You are on page 1of 5

104557_Journal vol 3 2019_Layout 1 4/11/19 12:42 PM Page 11

IS AUDIT
BASICS

Developing the IT Audit Plan


Using COBIT 2019
The IT Assurance Framework (ITAF) requires that the materialized. An example might be service delivery Do you have
IS audit and assurance function shall use an problems by the IT outsourcer(s). something
appropriate risk assessment approach and to say about this
supporting methodology to develop the overall IS At the end of this step, it is important to have a clear article?
audit plan and determine priorities for the effective and consistent view of the enterprise strategy, the Visit the Journal pages
allocation of IS audit resources.1 However, despite enterprise goals, IT-related risk and current I&T of the ISACA® website
this requirement, there is little ISACA® documentation issues. The design guide provides concrete (www.isaca.org/journal),
on defining an IT audit plan. Perhaps this is because examples of these. An appropriate perspective to find the article and click
the seminal Developing the IT Audit Plan Global keep in mind is that technology only exists to on the Comments link to
Technology Audit Guide (GTAG 11)2 is so good. support and further the organization’s objectives share your thoughts.
Nonetheless, this document was published in July and is a risk to the organization if its failure results https://bit.ly/2K0enob
2008, so the question should be asked, given current in the inability to achieve the business objective.9
practices, can this be improved upon?

In December 2018, ISACA published what I believe


will become an equally influential document, the
COBIT® 2019 Design Guide: Designing an
Information and Technology Governance Solution.3 I
am proposing that the steps described therein for
designing a tailored governance system can be
adopted to developing the IT audit plan (figure 1).

Understand the Enterprise Context and


Strategy
Before developing an audit plan, one should
understand the enterprise under review. Enterprises
can have different strategies, which the design
Ian Cooke, CISA, CRISC, CGEIT, COBIT Assessor and Implementer,
guide expresses as archetypes (figure 2). Enterprise
CFE, CIPM, CIPP/E, CIPT, CPTE, DipFM, FIP, ITIL Foundation, Six
strategy is realized by the achievement of (a set of)
Sigma Green Belt
enterprise goals.4 These goals are structured along Is the group IT audit manager with An Post (the Irish Post Office based in
the balanced scorecard (BSC) dimensions,5 an Dublin, Ireland) and has 30 years of experience in all aspects of information
example being business service continuity and systems. Cooke has served on several ISACA® committees and is a past
availability. A risk profile identifies the sort of IT- member of ISACA’s CGEIT® Exam Item Development Working Group. He is
related risk to which the enterprise is currently the topic leader for the Audit and Assurance discussions in the ISACA Online
exposed and indicates which areas of risk are Forums. Cooke supported the update of the CISA® Review Manual for the
exceeding the risk appetite.6 Good sample risk 2016 job practices and was a subject matter expert for the development of
ISACA’s CISA® and CRISC™ Online Review Courses. He is the recipient of the
scenarios have been developed by ISACA to aid
2017 John W. Lainhart IV Common Body of Knowledge Award for
with understanding IT-related risk.7
contributions to the development and enhancement of ISACA publications
and certification training modules. He welcomes comments or suggestions
Closely related to IT risk are information and for articles via email (Ian_J_Cooke@hotmail.com), Twitter (@COOKEI),
technology (I&T)-related issues—also called pain LinkedIn (www.linkedin.com/in/ian-cooke-80700510/) or on the Audit and
points—from which the enterprise is suffering.8 Assurance Online Forum (engage.isaca.org/home). Opinions expressed are
These could be considered risk that have his own and do not necessarily represent the views of An Post.

ISACA JOURNAL VOL 3 11


104557_Journal vol 3 2019_Layout 1 4/11/19 12:42 PM Page 12

Figure 1—IT Audit Plan Design Workflow

2. Determine
1. Understand 4. Conclude
the 3. Risk assess
the enterprise and validate
components the IT audit
context and the IT audit
of the IT audit universe.
strategy. plan.
universe.

• Understand • Consider the • Consider the COBIT® • Resolve inherent


enterprise strategy. components 2019 design factors priority conflicts.
• Understand of a governance as risk factors. • Conclude the
enterprise goals. system. IT audit plan.
• Understand the • Determine the • Publish the
risk profile. IT audit portfolios. IT audit plan.
• Understand current • Define the IT
I&T-related issues. audit universe.
Source: Adapted from ISACA®, COBIT® 2019 Design Guide: Designing an Information and Technology Governance Solution, USA, 2018. Reprinted with permission.

Figure 2—Enterprise Strategy


Strategy Archetype Explanation
Growth/Acquisition The enterprise has a focus on growing (revenues)2
Innovation/Differentiation The enterprise has a focus on offering different and/or innovative products and
services to their clients3
Cost Leadership The enterprise has a focus on short-term cost minimization4
Client Service/Stability The enterprise has a focus on providing a stable and client-oriented service5
Source: ISACA®, COBIT® 2019 Design Guide: Designing an Information and Technology Governance Solution, USA, 2018. Reprinted with permission.

Determine the Components of the IT governance system over I&T12 and, therefore, should
Audit Universe be considered when developing the IT audit plan.

ISACA defines a portfolio as a grouping of “objects The portfolios should include all activities that will
of interest” (i.e., investment programs, IT services, be performed by IT audit. Why? Because performing
IT projects, other IT assets or resources) managed audit recommendation follow-ups, attending
and monitored to optimize business value.10 A key training or reporting on the status of the audit
consideration for IT portfolio management is activities takes time, and the only way to ensure
getting the mix right to achieve this business value, that time is properly allocated for them is to include
one of the motives being that, just like a financial them in the audit plan.
portfolio, some of the areas may not provide the
expected value. Therefore, it makes sense to Once the IT audit portfolios have been defined, they
consider these portfolios when developing the IT can be expanded to create the IT audit universe
audit plan—to match this mix we should audit (figure 4).
across each of the areas defined in the portfolios.
Risk Assess the IT Audit Universe
Of course, this raises a question: What if there are
no discernible portfolios? In that case, I propose Risk analysis is the process of estimating the two
using COBIT 2019’s components of the governance essential properties of each risk scenario13:
system11 to define the IT audit portfolios (figure 3).
• Frequency—The number of times in a given
These are factors that, individually and collectively, period (usually in a year) that an event is likely to
contribute to the good operations of the enterprise’s occur

12 ISACA JOURNAL VOL 3


104557_Journal vol 3 2019_Layout 1 4/11/19 12:42 PM Page 13

Figure 3—IT Audit Portfolio


Governance System Component IT Audit Portfolio Examples
®
Processes COBIT 2019 processes
Organizational Structures Third-party suppliers, subsidiaries, divisions of the enterprise
Principles, Policies, Procedures Privacy, laws, regulations and other compliance requirements
Information How IT audit reports its performance
Culture, Ethics and Behavior Audit recommendation follow-ups, new IT initiatives
People, Skills and Competencies Training to be undertaken by IT audit; training to be given by IT audit; audit
of general IT awareness training
Services, Infrastructure and Applications Applications, databases, websites, operating systems, virtual machines, etc.

Figure 4—IT Audit Universe Sources


IT Audit Portfolio Example Potential Source
COBIT 2019 processes COBIT 2019 Governance and Management Objectives13
Third-party suppliers, subsidiaries, divisions of the Enterprise resource planning (ERP) system, enterprise
enterprise structure documentation, organization charts
Privacy, laws, regulations and other compliance Legal, privacy, security, and governance, risk and
requirements compliance (GRC) functions
How IT audit reports its performance Audit committee requirements
Audit recommendation follow-ups, new IT initiatives Internal audit and management—scheduled
recommendation completion dates, completed
recommendations
Training to be undertaken by IT audit; training to be given Training plans, personal development plans
by IT audit; audit of general IT awareness training
Applications, databases, websites, operating systems, IT asset register
virtual machines, etc.

• Impact—The business consequences of accept that success includes managing risk, then it
the scenario makes sense that the COBIT 2019 design factors
can also be used as risk factors (figure 5).
Risk factors are those conditions that influence
frequency and impact. They can be of different The factors include those that helped with our
natures and can be classified into two major understanding of the enterprise context and
categories14: strategy and are described in detail in the COBIT
2019 Design Guide.16 Their influence as risk factors
• Contextual factors—Can be divided into internal is described in figure 6.
and external factors, the difference being the
degree of control an enterprise has over them It should be noted that not all risk factors may be
• Capabilities—How effective and efficient the applicable to each enterprise or IT audit portfolio,
enterprise is in a number of IT-related activities nor should more traditional risk factors such as the
market, economic factors, geopolitics and industry
The importance of risk factors lies in the influence competition necessarily be ignored.
they have on risk. They should be considered during
every risk analysis. Once the risk factors have been decided upon, they
can be used to perform the risk analysis. Practical
Design factors are factors that can influence the guidance on performing this and the risk assessment
design of an enterprise’s governance system and is explained well in the Risk Scenarios Using COBIT® 5
position it for success in the use of I&T.15 If we for Risk17 and the GTAG 11 documents.18

ISACA JOURNAL VOL 3 13


104557_Journal vol 3 2019_Layout 1 4/11/19 12:42 PM Page 14

Figure 5—COBIT Design Factors


Enjoying
this article?
Enterprise Enterprise Risk I&T-Related Threat
• Read Information Strategy Goals Profile Issues Landscape
Systems Auditing:
Tools and
Techniques—
Creating Audit
Sourcing IT Technology
Programs. Compliance Role Model Implementation Adoption Enterprise
www.isaca.org/ Requirements of IT for IT Methods Strategy Size
tools-and-
techniques
• Learn more about, Future Factors
discuss and
collaborate on Source: ISACA, COBIT® 2019 Design Guide: Designing an Information and Technology Governance Solution, USA, 2018. Reprinted with permission.
audit and
assurance ISACA’s
Online Forums.
https://engage.
isaca.org/
onlineforums

14 ISACA JOURNAL VOL 3


104557_Journal vol 3 2019_Layout 1 4/11/19 12:42 PM Page 15

In addition, the IT audit follow-ups, training and audit Endnotes


committee requirements should also be subject to a
risk assessment. Example questions include: What 1 ISACA®, ITAF, A Professional Practices
follows-ups should be performed first? Is the training Framework for IS Audit/Assurance, USA, 2014,
addressing perceived risk? Is the right information www.isaca.org/Knowledge-Center/ITAF-IS-
being provided to the audit committee? Assurance-Audit-/IS-Audit-and-Assurance/Pages/
ObjectivesScopeandAuthorityofITAudit.aspx
2 The Institute of Internal Auditors, Global
Conclude and Validate the IT Audit Plan
Technology Audit Guide (GTAG) 11: Developing
At this stage, one should have a list of ranked audit the IT Audit Plan, USA, 2008, https://na.theiia.org/
universe items by portfolio. Unless the element of standards-guidance/recommended-guidance/
surprise is required, these should be discussed and practice-guides/Pages/GTAG11.aspx
validated with senior management of the auditee. 3 ISACA®, COBIT® 2019 Design Guide: Designing
Why? Because management will be aware of factors an Information and Technology Governance
such as scheduled upgrades, application Solution, USA, 2018, https://www.isaca.org/
replacements and external audits, which may affect COBIT/Pages/COBIT-2019-Design-Guide.aspx
audit’s ability to deliver the plan on time. In addition, 4 Ibid., p. 22
they may have insights or special requests for audits 5 Ibid.
that are not currently part of the universe. When this 6 Ibid., p. 23
is complete, the plan should be reviewed from audit’s 7 ISACA, Risk Scenarios Using COBIT® 5 for Risk,
perspective. Are there any inherent conflicts? Is USA, 2014, p. 33, www.isaca.org/Knowledge-
specialist help needed for specific audits? Center/Research/ResearchDeliverables/Pages/
Risk-Scenarios-Using-COBIT-5-for-Risk.aspx
Finally, publish the IT audit plan, including the 8 Ibid.
proposed sequence and timings. This may prove 9 Op cit GTAG 11, p. 4
controversial—what if management remediates risk 10 ISACA Glossary, Portfolio,
scenarios before audit arrives? This is a positive. https://www.isaca.org/Pages/Glossary.aspx
The purpose of audit is not to have audit findings; 11 ISACA, COBIT® 2019 Framework, Introduction and
the purpose of audit is to help mitigate risk. Methodology, USA, 2018, www.isaca.org/COBIT
12 Ibid., p. 21
Conclusion 13 Op cit Risk Scenarios Using COBIT® 5 for Risk
14 Ibid., p. 16
When developing the IT audit plan, remember that 15 Op cit COBIT 2019 Design Guide, p. 21
one of the basic rules of the (audit) universe is that 16 Ibid.
nothing is perfect. Perfection simply does not 17 Op cit Risk Scenarios Using COBIT 5 for Risk
exist.19 However, by adapting a portfolio-based 18 Op cit GTAG 11
approach along with COBIT 2019’s design factors 19 Goodreads, Stephen Hawking Quotes,
as risk factors, the IT audit plan should be closely https://www.goodreads.com/quotes/363982-
aligned with the business strategy and direction. one-of-the-basic-rules-of-the-universe-is-that
The process makes this demonstrable and allows
audit to add value.

ISACA JOURNAL VOL 3 15

You might also like