Deciding to perform an IT audit

Deciding to perform an IT audit

Deciding to perform an IT audit

The IT auditor decides whether to audit IT systems which have an impact on the objectives of the audit by gathering and assessing information on related risks and controls.
Compliance audit Financial audit Performance audit
Planning
Ref: 16.701
Please see also pages on planning an IT audit and performing an IT audit .

Definitions

IT risks are the risks associated with the adoption, ownership, use, operation, and maintenance of IT systems, representing the threats and vulnerabilities associated with these systems. IT controls are the policies, procedures, practices, activities, tools, mechanisms, or other techniques used by an entity to manage IT risks, and can be of an administrative, technical, management or legal nature. IT audit is the examination of IT controls to identify instances of deviation from criteria, including assessing compliance with policies and procedures, laws, regulations, contracts and guidelines, the confidentiality, integrity and availability of data and information and the efficiency and effectiveness of IT operations.

Principles

An experienced IT auditor carries out an initial assessment of IT risks which affect the objectives of the audit. The IT auditor is usually from the IT audit team but can also be an auditor from the chamber who has the appropriate training. When deciding whether to perform an IT audit, we identify and document all the components of the IT environment, the IT systems and subsystems that affect the area we are auditing, and we evaluate the extent of their impact on the audit objectives. We gather information about the IT risks relevant to our audit, and the controls established to mitigate them, to obtain an overview of how the auditee manages IT risk and how this can impact the audit. We assess the IT systems’ importance, complexity and associated risks, and determine which are most critical to the audit. Based on the outcome, we decide whether to perform an IT audit or a review of the minimum IT controls, assess the level of expertise we will require, and provide this information to the audit team for inclusion in the task plan.

Instructions

The auditee's IT environment

To obtain an understanding of the audit area and/or of the entity and its environment , identify and document all the components of the IT environment for the auditee’s processes:
  • obtain information on the role of IT in the organisation and how it helps the auditee achieve its objectives;
  • understand how the IT department and operations are organised and identify key IT roles in the organisation;
  • understand where responsibility for managing the IT systems used by the auditee lies;
  • identify the key processes, information flows and transaction flows which are relevant to the area being audited; and
  • collect information on the key IT controls in place.

IT systems relevant to the audit

To identify the IT systems that impact the audit, and to which extent, consider the following:
  • for a financial audit, identify the IT systems involved in preparing the financial statements, especially those used for accounting operations, and which may be associated with a risk of material misstatement. Examples of such systems could include accounting systems, payroll systems, banking/payment systems, business intelligence systems, robotic process automation systems etc.;
  • for a compliance audit, identify the IT systems the auditee uses to comply with applicable laws and regulations, policies and procedures. Such systems could include workflow management systems, decision support systems, data collection and data processing systems, reporting systems etc.; and
  • for a performance audit, identify the IT systems which are part of the internal control system of the auditee with a direct or indirect impact on performance. In addition, consider assessing the impact of the systems on the reliability of data to be used as evidence, understand the relevant dataflows and identify the IT systems involved in the collection, processing, reporting, and dissemination of data.
Consult previous ECA reports, audit programmes, policy scans, subject briefs, internal presentations, information on the auditee that is publicly available, or ask the auditee directly, for example in interviews or by checking the inventory of IT systems. Assess the impact these systems and sub-systems have on the objective of the audit. For complex systems use the Identification of IT systmes tool to document your understanding of each system’s purpose and assess their impact on the audit objective(s). This can help you determine which of the systems to prioritise.

IT risks identified by the auditee

For background information on levels of IT risk associated with IT systems, review the most common IT risks. Determine whether the auditee systematically identifies, assesses, responds to, and monitors IT risks using processes that are aligned with international standards and best practice such as the ISO/IEC 27005 - Information security, cybersecurity and privacy protection - Guidance on managing information security risks and the NIST special publications SP 800-30 Rev. 1, Guide for Conducting Risk Assessments and SP 800-39, Managing Information Security Risk . If possible, obtain the auditee’s most recent IT risk registry and IT security plan.

IT controls in place

Obtain an overview of the IT controls set up and operated to address each of the specific IT risks for the IT system under review. IT controls can exist at several levels within the auditee:
  • IT governance controls: these controls form the IT control environment, setting the tone and culture of IT in the organisation. These controls describe how IT is viewed by, and integrated into the structure and functioning of the auditee’s strategies, policies, procedures, risk assessment, resource management, training, ethics, quality assurance and internal audit.
  • General IT controls: controls in place for the auditee’s IT activities, which apply to all IT systems. These provide a reliable environment for IT applications to be developed, operated, managed and maintained, and are embedded within IT processes such as application development, access management, change management as well as safeguards built into routine IT operations such as backup and maintenance of the IT infrastructure.
  • Application controls: these are embedded within applications and directly support the processes under review. For example, for a financial reporting application, application controls could include restricting access to specific transactions, prohibiting the recording of unauthorised transactions or manual reconciliations.
ISA 315, Appendix 6: Considerations for Understanding General IT controls provides further details that can be considered. At a minimum, identify and understand the following categories of controls implemented by the auditee:
  • IT governance;
  • change management;
  • information security;
  • business continuity; and
  • third-party providers and outsourcing.
Design and implementation of IT controls

The criticality of the IT system

The criticality of an IT system is the combination between its importance for the audit, its complexity and the potential impact of IT risks associated with the system. The criticality of a given IT system can vary from one audit to another, depending on its importance for the audit objectives and risks associated with it. Consider the following:
  • state of digitalisation of the auditee: the more the processes depend on IT, the higher the IT risk;
  • importance of the IT system to the organisation: the greater the impact of a potential system failure on the organisation overall, the higher the IT risk;
  • relevance of the IT system to the audit: if the processes you are auditing are highly automated, this increases the level of IT risk;
  • accessibility to the public: systems that are directly accessible from the internet are more likely to face security risks;
  • interfaces with other systems: interfaces and interdependencies with other systems increase the IT risk;
  • certifications and accreditations: certified and accredited systems can provide assurance on some elements of IT risk;
  • previous IT audits: recent IT audits can provide assurance regarding elements of IT risk; examine carefully the scope of these IT audits to ensure that the relevant areas are covered;
  • IT security risk assessments: if a system has recently undergone an IT security risk assessment and findings are being addressed, cyber and information security risks are significantly reduced;
  • system development: commercial off the shelf systems with low customization levels are typically less risky than systems developed in-house;
  • sensitivity of processes and data: if the system handles sensitive processes and data, the likelihood of a data breach is higher, and will have greater impact; and
  • emerging technologies: if the system is highly dependent on emerging technologies, that have not been fully evaluated and tested, the risk of the system not performing as expected will increase.
To perform the IT criticality assessment you can use the IT criticality assessment tool to help you quantify the impact of the factors above. For each IT system under review, conclude on whether:
  • it is not critical for achieving the audit objectives or there are no significant IT risks affecting the audit (low criticality);
  • several IT risks exist, and IT control failures may affect the audit objective (medium criticality); or
  • several significant IT risks exist, the audit is highly dependent on the use of technology, or IT control failures significantly affect the audit objective (high criticality).
Based on the level of criticality of the IT system under review apply the set of minimum IT controls to assess whether there is sufficient and reliable evidence on the existence and effectiveness of these controls.

Whether to perform an IT audit

Based on the information you have gathered and the level of criticality of the IT system (low, medium, high) decide together with the audit team and the hierarchy how to address the IT risks. As a guide:
  • if the criticality of the system is low or if you have sufficient and reliable evidence on the existence and effectiveness of IT controls, you may decide to not perform any additional procedures;
  • if the criticality of the system is low or medium, and you do not have sufficient and reliable evidence on the existence and effectiveness of IT controls, include in the audit a review of minimum IT controls using the minimum IT controls checklist as a baseline; or
  • if the criticality of the system is high or the criticality of the system is medium but you do not have sufficient evidence of the existence and effectiveness of IT controls, plan and perform an IT audit .
Last Modified: 05/12/2024 15:25   Tags: