You are on page 1of 1

INTERNAL CONTROL DEFINITION EXAMPLE

Manual Controls - Performed by individuals outside of a system - Nagchecheck if tama ba yung details sa delivery oreder at yung niloload sa truck
- Depends on human - Matching of cash received in the firm’s bank account against a clients’ AR balance
- Manually nag-aaudit/nagchecheck

IT-Dependent Manual Controls - Rely on manual process from personnel but a portion - A system-generated report lists users that have not accessed (e.g., logged into a
of the control requires some level of system system) a particular system within the past 90 days. The internal control may require
involvement an administrator to review such reports and disable certain users whose accounts have
- should have a process owner. (This will facilitate the not been accessed within the defined 90 days, as a result.
consistent operation of these controls and avoid any
exceptions being noted within an audit report) * IT-dependent: system-generated report
- Iccheck kung tama ba yung record sa hard copy docs * manual: administrator review of the report and disabling certain users as a result
(manual) at yung naka-record sa system
- Rechecking or recomputation

IT General Control - the focal point of most SOC audits - organization’s change management process tracks and documents that changes are
- are comprised of policy management, logical access, authorized, tested, approved, and implemented into production. Moreover, it helps an
change management, and physical security organization gain assurance that changes happen in an environment where there is
- IT General Controls can be a combination of manual proper segregation of duties
and application controls. As such, the type of sampling - User access administration controls are used so that the right people have the right
to test these controls varies by control type. access to system resources (i.e., right people & right access). These processes and
- more on access sa AIS the controls supporting these processes are IT general controls.

Application Control - Virtually any configuration setting in a system that can - Google G-Suite and Microsoft’s Office 365 can be configured to require two-factor
be used to prevent or detect problems authentication (e.g., 2FA, MFA) in order for users to log in and access system
- In-app controls resources and data. Enabling 2FA helps prevent unauthorized users from logging in to
the system.
- the system is configured to lock out a user that enters an incorrect password after
three attempts, it has an application control that detects problems possibly associated
with unauthorized access attempts
- that the system is configured to automatically download and apply security patches or
updates to software

You might also like