You are on page 1of 4

INSIGHT

MetricStream Strengthen IT Auditing with COBIT


As businesses increasingly adopt cloud, virtualization, and • Focuses more on enablers
mobile technologies, they are grappling with a growing number
• Draws from a new process reference model
of sophisticated IT security threats and risks. It has become
imperative to strengthen IT governance and audit processes, to • Factors in a new and modified set of practices, processes,
ensure the integrity of information systems. COBIT helps business and activities
and their IT managers achieve these, and build a powerful, • Has a pool of goals, metrics, inputs, and outputs
integrated framework for IT governance, control and audit
processes. • Includes Responsibility, Accountability, Consultancy or
Informational (RACI) Charts
Achieving IT Control Objectives with COBIT 5 • Provides process capability maturity models and
COBIT, or the Control Objectives for Information and Related assessments
Technologies, was drafted to “research, develop, publicize, and
promote an authoritative, up-to-date, international set of generally COBIT 5 comprises five principles and seven enablers which are
accepted IT control objectives for day-to-day use by business generic and designed to cater to the requirements of a range of
managers and auditors.” commercial, financial, and not-for-profit enterprises.

COBIT 5, the latest version of the control objectives, aims to The five principles are as follows:
achieve the following:
1. Meeting stakeholder needs
• Help enterprises derive optimal value from IT by maintaining a
2. Covering the enterprise end-to-end
balance between realizing the desired benefits, and optimizing
risk levels and resource use 3. Applying a single integrated framework

• Enable information and related technology to be governed and 4. Enabling a holistic approach
managed in a holistic manner across the enterprise
5. Separating governance from management
• Integrate business and functional areas of responsibility with
IT-related interests of all stakeholders The seven enablers facilitate the introduction and implementation
of COBIT 5 principles. These enablers are as follows:
The Evolution of COBIT
Since it was first established, COBIT has gone through several 1. Principles, policies, and frameworks which offer guidance for
revisions. COBIT 5 packs in more punch by integrating the best routine management of issues
features of the earlier versions. 2. Processes which help reach the stated overall goals

The first and second editions, released in 1996 and 1998 3. Organizational structures which often decide the main
respectively, focused on control objectives, and were based strategy driving the enterprise
on a purely IT control and audit framework. The third version 4. Culture, ethics and behavior which play an important role
(2000) was an IT management framework which incorporated in any enterprise, and vary across the company and its
management guidelines. international operations

IT governance became the guiding force behind COBIT 4.0 (2005) 5. Information which, if harnessed at the right time and in the
and 4.1 (2007), with the inclusion of governance and compliance right way, can result in maximum benefits for all stakeholders
processes, and removal of assurance processes. 6. Services, infrastructure, and applications

With COBIT 5, businesses have a framework that: 7. People, skills and competencies which together help ensure a
strong competitive advantage and success in the long run
• Incorporates new Governance of Enterprise IT (GEIT)
principles
INSIGHT

COBIT 5’s Navigation Aids lock on a door.” How does one know if the lock is a good control
The COBIT 5 conceptual framework can be approached from three or not? It depends on whether the objective of the lock is to
vantage points: Information criteria, IT resources, and IT processes. keep people out or in. Only if this is known, will one be able to
determine which side of the door the key should be on.
The information criteria describe the requirements for information
effectiveness, efficiency, confidentiality, integrity, availability, Similarly, IT controls can be better monitored and audited when
compliance, and reliability. The IT resources are defined to help the objective behind the control is clear. The advantage of COBIT
meet business requirements, and include people, applications, is that it helps determine these objectives. Therefore, instead of
technology, facilities, and data. The IT processes in this context waiting for an audit, businesses can implement controlled self-
are planning and organization, acquisition and implementation, assessments, where management can themselves evaluate the
delivery and support, and monitoring. efficiency of the control structure. COBIT 5 has only one control
objective: Enterprise goals should be achieved.
How can organizations ensure that the output of their IT resources
and IT processes match the information security criteria The process capability model as outlined in COBIT 5 has a number
established for meeting key business objectives? This is where of benefits for auditors. This includes enhanced usability, reliability
COBIT 5’s sound internal control framework comes into play. as well as frequency of process capability assessment initiatives.
COBIT 5’s navigation aids link the processes, resources, and It also provides a strong base for conducting more rigorous
criteria to 34 overall control objectives with 318 detailed control assessments, as well as reducing the disagreements between
objectives. stakeholders on assessment results.

The navigation aids function together in the following way: COBIT 5 as an Overarching Corporate Governance Integrator
COBIT 5 aligns with the latest international standards and
The control of IT processes – which satisfy the business
frameworks, including enterprise frameworks such as COSO, ISO/
requirements, and is in turn enabled by control statements, and
IEC 9000, ISO/IEC 31000, and IT-related frameworks such as ISO/
takes into consideration control practices.
IEC 38500, ITIL, ISO/IEC 27000, TOGAF, PMBOK/PRINCE 2, and
COBIT 5 from an Audit Manager’s Perspective CMMI. This allows enterprises to use COBIT 5 as the overarching
COBIT 5 is not only a cost-efficient approach, but also a governance and management framework integrator.
conceptually easy framework for auditors to understand and
Information Systems Audit and Control Association (ISACA) is
communicate to the management. COBIT 5 moves away from the
now planning to facilitate COBIT user mapping of practices and
“maturity models” in COBIT 4.1, to “Process Capability Model”.
activities to third-party references, to enable effective control
management without duplication of effort.

How COBIT Fits in with COSO and SOX


Organizations are obligated to achieve SOX compliance in financial
reporting and auditing. The COSO control framework offers a
roadmap for the same by providing five crucial components,
namely: information and communication, which drive the control
activities through a thorough risk assessment process, in order
to maintain the desired control environment. The whole cycle is
monitored to ensure ongoing compliance.

In this context, COBIT provides additional detailed guidance for IT.


Summary of COBIT 5 Process Capability Model The five components of COSO can be visualized as the horizontal
Source: ISACA - http://www.isaca.org/COBIT/Documents/Framework-Overview.pdf layers of a three-dimensional cube, with the COBIT objective
domains – “plan and organize, acquire and implement, deliver and
The key is to thoroughly understand “what” the control objectives support, and monitor and evaluate” applying to each.
are. It’s very difficult to evaluate the effectiveness of controls The cube enables good mapping between COBIT’s risk
unless one is clear about what those controls are meant to management framework and COSO components. Ultimately COBIT
achieve. A typical example to illustrate this point is that of “a fits the bill perfectly in building upon COSO and SOX.
INSIGHT

A Detailed Look at Internal Control Components The relevant information must be accurately identified,
The following five internal control components interact with each captured, and communicated to all stakeholders. Appropriate
other and are integrated with the management process. They communication channels should be employed to target various
must be embedded seamlessly into the operational activities of stakeholders, and employees should be adequately educated
the organization. about their individual roles in the internal exercise.

1. Control Environment 5. Monitoring


This forms the basis for the rest of the components. Consider ADoes the internal control system function as intended over
the simplest control in IT, the password. Any user has to fully a period of time? Does it evolve continuously in sync with the
comprehend the need for a password, to help the password work changing business environment? This kind of a systematic review
effectively. Similarly, it’s important that everyone in an enterprise forms the backbone of any dynamic system. The frequency of
recognizes the vital need for a control environment. these regular reviews is decided according to the criticality of the
risks involved.
The various elements of a control environment include:
Enterprises should also resort to a gap analysis to assess their
• Integrity and ethical values
security standards. They can mark themselves against different
• Employee competence COBIT levels to understand where they stand, and what higher
• Management’s philosophy and operating style levels they are aspiring for.

• Assignment of authority and responsibility Technology as an Enabler


• Organization and development of human resources A single, centralized technology system can support COBIT 5
compliance by harmonizing COBIT controls across IT governance
• Management’s direction
and regulatory compliance requirements such as HIPAA and PCI
DSS. It can also help build a centralized COBIT library that can be
2. Risk Assessment
leveraged for processes such as risk and control assessments,
An ever-changing internal and external environment results in
and policy mapping.
risks of varying levels. Risk and innovative initiatives cannot be
wholly separated from each other. The trick is not to worry about
More importantly, a centralized system can help streamline the
eliminating risks but to manage them diligently and intelligently.
entire IT audit workflow – right from audit scoping, planning and
scheduling, to reporting, and issue management. Automated
So what should the game plan be? First, a business must identify
capabilities, if present, can help accelerate and improve the
and link all consistent goals that drive the entire organization and its
efficiency of processes such as notifying auditors of task
business units. Then, it must zero in on the risks that can have an
assignments, or generating reports.
impact on these goals. Finally, it has to develop a clear roadmap to
manage these risks, and limit them to acceptable levels.
The key is to try and enable a systematic and organized process
for each aspect of auditing. For instance, with audit scoping, it is
3. Control Activities
useful to have a system that can help enterprise-wide auditable
Enterprises need to put in place policies, procedures, and concrete
entities to be defined and managed in a hierarchical, tree-like
measures to ensure that risks do not sabotage the organization’s
structure with a clear understanding of roles and responsibilities.
objectives. These measures include authorizations, verifications,
reconciliations, segregation of duties, and operational profitability As organizations embrace risk-based auditing, they are rapidly
reviews. adopting systems that can simplify risk assessments and
computations based on specific methodologies and algorithms.
4. Information and Communication
This allows auditors to clearly determine areas of high risk, and
The information required to run a secure control environment can
accordingly prioritize audits instead of trying to audit all areas at
be broadly classified as:
once.
• Financial or operational
• Gathered from internal or external sources
INSIGHT

When it comes to audit planning and scheduling, the auditing Reporting technology should also be leveraged wherever
system should help audit managers view enterprise-wide possible to improve the efficiency and effectiveness of audit
IT auditing requirements, as well as auditor profiles and reporting. An advanced reporting system can provide real-time
qualifications, and accordingly allocate task assignments and and enterprise-wide views of audit processes and results through
resources. Centralized dashboards can help in tracking and advanced dashboards. This information is extremely valuable for
managing these plans and schedules efficiently. stakeholders and the leadership to make informed and actionable
decisions.
In the project management stage, portable technical devices can
be leveraged to enter field data, and sync it with the central audit Conclusion
management system for optimal efficiency. Ingraining COBIT 5-based auditing into the organizational DNA is
critical to building a secure IT environment that is closely aligned
A robust audit work-paper management system can enable an to changing business realities. Organizations that establish a
integrated and collaborative approach to preparing, organizing, COBIT-oriented auditing approach are better positioned to comply
referencing, reviewing, and retaining work-papers created during with IT regulatory requirements in a sustainable manner, and drive
audits. Such a system can also help in sharing audit information, better value for their enterprise.
and synchronizing audit activities across the enterprise.

MetricStream
www.metricstream.com info@metricstream.com
© Copyright 2014. All Rights Reserved.

You might also like