You are on page 1of 6

Audit Planning and Risk Assessment

in a Computerized Environment
AUDITING in a CIS
 Audit planning and risk assessment in a computerized environment
require a thorough understanding of the client’s IT systems, controls,
and potential risks.
STEPS/PROCEDURES

Understanding Understanding
Identifying Key Assessing Assessing General
the Client’s IT Automated
IT Risks Internal Controls Controls
Environment Controls

Communication
Performing Data Documenting Developing an Continuous
and
Analysis Audit Procedures Audit Plan Monitoring
Collaboration
General Controls vs Specific Controls

 General Controls – are overarching controls that apply to an organization’s overall IT


environment.
Examples: Access Controls, Change Management Controls, IT Governance

What do you think is the purpose of General Controls?


General Controls help ensure the overall reliability, security, and integrity of IT systems and data.
They establish the foundation for specific controls to operate effectively.
General Controls vs Specific Controls

 Specific Controls – are controls that are directly related to specific IT applications or processes
within an organization.
Examples: Input Controls, Processing Controls, Output Controls

What do you think is the purpose of Specific Controls?


Specific Controls are tailored to the specific risks and requirements of individual IT applications or
processes. They help ensure the accuracy, reliability, and security of data within those systems.
 Example Risk: Unauthorized Access to Customer Data

 Auditors’ Response:
1. Risk Assessment
2. Testing Access Controls
3. Reviewing User Access Logs
4. Assessing Segregation of Duties
5. Recommendation for Improvement
6. Follow-up and Monitoring

You might also like