370 likes | 1.49k Views
Internal Controls in a computerized environment. Some concepts of control do not change Objectives Framework (COSO)* Internal Environment Implementation will change More focus on system (imbedded) controls Continuous rather than periodic controls Random v. systematic errors
E N D
Internal Controls in a computerized environment Some concepts of control do not change Objectives Framework (COSO)* Internal Environment Implementation will change More focus on system (imbedded) controls Continuous rather than periodic controls Random v. systematic errors *COBIT augments existing framework
Computerized Controls Benefits: Decrease human error, restrict access, decrease duplication of input, audit trail Detriments: Confidentiality, system integrity, completeness, input errors, audit trail
Categories of IC in a computerized environment General Controls – pervasive, relate to the entire system Part of Control Environment, must be managed well to enhance effectiveness of application controls Examples: physical access restrictions, backup process, policies, disaster recovery, IT segregation of duties
General Controls – System reliability Definition: “A system that operates without material error, fault or failure during a specified time in a specified environment.” Components: Separation of incompatible functions Access Backup and recovery Management of the IS function
General Controls—based on COBIT Company level controls Monitoring, planning, assessment—Definition of IT roles, Assessment of significant IT activities outside the IT function… Change controls Approval, separation of duties, policies—Testing & QA of changes, authorization of changes, separate developers from production environment Operations Policies, roles—Formal backup policies, operational policies and procedures well defined Security Review, access, data/system—periodic review of access, policies for admitting new users/user access, review of exception logs
Criteria for implementing principles of system reliability • Policies-The entity has defined and documented its security policies relevant to the particular principle. • Communications-The entity has communicated its defined policies to authorized users. • Procedures- The entity uses procedures to achieve its objectives in accordance with its defined policies. • Monitoring- The entity monitors the system and takes action to maintain compliance with its defined policies. NOTE: Management involvement and support is necessary
Principles to achieve system reliability a. Security- The system is protected against unauthorized access (both physical and logical). b. Availability- The system is available for operation and use as committed or agreed. c. Processing integrity- System processing is complete, accurate, timely, and authorized. d. Confidentiality- Information designated as confidential is protected from unauthorized disclosure. e. Privacy- Personal information obtained as a result of e-commerce is collected, used, disclosed, and retained as committed or agreed.
Security • Security is a management issue, not a technology issue • Redundancy—Defense in depth • Control categories—apply to manual and computer • Preventive • Detective • Monitoring • Examples?
Availability • Threats: • Hardware/software failure • Natural/man-made disasters • Human error • Worms/Viruses • Sabotage
Availability • Controls: • Disaster Recovery Plan (continuity) • Access Controls – physical and automated • Preventive maintenance • Surge protectors/uninterruptible power supply • Training
Processing Integrity • Accurate, timely, authorized transactions and completeness • Types of controls: • Source Data controls • Data entry controls • Processing controls • Output controls
Source Data Controls • Form Design • Cancellation • Secure Storage • Segregation of Duties • Authorization
Data Entry Controls • Computer field checks • Range checks • Completeness checks • Validity Checks Means to achieve: • Error logs • Batch totals • Sequence checks
Processing Controls • Data matching • Batch total recalculation • Write Protection
Output Controls • Usually manual • Reconciliations • Key reconciliation for a system is sub-ledger to control account in G/L • Source documentation verification
Confidentiality • Each organization has its own definition of what this means. • Examples of items usually considered confidential: • Business Plans • Pricing • Customer Lists • Contracts
Confidentiality • Controls • Encryption: Storage and Transmission • Access Controls: Read/Write, changes, deletion, copy, etc. • Authentication: Unique ID, Passwords, Fingerprints
Confidentiality • Threats: • E-mail • Instant Messaging • Downloads NOTE: Monitoring in this area is required as new threats are occurring almost daily
Privacy • Focuses on protecting personal information about customers and employees • Vs. confidentiality which deals predominately with organization data • Same controls as those for Confidentiality (Encryption, Access, Authentication) • Federal and some States have regulations around customer information privacy • Identity theft issues
Access Control Matrix • A table listing all authorized users and their corresponding abilities within a system. This should include type of access as well • Read • Change • Delete/Add • Powerful SOD tool • Change management is key to remaining effective • Type of control? • Preventive
Categories of IC in a computerized environment Application Controls – specific, relate to individual portions of the system—or types of transactions Prevent, detect, correct errors in input, processing, output Examples: software passwords, security matrix, edit reports, smart fields, batch totals
Key application controls Batch totals -aid in computer environment, often embedded in the process Source data controls – pre-numbered, turnaround, computer-readable Online data entry preformat prompt accuracy (completeness)
More application controls Input validation edit program sequence checks validity check File maintenance reconcile master with other data data security Output controls user review reconcile batch totals error logs
Computer systems - Segregation of Duties Recommended IT department segregation of duties: Systems Analyst, Programmer, Computer operator, Testing group, AIS Librarian (data, programs), Manager. What type of control is this? Preventive Once way for a company to address this risk is to? Share it – can use external consultant for pieces of application support, or utilize a web based application
Computer systems - Accessand safeguarding Data protection controls Physical and logical Lock rooms, require passwords Data transmission, Internet Preventive Labeling, librarians, data dictionaries Backup… Uninterruptible power sources Disaster recovery
Modifications - IT During an IT modification, controls need to be in place to ensure the continuation of system: Reliability Security Confidentiality Integrity Availability
Control Activities • Management should ensure that both IT general and application controls exist and support the objectives of the compliance effort. Some of the key areas related to IT include: • Designing and implementing controls designed to mitigate significant identified IT risks • Monitoring key IT controls for continued effectiveness • Documenting and testing IT controls related to §404
Things to keep in mind regarding IT • General computer controls should be: • based on financial reporting requirements • signed off by key business process owners • not left to the sole responsibility of the IT function. • IT application controls should also be defined by business-user requirements, and not the IT function.