0% found this document useful (0 votes)
928 views41 pages

RCM Itgc

The document outlines various IT General Controls (ITGC) related to IT policies, security training, change management, access management, and disaster recovery. It highlights risks associated with inadequate policies, unauthorized changes, and lack of employee awareness, along with corresponding controls to mitigate these risks. Additionally, it emphasizes the importance of periodic reviews and proper documentation of IT security policies and procedures.

Uploaded by

bfaginc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd

Topics covered

  • Control Objectives,
  • IT Governance Framework,
  • Environmental Controls,
  • Organizational Change Manageme…,
  • Physical Security,
  • Compliance,
  • Incident Management,
  • Service Request Fulfillment,
  • Business Continuity Planning,
  • Change Management
0% found this document useful (0 votes)
928 views41 pages

RCM Itgc

The document outlines various IT General Controls (ITGC) related to IT policies, security training, change management, access management, and disaster recovery. It highlights risks associated with inadequate policies, unauthorized changes, and lack of employee awareness, along with corresponding controls to mitigate these risks. Additionally, it emphasizes the importance of periodic reviews and proper documentation of IT security policies and procedures.

Uploaded by

bfaginc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd

Topics covered

  • Control Objectives,
  • IT Governance Framework,
  • Environmental Controls,
  • Organizational Change Manageme…,
  • Physical Security,
  • Compliance,
  • Incident Management,
  • Service Request Fulfillment,
  • Business Continuity Planning,
  • Change Management

Sr.

No Process Sub-process Risk Description: Control


Reference

1 ITGC IT Policies If the IT security policies/procedures IT-1


do not exist, or are not defined and
documented by management then it
may result in inconsistency in the
implementation of the
policlies/procedures which may cause
confidentiality, integrity and
availablity issues, legal, regulatory
and compliance issues

2 ITGC IT Policies If the employees are not aware of the IT-2


security policy/procedures of the
organization then they may not follow
the same resulting in inconsistent
process

3 ITGC IT Security If the new/existing employees are not IT-3


training aware of the security
policy/procedures of the organization
then it may impact the confidentiality,
integrity and security of the
organisation and it's assets
4 ITGC Third Party If the service level management IT-4
Management framework does not exist then it may
result in non measurement of
performance and financial and
business loss.

5 ITGC SOD Conflicts If the procedures do not exist for IT-5


identifying, preventing and monitoring
potential SoD conflicts then it may
result in poor internal controls,
accounting fraud and
misappropriation of company assets

6 ITGC Change Unauthorized changes are made in the IT-6


Management production environment that do not
follow the Change & Release
management process

7 ITGC Change Unauthorized changes are made in the IT-7


Management production environment that do not
follow the Change & Release
management process

8 ITGC Change Untested changes are made directly to IT-8


Management the production environment

9 ITGC Change Unauthorized changes are made in the IT-9


Management production environment that do not
follow the Change & Release
management process

10 ITGC Change Unauthorized or untested changes are IT-10


Management migrated to the production
environment

11 ITGC Patch Unauthorized patches or patches IT-11


Management having adverse effects on
systems/business process are
installed

12 ITGC Information If incident/problem management IT-12


Security procedures do not exist then
Incident incidents/problems may not resolved
Management in a timely manner and Information
Security weakness might go unnoticed
13 ITGC Job & Batch Application systems are not processed IT-13
Scheduling effectively.
Backup may be wrong

14 ITGC Malware Systems are prone to compromise and IT-14


Protection hack attacks in the absence of an
effective antivirus solution

15 ITGC Backup & Backup copies of critical data are not IT-15
recovery available when required

16 ITGC Physical and Unauthorized changes are made in the IT-16


Environment production environment that do not
Security follow the Physical Access &
Environmental Controls process

17 ITGC Physical and Unauthorized personnel gains access IT-17


Environment to information processing facilities
Security

18 ITGC Physical and Unauthorized personnel gains access IT-18


Environment to information processing facilities
Security
19 ITGC Physical and Critical information processing IT-19
Environment systems are not adequately protected
Security from damage.

20 ITGC Physical and Critical information processing IT-20


Environment systems are not adequately protected
Security from damage.

21 ITGC Access Unique IDs if not maintained, would IT-21


Management lead to difficulty in fixing of
responsiblities

22 ITGC Access Controls are in place to ensure IT-22


Management application and system resource users
are appropriately authorized.

23 ITGC Access Standard policies and procedures do IT-23


Management not exist or are not followed to ensure
that authorized access is granted to
user accounts

24 ITGC Access Standard policies and procedures do IT-24


Management not exist or are not followed to ensure
that user accounts of
resigned/terminated employees are
revoked immediately.

25 ITGC Access A weak password management system IT-25


Management might lead to chances of intrusion by
outsiders
26 ITGC Access Lack of segregation of duties over IT-26
Management requesting and granting access to the
systems and data

27 ITGC Disaster Disaster Recovery Plan, Policies and IT-27


Recovery/ Procedures do not exist leading to
Business disruption of the activities of the
Continutiy company (loss of data etc.)
plan

28 ITGC Vendor access -Endanger network vulnerability and IT-28


to network data security
-Window for potential fraud and
malpractices

29 ITGC Procurement -Uncontrolled purchases leading to IT-29


of IT assets unwarranted expenditure
-Unauthorized purchase of IT asset
opening potential fraud and
malpractice avenues

30 ITGC New Programs -Unauthorized implementation of new IT-30


or Services programs
-Unwarranted outflow of funds

31 ITGC Hardware -Loss/ damage/ theft of hardware IT-31


Monitoring components
-Unwarranted outflow of funds

32 ITGC Web filtering -Free access to websites containing IT-32


malicious viruses
-Endanger network vulnerability and
data security
33 ITGC Vulnerability -Window for
-Existence ofpotential fraud and
unidentified IT-33
Assessments malpractices
vulnerabilities in the system
-Network exposure to malicious
programs
34 ITGC Independent -Risks in IT framework and IT-34
IT Audit infrastructure remaining undetected
-Management not timely updated on IT
issues
-Stakeholder dissatisfaction
Control Objective

IT Security Policy & Procedures are


defined and formally documented,
reviewed periodically and
communicated to all related parties

IT Security Policy & Procedures are


stored on common accessible location
with easy access to employees

All employees and third party staff


should be provided with adequate
training on information security
aspects of the organization that
include ethical conduct, system
security practices, confidentiality
standards, integrity standards
Service Level Management framework
exists and is complied with

Segregation of Duties (SoD) matrix is


defined, documented and approved by
business management. Periodic review
is performed using information
extracted from systems

Controls are in place to ensure that


Change & Release Management
Policy/procedures are in place,
approved, reviewed on an annual basis
and communicated to all relevant
parties

Controls are in place to ensure that all


changes follow a documented Change
& Release management process

Controls are in place to ensure that


physically separate testing and/or
development environment is in place
and all changes are tested in an
environment that is physically separate
from production environment

Controls are in place to ensure that


adequate segregation of duties are
implemented in Change & Release
management process

Controls are in place to ensure that


developers do not have access to
production data and systems

Controls are in place to ensure that


system software updates are evaluated
and tested prior to implementation in
the production environment

Controls are in place to ensure that all


production problems are recorded and
tracked until their final resolution
Controls are in place to ensure that an
effective scheduling method is in place
to support batch and online processes.

Controls are in place to ensure that all


systems are secured by antivirus and is
upto date with latest virus definitions
and updates

Controls are in place to ensure that


backups are performed regularly and
data recovery is tested and certified on
a regular basis

Controls are in place to ensure that


Physical Access & Environmental
Controls Policy/procedures are in place,
approved, reviewed on an annual basis
and communicated to all relevant
parties

Controls are in place to ensure that


Physical Access to critical rooms is
monitored on a continuous basis

Controls are in place to ensure that all


information processing servers and
systems are locked in a secure rack or
cabinet and only authorized personnel
have access to the keys
Controls are in place to ensure that
critical rooms are equipped with
adequate environmental controls and
uninterrupted power supply.

Controls are in place to ensure that


critical rooms having environmental
control equipment are covered under
an annual maintenance contract (AMC)
and serviced regularly

Controls are in place to ensure all


application and system resource users
are uniquely identified

Controls are in place to ensure


application and system resource users
are appropriately authorized.

Controls are in place to ensure that


creation of new user accounts follows a
formalized procedure.

Controls are in place to ensure that


removal of existing user accounts
follows a formalized procedure.

Controls are in place to ensure that


access authentication mechanisms
(e.g. passwords) are effective
Controls are in place to ensure that
only authorized personnel are able to
create and modify system user
accounts.

Disaster recovery plan and business


continutiy plans are in place

Vendor access to the company's


network for diagnostic and/or
maintenance activities is properly
restricted

All purchases of IT assets are made


centrally and with adequate approval

New programs or services are


approved prior to implementation

The company's policies and procedures


establish for hardware monitoring

The company utilizes web filtering to


prevent employees from visiting
dangerous websites

The company obtains periodic network


vulnerability assessments
Independent reviews of IT related
areas are performed regularly
Control Description: Anti-Fraud Operational/
(Yes/No) Financial

Company A should have developed information security Yes Operational


policies/procedures to cover the following areas:
- Business information and data classification
- Information security incident management and problem
management
- Acceptable use policy
- Third party management
- Network management and monitoring
- User Access Management
- Password Settings and Management
- Vulnerability and Patch Management
- System acquisition, development and maintenance policy
- Laptop encryption Policy
- Capacity management policy
- Antivirus and malware protection
- Physical and environmental security
- Change and release Management Process
and should be reviewed periodcally and communicated to
related parties

All Information security policies/procedures should be No Operational


easily accessible to employees for ready reference like
Password policy
Malware protection policy
Acceptable usage policy
Email policy
Internet policy
Data classification policy
Information security Incident management policy

New employees and third party staff should be provided Yes Operational
training on the information security aspects and IT
policies/procedures of the organization during induction.
Employees and third party staff are required to sign off and
confirm that they have read and understood the policies
and procedures.
The IT policies and procedures are communicated to all the
employees at the time of joining. Refresher trainings are
provided in case of any changes in the policies or
procedures. Annual trainings should be provided to existing
employees and third party staff
Formal Statement of Work(SOW) is included in a contract as Yes Operational
supporting document for service contracts to define the
work scope, schedule and service deliverables. SOW is
approved by the management as part of the service
contract and SLA are measured for compliance

Business and IT function SoD Conflict Matrix is defined, Yes Operational


developed and mapped to applications to identify potential
fraud conflicts in financial reporting. SoD is approved by
business management and reviewed atleast once a year

Change & Release management process is defined, Yes Operational


documented and approved by management. Review is
performed on an annual basis and the policy/procedure are
communicated to all relevant parties

All changes follow the Change & Release management Yes Operational
process, relevant approvals are taken and all details are
adequately documented

Separate environments are established for development, No Operational


testing and production activities. These environments are
operating on physically separated servers.

For all changes, testing and UAT are performed in a


separate development and quality assurance environment
before migration to production environment
For all changes, the change requestor and change approver Yes Operational
cannot be the same person

Developers do not have access to production environment Yes Operational


and are restricted from migrating program code to
production environment

All OS patches should be evaluated and tested in test or No Operational


development environment prior to installation in
production, to determine the system impact and result of
new patches or software updates.

Downtime should be requested from application team prior


to installation of patches in production environment.
Incident and Problem management policy/procedure is in No Operational
place. All incidents/problems are recorded in Helpdesk tool
and documented with information such as root cause
analysis, actions taken, final solution, responsible staff,
management review and impact to the Company's business.
Incidents/problems are categorized depending on the
criticality or Impact as defined in Incident and problem
The schedule run once in a week to fetch data from meters Yes Financial
in MDAS server on Secure revenue management suite (web
based app);
Daily data backup schedules

All systems are installed with Symantec End Point antivirus No Operational
solution and are updated with latest virus definitions and
updates

Full backup on Daily and weekly basis for user data and No Operational
MDAS are kept in the data center room.
Application like HRMS, SAP, Email (Gmail) are completely
outsourced to third party vendors and hosted in cloud/
vendor’s data center. Company A depends on the third
party vendors for BCP/DR for those applications

Physical Access & Environmental Controls process is Yes Operational


defined, documented and approved by management.
Review is performed on an annual basis and the
policy/procedure is communicated to all relevant parties

All authorized employees entering the critical rooms are Yes Operational
required to enter through a controlled entry point
monitored by security guards and CCTV Surveillance. And
others (vendors and unauthroized employees) are required
to be escorted by authorized person and temporary access
is granted after management approval

All servers and systems should be securely locked in No Operational


cabinets or racks and only authorized personnel are allowed
to open and access the systems. Prior approvals are taken
from management for opening and accessing the systems
Data center equipment is kept cool in a well-air conditioned No Operational
room with a stable temperature.
Servers and other hardware are protected from power
surge and mechanisms are in place to mitigate and prevent
electrical loss or temperature variances. Systems are
protected from fire damage by a fire suppression system
that may include (but not be limited to) sprinklers, Halon
gas suppression units or a fire extinguishers.
Servers and other hardware are protected from water
damage through the use of tarps, protected overhangs or
other physical barriers preventing water from coming into
contact with the servers and other hardware.

Environmental control equipment like UPS, Fire No Operational


control/suppression systems, AC, etc., are monitored and
checked regularly and maintenance activities and testing is
carried out on a quarterly basis

The naming convention No Financial


(firstname.lastname@companya.com) is applied whereas
possible for system user ID creation to assure that the ID is
uniquely identified

The logical access rights are reviewed, defined and Yes Operational
authorized by the division controller (i.e. data owner).

On Joining of new user the HR sends a request to the IT Yes Operational


team for creating user account and allocating the system.
If further application rights are required for the job then
the respective head sends the approval for providing the
access

On exit the HR sends an email to the IT team for Yes Operational


disabling/removing the access for the user.
Based on the mail IT team disables/delete the user access

The authentication access mechanism is through Active No Operational


Directory and all password rules are enforced through the
domain and application's should have access authentication
as per the password policy
Only authorized user can create and modify user accounts. Yes Operational
All relevant approvals as mentioned in User Account
Management Procedure are taken prior to
creation/modification of user accounts.

The DR and BCP policies and procedures should be in place No Operational


to help recovering from disaster

Company A has outsourced its IT functions to Xenolith, IBM Yes Operational


& Cronos to assist in the day to day IT functions ( IT
Infrastructure & SAP). The access to these service providers
should be limited through Non-disclosure Agreements
(NDAs) and confidentiality agreements.

A note sheet is prepared seeking the approvals for any IT Yes Operational
asset purchase. Thereafter, the Purchase Requisition (PR)
for all the IT assets is created by IT function and approved
by Head IT. Any new laptop / desktop purchased is issued to
the user only after appropriately configured by IT.

For installation/implementation of any new program, a No Operational


relevant business case is prepared after detailed debates
and discussions with each stakeholder involved, and
documented through a Change Request Form (CRF). Once
the stakeholders approve the business case, a work-based
requisition (WBR) is created for the project. The WBR is
approved by CEO.

The IT function maintains the IT Asset Inventory in an Excel Yes Operational


Workbook. Physical verification of all hardware is
performed by IBM. Wall to wall reconciliation of IT assets is
performed quarterly for all locations. The verification report
is compiled in an excel spreadsheet and shared with IT
Head.

The company is using cyberom firewall traffic monitoring Yes Operational


and restricting access to potentially dangerous websites,
which may expose organisation network to threat

The company should have a periodic vulnerability Yes Operational


assessment to help timely identify the vulnerabilities
There should be an periodic indpendent review of IT related Yes Operational
areas to timely highlight the deviations and help in process
improvement
Test Type: Period: Key/ Control Performer Preventive /
(Inquiry/ Non-Key Frequency: Detective
Inspection/
Observation/
Re-performance)

Inspection 01/04/2016 - Key Annual Head IT Preventive


31/12/2016

Inquiry/ 01/04/2016 - Non-Key Ad-hoc IT Function Preventive


Inspection 31/12/2016

Inspection 01/04/2016 - Key Ad-hoc HR Function Preventive


31/12/2016
Inspection 01/04/2016 - Key Monthly IT Function Preventive
31/12/2016

Inspection 01/04/2016 - Key Annual IT Function Preventive


31/12/2016

Inspection 01/04/2016 - Key Annual IT Head Preventive


31/12/2016

Inspection 01/04/2016 - Key Annual Stakeholders Preventive


31/12/2016 CEO
IT Function

Inspection 01/04/2016 - Non-Key Annual IT Function Preventive


31/12/2016

Inspection 01/04/2016 - Key Ad-hoc IT Function Preventive


31/12/2016

Inspection 01/04/2016 - Key Ad-hoc IT Function Preventive


31/12/2016

Inspection 01/04/2016 - Non-Key Ad-hoc IT Function Preventive


31/12/2016

Inspection 01/04/2016 - Key Monthly IT Function Detective


31/12/2016
Inquiry/ 01/04/2016 - Key Continuous IT Function Preventive
Inspection 31/12/2016

Inspection 01/04/2016 - Non-Key Continuous IT Function Detective


31/12/2016

Inspection 01/04/2016 - Key Daily IT Function Corrective


31/12/2016

Inspection/ 01/04/2016 - Key Annual IT Head Preventive


Observation 31/12/2016

Inspection/ 01/04/2016 - Key Ad-hoc IT Team/ Facility Preventive


Observation 31/12/2016 management team

Inspection/ 01/04/2016 - Key Ad-hoc IT Function Preventive


Observation 31/12/2016
Inspection/ 01/04/2016 - Key Ad-hoc IT Team/ Facility Preventive
Observation 31/12/2016 management team

Inspection/ 01/04/2016 - Key Ad-hoc IT Function Preventive


Observation 31/12/2016

Inspection 01/04/2016 - Non-Key Ad-hoc IT Function Preventive


31/12/2016

Inspection 01/04/2016 - Key Ad-hoc IT Function/ Service Preventive


31/12/2016 Provider

Inspection 01/04/2016 - Key Ad-hoc IT Function Preventive


31/12/2016 HR Function

Inspection 01/04/2016 - Key Ad-hoc IT Function Preventive


31/12/2016 HR Function

Inspection 01/04/2016 - Key Ad-hoc IT Function Preventive


31/12/2016
Inspection 01/04/2016 - Key Ad-hoc IT Function Preventive
31/12/2016

Inquiry / 01/04/2016 - Non-Key Annual IT Function Corrective


Inspection 31/12/2016 Maintenance
Function
Administration
function

Inquiry / 01/04/2016 - Non-Key Annual IT Function Preventive


Inspection 31/12/2016

Inquiry / 01/04/2016 - Key Ad-hoc IT Function Preventive


Inspection 31/12/2016

Inquiry / 01/04/2016 - Key Ad-hoc IT Function Preventive


Inspection 31/12/2016

Inquiry / 01/04/2016 - Key Quartely IT Function Detective


Inspection 31/12/2016

Inquiry / 01/04/2016 - Key Continuous IT Function Preventive


Inspection 31/12/2016

Inquiry / 01/04/2016 - Key Yearly IT Function Detective


Inspection 31/12/2016
Inquiry / 01/04/2016 - Key Ad-hoc Statutory & Detective
Inspection 31/12/2016 Internal Auditors
Automated / Test of Design Issue
Manual Conclusion

Manual Pass NA

Manual Pass NA

Manual Pass NA
Manual Fail The SLA's are not monitored for
ensuring compliance

Manual Pass NA

Manual Pass NA

Manual Pass NA

Manual Pass NA

Manual Pass NA

Manual Pass NA

Manual Pass NA

Manual Pass NA
Automated Pass NA

Manual Pass NA

Manual Pass NA

Manual Pass NA

Manual Pass NA

Manual Pass NA
Manual Pass NA

Manual Pass NA

Automated Pass NA

Automated Pass NA

Manual Pass NA

Manual Pass NA

Automated Pass NA
Manual We observed
the population
and noted that
there is no
privileged user
created during
the testing
Manual Fail Company A currently have no
Business Continuity Planning
(BCP)/ Disaster Recovery (DR) in
place.

Manual Pass NA

Automated Pass NA

Manual Can not test NA


the design
effectiveness;
since there is
no population
during FY 16-
17

Manual Pass NA

Automated Pass NA

Automated Pass NA
Manual Pass NA
Recommendation Summary

NA

NA

NA
There should be a regular performance monitoring for
ensuring compliance with SLA's

NA

NA

NA

NA

NA

NA

NA

NA
NA

NA

There should be a periodic restoration testing.

NA

NA

NA
NA

NA

NA

NA

NA

NA

NA
To have BCP/DR plan

NA

NA

NA

NA

NA

NA
NA
1 APO01 - IT Management Framework 27
2 APO02 - IT Service Strategy Principles 28
3 APO02 - IT Strategy Principles 29
4 APO03 - Architectural Principles 30
5 APO04 - Innovation Principles 31
6 APO05 - Portfolio Principles 32
7 APO06 - Budgeting Policy 33
8 APO07 - Contract Staff Policy 34
9 APO07 - Human Resources Policies 35
10 APO08 - Business-IT Relationship Management Policy 36
11 APO10 - IT Procurement Policy 37
12 APO10 - Third-Party IT Service Delivery Management Policy 38
13 APO11 - Quality Management Policy 39
14 APO12 - Fraud Risk Policy 40
15 APO13 - Information Security Policy 41
16 APO14 - Data Cleansing Policy 42
17 APO14 - Data Quality Assessment Policy 43
18 APO14 - Data Management Policy 44
19 APO14 - Privacy Policy
20 BAI01 - Program-Project Management Policy
21 BAI03 - Maintenance Policy
22 BAI03 - Software Development Policy
23 BAI03 - System and Service Acquisition Policy
24 BAI04 - Availability Management Policy
25 BAI04 - Crisis Management Policy
26 BAI05 - Organizational Change Management Policy
BAI06 - IT Change Management Policy 45 EDM03 - Enterprise Risk Policy
BAI07 - IT Change Acceptance and Transitioning 46 EDM04 - Performance Measurement Policy
BAI08 - Knowledge Management Policy 47 EDM05 - Transparency Policy
BAI09 - Asset Management Policy 48 MEA01 - Self-Assessment Policy
BAI09 - Intellectual Property Policy 49 MEA01 - Whistle-Blower Policy
BAI10 - Configuration Management Policy 50 MEA02 - Internal Control Policy
BAI10 - Service level agreement (SLA) Policy 51 MEA02 - Internal Control Self-Assessment Guidance
DSS01 - Service Management Policy 52 MEA03 - Compliance Policy
DSS02 - Incident Management Policy 53 MEA04 - Assurance Guide
DSS02 - Service Request Fulfillment Policy 54 MEA04 - Internal Audit Charter
DSS03 - Problem Resolution Policy 55 COBIT Process Policy Mapping
DSS04 - Business Continuity Policy 56 COBIT-2019- Maturity Assessment
DSS06 - Business Controls Guidance
Enterprise Architecture Principles - Development Options and Process
Four Ps Description Governance Enablers & Tools
EDM01 - Delegation of Authority Policy
EDM01 - IT Governance Policy
EDM02 - Delivery Execution Policy
ssment Guidance

Common questions

Powered by AI

Without a documented Disaster Recovery plan, a business risks significant disruptions in operations, loss of data, and extended downtimes following an incident. The absence of such a plan can lead to prolonged recovery times, increased financial losses, and long-term damage to the organization's reputation .

Vendor access to a company's network can introduce vulnerabilities such as network vulnerability and data security risks. These can be mitigated by implementing restricted access protocols, conducting regular compliance checks, and ensuring that all activities are monitored and audited .

Weak password management systems can lead to intrusions by outsiders due to factors such as predictable passwords, lack of complexity requirements, and inadequate update policies. This vulnerability exposes the system to unauthorized access, potentially leading to data breaches and the compromise of sensitive information .

Regular vulnerability assessments are crucial for identifying and addressing security weaknesses before they can be exploited. Failure to conduct these assessments can leave systems exposed to malicious attacks, resulting in data breaches, operational disruptions, and potential financial loss .

Maintaining a documented change and release management process ensures that all changes are evaluated, authorized, and traceable, reducing the risk of errors and system disruptions. This leads to increased system stability and facilitates compliance with regulatory requirements .

Inadequate physical and environmental security measures can lead to damage or unauthorized access to critical information processing systems. Consequently, this may result in data loss, system downtimes, and compromised data integrity, severely impacting an organization's operational capabilities and reputation .

Training new employees and third-party staff on information security policies ensures they understand organizational security protocols, reducing the risk of accidental data breaches and non-compliance. Neglecting this training can result in unintentional policy violations, increasing the likelihood of security incidents .

Independent IT audits provide an objective evaluation of an organization's IT governance framework, identifying areas of risk, and ensuring that IT policies and procedures align with best practices. This can lead to improvements in compliance, enhanced risk management, and overall system reliability .

Formalized procedures for creating and removing user accounts ensure that only authorized individuals have access to systems and data. Without such procedures, there is a risk of unauthorized access by former employees or incorrect permissions being granted, which can lead to data breaches and unauthorized data manipulation .

The lack of segregation of duties in access management can lead to conflicts of interest and increase the risk of fraudulent activities. When individuals have overlapping responsibilities, they may grant unauthorized access, deliberately or inadvertently, leading to potential data breaches or manipulation of information systems .

You might also like