You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/224162993

IT audit in accordance with Cobit standard

Conference Paper · May 2010


Source: IEEE Xplore

CITATIONS READS

19 9,927

4 authors, including:

Dalibor Radovanovic Tijana Radojević


Singidunum University Singidunum University
28 PUBLICATIONS 67 CITATIONS 64 PUBLICATIONS 502 CITATIONS

SEE PROFILE SEE PROFILE

Marko Šarac
Singidunum University
63 PUBLICATIONS 268 CITATIONS

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

SITCON 2020 - Singidunum International Tourism Conference View project

FINIZ 2016 View project

All content following this page was uploaded by Dalibor Radovanovic on 16 May 2014.

The user has requested enhancement of the downloaded file.


IT audit in accordance with Cobit standard

Dalibor Radovanović, Tijana Radojević, Dubravka Lučić, Marko Šarac


Singidunum University
Danijelova 32, Belgrade, Serbia
E-mail: dradovanovic@singidunum.ac.rs, tradojevic@singidunum.ac.rs, msarac@singidunum.ac.rs
Ernst & Young Belgrade
Bulevar Mihajla Pupina 115d, Belgrade, Serbia
E-mail: dubravka.lucic@yu.ey.com

Abstract - In today's market circumstances, the fact that ty and maintain data integrity. It is also necessary to de-
the number of jobs that are taking place with the help of in- termine whether IS enables effective achievement of busi-
formation systems constantly growing is indisputable. Man- ness objectives and whether system resources are used in
agers often know very little about the information system and an effective and efficient manner. IT audit today represent
in that circumstance it is very difficult to them to effectively a modern and advisory function, "right hand" that helps the
perform control function and successfully manage informa- management on IT governance. Furthermore represent a
tion’s. This paper explains the concept of information systems procedure used to assess whether the information technol-
audit and methodologies used. IT governance and informa- ogy acts in the function of successful accomplishment of
tion systems audit is imposed as an imperative for successful business objectives.
business. To improve the management of IT in accordance There are several methodologies and standards that deal
with regulatory requirements, organizations are using best with this issue: COBIT, ITIL, ISO 27002 (ex ISO 17799)
practice frameworks to facilitate the work. One of these and ISO 9000. Organizations will consider and use a varie-
frameworks for IT governance is Cobit, which provides ty of IT models, standards and best practices. These must
guidelines on what can be done in an organization in terms of be understood in order to consider how they can be used
control activities, measurement and documentation of together (Fig 1.), COBIT with acting as the consolidator.
processes and operations.

II. COBIT
I. INTRODUCTION
COBIT (Control Objectives for Information and Related
Critical element important for the survival and success Technologies) is the worldwide accepted standard which
of the organization is effectively managing information prescribes areas and individual controls for IT governance,
and communication technology or ICT, which is reflected informatics and related IT processes. COBIT framework
in the increase depending on the information and their as- authors are non-profit organization ISACA (Information
sociated systems, increased vulnerability and a wide range System Audit and Control Association) and ITGI (IT Go-
of threats to the ICT technology, the extent and cost of ex- vernance Institute).
isting and future investments in ICT systems , the potential COBIT combines business and IT goals, providing the
of technology to change work organization and business ability to monitor the maturity of the information metric
practices, creating new opportunities and reduce costs. system. COBIT enables management to optimize IT re-
sources such as applications, information, infrastructure
and people. The practice recommended by COBIT is the
mixture of knowledge of numerous experts as a result of
good practice, applicable in any organization.

Fig 1. COBIT as consolidator

IT audit is the process of gathering and evaluating evi-


dence based on which one can evaluate the performance of
IT systems, i.e, to determine whether the operation of in- Fig 2. Development COBIT framework [8]
formation systems in the function of preserving the proper-
The first version of COBIT was created as a tool to in For each of the key business and IT processes COBIT
order to support performance of audit of financial state- defines and provides (Fig 3.):
ments, but it continues further to develop following devel-  Maturity models
opment of the IT role in business. By releasing second ver-  Critical success factors – CSF
sions it became the most frequently used methodology for
audit of information systems worldwide. Through further  Key goal indicators – KGI
development and publishing of third version in the year  Key performance indicators – KPI
2004, COBIT became integrated framework for IT man-  RACI chart
agement, while the last version of COBIT 4.1 represents  Control objectives and control tests.
the major framework and methodology for IT governance.
By using COBIT methodology management and corpo-
Figure 2 shows the development of the COBIT framework
rate structures is easy to determine which of these
and roles it has had through his development and upgrad-
processes and in what extent are important. From the point
ing.
of control and information systems audit COBIT deter-
COBIT consists of 34 key business control processes mines 18 applications and 6 of process controls. Assess-
describing each process model of maturity. It contains over ments of maturity are based on the famous CMM model,
300 detailed IT controls. The primary control objectives only that in COBIT model marks are very detailed de-
are divided into four domains [6]: scribed and explained for each process. Assessment of ma-
1) Planning and Organization - PO, includes processes for turity of IT governance processes are in the range of 0 to 5
planning and design organization in the function of [2, 11]:
achievement of business goals of the organization. This  0 - There are no processes, process of IT governance
domain includes risk assessment. do not exist. Management did not recognize the im-
2) Acquisition and Implementation - AI, includes processes portance of this concept; the decisions on investments
related to the acquisition and development of IT solutions in IT are uncontrolled, from case to case ('ad hoc'),
and manages changes of these solutions throughout the outside the system supervision and risk assessment
time. and are completely in the hands of individuals.
3) Delivery and Support - DS, includes the processes that  1 - Initial processes, management is not aware of the
affect the actual delivery of IT services to organization. importance of IT governance, although there are no
This domain includes the processes for manage problems formal procedures, management and oversight of in-
and incidents; manage security and other processes that af- formation technology is mostly based on individual
fect the performance of IT. and uncontrolled based, and actions are taken on case
4) Monitoring and Evaluation - ME, includes processes for by case basis. There are no standards, nor corporate
regular review of IT processes and their successfulness in rules, nor obligations and responsibilities regarding
the function of achievement of relevant IT controls objec- this issue. Management generally is not aware of the
tives. importance of IT risk. IT governance and its perfor-
Each of these domains shows the key control activities mance measurement are processes that are carried out
of information technology related to the area. Each of only within the IT department, and management is
these processes offers a so-called RACI matrix (the acro- passive, uneducated and not aware of this matter.
nyms of Responsible, Accountable, Consulted, Informed),  2 - Repeatable processes, IT governance processes
representing a matrix which for each process determines exist, but it is uncoordinated and mainly initiated by
who is responsible and authorized for implementation of IT department or some other operating level. It often
particular control activities and who only need to be in- happens that many people perform the same task (se-
formed and consulted. gregation of duties issue); there is no system's super-
vision, coordination, or standardized procedures. The
responsibility is left to individuals; corporate policies
do not exist or are not presented to employees.
 3 - Defined processes, IT governance procedures are
prescribed and documented, and constantly improved
through formal trainings and education. Procedures
and corporate rules, although formally exists, are not
sophisticated, mature nor customized to organization
business.. They only represent the formalization of
existing procedures. Although procedures exist, the
responsibility for its execution is on the individuals,
and having in mind that there is no system supervi-
sion, it is unlikely that one can detect anomalies re-
garding this matter.
 4 - Managed processes; except corporate policies and
procedures exist, it also is possible to constantly
monitor their execution, to measure their performance
and to take necessary corrections in accordance with
Fig 3. Interrelationships of COBIT Components needs. Processes and activities are continuously im-
proved. Very sophisticated IT governance objectives
closely aligned with the business objectives are being
set. Using of current methods and frameworks
(COBIT, IT BSC and ITIL) in performance mea- future. It also concerns the safeguarding of necessary
surement and IT audit is required. resources and associated capabilities.
 5 - Optimized processes, IT governance processes are  Compliance deals with complying with the laws, regu-
brought to the optimal level and the company is a lations and contractual arrangements to which the
leader in the area. Performance and efficiency of IT business process is subject, i.e., externally imposed
as a business function is constantly measured, and the business criteria as well as internal policies.
results are compared with best practice and other or-  Reliability relates to the provision of appropriate in-
ganizations. Complete transparency in IT governance formation for management to operate the entity and
governs, corporate bodies have actual supervision exercise its fiduciary and governance responsibilities.
over information technology through a series of for- Summary of IT resources are managed by IT processes
mal mechanisms. Information technology is used in a to achieve goals that meet the business requirements of or-
strategic purpose, as key business resource and in- ganizations. This basic principle of COBIT framework is
formation activities (investments, projects, risks, etc.) illustrated in Fig 4. The IT resources identified in COBIT
are optimally functioning align with the real business can be defined as follows [6]:
priorities.
 Applications are the automated user systems and ma-
It is essential that the most important methods of IT go- nual procedures that process the information.
vernance and information systems audit such as ITIL,
COBIT and Sarbanes-Oxley use the same range for as-  Information is the data, in all their forms, input,
sessment of IT processes maturity and effectiveness of processed and output by the information systems in
controls over them (from 0 to 5, with the same explana- whatever form is used by the business.
tion).  Infrastructure is the technology and facilities (i.e.,
hardware, operating systems, database management
systems, networking, multimedia, and the environ-
ment that houses and supports them) that enable the
Business objectives
processing of the applications.
 People are the personnel required to plan, organize,
ess ity lity
en cy ial ce ty acquire, implement, deliver, support, monitor and
ectiv icien ident egrity ailabi plian iabili
E f f E f f n f n t Av o m a l evaluate the information systems and services. They
Co I C Re
may be internal, outsourced or contracted as required.
Infrastructure

People

Domains
III. ITIL
Information
IT Processes

Applications

Processes The UK Government recognized very early on the signi-


ficance of IT best practices to Government and, for many
years, has developed best practices to guide the use of IT
Activities in Government departments. These practices have now be-
e s
urc come common standards around the world in private and
r eso public sectors. ITIL was developed more than 15 years ago
IT
to document best practice for IT service management, with
that best practice being determined through the involve-
Fig 4. The COBIT cube ment of industry experts, consultants and practitioners.
ITIL is based on defining best practice processes for IT
service management and support, rather than on defining a
To satisfy business objectives, information needs to con- broad-based control framework. It focuses on the method
form to certain control criteria, which COBIT refers to as and defines a more comprehensive set of processes. Addi-
business requirements for information. Based on the tionally, ITIL provides a business and strategic context for
broader quality, fiduciary and security requirements, seven IT decision making and for the first time describes conti-
distinct, certainly overlapping, information criteria are de- nual service improvement as the key activity which drives
fined as follows [10, 11, 12]: maintenance of value delivery to customers.
 Effectiveness deals with information being relevant IT service management is concerned with planning,
and pertinent to the business process as well as being sourcing, designing, implementing, operating, supporting
delivered in a timely, correct, consistent and usable and improving IT services that are appropriate to business
manner. needs. ITIL provides a comprehensive, consistent and co-
 Efficiency concerns the provision of information herent best practice framework for IT service management
through the optimal use of resources. and related processes, promoting a high-quality approach
for achieving business effectiveness and efficiency in IT
 Confidentiality concerns the protection of sensitive in-
service management. ITIL is intended to underpin but not
formation from unauthorized disclosure.
dictate the business processes of an organization. The role
 Integrity relates to the accuracy and completeness of of the ITIL framework is to describe approaches, func-
information as well as to its validity in accordance tions, roles and processes, upon which organizations may
with business values and expectations. base their own practices and to give guidance at the lowest
 Availability relates to information being available level that is applicable generally.
when required by the business process now and in the
Below that level, and to implement ITIL in an organiza- Table 1. Overview of COBIT, ITIL and ISO27002
tion, specific knowledge of its business processes is re- COBIT ITIL ISO27002
quired to drive ITIL for optimum effectiveness. In ITIL Mapping IT Information
Mapping IT
V3, the most significant development has been the move Function Service Level Security
Process
from a process-based framework to a more comprehensive Management Framework
structure reflecting the life cycle of IT services. In this new 34 Processes
Area 9 Processes 10 Domains
context, the key processes have been updated, but more 4 Domains
significantly, ITIL now describes IT service management Issuer ISACA OGC ISO Board
functions, activities and organizational structure; strategic Information Compliance
and sourcing concerns; and integration with the business, Implemen- Manage Ser-
System Au- with security
ITIL V3. tation vice Level
dit standards
Five volumes comprise the ITIL v3, published in May Accounting Security
2007 [7]: Company, IT IT Consulting Company, IT
Consultant
 ITIL Service Strategy Consulting Company and Network
Company Consulting
 ITIL Service Design
 ITIL Service Transition
ITIL’s best practice framework covers a total of 9 proc-
 ITIL Service Operation
esses and enables the implementation of IT service level
 ITIL Continual Service Improvement management with focus on achieving business effective-
ness and efficiency in IT service management.

IV. ISO 27002 AND ISO 27001 STANDARD Table 2. Comparison of COBIT, ITIL and ISO 27002
Objectives Objectives
which refer which refer
The international standard of IT security controls, COBIT CONTROL OBJECTIVES to ISO to ITIL
ISO/IEC 27002:2005 was published by ISO and the IEC, 27002
which established a joint technical committee, ISO/IEC PO - PLAN AND ORGANISE
PO1 Define a strategic IT plan
JTC 1, ISO 27000 [5] Directory (2005). Its goal is to pro- PO2 Define the information architecture 
vide information to parties responsible for implementing
STRATEGIC LEVEL

PO3 Determine technological direction  slightly


information security within an organization. It can be seen PO4
Define the IT processes,
 slightly
as a best practice for developing and maintaining security organization and relationships
standards and management practices within an organiza- PO5 Manage the IT investment slightly
Communicate management aims
tion to improve reliability on information security in inte- PO6 
and direction
rorganizational relationships. It defines 133 security con- PO7 Manage IT human resources 
trols strategies under 11 major headings. The standard em- PO8 Manage quality 
phasizes the importance of risk management and makes it PO9 Assess and manage IT risks 
clear that it is not necessary to implement every stated PO10 Manage projects
DS - DELIVER AND SUPPORT
guideline, only those that are relevant. DS1 Define and manage service levels  
The guiding principles in ISO/IEC 27002:2005 are the DS2 Manage third-party services.  
starting points for implementing information security. DS3 Manage performance and capacity  
DS4 Ensure continuous service  
They rely on either legal requirements or generally ac-
TACTICAL AND OPERATIONAL LEVEL

DS5 Ensure systems security 


cepted best practices. Measures based on legal require- DS6 Identify and allocate costs 
ments include: protection and non-disclosure of personal DS7 Educate and train users 
data, protection of internal information and protection of DS8 Manage service desk and incidents  
intellectual property rights. Best practices mentioned in the DS9 Manage the configuration  
standard include: information security policy, assignment DS10 Manage problems  
DS11 Manage data  
of responsibility for information security, problem escala- DS12 Manage the physical environment 
tion and business continuity management [1]. DS13 Manage operations  
AI - ACQUIRE AND IMPLEMENT
AI1 Identify automated solutions  
Acquire and maintain application
AI2  
V. . COMPARISON OF A COBIT, ITIL AND ISO27002 software
Acquire and maintain technology
AI3  
infrastructure
A first difference of the three standards is the fact that AI4 Enable operation and use  
they are issued by different organizations with different ar- AI5 Procure IT resources  
eas of activities and objectives. The general function of the AI6 Manage changes  
Install and accredit solutions and
standards is also slightly different (Table 1.). COBIT pro- AI7  
changes
vides best practices and tools for monitoring and mapping ME - MONITOR AND EVALUATE
STRATEGIC LEVEL

IT processes while ITIL aims to map IT service level man- ME1


Monitor and evaluate IT

agement and ISO27002 provides guidelines for imple- performance
menting a standardized information security framework. Monitor and evaluate internal
ME2 
control
COBIT consists of 4 domains and 34 processes which are Ensure compliance with external
required for the implementation of the information system ME3
requirements
audit. ME4 Provide IT governance
These three methodologies described are quite used in taining discipline and rigor across functions and geogra-
the past few years by certain organizations and represent phies.
best practice, approved, developed and tested by experts Internal Audit should have a direct line to executive
worldwide. Table 2 shows the correlation between control management and the Audit Committee. By cascading top
objectives presented through the COBIT framework with level opinion on the value and content of Internal Audit’s
ISO 27002 and ITIL methodology. outputs and by communicating information on the issues
In relation to the COBIT framework, ITIL describes in that affect the business, the function can heighten its visi-
detail the procedures for delivery and support services (DS bility.
domain - Table 2), but does not support all the require- To maintain that position, it needs to develop a closer
ments for monitoring and evaluation of ICT within COBIT relationship with the business while maintaining its inde-
model. Some control objectives COBIT model in the do- pendence and objectivity. It also needs to work in closer
main of planning and organization (PO domain - Table 2) cooperation with the wider audit function to leverage un-
are treated superficially and displayed through ITIL. ITIL derstanding and efficiency. This powerful combination of
model is not focused on describing what needs to be ad- technical and business know-how, underpinned by an un-
dressed in the management of ICT. The processes are de- derstanding of operational and technology risk, can turn
tailed structured to indicate who and how to apply them the function from cost centre to value builder.
(roles and responsibilities). IT audit as a discipline is maturing. To compete in this
In the period from 1 June to 31 July 2009 company new and threatening environment, it needs to standardize,
Ernst & Young conducted a survey which included 1865 automate and speed up its analysis and reporting. It has to
companies from 61 countries, covering all major indus- become more economic and efficient by reducing costs
tries. This research belongs to the group of the oldest and and using tools that improve the effectiveness and reliabil-
most respected researches of this type. It provides a com- ity of its output and its compliance and control.
parison of companies in respect of major areas of informa-
tion security and IT governance [4].
COBIT are increasingly popular for planning IT audit
activity (Fig 5) and are adopted by 69 percent of respon-
dents. These frameworks deliver a structured approach to REFERENCES
planning and focus the IT audit on the business and tech-
nological risks of the organization. [1] Calder, A., & Watkins, S. 2008. A Manager's Guide to Da-
ta Security and ISO 27001 / ISO 27002. Kogan Page.
[2] Cannon, D. L. 2008. CISA Certified Information Systems
Auditor Study Guide. Sybex.
[3] Davis, C., Schiller, M., & Wheeler, K. 2007. IT Auditing:
Using Controls to Protect Information Assets. McGraw-
Hill Osborne Media.
[4] Ernst & Young. 2009. Global Information Security Survey.
Available from Internet: http://www.ey.com/Publication/
/vwLUAssets/12th_annual_GISS/$FILE/12th_annual_GIS
S.pdf.
[5] ISO. 2005. ISO/IEC 27001. Switzerland: International Or-
ganization for Standardization (ISO).
[6] ITGI. 2007. CobiT 4.1 – Framework, Control Objectives,
Management Guidlines and Maturiy Models, USA: IT Go-
Fig 5. Standards and frameworks that are used for plan- vernance Institute.
ning IT audit activity [7] ITIL. 2007. An Introductory Overview of ITIL V3. London:
The UK Chapter of the itSMF.
[8] Min, Y. W. 2009. Understanding and Auditing IT Systems.
Peking: Lulu.
VI. . CONCLUSIONS [9] Panian, Z., & Spremic, M. 2007. Korporativno upravljanje
i revizija informacijskih sustava. Zagreb: Zgombić & Part-
neri.
COBIT, ITIL, ISO 17799 and ISO 27001 are the group
of most commonly used methodologies by companies in [10] Publishing, V. H. 2008. IT Governance based on Cobit 4.1
respect of IT security and IT governance. They are used - A Management Guide. Van Haren Publishing.
parallel, which is not surprising, considering that represent [11] Selig, G. J. 2008. Implementing IT Governance. Van Haren
best practices and experiences, which have been approved, Publishing.
developed and tested in companies around the world. [12] Senft, S., & Gallegos, F. 2009. Information Technology
Many organizations face a continually changing set of Control and Audit (Third ed.). Boca Raton, USA: Taylor &
pressures and dynamics in the current economic climate. Francis Group.
Faced with shrinking markets, they can choose to rational- [13] Spremic, M. 2007. Methods of auditing infromation sys-
ize, merge or contract. The technology thread which holds tems. Zbornik Ekonomskog fakulteta u Zagrebu, 295-312.
systems and processes together is at risk. As a conse-
quence, IT Internal Audit plays an integral role in main-

View publication stats

You might also like