You are on page 1of 5

FEATURE FEATURE

The Evolution of Information


Systems Audit

F
rom the early days of electronic data processing The Business Environment
(EDP) to modern cybersecurity, IS audits have Organizations that dominate the rankings in terms
come a long way. The landscape around of revenue and market capitalization today are very
information systems has been changing, but different from those that were leaders a few decades
as in any journey, an eye on the rearview mirror enables ago. In fact, many of those former leaders have fallen
better decision-making and safer travel forward. out of the rankings or even ceased to exist. From
a brick-and-mortar world of material things and
By considering the lessons learned and avoiding commodities, the modern global economy now leans
the mistakes of the past, the world of information heavily on technology and services.
systems audit can be shaped and prepared to
respond to the future. This has caused organizations to prioritize innovation
and creativity over functioning and growth. Innovation
Changing Contexts
The factors that play a significant role in information
systems audit can be broadly classified into a few
contexts, including:

• The business environment

• The technology landscape

• Sociopolitical global trends

• The need for governance

Information systems audits do not live in a world


of their own; they are performed in the context of
these environments. Understanding the current
state of each of these contexts can help the auditors
determine how the world of information systems
audit needs to change to stay relevant and useful.

A N A N T H A SAYA N A | CIS A , CIS M, CI A

Has experienced the evolution of IT since its early days in the 1980s. After conducting information systems audits for more than a
decade across systems in banking, finance, manufacturing, supply chain and project management in a variety of IT infrastructure
landscapes, Sayana moved to a leadership role in core IT. He managed the implementation and maintenance of many solutions,
including enterprise resource planning (ERP), web portals and the related IT setups used to build and manage information security
in different software and domain environments. He has led digital transformation, including the implementation of new digital
technologies such as the Internet of Things, augmented reality, virtual reality, mobile applications, big data analytics, machine learning
and artificial intelligence for various solutions in engineering, manufacturing and project management. Four decades of experience
have given him tremendous insight into managing, securing and auditing IT systems. Sayana is now retired and is currently mentoring
digital start-ups. He has volunteered with ISACA® for many years, including as a founding coauthor of the IT Audit Basics column in the
ISACA® Journal and past Journal article peer reviewer. He was one of the founders of the ISACA Mumbai (India) Chapter and served as
its president. He has also been a member of the CISA Test Enhancement Committee. He has spoken at numerous conferences and
written many articles. He can be reached at asayana@gmail.com.

© 2022 ISACA. All rights reserved. www.isaca.org VOLUME 1 | 2022 ISACA JOURNAL 1
and creativity, spanning every function in the location and communication capabilities that are
organization, can result in amazing new products, available anywhere and anytime.
business models, methods of acquiring and servicing
customers and financing models, and helps create New technologies and tools have also been added
more efficiency in every process. to the fold. The Internet of Things (IoT) connects
automobiles, appliances, machines and other
The organizational ethos has also changed inanimate objects seamlessly into digital solutions
dramatically. A greater focus on inclusion, diversity, through a combination of sensors, tracking tags and
empowerment, trust, collaboration, teamwork, gateway communication devices.
outsourcing and gig workers has changed how work
is accomplished. In addition, although the digital Virtual reality, augmented reality and mixed reality
technologies to enable work from anywhere have applications are being integrated with engineering,
been available and practiced by many organizations, manufacturing and other solutions. Blockchain
the COVID-19 pandemic made the adaption of technology is finding applications in fields such as
working from anywhere an urgent and important finance and supply chain. Cryptocurrencies could
change for every organization. dramatically change the world of finance; even the
world of art is experiencing disruptive technology
The roles of IT and digitalization are significant through nonfungible tokens (NFTs). Artificial
in every one of these aspects. Organizations that intelligence (AI) is benefiting from advances in
leverage IT and digital technologies are the winners in hardware and software that make it more viable.
today’s game. Powered by big data analytics and machine learning,
AI is finding its way into the mainstream and getting
embedded in solutions to aid human capabilities and
“The frequency and scale of decision-making. Robotic process automation (RPA)
is being used to convert routine manual tasks to
cybercrimes and the profiles and being completely performed by software, eliminating
powers of the actors involved tedious human effort.

are also changing.” Although digital technologies put convenience and


power in the hands of consumers and end users,
the backend complexities of how these solutions
The Technology Landscape are created and maintained have increased security
An aggregation of physical equipment in a glass- considerations exponentially.
enclosed space is no longer the metaphor for IT. An
application on a mobile phone is likely a better icon of The pace at which new technologies and solutions
today’s technologies in this click-and-swipe world. are being developed is mind-boggling and shows no
signs of slowing down or stopping. The next major
Over the past few decades, the capabilities of paradigm shift will occur when quantum computing
computing power, storage and communication, becomes mainstream.
accompanied by significant advances in programming
languages and platforms, have exploded, moving Although it may be impossible for one person to
from tedious batch processing to online, real-time gain expertise in all of these technologies, modern
processing and responses that yield instant results. information systems auditors need to perform their
work in this landscape.
Cloud computing has become pervasive and
produces significant computing power, storage and Sociopolitical Global Trends
processing tools available to people all over the world. Globalization is grappling with the forces of
The phenomenal increase in network coverage and localization. Global and local regulators are requiring
speed have made the Internet available to a very large organizations to abide by a large set of requirements
population of the world. Today's mobile devices pack for complying with regulations by governments
the punch of large servers of the past and provide and other regulatory bodies. Economic disparities
dazzling high-resolution touch displays, audio, video, and inequities have widened, leading to an increase

2 ISACA JOURNAL VOLUME 1 | 2022 © 2022 ISACA. All rights reserved. www.isaca.org
in crime. Specifically, the frequency and scale of
cybercrimes and the profiles and powers of the
actors involved are also changing.
“The interconnections and integration between
solutions also need to be considered during
Organizations should focus on the climate and
environment, proving that they are socially responsible these audits.”
citizens—caring for the larger world and not merely
increasing revenue and profits. Multiple demands such
as these on organizational management may, at times, Today, the distinction between an intranet and the
dilute the focus and importance that need to be given Internet has practically disappeared. With many
to securing the enterprise. solutions hosted in the cloud, users spread all
over the world, and the increased use of mobile
Given the multiple demands on management in this devices, the physical segregation is often impossible
changing climate, it is important for the auditor to or impractical.
perform their duties to ensure that the objectives of
securing the enterprise get due attention consistently. IT solutions in earlier days assisted the organization
in its processes. They were often focused on batch
The Need for Governance processing and had little interface with end users.
The need for governance has never been greater. Modern solutions do not merely assist in the process
Organizations work to be on top of the curve and but are often the process itself. For example, financial
deploy the necessary technologies and business transactions are processed entirely on computer
models, but that means nothing if boards, systems, while logistics, transportation, scheduling
regulators and management do not take care of and manufacturing are all driven, controlled and
the inherent risk and pitfalls that the environment monitored by computer systems.
presents. Governance is necessary to ensure that
risk management objectives and limits are set The information system auditor's approach to what
and communicated and that policies are framed to audit will need to change. An isolated audit of
for management to implement and follow. A one application solution or an infrastructure setup
comprehensive audit system and process needs to may serve a limited purpose. The interconnections
be reviewed against local and global standards with and integration between solutions also need to be
regulatory frameworks and risk mitigation adjusted considered during these audits.
as needed on an ongoing basis.
2. The Nature of the Enemy and Attacks
For the well-being of the organizations, the audit The cybersecurity landscape is constantly under
team needs to be capable, dependable and cognizant threat, and the task of keeping systems secure is more
of all the factors in the landscape that affect complicated than ever. It is often not just a disgruntled
operations or else they run the risk of becoming employee or a random hacker attacking systems
irrelevant or ineffective. today. State-supported or sponsored cyberattacks
are also mentioned in the media. The emergence of
Changes to Information Systems Audit various cryptocurrencies as a method of payment has
enabled ransomware and other threat-based attacks
Given the significant changes to the environment,
to find anonymous methods of enrichment. Constant
information systems audit teams need to be able to
vigilance is required to remain secure and protected
also adapt by recognizing three significant factors
from attacks.
that can affect their reality.

The auditor needs to evaluate how the enterprise is


1. Nature and Shape of IT Solutions
geared to face these threats. Whether strategies for
IT solutions in the past were largely inward looking incidence emergency response, disclosures, recovery
and used by the employees of the organization. In from disasters, communication management and
the past, fewer applications were exposed to the reputation recovery are in place and tested should be
Internet, and many others were available only within verified by the auditors.
an intranet—an organization’s private network.1

© 2022 ISACA. All rights reserved. www.isaca.org VOLUME 1 | 2022 ISACA JOURNAL 3
3. The Significance of Privacy the elements of information systems audit that
Every system that captures, stores and processes are under the most stress—digital solutions and
personally identifiable information (PII) has to operate modern business processes are continually evolving
under regulations that protect privacy and remain and high-velocity, high-volume transactions are
within that framework with respect to consent, being processed in real time. In this scenario, the
protection and nondisclosure. information systems audit cannot focus only on
reactionary activity. Security and controls need to be
Hence, the auditor needs to identify the specific built into the environment during the design, build and
privacy regulations that impact the solutions and maintenance stages. Mature organizations that find a
include a verification of how the solutions comply way to include this constructive collaboration will set
with the privacy requirement pertaining to that region themselves up for a secure future.
in their audits.
Education and Training
The COVID-19 pandemic has expanded the digital
“Powerful big data analytics world. Today, digital learning courses on audit and
emerging technologies are available to people all
are helping auditors find over the world. Information systems auditors must
prioritize learning, develop a systematic plan and
anomalies and patterns of make the effort to learn. The managements of
wrongdoing—sometimes before the audit function should include learning as an
important criterion in the evaluation of their teams.
the event occurs.”
Standards and Guidelines
Although technology has evolved rapidly, many
How the Audit Function Responds to organizations are working hard to implement standards
This Change and guidelines to make themselves secure. Frameworks
The audit function can address these significant for the secure implementation of many of the
changes across several dimensions, including technologies are available either from the manufacturers
collaboration, education and training, standards and themselves or from professional entities.
guidelines, regulations, and technology.
For example, based on the emerging world of the
Internet of Things (IoT), the US National Institute of
Independence and Collaboration
Standards and Technology (NIST) released draft
The audit function inherently needs to be
cybersecurity guidance for manufacturers of IoT
independent, unbiased and influenced only by
devices and equipment.2 Guidelines for securing
objective review and reporting. In an organizational
and auditing IoT, cloud and AI have been developed
context, the reporting structure, resourcing and
by industry bodies.3, 4 Information systems auditors
management of the audit function must remain
would benefit from studying these types of
free from influence by the technology or business
frameworks, standards and guidelines.
functions, and the team should have access to top
management and the board.
Regulations

However, given that the information systems audit Regulatory bodies are working to keep pace with
function requires significant technology and emerging technologies. Requirements cover many
business skills, collaboration and teamwork aspects of cybersecurity and privacy. This is a big
are essential. The challenge is to obtain the driver for compliance and has spurred the creation
needed skills by working together without of products and service providers who consult in
compromising independence. those areas.

Collaboration and teamwork without compromising It is important for the auditor to be aware of the
independence can only be achieved through a jurisdiction of each of these regulations and
mature approach and learning mindset. These are how they impact the solutions an organization
in different parts of the world can implement,

4 ISACA JOURNAL VOLUME 1 | 2022 © 2022 ISACA. All rights reserved. www.isaca.org
considering where they are hosted and where
their users reside. Noncompliance with regulatory “Every organization needs a competent, relevant
requirements can cost organizations plenty in terms
of fines and punishments. and effective information systems audit function
to verify, report and offer guidance.”
Technology
Like the rest of the business, the auditors also need to
embrace technology for their work. New technologies
that drive innovative solutions are helping to better and evolving, audit should include continuous
secure those solutions. Big advances are being made assurance and proactive monitoring. It should
in encryption and transmission of data. Two-factor also focus on the processes that manage the
authentication is gaining acceptance, and systems technology development and implementation.
using biometrics are more efficient and more reliable An IS audit should focus on the governance
than ever. This results in more secure and controlled and management aspects of technology and
access. cybersecurity as much as it does on specific focus
areas of the audit.5
AI is being built into more products and can watch • 
IS audit needs to be cognizant of business
for patterns in traffic and identify attacks before they imperatives and align with the aspirations of the
cause harm. Powerful big data analytics are helping organization, including being agile and innovative
auditors find anomalies and patterns of wrongdoing— and adopting technologies at a rapid pace. IS
sometimes before the event occurs. audit’s integration with business management
and technology management should increase and
Computer-assisted audit techniques (CAAT), as they
improve without compromising independence.
were previously known, are evolving. Continuous
monitoring is being built into the digital solutions
Endnotes
themselves, with the goal of autodetecting harm and
1 Sayana, S. A.; “Approach to Auditing Network
self-healing systems.
Security,” Information Systems Control Journal,
It is up to the auditor to remain up to date and take vol. 5, 2003
advantage of new technology to assist in information 2 National Institute of Standards and Technology
systems audits and ensure that organizations build (NIST), “NIST Releases Draft Guidance on Internet
effective security programs and remain secure. of Things Device Cybersecurity,” 15 December 2020,
https://www.nist.gov/news-events/news/2020/
12/nist-releases-draft-guidance-internet-things-
Conclusion
device-cybersecurity
Changes in business, technology and sociopolitical
3 Standton, B.; T. Jensen; Trust and Artificial
environments have increased the need for a force to
Intelligence, Draft NISTIR 8332, National Institute
safeguard organizations, including assets, data and
of Standards and Technology (NIST), USA,
systems. The information security or cybersecurity
March 2021, https://nvlpubs.nist.gov/nistpubs/
function must be well organized, well staffed,
ir/2021/NIST.IR.8332-draft.pdf
properly implemented and effectively operated. Every
organization needs a competent, relevant and effective 4 European Network and Information Security
information systems audit function to verify, report and Agency (ENSIA), Cloud Computing: Benefits,
offer guidance about the efficient functioning of the Risks and Recommendations for Information
cybersecurity function. This includes: Security, Greece, November 2009,
https://www.enisa.europa.eu/publications/
• The technology capabilities of the IS audit cloud-computing-risk-assessment
function need to keep pace with the evolution of 5 Shilts, J.; “A Framework for Continuous Auditing:
new digital technologies. Why Companies Don’t Need to Spend Big Money,”
• IS audit cannot be a discrete, periodic activity. Journal of Accountancy, 1 March 2017,
Given that the digital solutions of today are https://www.journalofaccountancy.com/issues/
running the enterprise and continuously upgrading 2017/mar/continuous-auditing.html

© 2022 ISACA. All rights reserved. www.isaca.org VOLUME 1 | 2022 ISACA JOURNAL 5

You might also like