0 ratings0% found this document useful (0 votes) 143 views40 pagesCobit Framework
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Introduction
What is COBIT?
Control OBjectives for Information and related
Technologies
Businesses use IT but do not understand it or
manage it properly. Cobit is a control framework
that achieves the following
Links to business requirements
Organizes IT activities into a general process model
Identifies major IT resources to be leveraged
Defines management control objectives that need to be
consideredManagement Goals
Business objectives are achieved
Undesired events are prevented or detected and
corrected
A measure of where the organization stands and
how it can be improved
Cobit Defines
Benchmarking guidelines
Goals and metrics
Activity goalsCobit Products
Executive management and boards
Business and IT management
Governance, assurance, control and
security professionalsGovernance, Assurance and Security
Professionals
Framework—Explaining how COBIT organizes IT
governance objectives and best practices by IT domains
and processes, and links them to business requirements
Control objectives— Providing poner best practice
management objectives for all IT activities
Control Practices— Providing ete on why controls
are worth implementing and how to implement them
IT Assurance Guide—Providing a generic audit approach
and supporting guidance for audits of all COBIT’s IT
processes
IT Control Objectives for Sarbanes-Oxley—Providing
guidance on how to ensure compliance for the IT
environment based on the COBIT control objectivesGovernance, Assurance and Security
Professionals
IT Governance Implementation Guide—Providing a
generic road map for implementing IT
governance using the COBIT resources and a
supporting tool kit
COBIT Quickstart —Providing a baseline of
control for the smaller organisation and a
possible first step for the larger enterprise
COBIT Security Baseline —Focusing the
organization on essential steps for implementing
information security within the enterprise
Cobit implementation is supported by several
products, refer: www.isaca.org/cobitPrinciples of Cobit Framework
Cobit meets the need of integrating
business requirements with IT and
leveraging for performance
Business-focused
Process-oriented
Controls-based
Measurement-driven.inter-relationship among cobit components
(Business Focused)
Business
‘requirements, iY information
IT
Processes
Guidelines Practices
Key Goal Matut
Indhcators ModsCobit Principle
Business
w., requirements
IT Processes
a IT ResourcesIT Goals and Enterprise Architecture for IT
Enterprise Strategy
tries
rect
IT Goals
i a
direct Enterprise g
Architecture for IT 8
— ‘nfonmation
(trees +" rseteatone
— ake
Business Goals for IT Enterprise Architecture for ITManaging IT Resources for IT Goals
Business Goals:
Governance Drivers
g
;
i
Infrastructure = 4
Information = =} 2
People
i Amicatios =
k=
len le
le
5
B lem
a
Keb
he!
ep
emcobit framework (Process Oriented)
Plan and Organize
Acquire and Implement
Deliver and Support
Monitor and EvaluatePlan and Organize
The strategy and domain of IT planning
Are IT and business aligned?
Is Enterprise achieving optimum use of its
resources?
Does everyone understand IT objectives?
Are IT risks understood and managed?
Is quality of IT systems appropriate for business
needs?Acquire and Implement
To realize business goals IT solutions need
to be developed or acquired and
integrated into the business process
Are new projects likely to deliver to business
needs?
Are new projects likely to be delivered on time?
Will new systems work properly when
implemented?
Will changes be inter-operable and compatible?Deliver and Support
Service delivery, management of security
and continuity, service support for users,
and management of data
Are IT services delivered in line with business
priorities?
Are IT costs optimized?
Is the workforce able to use IT systems
productively and safely?
Are adequate confidentiality, integrity and
availability in place?Monitor and Evaluate
Regular assessment of IT processes for
quality and compliance with control
requirements
Is IT’s performance measured to detect problems
before it is too late?
Does management ensure that internal controls are
effective and efficient?
Can IT performance be linked back to business
goals?
Are risk, control, compliance and performance
measured and reported?Process Controls (Control Driven)
ACT
CONTROL
INFORMATIONProcess Controls
Controls are policies, procedures that
provide reasonable assurance for
achieving business objectives
Each of COBIT's IT process has high-level
and fine grained objectives identified by
PCn which identifies the process control
numberControl Objectives in COBIT
PC1 : Process Owner
Assign an owner for each COBIT process such that responsibility is
clear
PC2 : Repeatability
Define each COBIT process such that it is repeatable.
PC3 : Goals and Objectives
Establish clear goals and objectives for each COBIT process for
effective execution
PC4 : Roles and Responsibilities
Define unambiguous roles, activities and responsibilities for each
COBIT process for efficient execution
PCS : Process Performance
Measure the performance of each COBIT process against its goals
PC6 : Policy, Plans and Procedures
Document, review, keep up to date, sign off on and communicate to all
involved parties any policy, plan or procedure that drives a COBIT
processBusiness and General Controls
At the executive paneer at level, business objectives are set,
policies are established and decisions are made on how to deploy
and manage the resources of the enterprise to execute the enterprise
strategy. The IT control environment is directed by this top-level set
of objectives and policies.
At the business process level, controls are applied to specific
business activities. Most business processes are automated and
integrated with IT application systems, resulting in many of the
controls at this level being automated as well. These controls are
known as application controls.
To EUBBOH the business processes, IT provides IT services, usually
in a shared service to many business processes, as many of the
development and operational IT processes are provided to the
whole enterprise, and much of the IT infrastructure is provided as a
common service (e.g., networks, databases, operating systems and
storage). The controls applied to all IT service activities are known
as IT general controls.Business and General Controls
General controls are those controls embedded in IT
processes and services. Examples include:
Systems development
Change management
Security
Computer operations
Controls embedded in business process applications are
commonly referred to as application controls. Examples
include:
Completeness
Accuracy
Validity
Authorization
Segregation of dutiesApplication Controls
Cobit assumes implementation of the following
controls as part of the acquire and implement
domain. It only defines control objectives of
application controls. They are as follows:
Data origination and authorisation procedures
Data input controls
Data processing controls
Data output controls
Boundary controlsData Origination/Authorisation Controls
AC1 Data Preparation Procedures: Data preparation procedures are in place and
followed by user departments. In this context, input form design helps ensure that
errors and omissions are minimised. Error-handling procedures during data
origination reasonably ensure that errors and irregularities are detected, reported and
corrected.
AC2 Source Document Authorisation Procedures: Authorised personnel who are
acting within their authority properly prepare source documents and an adequate
segregation of duties is in place regarding the origination and approval of source
documents.
AC3 : Source Document Data Collection: Procedures ensure that all authorised
source documents are complete and accurate, properly accounted for and transmitted
ina timely manner for entry.
AC4 Source Document Error Handling : Error-handling procedures during data
origination reasonably ensure detection, reporting and correction of errors and
irregularities.
ACS Source Document Retention : Procedures are in place to ensure original source
documents are retained or are reproducible by the organisation for an adequate
amount of time to facilitate retrieval or reconstruction of data as well as to satisfy
legal requirements.Data Input Controls
AC6 Data Input Authorisation Procedures: Procedures
ensure that only authorised staff members perform data
input.
AC7 Accuracy, Completeness and Authorisation Checks:
Transaction data entered for processing (people-
generated, system-generated or interfaced inputs) are
subject to a variety of controls to check for accuracy,
completeness and validity. Procedures also assure that
input data are validated and edited as close to the point
of origination as possible.
AC8 Data Input Error Handling: Procedures for the
correction and resubmission of data that were
erroneously input are in place and followed.Data Processing Controls
AC9 Data Processing Integrity : Procedures for processing data
ensure that separation of duties is maintained and work performed
is routinely verified. The procedures ensure that adequate update
controls such as run-to-run control totals and master tile update
controls are in place.
AC10 Data Processing Validation and Editing: Procedures ensure
that data pea validation, authentication and editing are
tformed as close to the point of Oremanon as possible.
dividuals approve vital decisions that are based on artificial
intelligence systems.
AC11 Data Processing Error Handling : Data processing error-
handling procedures enable erroneous transactions to be identified
without being processed and without undue disruption of the
processing of other valid transactions.Data Output Controls
AC12 Output Handling and Retention : Handling and retention of
output from IT applications follow defined procedures and consider
privacy and security requirements.
AC13 Output Distribution : Procedures for the distribution of IT
output are defined, communicated and followed.
AC14 Output Balancing and Reconciliation : Output is routinely
balanced to the relevant control totals. Audit trails facilitate the
tracing of transaction processing and the reconciliation of disrupted
data.
AC15 Output Review and Error Handling : Procedures assure that
the provider and relevant users review the accuracy of output
reports. Procedures are also in place for identification and handling
of errors contained in the output.
AC16 Security Provision for Output Reports : Procedures are in
place to assure that the security of output reports is maintained for
those awaiting distribution as well as those already distributed to
users.Cobit Framework (Measurement Driven)
This addresses the basic need of every organization to
understand its status
Need to obtain an objective view of the enterprise’s own performance.
What to monitor and how are important
Need to implement a proper management tool kit that can improve
performance
Cobit addresses these by providing
Maturity models to enable benchmarking and identification of
necessary capability improvements
Performance goals and metrics for the IT processes, demonstrating how
processes meet business and IT goals and are used for measuring
internal process performance based on balanced scorecard principles
Activity goals for enabling effective process performanceMaturity Models
A Measure of the quality of the IT process
management
Relative quality of the enterprise
A direction in which to move efficiently
Tool for measuring progress
Using Cobit the management can identify
Actual performance of the enterprise
Compare with industry
Enterprise’s target for improvementMaturity Model
Noneexistent Initial Repeatable Defined © Managed Optimised
ae
LEGEND FOR SYMBOLS USED LEGEND FOR RANKINGS USED
Enterprise current status O=Management processes are nat appled at all,
* Indust 1—Processes are ad hoc and disorganised,
ncustry average 2—Processes follow a regular pattern,
Enterprise target ‘3=Provesses are documented and communicated,
4—Processes are monitored and measured.
5—Good practices are followed and automated,Generic Maturity Model for Cobit
0 Non-existent
Complete lack of any recognizable processes.
The enterprise has not even recognized that there is an issue to be addressed
1 Initial
‘There is evidence that the enterprise has recognized that the issues exist and
need to be addressed.
There are, however, no standardised processes; instead there are ad hoc
approaches that tend to be applied on an individual or case-by-case basis.
The overall approach to management is disorganized
2 Repeatable
Processes have developed to the stage where similar procedures are followed
by different people undertaking the same task.
There is no formal training or communication of standard procedures, and
responsibility is left to the individual.
There is a high degree of reliance on the knowledge of individuals and,
therefore, errors are likelyGeneric Maturity Model
3 Defined
Procedures have been standardised and documented, and communicated
through training.
It is, however, left to the individual to follow these proce:
that deviations will be detected.
The procedures themselves are not sophisticated but are the formalization of
existing practices.
4 Managed
Itis possible to monitor and measure compliance with procedures and to take
action where processes appear not to be working effectively.
Processes are under constant improvement and provide good practice.
Automation and tools are used in a limited or fragmented way.
5 Optimised
Processes have been refined to a level of best practice, based on the results of
continuous improvement and maturity modeling with other enterprises.
IT is used in an integrated way to automate the workflow, providing tools to
improve quality and effectiveness, making the enterprise quick to adapt.
s, and it is unlikelyGeneric Maturity Model
Me ety models provide a generic profile of the
stages through which Soe pees evolve for
management and control of IT processes, and
are:
A set of requirements and the enabling aspects at the
different maturity levels
A scale where the difference can be made measurable in an
easy Manner
A scale that lends itself to pragmatic comparison
The basis for setting as-is and to-be positions
Support for gap analysis to determine what needs to be
done to achieve a chosen level
Taken together, a view of how IT is managed in the
enterprisePerformance Measurement
Maturity model only define capability but not
actual performance. Cobit defines two metrics
Goal indicators:
IT goals and metrics that define what the business expects from IT
(what the business would use to measure IT)
Process goals and metrics that define what the IT process must
deliver to support IT’s objectives (how the IT process owner would
be measured)
Performance indicators
Process performance metrics (to measure how well the process is
performing to indicate if the goals are likely to be met)Goal Indicators
Key goal indicators (KGI) define measures that
tell management —after the fact—whether an IT
process has achieved its business requirements,
usually expressed in terms of information
criteria:
Availability of information needed to support the business
needs
Absence of integrity and confidentiality risks
Cost-efficiency of processes and operations
Confirmation of reliability, effectiveness and compliancePerformance Indicators
Key performance indicators (KPI) define measures that
determine how well the IT process is performing in
enabling the goal to be reached. Effective metrics should
meet the following characteristics:
A high insight-to-effort ratio (i.c., insight into performance and the
achievement of goals as compared to effort to capture them)
Be comparable internally (e.g., percent against a base or numbers over
time)
Be comparable externally irrespective of enterprise size or industry
Better to have a few good metrics (may even be one very good one that
could be influenced by different means) than a longer list of lower
quality
Should be easy to measure and should not be confused with targetsInter-relationship Processes, IT and
business goals
Actty
el
Unita ain
secu fod
reatemans, ae
‘aheraibes fey
‘thes. _—
= lp
8 i}
3 temessured by |} fe messed by ts measured by
oe Frequency ot } Number of Pl
my review of the | access violations: | ry
a pect secanty | Cerri
s ‘ents tobe Parse
H ‘mentored
-
WPI Process Metic KSI
Pes
DOU ECL LsCobit Management, Alignment and Control
a Ea
Prt 4 mss
Pitiiitt? somInter-relationship Processes, IT and
business goals
Goals are defined top-down in that business goals will
determine a number of IT goals to support them, IT
goals will decide the different process goals needed, and
each process goal will establish the activity goals.
The achievement of goals is measured by outcome
metrics (called key goal indicators, or KGIs) and drives
the higher-level goal.
The metric that measured the achievement of the activity
goal is a performance driver (called key performance
indicator, or KPI) for the process goal. Metrics allow
management to correct performance and realign with
the goals.Summary
The COBIT framework, therefore, ties the
businesses requirements for information and
governance to the objectives of the IT services
function. The COBIT process model enables IT
activities and the resources that support them to
be properly managed and controlled based on
COBIT’s control objectives, and aligned and
monitored using COBIT’s KGI and KPI metrics
In COBIT, IT resources are managed by IT
processes to achieve IT goals that respond to the
business requirements.i
i
ory
Saeeaeneaes