internal controls over information systems

Post on 28-Nov-2014

1.502 Views

Category:

Technology

5 Downloads

Preview:

Click to see full reader

DESCRIPTION

Understanding how Internal Controls over Information systems support Internal Controls over Financial Reporting.

TRANSCRIPT

Internal Controls Over

Information Systems

Information Technology

Internal Controls Over

Information Systems

• Objective – Understand how Internal Controls over Information systems support Internal Controls over Financial Reporting (ICFR)

Agenda

• Internal Controls

• Segregation of Duties

• System Development Lifecycle (SDLC)

• Change Management

• Security

Application/Platform

Logical Security

Physical Security

Agenda

• Security (continued)

Environmental Controls

Monitoring

Backup

Disaster Recovery

• Third Parties/Cloud Computing

• Prioritization

• Summary

Internal Controls Over

Information Systems

Internal Controls

• Internal controls are established as mechanism to achieve desired business objectives

• Counter risks & threats, both external & internal, to business environment

• Ensure business requirements of quality, cost & delivery are met

• Resources are effectively & efficiently used

Internal Controls

• Confidentiality, integrity, availability (CIA) &

reliability of information are met, as well as comply

with statutory & regulatory requirements

• Our focus will be on the last one, (CIA), as it relates

to information systems & financial reporting

Confidentiality

Integrity

Availability

Information System Controls • Segregation of duties

• System development lifecycle (SDLC)

• Security

Logical

Physical

Environmental

Monitoring

Back up

Disaster recovery

• Third parties/cloud computing

System Development Life Cycle

(SDLC)

System Development Life Cycle

(SDLC)

• Assess needs

• Design specifications/Vendor Selection

• Develop/test software

• Implement systems – training, documentation

• Support operations (maintenance)

• Evaluate performance (monitor)

Security

Application/Platform Security

• Risk & vulnerability will vary based on:

Applications and platforms being used

Location of systems: Onsite vs. hosted

Access to source code

Logical Security • Computer access

Access to only what they need to do their job

System/network level

Application level

• Password management

Are they complex?

Do they have to be changed?

Is there policy about not sharing, writing them down, etc.

• Wireless – Secured, Segmented

Logical Security

Access management

• New hires

• Job changes

• Terminations

Timely

• Access audits

Employees

Third parties

Physical Security • Data center

Similar to building controls

What about vendors?

• Work areas

Can computers be stolen?

Can data be stolen?

Can malicious software be uploaded?

• Mobile devices

Monitoring

• User access – failed login attempts

• Unauthorized access attempts through firewalls, routers & VPN

• System usage – thresholds

• Is someone monitoring, reporting & remediating?

• Is a problem & incident system in place?

Others Control Areas

• Strategic Plan

• IT Strategy – strategic plan that includes risk management

• Organizational infrastructure

Adequate number of trained personnel to support systems. Can they do their jobs without causing errors that impact financial data?

Current policies & procedures to prevent errors or disclosures

Summary

Confidentiality – INTEGRITY – Availability

Information System Controls C I A

Segregation of Duties Y Y Y

SDLC & Change Management Y Y Y

Logical Security Y Y Y

Physical Security Y Y Y

Environmental Controls Y

Monitoring Y Y Y

Back Up Y Y Y

Disaster Recovery Y Y Y

Third Parties Y Y Y

Internal Controls Over Financial Reporting Y

Summary

Internal Controls over Information Systems

Ongoing process

Continually changing

Monitoring is key

Review periodically

top related