensure:

User access rights are appropriately requested, reviewed, and


approved;

User accounts are unique and not shared;

All users and their activities are identifiable using their unique
user IDs;

User access rights are in line with documented business needs


and job requirement.

Request and review the list of privileges user accounts to ensure that
only authorized individuals have elevated privileges:
System administrators;

Database administrators;

Network administrators.

Verify user accounts with privileged access rights have a secondary


user account.

Verify privileged user activities are logged and monitored.

Verify there are limited number of network administrators, database


administrators, server administrators.

Verify the enforcement of least-privileged access and need-to-know


access for applications, databases, servers.

Verify periodic reviews of access rights are completed and


documented.
Authentication and Authorization
Objective: to ensure appropriate controls are in place over user authentic
and authorization to prevent unauthorized access to critical applications,
and systems. (Where applicable, review related documentation)

Are there policies and procedures available which describe:

Authentication mechanisms enabled for user identification;

Password complexity requirement for accessing the University’s


network, application, data etc.;

Password parameters – length, characters used, locking of comput


screen when not used for certain time, password requirement to
unlock the computer screen etc.;

Restrictions on using or retaining a vendor default password;

Determine if the systems, applications, and the network have been


configured to enforce the password requirement including those with s
sign-on and/or multi-factor authentication.
Request and review the password settings for the application, network,
systems to ensure the password is set according to the policy requireme
and industry best practices.
Change Management Controls
Objective: Perform a review of the change management process to
provide management with assurance that the process is controlled,
monitored and is in compliance with good practices.

Methodology: Interview management and review available documented


standards, processes, procedures and guidelines, reports, and/or logs
to:

Obtain an understanding of the University's system of identifying,


classifying and approving change requests.

Determine if a process exists to classify change requests as an


infrastructure or application change.

Determine if there is a process for tracking the status of the changes


that are approved, in-process, and completed.

Determine if changes are appropriately reviewed, authorized,


approved/rejected, and tested prior to implementing in production.

Determine if only approved changes are implemented.


Determine if there is adequate documentation for requested,
approved or rejected changes.

Determine if the sign-off process, prior to a change moving into


production, includes the following supporting documentation
indicating:

Completion of testing, quality assurance and documentation;

Satisfactory user acceptance test, approval and knowledge of


implementation date;

Acceptance of information security changes.

Determine if logs and reports generated by the change management


system are reviewed and documented by management.

Determine whether testing changes prior to implementation is done


in a test environment rather than production environment.

Determine if there is a process for defining, prioritizing, testing,


documenting, assessing and authorizing emergency changes that do
not follow the established change process.
Computer Operations
Objective: Effective computer operations controls are in place to ensure
systems and programs are available and processing accurately.

Methodology: Inquire with management/review available documented


standards, processes, procedures and guidelines, reports, logs to
determine if the University’s controls over computer operations are
effective.

Obtain an understanding of computer operations procedures, ensure


the procedures include but not limited to:

System start-up procedures;

Emergency procedures;

System shutdown procedures;

Backup assignments;

System and job status reporting instructions.


Review procedures and logs for batch job processing to determine if
batch jobs are appropriately scheduled, processed, monitored, and
tracked.

Review forms, logs and any related documents to determine if


appropriate physical safeguards, accounting practices, and inventory
management over sensitive IT resources are in place.
Computer Operations
Continuity of Operations and Disaster Recovery
Objective: To determine if the University has appropriate processes and
controls in place to continue its mission-critical functions with minimal
disruption in case of an emergency or a disaster.
Methodology: Inquire with management/review available documented
standards, plans (continuity of operations plan, disaster recovery plan),
processes, procedures and guidelines, reports, logs to:

Determine if the University has a framework for IT continuity of


operations plan and a disaster recovery plan.

Determine if a continuity of operations plan and disaster recovery plan


have been develop and are kept up-to-date.

Determine if periodic testing of the IT continuity of operations plan and


disaster recovery plan is performed and the concerned parties are
trained.

Determine if a list of the most critical IT resources for recovery is


maintained and is up-to-date.

Determine if the failover and redundancy technology and location


(recovery site) are properly prepared for a disaster situation.
Systems Development
Objective: Ensure written standards and procedures established for
systems development and maintenance for the systems to be
developed, acquired, implemented, and maintained.

Methodology: Interview management and review available documented


standards, processes, procedures and guidelines, reports, and/or logs to
obtain an understanding of the University’s controls over the process of
systems development.

Obtain and review documentation related to the System Development


Life Cycle (SDLC) to ensure it contains clear guidelines for the phases
of SDLC:

System Definition;

Requirement Analysis;

Component Design;

Implementation;
System Maintenance (fixes, patches).

Review SDLC workpapers to determine if the appropriate levels of


authorization were obtained for each phase of development.

Review SDLC methodology to ensure that its provisions reflect current


generally accepted techniques and procedures.

Review documented testing procedures, test data, and resulting


output to determine if they appear to be comprehensive and if they
follow University standards.

Review and evaluate procedures for program promotion and


implementation.

Review documentation of the program promotion procedure.


Determine if the standards are followed and if documentation of
compliance with the standards is available. Trace selected program
and system software changes to the appropriate supporting records to
determine if the changes have been properly approved.

Review and evaluate the procedures for performing post-


implementation reviews.
Review and evaluate the procedures for the maintenance of existing
applications.
Outsourced Services
Objective: Ensure that the University has an effective third-party
management process and that the services provided by third parties
(suppliers, vendors and partners) meet business requirements.
Methodology: Interview management and review available documented
service level agreements, independent service organization audits,
and/or related documents to:

Determine if the University has valid contracts and comprehensive


service level agreements (SLA) with third-party service providers.

Determine if the third-party SLA provides clearly defined roles,


responsibilities and expectations for both the University as well as the
for the provider.

Determine if the University is reviewing independent service


organization audit reports, such as SOC 2 audits conducted pursuant
to AICPA standards, or audits for compliance with ISO27001,
Information Security Management Systems Requirements, to ensure
that IT controls necessary to safeguard the University’s data and
information resources have not been identified, by the independent
auditor, as being deficient.

You might also like